18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * IPv6 virtual tunneling interface 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Copyright (C) 2013 secunet Security Networks AG 68c2ecf20Sopenharmony_ci * 78c2ecf20Sopenharmony_ci * Author: 88c2ecf20Sopenharmony_ci * Steffen Klassert <steffen.klassert@secunet.com> 98c2ecf20Sopenharmony_ci * 108c2ecf20Sopenharmony_ci * Based on: 118c2ecf20Sopenharmony_ci * net/ipv6/ip6_tunnel.c 128c2ecf20Sopenharmony_ci */ 138c2ecf20Sopenharmony_ci 148c2ecf20Sopenharmony_ci#include <linux/module.h> 158c2ecf20Sopenharmony_ci#include <linux/capability.h> 168c2ecf20Sopenharmony_ci#include <linux/errno.h> 178c2ecf20Sopenharmony_ci#include <linux/types.h> 188c2ecf20Sopenharmony_ci#include <linux/sockios.h> 198c2ecf20Sopenharmony_ci#include <linux/icmp.h> 208c2ecf20Sopenharmony_ci#include <linux/if.h> 218c2ecf20Sopenharmony_ci#include <linux/in.h> 228c2ecf20Sopenharmony_ci#include <linux/ip.h> 238c2ecf20Sopenharmony_ci#include <linux/net.h> 248c2ecf20Sopenharmony_ci#include <linux/in6.h> 258c2ecf20Sopenharmony_ci#include <linux/netdevice.h> 268c2ecf20Sopenharmony_ci#include <linux/if_arp.h> 278c2ecf20Sopenharmony_ci#include <linux/icmpv6.h> 288c2ecf20Sopenharmony_ci#include <linux/init.h> 298c2ecf20Sopenharmony_ci#include <linux/route.h> 308c2ecf20Sopenharmony_ci#include <linux/rtnetlink.h> 318c2ecf20Sopenharmony_ci#include <linux/netfilter_ipv6.h> 328c2ecf20Sopenharmony_ci#include <linux/slab.h> 338c2ecf20Sopenharmony_ci#include <linux/hash.h> 348c2ecf20Sopenharmony_ci 358c2ecf20Sopenharmony_ci#include <linux/uaccess.h> 368c2ecf20Sopenharmony_ci#include <linux/atomic.h> 378c2ecf20Sopenharmony_ci 388c2ecf20Sopenharmony_ci#include <net/icmp.h> 398c2ecf20Sopenharmony_ci#include <net/ip.h> 408c2ecf20Sopenharmony_ci#include <net/ip_tunnels.h> 418c2ecf20Sopenharmony_ci#include <net/ipv6.h> 428c2ecf20Sopenharmony_ci#include <net/ip6_route.h> 438c2ecf20Sopenharmony_ci#include <net/addrconf.h> 448c2ecf20Sopenharmony_ci#include <net/ip6_tunnel.h> 458c2ecf20Sopenharmony_ci#include <net/xfrm.h> 468c2ecf20Sopenharmony_ci#include <net/net_namespace.h> 478c2ecf20Sopenharmony_ci#include <net/netns/generic.h> 488c2ecf20Sopenharmony_ci#include <linux/etherdevice.h> 498c2ecf20Sopenharmony_ci 508c2ecf20Sopenharmony_ci#define IP6_VTI_HASH_SIZE_SHIFT 5 518c2ecf20Sopenharmony_ci#define IP6_VTI_HASH_SIZE (1 << IP6_VTI_HASH_SIZE_SHIFT) 528c2ecf20Sopenharmony_ci 538c2ecf20Sopenharmony_cistatic u32 HASH(const struct in6_addr *addr1, const struct in6_addr *addr2) 548c2ecf20Sopenharmony_ci{ 558c2ecf20Sopenharmony_ci u32 hash = ipv6_addr_hash(addr1) ^ ipv6_addr_hash(addr2); 568c2ecf20Sopenharmony_ci 578c2ecf20Sopenharmony_ci return hash_32(hash, IP6_VTI_HASH_SIZE_SHIFT); 588c2ecf20Sopenharmony_ci} 598c2ecf20Sopenharmony_ci 608c2ecf20Sopenharmony_cistatic int vti6_dev_init(struct net_device *dev); 618c2ecf20Sopenharmony_cistatic void vti6_dev_setup(struct net_device *dev); 628c2ecf20Sopenharmony_cistatic struct rtnl_link_ops vti6_link_ops __read_mostly; 638c2ecf20Sopenharmony_ci 648c2ecf20Sopenharmony_cistatic unsigned int vti6_net_id __read_mostly; 658c2ecf20Sopenharmony_cistruct vti6_net { 668c2ecf20Sopenharmony_ci /* the vti6 tunnel fallback device */ 678c2ecf20Sopenharmony_ci struct net_device *fb_tnl_dev; 688c2ecf20Sopenharmony_ci /* lists for storing tunnels in use */ 698c2ecf20Sopenharmony_ci struct ip6_tnl __rcu *tnls_r_l[IP6_VTI_HASH_SIZE]; 708c2ecf20Sopenharmony_ci struct ip6_tnl __rcu *tnls_wc[1]; 718c2ecf20Sopenharmony_ci struct ip6_tnl __rcu **tnls[2]; 728c2ecf20Sopenharmony_ci}; 738c2ecf20Sopenharmony_ci 748c2ecf20Sopenharmony_ci#define for_each_vti6_tunnel_rcu(start) \ 758c2ecf20Sopenharmony_ci for (t = rcu_dereference(start); t; t = rcu_dereference(t->next)) 768c2ecf20Sopenharmony_ci 778c2ecf20Sopenharmony_ci/** 788c2ecf20Sopenharmony_ci * vti6_tnl_lookup - fetch tunnel matching the end-point addresses 798c2ecf20Sopenharmony_ci * @net: network namespace 808c2ecf20Sopenharmony_ci * @remote: the address of the tunnel exit-point 818c2ecf20Sopenharmony_ci * @local: the address of the tunnel entry-point 828c2ecf20Sopenharmony_ci * 838c2ecf20Sopenharmony_ci * Return: 848c2ecf20Sopenharmony_ci * tunnel matching given end-points if found, 858c2ecf20Sopenharmony_ci * else fallback tunnel if its device is up, 868c2ecf20Sopenharmony_ci * else %NULL 878c2ecf20Sopenharmony_ci **/ 888c2ecf20Sopenharmony_cistatic struct ip6_tnl * 898c2ecf20Sopenharmony_civti6_tnl_lookup(struct net *net, const struct in6_addr *remote, 908c2ecf20Sopenharmony_ci const struct in6_addr *local) 918c2ecf20Sopenharmony_ci{ 928c2ecf20Sopenharmony_ci unsigned int hash = HASH(remote, local); 938c2ecf20Sopenharmony_ci struct ip6_tnl *t; 948c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 958c2ecf20Sopenharmony_ci struct in6_addr any; 968c2ecf20Sopenharmony_ci 978c2ecf20Sopenharmony_ci for_each_vti6_tunnel_rcu(ip6n->tnls_r_l[hash]) { 988c2ecf20Sopenharmony_ci if (ipv6_addr_equal(local, &t->parms.laddr) && 998c2ecf20Sopenharmony_ci ipv6_addr_equal(remote, &t->parms.raddr) && 1008c2ecf20Sopenharmony_ci (t->dev->flags & IFF_UP)) 1018c2ecf20Sopenharmony_ci return t; 1028c2ecf20Sopenharmony_ci } 1038c2ecf20Sopenharmony_ci 1048c2ecf20Sopenharmony_ci memset(&any, 0, sizeof(any)); 1058c2ecf20Sopenharmony_ci hash = HASH(&any, local); 1068c2ecf20Sopenharmony_ci for_each_vti6_tunnel_rcu(ip6n->tnls_r_l[hash]) { 1078c2ecf20Sopenharmony_ci if (ipv6_addr_equal(local, &t->parms.laddr) && 1088c2ecf20Sopenharmony_ci (t->dev->flags & IFF_UP)) 1098c2ecf20Sopenharmony_ci return t; 1108c2ecf20Sopenharmony_ci } 1118c2ecf20Sopenharmony_ci 1128c2ecf20Sopenharmony_ci hash = HASH(remote, &any); 1138c2ecf20Sopenharmony_ci for_each_vti6_tunnel_rcu(ip6n->tnls_r_l[hash]) { 1148c2ecf20Sopenharmony_ci if (ipv6_addr_equal(remote, &t->parms.raddr) && 1158c2ecf20Sopenharmony_ci (t->dev->flags & IFF_UP)) 1168c2ecf20Sopenharmony_ci return t; 1178c2ecf20Sopenharmony_ci } 1188c2ecf20Sopenharmony_ci 1198c2ecf20Sopenharmony_ci t = rcu_dereference(ip6n->tnls_wc[0]); 1208c2ecf20Sopenharmony_ci if (t && (t->dev->flags & IFF_UP)) 1218c2ecf20Sopenharmony_ci return t; 1228c2ecf20Sopenharmony_ci 1238c2ecf20Sopenharmony_ci return NULL; 1248c2ecf20Sopenharmony_ci} 1258c2ecf20Sopenharmony_ci 1268c2ecf20Sopenharmony_ci/** 1278c2ecf20Sopenharmony_ci * vti6_tnl_bucket - get head of list matching given tunnel parameters 1288c2ecf20Sopenharmony_ci * @p: parameters containing tunnel end-points 1298c2ecf20Sopenharmony_ci * 1308c2ecf20Sopenharmony_ci * Description: 1318c2ecf20Sopenharmony_ci * vti6_tnl_bucket() returns the head of the list matching the 1328c2ecf20Sopenharmony_ci * &struct in6_addr entries laddr and raddr in @p. 1338c2ecf20Sopenharmony_ci * 1348c2ecf20Sopenharmony_ci * Return: head of IPv6 tunnel list 1358c2ecf20Sopenharmony_ci **/ 1368c2ecf20Sopenharmony_cistatic struct ip6_tnl __rcu ** 1378c2ecf20Sopenharmony_civti6_tnl_bucket(struct vti6_net *ip6n, const struct __ip6_tnl_parm *p) 1388c2ecf20Sopenharmony_ci{ 1398c2ecf20Sopenharmony_ci const struct in6_addr *remote = &p->raddr; 1408c2ecf20Sopenharmony_ci const struct in6_addr *local = &p->laddr; 1418c2ecf20Sopenharmony_ci unsigned int h = 0; 1428c2ecf20Sopenharmony_ci int prio = 0; 1438c2ecf20Sopenharmony_ci 1448c2ecf20Sopenharmony_ci if (!ipv6_addr_any(remote) || !ipv6_addr_any(local)) { 1458c2ecf20Sopenharmony_ci prio = 1; 1468c2ecf20Sopenharmony_ci h = HASH(remote, local); 1478c2ecf20Sopenharmony_ci } 1488c2ecf20Sopenharmony_ci return &ip6n->tnls[prio][h]; 1498c2ecf20Sopenharmony_ci} 1508c2ecf20Sopenharmony_ci 1518c2ecf20Sopenharmony_cistatic void 1528c2ecf20Sopenharmony_civti6_tnl_link(struct vti6_net *ip6n, struct ip6_tnl *t) 1538c2ecf20Sopenharmony_ci{ 1548c2ecf20Sopenharmony_ci struct ip6_tnl __rcu **tp = vti6_tnl_bucket(ip6n, &t->parms); 1558c2ecf20Sopenharmony_ci 1568c2ecf20Sopenharmony_ci rcu_assign_pointer(t->next , rtnl_dereference(*tp)); 1578c2ecf20Sopenharmony_ci rcu_assign_pointer(*tp, t); 1588c2ecf20Sopenharmony_ci} 1598c2ecf20Sopenharmony_ci 1608c2ecf20Sopenharmony_cistatic void 1618c2ecf20Sopenharmony_civti6_tnl_unlink(struct vti6_net *ip6n, struct ip6_tnl *t) 1628c2ecf20Sopenharmony_ci{ 1638c2ecf20Sopenharmony_ci struct ip6_tnl __rcu **tp; 1648c2ecf20Sopenharmony_ci struct ip6_tnl *iter; 1658c2ecf20Sopenharmony_ci 1668c2ecf20Sopenharmony_ci for (tp = vti6_tnl_bucket(ip6n, &t->parms); 1678c2ecf20Sopenharmony_ci (iter = rtnl_dereference(*tp)) != NULL; 1688c2ecf20Sopenharmony_ci tp = &iter->next) { 1698c2ecf20Sopenharmony_ci if (t == iter) { 1708c2ecf20Sopenharmony_ci rcu_assign_pointer(*tp, t->next); 1718c2ecf20Sopenharmony_ci break; 1728c2ecf20Sopenharmony_ci } 1738c2ecf20Sopenharmony_ci } 1748c2ecf20Sopenharmony_ci} 1758c2ecf20Sopenharmony_ci 1768c2ecf20Sopenharmony_cistatic void vti6_dev_free(struct net_device *dev) 1778c2ecf20Sopenharmony_ci{ 1788c2ecf20Sopenharmony_ci free_percpu(dev->tstats); 1798c2ecf20Sopenharmony_ci} 1808c2ecf20Sopenharmony_ci 1818c2ecf20Sopenharmony_cistatic int vti6_tnl_create2(struct net_device *dev) 1828c2ecf20Sopenharmony_ci{ 1838c2ecf20Sopenharmony_ci struct ip6_tnl *t = netdev_priv(dev); 1848c2ecf20Sopenharmony_ci struct net *net = dev_net(dev); 1858c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 1868c2ecf20Sopenharmony_ci int err; 1878c2ecf20Sopenharmony_ci 1888c2ecf20Sopenharmony_ci dev->rtnl_link_ops = &vti6_link_ops; 1898c2ecf20Sopenharmony_ci err = register_netdevice(dev); 1908c2ecf20Sopenharmony_ci if (err < 0) 1918c2ecf20Sopenharmony_ci goto out; 1928c2ecf20Sopenharmony_ci 1938c2ecf20Sopenharmony_ci strcpy(t->parms.name, dev->name); 1948c2ecf20Sopenharmony_ci 1958c2ecf20Sopenharmony_ci vti6_tnl_link(ip6n, t); 1968c2ecf20Sopenharmony_ci 1978c2ecf20Sopenharmony_ci return 0; 1988c2ecf20Sopenharmony_ci 1998c2ecf20Sopenharmony_ciout: 2008c2ecf20Sopenharmony_ci return err; 2018c2ecf20Sopenharmony_ci} 2028c2ecf20Sopenharmony_ci 2038c2ecf20Sopenharmony_cistatic struct ip6_tnl *vti6_tnl_create(struct net *net, struct __ip6_tnl_parm *p) 2048c2ecf20Sopenharmony_ci{ 2058c2ecf20Sopenharmony_ci struct net_device *dev; 2068c2ecf20Sopenharmony_ci struct ip6_tnl *t; 2078c2ecf20Sopenharmony_ci char name[IFNAMSIZ]; 2088c2ecf20Sopenharmony_ci int err; 2098c2ecf20Sopenharmony_ci 2108c2ecf20Sopenharmony_ci if (p->name[0]) { 2118c2ecf20Sopenharmony_ci if (!dev_valid_name(p->name)) 2128c2ecf20Sopenharmony_ci goto failed; 2138c2ecf20Sopenharmony_ci strlcpy(name, p->name, IFNAMSIZ); 2148c2ecf20Sopenharmony_ci } else { 2158c2ecf20Sopenharmony_ci sprintf(name, "ip6_vti%%d"); 2168c2ecf20Sopenharmony_ci } 2178c2ecf20Sopenharmony_ci 2188c2ecf20Sopenharmony_ci dev = alloc_netdev(sizeof(*t), name, NET_NAME_UNKNOWN, vti6_dev_setup); 2198c2ecf20Sopenharmony_ci if (!dev) 2208c2ecf20Sopenharmony_ci goto failed; 2218c2ecf20Sopenharmony_ci 2228c2ecf20Sopenharmony_ci dev_net_set(dev, net); 2238c2ecf20Sopenharmony_ci 2248c2ecf20Sopenharmony_ci t = netdev_priv(dev); 2258c2ecf20Sopenharmony_ci t->parms = *p; 2268c2ecf20Sopenharmony_ci t->net = dev_net(dev); 2278c2ecf20Sopenharmony_ci 2288c2ecf20Sopenharmony_ci err = vti6_tnl_create2(dev); 2298c2ecf20Sopenharmony_ci if (err < 0) 2308c2ecf20Sopenharmony_ci goto failed_free; 2318c2ecf20Sopenharmony_ci 2328c2ecf20Sopenharmony_ci return t; 2338c2ecf20Sopenharmony_ci 2348c2ecf20Sopenharmony_cifailed_free: 2358c2ecf20Sopenharmony_ci free_netdev(dev); 2368c2ecf20Sopenharmony_cifailed: 2378c2ecf20Sopenharmony_ci return NULL; 2388c2ecf20Sopenharmony_ci} 2398c2ecf20Sopenharmony_ci 2408c2ecf20Sopenharmony_ci/** 2418c2ecf20Sopenharmony_ci * vti6_locate - find or create tunnel matching given parameters 2428c2ecf20Sopenharmony_ci * @net: network namespace 2438c2ecf20Sopenharmony_ci * @p: tunnel parameters 2448c2ecf20Sopenharmony_ci * @create: != 0 if allowed to create new tunnel if no match found 2458c2ecf20Sopenharmony_ci * 2468c2ecf20Sopenharmony_ci * Description: 2478c2ecf20Sopenharmony_ci * vti6_locate() first tries to locate an existing tunnel 2488c2ecf20Sopenharmony_ci * based on @parms. If this is unsuccessful, but @create is set a new 2498c2ecf20Sopenharmony_ci * tunnel device is created and registered for use. 2508c2ecf20Sopenharmony_ci * 2518c2ecf20Sopenharmony_ci * Return: 2528c2ecf20Sopenharmony_ci * matching tunnel or NULL 2538c2ecf20Sopenharmony_ci **/ 2548c2ecf20Sopenharmony_cistatic struct ip6_tnl *vti6_locate(struct net *net, struct __ip6_tnl_parm *p, 2558c2ecf20Sopenharmony_ci int create) 2568c2ecf20Sopenharmony_ci{ 2578c2ecf20Sopenharmony_ci const struct in6_addr *remote = &p->raddr; 2588c2ecf20Sopenharmony_ci const struct in6_addr *local = &p->laddr; 2598c2ecf20Sopenharmony_ci struct ip6_tnl __rcu **tp; 2608c2ecf20Sopenharmony_ci struct ip6_tnl *t; 2618c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 2628c2ecf20Sopenharmony_ci 2638c2ecf20Sopenharmony_ci for (tp = vti6_tnl_bucket(ip6n, p); 2648c2ecf20Sopenharmony_ci (t = rtnl_dereference(*tp)) != NULL; 2658c2ecf20Sopenharmony_ci tp = &t->next) { 2668c2ecf20Sopenharmony_ci if (ipv6_addr_equal(local, &t->parms.laddr) && 2678c2ecf20Sopenharmony_ci ipv6_addr_equal(remote, &t->parms.raddr)) { 2688c2ecf20Sopenharmony_ci if (create) 2698c2ecf20Sopenharmony_ci return NULL; 2708c2ecf20Sopenharmony_ci 2718c2ecf20Sopenharmony_ci return t; 2728c2ecf20Sopenharmony_ci } 2738c2ecf20Sopenharmony_ci } 2748c2ecf20Sopenharmony_ci if (!create) 2758c2ecf20Sopenharmony_ci return NULL; 2768c2ecf20Sopenharmony_ci return vti6_tnl_create(net, p); 2778c2ecf20Sopenharmony_ci} 2788c2ecf20Sopenharmony_ci 2798c2ecf20Sopenharmony_ci/** 2808c2ecf20Sopenharmony_ci * vti6_dev_uninit - tunnel device uninitializer 2818c2ecf20Sopenharmony_ci * @dev: the device to be destroyed 2828c2ecf20Sopenharmony_ci * 2838c2ecf20Sopenharmony_ci * Description: 2848c2ecf20Sopenharmony_ci * vti6_dev_uninit() removes tunnel from its list 2858c2ecf20Sopenharmony_ci **/ 2868c2ecf20Sopenharmony_cistatic void vti6_dev_uninit(struct net_device *dev) 2878c2ecf20Sopenharmony_ci{ 2888c2ecf20Sopenharmony_ci struct ip6_tnl *t = netdev_priv(dev); 2898c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(t->net, vti6_net_id); 2908c2ecf20Sopenharmony_ci 2918c2ecf20Sopenharmony_ci if (dev == ip6n->fb_tnl_dev) 2928c2ecf20Sopenharmony_ci RCU_INIT_POINTER(ip6n->tnls_wc[0], NULL); 2938c2ecf20Sopenharmony_ci else 2948c2ecf20Sopenharmony_ci vti6_tnl_unlink(ip6n, t); 2958c2ecf20Sopenharmony_ci dev_put(dev); 2968c2ecf20Sopenharmony_ci} 2978c2ecf20Sopenharmony_ci 2988c2ecf20Sopenharmony_cistatic int vti6_input_proto(struct sk_buff *skb, int nexthdr, __be32 spi, 2998c2ecf20Sopenharmony_ci int encap_type) 3008c2ecf20Sopenharmony_ci{ 3018c2ecf20Sopenharmony_ci struct ip6_tnl *t; 3028c2ecf20Sopenharmony_ci const struct ipv6hdr *ipv6h = ipv6_hdr(skb); 3038c2ecf20Sopenharmony_ci 3048c2ecf20Sopenharmony_ci rcu_read_lock(); 3058c2ecf20Sopenharmony_ci t = vti6_tnl_lookup(dev_net(skb->dev), &ipv6h->saddr, &ipv6h->daddr); 3068c2ecf20Sopenharmony_ci if (t) { 3078c2ecf20Sopenharmony_ci if (t->parms.proto != IPPROTO_IPV6 && t->parms.proto != 0) { 3088c2ecf20Sopenharmony_ci rcu_read_unlock(); 3098c2ecf20Sopenharmony_ci goto discard; 3108c2ecf20Sopenharmony_ci } 3118c2ecf20Sopenharmony_ci 3128c2ecf20Sopenharmony_ci if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) { 3138c2ecf20Sopenharmony_ci rcu_read_unlock(); 3148c2ecf20Sopenharmony_ci goto discard; 3158c2ecf20Sopenharmony_ci } 3168c2ecf20Sopenharmony_ci 3178c2ecf20Sopenharmony_ci ipv6h = ipv6_hdr(skb); 3188c2ecf20Sopenharmony_ci if (!ip6_tnl_rcv_ctl(t, &ipv6h->daddr, &ipv6h->saddr)) { 3198c2ecf20Sopenharmony_ci t->dev->stats.rx_dropped++; 3208c2ecf20Sopenharmony_ci rcu_read_unlock(); 3218c2ecf20Sopenharmony_ci goto discard; 3228c2ecf20Sopenharmony_ci } 3238c2ecf20Sopenharmony_ci 3248c2ecf20Sopenharmony_ci rcu_read_unlock(); 3258c2ecf20Sopenharmony_ci 3268c2ecf20Sopenharmony_ci XFRM_TUNNEL_SKB_CB(skb)->tunnel.ip6 = t; 3278c2ecf20Sopenharmony_ci XFRM_SPI_SKB_CB(skb)->family = AF_INET6; 3288c2ecf20Sopenharmony_ci XFRM_SPI_SKB_CB(skb)->daddroff = offsetof(struct ipv6hdr, daddr); 3298c2ecf20Sopenharmony_ci return xfrm_input(skb, nexthdr, spi, encap_type); 3308c2ecf20Sopenharmony_ci } 3318c2ecf20Sopenharmony_ci rcu_read_unlock(); 3328c2ecf20Sopenharmony_ci return -EINVAL; 3338c2ecf20Sopenharmony_cidiscard: 3348c2ecf20Sopenharmony_ci kfree_skb(skb); 3358c2ecf20Sopenharmony_ci return 0; 3368c2ecf20Sopenharmony_ci} 3378c2ecf20Sopenharmony_ci 3388c2ecf20Sopenharmony_cistatic int vti6_rcv(struct sk_buff *skb) 3398c2ecf20Sopenharmony_ci{ 3408c2ecf20Sopenharmony_ci int nexthdr = skb_network_header(skb)[IP6CB(skb)->nhoff]; 3418c2ecf20Sopenharmony_ci 3428c2ecf20Sopenharmony_ci return vti6_input_proto(skb, nexthdr, 0, 0); 3438c2ecf20Sopenharmony_ci} 3448c2ecf20Sopenharmony_ci 3458c2ecf20Sopenharmony_cistatic int vti6_rcv_cb(struct sk_buff *skb, int err) 3468c2ecf20Sopenharmony_ci{ 3478c2ecf20Sopenharmony_ci unsigned short family; 3488c2ecf20Sopenharmony_ci struct net_device *dev; 3498c2ecf20Sopenharmony_ci struct xfrm_state *x; 3508c2ecf20Sopenharmony_ci const struct xfrm_mode *inner_mode; 3518c2ecf20Sopenharmony_ci struct ip6_tnl *t = XFRM_TUNNEL_SKB_CB(skb)->tunnel.ip6; 3528c2ecf20Sopenharmony_ci u32 orig_mark = skb->mark; 3538c2ecf20Sopenharmony_ci int ret; 3548c2ecf20Sopenharmony_ci 3558c2ecf20Sopenharmony_ci if (!t) 3568c2ecf20Sopenharmony_ci return 1; 3578c2ecf20Sopenharmony_ci 3588c2ecf20Sopenharmony_ci dev = t->dev; 3598c2ecf20Sopenharmony_ci 3608c2ecf20Sopenharmony_ci if (err) { 3618c2ecf20Sopenharmony_ci dev->stats.rx_errors++; 3628c2ecf20Sopenharmony_ci dev->stats.rx_dropped++; 3638c2ecf20Sopenharmony_ci 3648c2ecf20Sopenharmony_ci return 0; 3658c2ecf20Sopenharmony_ci } 3668c2ecf20Sopenharmony_ci 3678c2ecf20Sopenharmony_ci x = xfrm_input_state(skb); 3688c2ecf20Sopenharmony_ci 3698c2ecf20Sopenharmony_ci inner_mode = &x->inner_mode; 3708c2ecf20Sopenharmony_ci 3718c2ecf20Sopenharmony_ci if (x->sel.family == AF_UNSPEC) { 3728c2ecf20Sopenharmony_ci inner_mode = xfrm_ip2inner_mode(x, XFRM_MODE_SKB_CB(skb)->protocol); 3738c2ecf20Sopenharmony_ci if (inner_mode == NULL) { 3748c2ecf20Sopenharmony_ci XFRM_INC_STATS(dev_net(skb->dev), 3758c2ecf20Sopenharmony_ci LINUX_MIB_XFRMINSTATEMODEERROR); 3768c2ecf20Sopenharmony_ci return -EINVAL; 3778c2ecf20Sopenharmony_ci } 3788c2ecf20Sopenharmony_ci } 3798c2ecf20Sopenharmony_ci 3808c2ecf20Sopenharmony_ci family = inner_mode->family; 3818c2ecf20Sopenharmony_ci 3828c2ecf20Sopenharmony_ci skb->mark = be32_to_cpu(t->parms.i_key); 3838c2ecf20Sopenharmony_ci ret = xfrm_policy_check(NULL, XFRM_POLICY_IN, skb, family); 3848c2ecf20Sopenharmony_ci skb->mark = orig_mark; 3858c2ecf20Sopenharmony_ci 3868c2ecf20Sopenharmony_ci if (!ret) 3878c2ecf20Sopenharmony_ci return -EPERM; 3888c2ecf20Sopenharmony_ci 3898c2ecf20Sopenharmony_ci skb_scrub_packet(skb, !net_eq(t->net, dev_net(skb->dev))); 3908c2ecf20Sopenharmony_ci skb->dev = dev; 3918c2ecf20Sopenharmony_ci dev_sw_netstats_rx_add(dev, skb->len); 3928c2ecf20Sopenharmony_ci 3938c2ecf20Sopenharmony_ci return 0; 3948c2ecf20Sopenharmony_ci} 3958c2ecf20Sopenharmony_ci 3968c2ecf20Sopenharmony_ci/** 3978c2ecf20Sopenharmony_ci * vti6_addr_conflict - compare packet addresses to tunnel's own 3988c2ecf20Sopenharmony_ci * @t: the outgoing tunnel device 3998c2ecf20Sopenharmony_ci * @hdr: IPv6 header from the incoming packet 4008c2ecf20Sopenharmony_ci * 4018c2ecf20Sopenharmony_ci * Description: 4028c2ecf20Sopenharmony_ci * Avoid trivial tunneling loop by checking that tunnel exit-point 4038c2ecf20Sopenharmony_ci * doesn't match source of incoming packet. 4048c2ecf20Sopenharmony_ci * 4058c2ecf20Sopenharmony_ci * Return: 4068c2ecf20Sopenharmony_ci * 1 if conflict, 4078c2ecf20Sopenharmony_ci * 0 else 4088c2ecf20Sopenharmony_ci **/ 4098c2ecf20Sopenharmony_cistatic inline bool 4108c2ecf20Sopenharmony_civti6_addr_conflict(const struct ip6_tnl *t, const struct ipv6hdr *hdr) 4118c2ecf20Sopenharmony_ci{ 4128c2ecf20Sopenharmony_ci return ipv6_addr_equal(&t->parms.raddr, &hdr->saddr); 4138c2ecf20Sopenharmony_ci} 4148c2ecf20Sopenharmony_ci 4158c2ecf20Sopenharmony_cistatic bool vti6_state_check(const struct xfrm_state *x, 4168c2ecf20Sopenharmony_ci const struct in6_addr *dst, 4178c2ecf20Sopenharmony_ci const struct in6_addr *src) 4188c2ecf20Sopenharmony_ci{ 4198c2ecf20Sopenharmony_ci xfrm_address_t *daddr = (xfrm_address_t *)dst; 4208c2ecf20Sopenharmony_ci xfrm_address_t *saddr = (xfrm_address_t *)src; 4218c2ecf20Sopenharmony_ci 4228c2ecf20Sopenharmony_ci /* if there is no transform then this tunnel is not functional. 4238c2ecf20Sopenharmony_ci * Or if the xfrm is not mode tunnel. 4248c2ecf20Sopenharmony_ci */ 4258c2ecf20Sopenharmony_ci if (!x || x->props.mode != XFRM_MODE_TUNNEL || 4268c2ecf20Sopenharmony_ci x->props.family != AF_INET6) 4278c2ecf20Sopenharmony_ci return false; 4288c2ecf20Sopenharmony_ci 4298c2ecf20Sopenharmony_ci if (ipv6_addr_any(dst)) 4308c2ecf20Sopenharmony_ci return xfrm_addr_equal(saddr, &x->props.saddr, AF_INET6); 4318c2ecf20Sopenharmony_ci 4328c2ecf20Sopenharmony_ci if (!xfrm_state_addr_check(x, daddr, saddr, AF_INET6)) 4338c2ecf20Sopenharmony_ci return false; 4348c2ecf20Sopenharmony_ci 4358c2ecf20Sopenharmony_ci return true; 4368c2ecf20Sopenharmony_ci} 4378c2ecf20Sopenharmony_ci 4388c2ecf20Sopenharmony_ci/** 4398c2ecf20Sopenharmony_ci * vti6_xmit - send a packet 4408c2ecf20Sopenharmony_ci * @skb: the outgoing socket buffer 4418c2ecf20Sopenharmony_ci * @dev: the outgoing tunnel device 4428c2ecf20Sopenharmony_ci * @fl: the flow informations for the xfrm_lookup 4438c2ecf20Sopenharmony_ci **/ 4448c2ecf20Sopenharmony_cistatic int 4458c2ecf20Sopenharmony_civti6_xmit(struct sk_buff *skb, struct net_device *dev, struct flowi *fl) 4468c2ecf20Sopenharmony_ci{ 4478c2ecf20Sopenharmony_ci struct ip6_tnl *t = netdev_priv(dev); 4488c2ecf20Sopenharmony_ci struct net_device_stats *stats = &t->dev->stats; 4498c2ecf20Sopenharmony_ci struct dst_entry *dst = skb_dst(skb); 4508c2ecf20Sopenharmony_ci struct net_device *tdev; 4518c2ecf20Sopenharmony_ci struct xfrm_state *x; 4528c2ecf20Sopenharmony_ci int pkt_len = skb->len; 4538c2ecf20Sopenharmony_ci int err = -1; 4548c2ecf20Sopenharmony_ci int mtu; 4558c2ecf20Sopenharmony_ci 4568c2ecf20Sopenharmony_ci if (!dst) { 4578c2ecf20Sopenharmony_ci switch (skb->protocol) { 4588c2ecf20Sopenharmony_ci case htons(ETH_P_IP): { 4598c2ecf20Sopenharmony_ci struct rtable *rt; 4608c2ecf20Sopenharmony_ci 4618c2ecf20Sopenharmony_ci fl->u.ip4.flowi4_oif = dev->ifindex; 4628c2ecf20Sopenharmony_ci fl->u.ip4.flowi4_flags |= FLOWI_FLAG_ANYSRC; 4638c2ecf20Sopenharmony_ci rt = __ip_route_output_key(dev_net(dev), &fl->u.ip4); 4648c2ecf20Sopenharmony_ci if (IS_ERR(rt)) 4658c2ecf20Sopenharmony_ci goto tx_err_link_failure; 4668c2ecf20Sopenharmony_ci dst = &rt->dst; 4678c2ecf20Sopenharmony_ci skb_dst_set(skb, dst); 4688c2ecf20Sopenharmony_ci break; 4698c2ecf20Sopenharmony_ci } 4708c2ecf20Sopenharmony_ci case htons(ETH_P_IPV6): 4718c2ecf20Sopenharmony_ci fl->u.ip6.flowi6_oif = dev->ifindex; 4728c2ecf20Sopenharmony_ci fl->u.ip6.flowi6_flags |= FLOWI_FLAG_ANYSRC; 4738c2ecf20Sopenharmony_ci dst = ip6_route_output(dev_net(dev), NULL, &fl->u.ip6); 4748c2ecf20Sopenharmony_ci if (dst->error) { 4758c2ecf20Sopenharmony_ci dst_release(dst); 4768c2ecf20Sopenharmony_ci dst = NULL; 4778c2ecf20Sopenharmony_ci goto tx_err_link_failure; 4788c2ecf20Sopenharmony_ci } 4798c2ecf20Sopenharmony_ci skb_dst_set(skb, dst); 4808c2ecf20Sopenharmony_ci break; 4818c2ecf20Sopenharmony_ci default: 4828c2ecf20Sopenharmony_ci goto tx_err_link_failure; 4838c2ecf20Sopenharmony_ci } 4848c2ecf20Sopenharmony_ci } 4858c2ecf20Sopenharmony_ci 4868c2ecf20Sopenharmony_ci dst_hold(dst); 4878c2ecf20Sopenharmony_ci dst = xfrm_lookup_route(t->net, dst, fl, NULL, 0); 4888c2ecf20Sopenharmony_ci if (IS_ERR(dst)) { 4898c2ecf20Sopenharmony_ci err = PTR_ERR(dst); 4908c2ecf20Sopenharmony_ci dst = NULL; 4918c2ecf20Sopenharmony_ci goto tx_err_link_failure; 4928c2ecf20Sopenharmony_ci } 4938c2ecf20Sopenharmony_ci 4948c2ecf20Sopenharmony_ci if (dst->flags & DST_XFRM_QUEUE) 4958c2ecf20Sopenharmony_ci goto xmit; 4968c2ecf20Sopenharmony_ci 4978c2ecf20Sopenharmony_ci x = dst->xfrm; 4988c2ecf20Sopenharmony_ci if (!vti6_state_check(x, &t->parms.raddr, &t->parms.laddr)) 4998c2ecf20Sopenharmony_ci goto tx_err_link_failure; 5008c2ecf20Sopenharmony_ci 5018c2ecf20Sopenharmony_ci if (!ip6_tnl_xmit_ctl(t, (const struct in6_addr *)&x->props.saddr, 5028c2ecf20Sopenharmony_ci (const struct in6_addr *)&x->id.daddr)) 5038c2ecf20Sopenharmony_ci goto tx_err_link_failure; 5048c2ecf20Sopenharmony_ci 5058c2ecf20Sopenharmony_ci tdev = dst->dev; 5068c2ecf20Sopenharmony_ci 5078c2ecf20Sopenharmony_ci if (tdev == dev) { 5088c2ecf20Sopenharmony_ci stats->collisions++; 5098c2ecf20Sopenharmony_ci net_warn_ratelimited("%s: Local routing loop detected!\n", 5108c2ecf20Sopenharmony_ci t->parms.name); 5118c2ecf20Sopenharmony_ci goto tx_err_dst_release; 5128c2ecf20Sopenharmony_ci } 5138c2ecf20Sopenharmony_ci 5148c2ecf20Sopenharmony_ci mtu = dst_mtu(dst); 5158c2ecf20Sopenharmony_ci if (skb->len > mtu) { 5168c2ecf20Sopenharmony_ci skb_dst_update_pmtu_no_confirm(skb, mtu); 5178c2ecf20Sopenharmony_ci 5188c2ecf20Sopenharmony_ci if (skb->protocol == htons(ETH_P_IPV6)) { 5198c2ecf20Sopenharmony_ci if (mtu < IPV6_MIN_MTU) 5208c2ecf20Sopenharmony_ci mtu = IPV6_MIN_MTU; 5218c2ecf20Sopenharmony_ci 5228c2ecf20Sopenharmony_ci icmpv6_ndo_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 5238c2ecf20Sopenharmony_ci } else { 5248c2ecf20Sopenharmony_ci if (!(ip_hdr(skb)->frag_off & htons(IP_DF))) 5258c2ecf20Sopenharmony_ci goto xmit; 5268c2ecf20Sopenharmony_ci icmp_ndo_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, 5278c2ecf20Sopenharmony_ci htonl(mtu)); 5288c2ecf20Sopenharmony_ci } 5298c2ecf20Sopenharmony_ci 5308c2ecf20Sopenharmony_ci err = -EMSGSIZE; 5318c2ecf20Sopenharmony_ci goto tx_err_dst_release; 5328c2ecf20Sopenharmony_ci } 5338c2ecf20Sopenharmony_ci 5348c2ecf20Sopenharmony_cixmit: 5358c2ecf20Sopenharmony_ci skb_scrub_packet(skb, !net_eq(t->net, dev_net(dev))); 5368c2ecf20Sopenharmony_ci skb_dst_set(skb, dst); 5378c2ecf20Sopenharmony_ci skb->dev = skb_dst(skb)->dev; 5388c2ecf20Sopenharmony_ci 5398c2ecf20Sopenharmony_ci err = dst_output(t->net, skb->sk, skb); 5408c2ecf20Sopenharmony_ci if (net_xmit_eval(err) == 0) 5418c2ecf20Sopenharmony_ci err = pkt_len; 5428c2ecf20Sopenharmony_ci iptunnel_xmit_stats(dev, err); 5438c2ecf20Sopenharmony_ci 5448c2ecf20Sopenharmony_ci return 0; 5458c2ecf20Sopenharmony_citx_err_link_failure: 5468c2ecf20Sopenharmony_ci stats->tx_carrier_errors++; 5478c2ecf20Sopenharmony_ci dst_link_failure(skb); 5488c2ecf20Sopenharmony_citx_err_dst_release: 5498c2ecf20Sopenharmony_ci dst_release(dst); 5508c2ecf20Sopenharmony_ci return err; 5518c2ecf20Sopenharmony_ci} 5528c2ecf20Sopenharmony_ci 5538c2ecf20Sopenharmony_cistatic netdev_tx_t 5548c2ecf20Sopenharmony_civti6_tnl_xmit(struct sk_buff *skb, struct net_device *dev) 5558c2ecf20Sopenharmony_ci{ 5568c2ecf20Sopenharmony_ci struct ip6_tnl *t = netdev_priv(dev); 5578c2ecf20Sopenharmony_ci struct net_device_stats *stats = &t->dev->stats; 5588c2ecf20Sopenharmony_ci struct flowi fl; 5598c2ecf20Sopenharmony_ci int ret; 5608c2ecf20Sopenharmony_ci 5618c2ecf20Sopenharmony_ci if (!pskb_inet_may_pull(skb)) 5628c2ecf20Sopenharmony_ci goto tx_err; 5638c2ecf20Sopenharmony_ci 5648c2ecf20Sopenharmony_ci memset(&fl, 0, sizeof(fl)); 5658c2ecf20Sopenharmony_ci 5668c2ecf20Sopenharmony_ci switch (skb->protocol) { 5678c2ecf20Sopenharmony_ci case htons(ETH_P_IPV6): 5688c2ecf20Sopenharmony_ci if ((t->parms.proto != IPPROTO_IPV6 && t->parms.proto != 0) || 5698c2ecf20Sopenharmony_ci vti6_addr_conflict(t, ipv6_hdr(skb))) 5708c2ecf20Sopenharmony_ci goto tx_err; 5718c2ecf20Sopenharmony_ci 5728c2ecf20Sopenharmony_ci memset(IP6CB(skb), 0, sizeof(*IP6CB(skb))); 5738c2ecf20Sopenharmony_ci xfrm_decode_session(skb, &fl, AF_INET6); 5748c2ecf20Sopenharmony_ci break; 5758c2ecf20Sopenharmony_ci case htons(ETH_P_IP): 5768c2ecf20Sopenharmony_ci memset(IPCB(skb), 0, sizeof(*IPCB(skb))); 5778c2ecf20Sopenharmony_ci xfrm_decode_session(skb, &fl, AF_INET); 5788c2ecf20Sopenharmony_ci break; 5798c2ecf20Sopenharmony_ci default: 5808c2ecf20Sopenharmony_ci goto tx_err; 5818c2ecf20Sopenharmony_ci } 5828c2ecf20Sopenharmony_ci 5838c2ecf20Sopenharmony_ci /* override mark with tunnel output key */ 5848c2ecf20Sopenharmony_ci fl.flowi_mark = be32_to_cpu(t->parms.o_key); 5858c2ecf20Sopenharmony_ci 5868c2ecf20Sopenharmony_ci ret = vti6_xmit(skb, dev, &fl); 5878c2ecf20Sopenharmony_ci if (ret < 0) 5888c2ecf20Sopenharmony_ci goto tx_err; 5898c2ecf20Sopenharmony_ci 5908c2ecf20Sopenharmony_ci return NETDEV_TX_OK; 5918c2ecf20Sopenharmony_ci 5928c2ecf20Sopenharmony_citx_err: 5938c2ecf20Sopenharmony_ci stats->tx_errors++; 5948c2ecf20Sopenharmony_ci stats->tx_dropped++; 5958c2ecf20Sopenharmony_ci kfree_skb(skb); 5968c2ecf20Sopenharmony_ci return NETDEV_TX_OK; 5978c2ecf20Sopenharmony_ci} 5988c2ecf20Sopenharmony_ci 5998c2ecf20Sopenharmony_cistatic int vti6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, 6008c2ecf20Sopenharmony_ci u8 type, u8 code, int offset, __be32 info) 6018c2ecf20Sopenharmony_ci{ 6028c2ecf20Sopenharmony_ci __be32 spi; 6038c2ecf20Sopenharmony_ci __u32 mark; 6048c2ecf20Sopenharmony_ci struct xfrm_state *x; 6058c2ecf20Sopenharmony_ci struct ip6_tnl *t; 6068c2ecf20Sopenharmony_ci struct ip_esp_hdr *esph; 6078c2ecf20Sopenharmony_ci struct ip_auth_hdr *ah; 6088c2ecf20Sopenharmony_ci struct ip_comp_hdr *ipch; 6098c2ecf20Sopenharmony_ci struct net *net = dev_net(skb->dev); 6108c2ecf20Sopenharmony_ci const struct ipv6hdr *iph = (const struct ipv6hdr *)skb->data; 6118c2ecf20Sopenharmony_ci int protocol = iph->nexthdr; 6128c2ecf20Sopenharmony_ci 6138c2ecf20Sopenharmony_ci t = vti6_tnl_lookup(dev_net(skb->dev), &iph->daddr, &iph->saddr); 6148c2ecf20Sopenharmony_ci if (!t) 6158c2ecf20Sopenharmony_ci return -1; 6168c2ecf20Sopenharmony_ci 6178c2ecf20Sopenharmony_ci mark = be32_to_cpu(t->parms.o_key); 6188c2ecf20Sopenharmony_ci 6198c2ecf20Sopenharmony_ci switch (protocol) { 6208c2ecf20Sopenharmony_ci case IPPROTO_ESP: 6218c2ecf20Sopenharmony_ci esph = (struct ip_esp_hdr *)(skb->data + offset); 6228c2ecf20Sopenharmony_ci spi = esph->spi; 6238c2ecf20Sopenharmony_ci break; 6248c2ecf20Sopenharmony_ci case IPPROTO_AH: 6258c2ecf20Sopenharmony_ci ah = (struct ip_auth_hdr *)(skb->data + offset); 6268c2ecf20Sopenharmony_ci spi = ah->spi; 6278c2ecf20Sopenharmony_ci break; 6288c2ecf20Sopenharmony_ci case IPPROTO_COMP: 6298c2ecf20Sopenharmony_ci ipch = (struct ip_comp_hdr *)(skb->data + offset); 6308c2ecf20Sopenharmony_ci spi = htonl(ntohs(ipch->cpi)); 6318c2ecf20Sopenharmony_ci break; 6328c2ecf20Sopenharmony_ci default: 6338c2ecf20Sopenharmony_ci return 0; 6348c2ecf20Sopenharmony_ci } 6358c2ecf20Sopenharmony_ci 6368c2ecf20Sopenharmony_ci if (type != ICMPV6_PKT_TOOBIG && 6378c2ecf20Sopenharmony_ci type != NDISC_REDIRECT) 6388c2ecf20Sopenharmony_ci return 0; 6398c2ecf20Sopenharmony_ci 6408c2ecf20Sopenharmony_ci x = xfrm_state_lookup(net, mark, (const xfrm_address_t *)&iph->daddr, 6418c2ecf20Sopenharmony_ci spi, protocol, AF_INET6); 6428c2ecf20Sopenharmony_ci if (!x) 6438c2ecf20Sopenharmony_ci return 0; 6448c2ecf20Sopenharmony_ci 6458c2ecf20Sopenharmony_ci if (type == NDISC_REDIRECT) 6468c2ecf20Sopenharmony_ci ip6_redirect(skb, net, skb->dev->ifindex, 0, 6478c2ecf20Sopenharmony_ci sock_net_uid(net, NULL)); 6488c2ecf20Sopenharmony_ci else 6498c2ecf20Sopenharmony_ci ip6_update_pmtu(skb, net, info, 0, 0, sock_net_uid(net, NULL)); 6508c2ecf20Sopenharmony_ci xfrm_state_put(x); 6518c2ecf20Sopenharmony_ci 6528c2ecf20Sopenharmony_ci return 0; 6538c2ecf20Sopenharmony_ci} 6548c2ecf20Sopenharmony_ci 6558c2ecf20Sopenharmony_cistatic void vti6_link_config(struct ip6_tnl *t, bool keep_mtu) 6568c2ecf20Sopenharmony_ci{ 6578c2ecf20Sopenharmony_ci struct net_device *dev = t->dev; 6588c2ecf20Sopenharmony_ci struct __ip6_tnl_parm *p = &t->parms; 6598c2ecf20Sopenharmony_ci struct net_device *tdev = NULL; 6608c2ecf20Sopenharmony_ci int mtu; 6618c2ecf20Sopenharmony_ci 6628c2ecf20Sopenharmony_ci memcpy(dev->dev_addr, &p->laddr, sizeof(struct in6_addr)); 6638c2ecf20Sopenharmony_ci memcpy(dev->broadcast, &p->raddr, sizeof(struct in6_addr)); 6648c2ecf20Sopenharmony_ci 6658c2ecf20Sopenharmony_ci p->flags &= ~(IP6_TNL_F_CAP_XMIT | IP6_TNL_F_CAP_RCV | 6668c2ecf20Sopenharmony_ci IP6_TNL_F_CAP_PER_PACKET); 6678c2ecf20Sopenharmony_ci p->flags |= ip6_tnl_get_cap(t, &p->laddr, &p->raddr); 6688c2ecf20Sopenharmony_ci 6698c2ecf20Sopenharmony_ci if (p->flags & IP6_TNL_F_CAP_XMIT && p->flags & IP6_TNL_F_CAP_RCV) 6708c2ecf20Sopenharmony_ci dev->flags |= IFF_POINTOPOINT; 6718c2ecf20Sopenharmony_ci else 6728c2ecf20Sopenharmony_ci dev->flags &= ~IFF_POINTOPOINT; 6738c2ecf20Sopenharmony_ci 6748c2ecf20Sopenharmony_ci if (keep_mtu && dev->mtu) { 6758c2ecf20Sopenharmony_ci dev->mtu = clamp(dev->mtu, dev->min_mtu, dev->max_mtu); 6768c2ecf20Sopenharmony_ci return; 6778c2ecf20Sopenharmony_ci } 6788c2ecf20Sopenharmony_ci 6798c2ecf20Sopenharmony_ci if (p->flags & IP6_TNL_F_CAP_XMIT) { 6808c2ecf20Sopenharmony_ci int strict = (ipv6_addr_type(&p->raddr) & 6818c2ecf20Sopenharmony_ci (IPV6_ADDR_MULTICAST | IPV6_ADDR_LINKLOCAL)); 6828c2ecf20Sopenharmony_ci struct rt6_info *rt = rt6_lookup(t->net, 6838c2ecf20Sopenharmony_ci &p->raddr, &p->laddr, 6848c2ecf20Sopenharmony_ci p->link, NULL, strict); 6858c2ecf20Sopenharmony_ci 6868c2ecf20Sopenharmony_ci if (rt) 6878c2ecf20Sopenharmony_ci tdev = rt->dst.dev; 6888c2ecf20Sopenharmony_ci ip6_rt_put(rt); 6898c2ecf20Sopenharmony_ci } 6908c2ecf20Sopenharmony_ci 6918c2ecf20Sopenharmony_ci if (!tdev && p->link) 6928c2ecf20Sopenharmony_ci tdev = __dev_get_by_index(t->net, p->link); 6938c2ecf20Sopenharmony_ci 6948c2ecf20Sopenharmony_ci if (tdev) 6958c2ecf20Sopenharmony_ci mtu = tdev->mtu - sizeof(struct ipv6hdr); 6968c2ecf20Sopenharmony_ci else 6978c2ecf20Sopenharmony_ci mtu = ETH_DATA_LEN - LL_MAX_HEADER - sizeof(struct ipv6hdr); 6988c2ecf20Sopenharmony_ci 6998c2ecf20Sopenharmony_ci dev->mtu = max_t(int, mtu, IPV4_MIN_MTU); 7008c2ecf20Sopenharmony_ci} 7018c2ecf20Sopenharmony_ci 7028c2ecf20Sopenharmony_ci/** 7038c2ecf20Sopenharmony_ci * vti6_tnl_change - update the tunnel parameters 7048c2ecf20Sopenharmony_ci * @t: tunnel to be changed 7058c2ecf20Sopenharmony_ci * @p: tunnel configuration parameters 7068c2ecf20Sopenharmony_ci * @keep_mtu: MTU was set from userspace, don't re-compute it 7078c2ecf20Sopenharmony_ci * 7088c2ecf20Sopenharmony_ci * Description: 7098c2ecf20Sopenharmony_ci * vti6_tnl_change() updates the tunnel parameters 7108c2ecf20Sopenharmony_ci **/ 7118c2ecf20Sopenharmony_cistatic int 7128c2ecf20Sopenharmony_civti6_tnl_change(struct ip6_tnl *t, const struct __ip6_tnl_parm *p, 7138c2ecf20Sopenharmony_ci bool keep_mtu) 7148c2ecf20Sopenharmony_ci{ 7158c2ecf20Sopenharmony_ci t->parms.laddr = p->laddr; 7168c2ecf20Sopenharmony_ci t->parms.raddr = p->raddr; 7178c2ecf20Sopenharmony_ci t->parms.link = p->link; 7188c2ecf20Sopenharmony_ci t->parms.i_key = p->i_key; 7198c2ecf20Sopenharmony_ci t->parms.o_key = p->o_key; 7208c2ecf20Sopenharmony_ci t->parms.proto = p->proto; 7218c2ecf20Sopenharmony_ci t->parms.fwmark = p->fwmark; 7228c2ecf20Sopenharmony_ci dst_cache_reset(&t->dst_cache); 7238c2ecf20Sopenharmony_ci vti6_link_config(t, keep_mtu); 7248c2ecf20Sopenharmony_ci return 0; 7258c2ecf20Sopenharmony_ci} 7268c2ecf20Sopenharmony_ci 7278c2ecf20Sopenharmony_cistatic int vti6_update(struct ip6_tnl *t, struct __ip6_tnl_parm *p, 7288c2ecf20Sopenharmony_ci bool keep_mtu) 7298c2ecf20Sopenharmony_ci{ 7308c2ecf20Sopenharmony_ci struct net *net = dev_net(t->dev); 7318c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 7328c2ecf20Sopenharmony_ci int err; 7338c2ecf20Sopenharmony_ci 7348c2ecf20Sopenharmony_ci vti6_tnl_unlink(ip6n, t); 7358c2ecf20Sopenharmony_ci synchronize_net(); 7368c2ecf20Sopenharmony_ci err = vti6_tnl_change(t, p, keep_mtu); 7378c2ecf20Sopenharmony_ci vti6_tnl_link(ip6n, t); 7388c2ecf20Sopenharmony_ci netdev_state_change(t->dev); 7398c2ecf20Sopenharmony_ci return err; 7408c2ecf20Sopenharmony_ci} 7418c2ecf20Sopenharmony_ci 7428c2ecf20Sopenharmony_cistatic void 7438c2ecf20Sopenharmony_civti6_parm_from_user(struct __ip6_tnl_parm *p, const struct ip6_tnl_parm2 *u) 7448c2ecf20Sopenharmony_ci{ 7458c2ecf20Sopenharmony_ci p->laddr = u->laddr; 7468c2ecf20Sopenharmony_ci p->raddr = u->raddr; 7478c2ecf20Sopenharmony_ci p->link = u->link; 7488c2ecf20Sopenharmony_ci p->i_key = u->i_key; 7498c2ecf20Sopenharmony_ci p->o_key = u->o_key; 7508c2ecf20Sopenharmony_ci p->proto = u->proto; 7518c2ecf20Sopenharmony_ci 7528c2ecf20Sopenharmony_ci memcpy(p->name, u->name, sizeof(u->name)); 7538c2ecf20Sopenharmony_ci} 7548c2ecf20Sopenharmony_ci 7558c2ecf20Sopenharmony_cistatic void 7568c2ecf20Sopenharmony_civti6_parm_to_user(struct ip6_tnl_parm2 *u, const struct __ip6_tnl_parm *p) 7578c2ecf20Sopenharmony_ci{ 7588c2ecf20Sopenharmony_ci u->laddr = p->laddr; 7598c2ecf20Sopenharmony_ci u->raddr = p->raddr; 7608c2ecf20Sopenharmony_ci u->link = p->link; 7618c2ecf20Sopenharmony_ci u->i_key = p->i_key; 7628c2ecf20Sopenharmony_ci u->o_key = p->o_key; 7638c2ecf20Sopenharmony_ci if (u->i_key) 7648c2ecf20Sopenharmony_ci u->i_flags |= GRE_KEY; 7658c2ecf20Sopenharmony_ci if (u->o_key) 7668c2ecf20Sopenharmony_ci u->o_flags |= GRE_KEY; 7678c2ecf20Sopenharmony_ci u->proto = p->proto; 7688c2ecf20Sopenharmony_ci 7698c2ecf20Sopenharmony_ci memcpy(u->name, p->name, sizeof(u->name)); 7708c2ecf20Sopenharmony_ci} 7718c2ecf20Sopenharmony_ci 7728c2ecf20Sopenharmony_ci/** 7738c2ecf20Sopenharmony_ci * vti6_ioctl - configure vti6 tunnels from userspace 7748c2ecf20Sopenharmony_ci * @dev: virtual device associated with tunnel 7758c2ecf20Sopenharmony_ci * @ifr: parameters passed from userspace 7768c2ecf20Sopenharmony_ci * @cmd: command to be performed 7778c2ecf20Sopenharmony_ci * 7788c2ecf20Sopenharmony_ci * Description: 7798c2ecf20Sopenharmony_ci * vti6_ioctl() is used for managing vti6 tunnels 7808c2ecf20Sopenharmony_ci * from userspace. 7818c2ecf20Sopenharmony_ci * 7828c2ecf20Sopenharmony_ci * The possible commands are the following: 7838c2ecf20Sopenharmony_ci * %SIOCGETTUNNEL: get tunnel parameters for device 7848c2ecf20Sopenharmony_ci * %SIOCADDTUNNEL: add tunnel matching given tunnel parameters 7858c2ecf20Sopenharmony_ci * %SIOCCHGTUNNEL: change tunnel parameters to those given 7868c2ecf20Sopenharmony_ci * %SIOCDELTUNNEL: delete tunnel 7878c2ecf20Sopenharmony_ci * 7888c2ecf20Sopenharmony_ci * The fallback device "ip6_vti0", created during module 7898c2ecf20Sopenharmony_ci * initialization, can be used for creating other tunnel devices. 7908c2ecf20Sopenharmony_ci * 7918c2ecf20Sopenharmony_ci * Return: 7928c2ecf20Sopenharmony_ci * 0 on success, 7938c2ecf20Sopenharmony_ci * %-EFAULT if unable to copy data to or from userspace, 7948c2ecf20Sopenharmony_ci * %-EPERM if current process hasn't %CAP_NET_ADMIN set 7958c2ecf20Sopenharmony_ci * %-EINVAL if passed tunnel parameters are invalid, 7968c2ecf20Sopenharmony_ci * %-EEXIST if changing a tunnel's parameters would cause a conflict 7978c2ecf20Sopenharmony_ci * %-ENODEV if attempting to change or delete a nonexisting device 7988c2ecf20Sopenharmony_ci **/ 7998c2ecf20Sopenharmony_cistatic int 8008c2ecf20Sopenharmony_civti6_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) 8018c2ecf20Sopenharmony_ci{ 8028c2ecf20Sopenharmony_ci int err = 0; 8038c2ecf20Sopenharmony_ci struct ip6_tnl_parm2 p; 8048c2ecf20Sopenharmony_ci struct __ip6_tnl_parm p1; 8058c2ecf20Sopenharmony_ci struct ip6_tnl *t = NULL; 8068c2ecf20Sopenharmony_ci struct net *net = dev_net(dev); 8078c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 8088c2ecf20Sopenharmony_ci 8098c2ecf20Sopenharmony_ci memset(&p1, 0, sizeof(p1)); 8108c2ecf20Sopenharmony_ci 8118c2ecf20Sopenharmony_ci switch (cmd) { 8128c2ecf20Sopenharmony_ci case SIOCGETTUNNEL: 8138c2ecf20Sopenharmony_ci if (dev == ip6n->fb_tnl_dev) { 8148c2ecf20Sopenharmony_ci if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p))) { 8158c2ecf20Sopenharmony_ci err = -EFAULT; 8168c2ecf20Sopenharmony_ci break; 8178c2ecf20Sopenharmony_ci } 8188c2ecf20Sopenharmony_ci vti6_parm_from_user(&p1, &p); 8198c2ecf20Sopenharmony_ci t = vti6_locate(net, &p1, 0); 8208c2ecf20Sopenharmony_ci } else { 8218c2ecf20Sopenharmony_ci memset(&p, 0, sizeof(p)); 8228c2ecf20Sopenharmony_ci } 8238c2ecf20Sopenharmony_ci if (!t) 8248c2ecf20Sopenharmony_ci t = netdev_priv(dev); 8258c2ecf20Sopenharmony_ci vti6_parm_to_user(&p, &t->parms); 8268c2ecf20Sopenharmony_ci if (copy_to_user(ifr->ifr_ifru.ifru_data, &p, sizeof(p))) 8278c2ecf20Sopenharmony_ci err = -EFAULT; 8288c2ecf20Sopenharmony_ci break; 8298c2ecf20Sopenharmony_ci case SIOCADDTUNNEL: 8308c2ecf20Sopenharmony_ci case SIOCCHGTUNNEL: 8318c2ecf20Sopenharmony_ci err = -EPERM; 8328c2ecf20Sopenharmony_ci if (!ns_capable(net->user_ns, CAP_NET_ADMIN)) 8338c2ecf20Sopenharmony_ci break; 8348c2ecf20Sopenharmony_ci err = -EFAULT; 8358c2ecf20Sopenharmony_ci if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p))) 8368c2ecf20Sopenharmony_ci break; 8378c2ecf20Sopenharmony_ci err = -EINVAL; 8388c2ecf20Sopenharmony_ci if (p.proto != IPPROTO_IPV6 && p.proto != 0) 8398c2ecf20Sopenharmony_ci break; 8408c2ecf20Sopenharmony_ci vti6_parm_from_user(&p1, &p); 8418c2ecf20Sopenharmony_ci t = vti6_locate(net, &p1, cmd == SIOCADDTUNNEL); 8428c2ecf20Sopenharmony_ci if (dev != ip6n->fb_tnl_dev && cmd == SIOCCHGTUNNEL) { 8438c2ecf20Sopenharmony_ci if (t) { 8448c2ecf20Sopenharmony_ci if (t->dev != dev) { 8458c2ecf20Sopenharmony_ci err = -EEXIST; 8468c2ecf20Sopenharmony_ci break; 8478c2ecf20Sopenharmony_ci } 8488c2ecf20Sopenharmony_ci } else 8498c2ecf20Sopenharmony_ci t = netdev_priv(dev); 8508c2ecf20Sopenharmony_ci 8518c2ecf20Sopenharmony_ci err = vti6_update(t, &p1, false); 8528c2ecf20Sopenharmony_ci } 8538c2ecf20Sopenharmony_ci if (t) { 8548c2ecf20Sopenharmony_ci err = 0; 8558c2ecf20Sopenharmony_ci vti6_parm_to_user(&p, &t->parms); 8568c2ecf20Sopenharmony_ci if (copy_to_user(ifr->ifr_ifru.ifru_data, &p, sizeof(p))) 8578c2ecf20Sopenharmony_ci err = -EFAULT; 8588c2ecf20Sopenharmony_ci 8598c2ecf20Sopenharmony_ci } else 8608c2ecf20Sopenharmony_ci err = (cmd == SIOCADDTUNNEL ? -ENOBUFS : -ENOENT); 8618c2ecf20Sopenharmony_ci break; 8628c2ecf20Sopenharmony_ci case SIOCDELTUNNEL: 8638c2ecf20Sopenharmony_ci err = -EPERM; 8648c2ecf20Sopenharmony_ci if (!ns_capable(net->user_ns, CAP_NET_ADMIN)) 8658c2ecf20Sopenharmony_ci break; 8668c2ecf20Sopenharmony_ci 8678c2ecf20Sopenharmony_ci if (dev == ip6n->fb_tnl_dev) { 8688c2ecf20Sopenharmony_ci err = -EFAULT; 8698c2ecf20Sopenharmony_ci if (copy_from_user(&p, ifr->ifr_ifru.ifru_data, sizeof(p))) 8708c2ecf20Sopenharmony_ci break; 8718c2ecf20Sopenharmony_ci err = -ENOENT; 8728c2ecf20Sopenharmony_ci vti6_parm_from_user(&p1, &p); 8738c2ecf20Sopenharmony_ci t = vti6_locate(net, &p1, 0); 8748c2ecf20Sopenharmony_ci if (!t) 8758c2ecf20Sopenharmony_ci break; 8768c2ecf20Sopenharmony_ci err = -EPERM; 8778c2ecf20Sopenharmony_ci if (t->dev == ip6n->fb_tnl_dev) 8788c2ecf20Sopenharmony_ci break; 8798c2ecf20Sopenharmony_ci dev = t->dev; 8808c2ecf20Sopenharmony_ci } 8818c2ecf20Sopenharmony_ci err = 0; 8828c2ecf20Sopenharmony_ci unregister_netdevice(dev); 8838c2ecf20Sopenharmony_ci break; 8848c2ecf20Sopenharmony_ci default: 8858c2ecf20Sopenharmony_ci err = -EINVAL; 8868c2ecf20Sopenharmony_ci } 8878c2ecf20Sopenharmony_ci return err; 8888c2ecf20Sopenharmony_ci} 8898c2ecf20Sopenharmony_ci 8908c2ecf20Sopenharmony_cistatic const struct net_device_ops vti6_netdev_ops = { 8918c2ecf20Sopenharmony_ci .ndo_init = vti6_dev_init, 8928c2ecf20Sopenharmony_ci .ndo_uninit = vti6_dev_uninit, 8938c2ecf20Sopenharmony_ci .ndo_start_xmit = vti6_tnl_xmit, 8948c2ecf20Sopenharmony_ci .ndo_do_ioctl = vti6_ioctl, 8958c2ecf20Sopenharmony_ci .ndo_get_stats64 = ip_tunnel_get_stats64, 8968c2ecf20Sopenharmony_ci .ndo_get_iflink = ip6_tnl_get_iflink, 8978c2ecf20Sopenharmony_ci}; 8988c2ecf20Sopenharmony_ci 8998c2ecf20Sopenharmony_ci/** 9008c2ecf20Sopenharmony_ci * vti6_dev_setup - setup virtual tunnel device 9018c2ecf20Sopenharmony_ci * @dev: virtual device associated with tunnel 9028c2ecf20Sopenharmony_ci * 9038c2ecf20Sopenharmony_ci * Description: 9048c2ecf20Sopenharmony_ci * Initialize function pointers and device parameters 9058c2ecf20Sopenharmony_ci **/ 9068c2ecf20Sopenharmony_cistatic void vti6_dev_setup(struct net_device *dev) 9078c2ecf20Sopenharmony_ci{ 9088c2ecf20Sopenharmony_ci dev->netdev_ops = &vti6_netdev_ops; 9098c2ecf20Sopenharmony_ci dev->header_ops = &ip_tunnel_header_ops; 9108c2ecf20Sopenharmony_ci dev->needs_free_netdev = true; 9118c2ecf20Sopenharmony_ci dev->priv_destructor = vti6_dev_free; 9128c2ecf20Sopenharmony_ci 9138c2ecf20Sopenharmony_ci dev->type = ARPHRD_TUNNEL6; 9148c2ecf20Sopenharmony_ci dev->min_mtu = IPV4_MIN_MTU; 9158c2ecf20Sopenharmony_ci dev->max_mtu = IP_MAX_MTU - sizeof(struct ipv6hdr); 9168c2ecf20Sopenharmony_ci dev->flags |= IFF_NOARP; 9178c2ecf20Sopenharmony_ci dev->addr_len = sizeof(struct in6_addr); 9188c2ecf20Sopenharmony_ci netif_keep_dst(dev); 9198c2ecf20Sopenharmony_ci /* This perm addr will be used as interface identifier by IPv6 */ 9208c2ecf20Sopenharmony_ci dev->addr_assign_type = NET_ADDR_RANDOM; 9218c2ecf20Sopenharmony_ci eth_random_addr(dev->perm_addr); 9228c2ecf20Sopenharmony_ci} 9238c2ecf20Sopenharmony_ci 9248c2ecf20Sopenharmony_ci/** 9258c2ecf20Sopenharmony_ci * vti6_dev_init_gen - general initializer for all tunnel devices 9268c2ecf20Sopenharmony_ci * @dev: virtual device associated with tunnel 9278c2ecf20Sopenharmony_ci **/ 9288c2ecf20Sopenharmony_cistatic inline int vti6_dev_init_gen(struct net_device *dev) 9298c2ecf20Sopenharmony_ci{ 9308c2ecf20Sopenharmony_ci struct ip6_tnl *t = netdev_priv(dev); 9318c2ecf20Sopenharmony_ci 9328c2ecf20Sopenharmony_ci t->dev = dev; 9338c2ecf20Sopenharmony_ci t->net = dev_net(dev); 9348c2ecf20Sopenharmony_ci dev->tstats = netdev_alloc_pcpu_stats(struct pcpu_sw_netstats); 9358c2ecf20Sopenharmony_ci if (!dev->tstats) 9368c2ecf20Sopenharmony_ci return -ENOMEM; 9378c2ecf20Sopenharmony_ci dev_hold(dev); 9388c2ecf20Sopenharmony_ci return 0; 9398c2ecf20Sopenharmony_ci} 9408c2ecf20Sopenharmony_ci 9418c2ecf20Sopenharmony_ci/** 9428c2ecf20Sopenharmony_ci * vti6_dev_init - initializer for all non fallback tunnel devices 9438c2ecf20Sopenharmony_ci * @dev: virtual device associated with tunnel 9448c2ecf20Sopenharmony_ci **/ 9458c2ecf20Sopenharmony_cistatic int vti6_dev_init(struct net_device *dev) 9468c2ecf20Sopenharmony_ci{ 9478c2ecf20Sopenharmony_ci struct ip6_tnl *t = netdev_priv(dev); 9488c2ecf20Sopenharmony_ci int err = vti6_dev_init_gen(dev); 9498c2ecf20Sopenharmony_ci 9508c2ecf20Sopenharmony_ci if (err) 9518c2ecf20Sopenharmony_ci return err; 9528c2ecf20Sopenharmony_ci vti6_link_config(t, true); 9538c2ecf20Sopenharmony_ci return 0; 9548c2ecf20Sopenharmony_ci} 9558c2ecf20Sopenharmony_ci 9568c2ecf20Sopenharmony_ci/** 9578c2ecf20Sopenharmony_ci * vti6_fb_tnl_dev_init - initializer for fallback tunnel device 9588c2ecf20Sopenharmony_ci * @dev: fallback device 9598c2ecf20Sopenharmony_ci * 9608c2ecf20Sopenharmony_ci * Return: 0 9618c2ecf20Sopenharmony_ci **/ 9628c2ecf20Sopenharmony_cistatic int __net_init vti6_fb_tnl_dev_init(struct net_device *dev) 9638c2ecf20Sopenharmony_ci{ 9648c2ecf20Sopenharmony_ci struct ip6_tnl *t = netdev_priv(dev); 9658c2ecf20Sopenharmony_ci struct net *net = dev_net(dev); 9668c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 9678c2ecf20Sopenharmony_ci 9688c2ecf20Sopenharmony_ci t->parms.proto = IPPROTO_IPV6; 9698c2ecf20Sopenharmony_ci 9708c2ecf20Sopenharmony_ci rcu_assign_pointer(ip6n->tnls_wc[0], t); 9718c2ecf20Sopenharmony_ci return 0; 9728c2ecf20Sopenharmony_ci} 9738c2ecf20Sopenharmony_ci 9748c2ecf20Sopenharmony_cistatic int vti6_validate(struct nlattr *tb[], struct nlattr *data[], 9758c2ecf20Sopenharmony_ci struct netlink_ext_ack *extack) 9768c2ecf20Sopenharmony_ci{ 9778c2ecf20Sopenharmony_ci return 0; 9788c2ecf20Sopenharmony_ci} 9798c2ecf20Sopenharmony_ci 9808c2ecf20Sopenharmony_cistatic void vti6_netlink_parms(struct nlattr *data[], 9818c2ecf20Sopenharmony_ci struct __ip6_tnl_parm *parms) 9828c2ecf20Sopenharmony_ci{ 9838c2ecf20Sopenharmony_ci memset(parms, 0, sizeof(*parms)); 9848c2ecf20Sopenharmony_ci 9858c2ecf20Sopenharmony_ci if (!data) 9868c2ecf20Sopenharmony_ci return; 9878c2ecf20Sopenharmony_ci 9888c2ecf20Sopenharmony_ci if (data[IFLA_VTI_LINK]) 9898c2ecf20Sopenharmony_ci parms->link = nla_get_u32(data[IFLA_VTI_LINK]); 9908c2ecf20Sopenharmony_ci 9918c2ecf20Sopenharmony_ci if (data[IFLA_VTI_LOCAL]) 9928c2ecf20Sopenharmony_ci parms->laddr = nla_get_in6_addr(data[IFLA_VTI_LOCAL]); 9938c2ecf20Sopenharmony_ci 9948c2ecf20Sopenharmony_ci if (data[IFLA_VTI_REMOTE]) 9958c2ecf20Sopenharmony_ci parms->raddr = nla_get_in6_addr(data[IFLA_VTI_REMOTE]); 9968c2ecf20Sopenharmony_ci 9978c2ecf20Sopenharmony_ci if (data[IFLA_VTI_IKEY]) 9988c2ecf20Sopenharmony_ci parms->i_key = nla_get_be32(data[IFLA_VTI_IKEY]); 9998c2ecf20Sopenharmony_ci 10008c2ecf20Sopenharmony_ci if (data[IFLA_VTI_OKEY]) 10018c2ecf20Sopenharmony_ci parms->o_key = nla_get_be32(data[IFLA_VTI_OKEY]); 10028c2ecf20Sopenharmony_ci 10038c2ecf20Sopenharmony_ci if (data[IFLA_VTI_FWMARK]) 10048c2ecf20Sopenharmony_ci parms->fwmark = nla_get_u32(data[IFLA_VTI_FWMARK]); 10058c2ecf20Sopenharmony_ci} 10068c2ecf20Sopenharmony_ci 10078c2ecf20Sopenharmony_cistatic int vti6_newlink(struct net *src_net, struct net_device *dev, 10088c2ecf20Sopenharmony_ci struct nlattr *tb[], struct nlattr *data[], 10098c2ecf20Sopenharmony_ci struct netlink_ext_ack *extack) 10108c2ecf20Sopenharmony_ci{ 10118c2ecf20Sopenharmony_ci struct net *net = dev_net(dev); 10128c2ecf20Sopenharmony_ci struct ip6_tnl *nt; 10138c2ecf20Sopenharmony_ci 10148c2ecf20Sopenharmony_ci nt = netdev_priv(dev); 10158c2ecf20Sopenharmony_ci vti6_netlink_parms(data, &nt->parms); 10168c2ecf20Sopenharmony_ci 10178c2ecf20Sopenharmony_ci nt->parms.proto = IPPROTO_IPV6; 10188c2ecf20Sopenharmony_ci 10198c2ecf20Sopenharmony_ci if (vti6_locate(net, &nt->parms, 0)) 10208c2ecf20Sopenharmony_ci return -EEXIST; 10218c2ecf20Sopenharmony_ci 10228c2ecf20Sopenharmony_ci return vti6_tnl_create2(dev); 10238c2ecf20Sopenharmony_ci} 10248c2ecf20Sopenharmony_ci 10258c2ecf20Sopenharmony_cistatic void vti6_dellink(struct net_device *dev, struct list_head *head) 10268c2ecf20Sopenharmony_ci{ 10278c2ecf20Sopenharmony_ci struct net *net = dev_net(dev); 10288c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 10298c2ecf20Sopenharmony_ci 10308c2ecf20Sopenharmony_ci if (dev != ip6n->fb_tnl_dev) 10318c2ecf20Sopenharmony_ci unregister_netdevice_queue(dev, head); 10328c2ecf20Sopenharmony_ci} 10338c2ecf20Sopenharmony_ci 10348c2ecf20Sopenharmony_cistatic int vti6_changelink(struct net_device *dev, struct nlattr *tb[], 10358c2ecf20Sopenharmony_ci struct nlattr *data[], 10368c2ecf20Sopenharmony_ci struct netlink_ext_ack *extack) 10378c2ecf20Sopenharmony_ci{ 10388c2ecf20Sopenharmony_ci struct ip6_tnl *t; 10398c2ecf20Sopenharmony_ci struct __ip6_tnl_parm p; 10408c2ecf20Sopenharmony_ci struct net *net = dev_net(dev); 10418c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 10428c2ecf20Sopenharmony_ci 10438c2ecf20Sopenharmony_ci if (dev == ip6n->fb_tnl_dev) 10448c2ecf20Sopenharmony_ci return -EINVAL; 10458c2ecf20Sopenharmony_ci 10468c2ecf20Sopenharmony_ci vti6_netlink_parms(data, &p); 10478c2ecf20Sopenharmony_ci 10488c2ecf20Sopenharmony_ci t = vti6_locate(net, &p, 0); 10498c2ecf20Sopenharmony_ci 10508c2ecf20Sopenharmony_ci if (t) { 10518c2ecf20Sopenharmony_ci if (t->dev != dev) 10528c2ecf20Sopenharmony_ci return -EEXIST; 10538c2ecf20Sopenharmony_ci } else 10548c2ecf20Sopenharmony_ci t = netdev_priv(dev); 10558c2ecf20Sopenharmony_ci 10568c2ecf20Sopenharmony_ci return vti6_update(t, &p, tb && tb[IFLA_MTU]); 10578c2ecf20Sopenharmony_ci} 10588c2ecf20Sopenharmony_ci 10598c2ecf20Sopenharmony_cistatic size_t vti6_get_size(const struct net_device *dev) 10608c2ecf20Sopenharmony_ci{ 10618c2ecf20Sopenharmony_ci return 10628c2ecf20Sopenharmony_ci /* IFLA_VTI_LINK */ 10638c2ecf20Sopenharmony_ci nla_total_size(4) + 10648c2ecf20Sopenharmony_ci /* IFLA_VTI_LOCAL */ 10658c2ecf20Sopenharmony_ci nla_total_size(sizeof(struct in6_addr)) + 10668c2ecf20Sopenharmony_ci /* IFLA_VTI_REMOTE */ 10678c2ecf20Sopenharmony_ci nla_total_size(sizeof(struct in6_addr)) + 10688c2ecf20Sopenharmony_ci /* IFLA_VTI_IKEY */ 10698c2ecf20Sopenharmony_ci nla_total_size(4) + 10708c2ecf20Sopenharmony_ci /* IFLA_VTI_OKEY */ 10718c2ecf20Sopenharmony_ci nla_total_size(4) + 10728c2ecf20Sopenharmony_ci /* IFLA_VTI_FWMARK */ 10738c2ecf20Sopenharmony_ci nla_total_size(4) + 10748c2ecf20Sopenharmony_ci 0; 10758c2ecf20Sopenharmony_ci} 10768c2ecf20Sopenharmony_ci 10778c2ecf20Sopenharmony_cistatic int vti6_fill_info(struct sk_buff *skb, const struct net_device *dev) 10788c2ecf20Sopenharmony_ci{ 10798c2ecf20Sopenharmony_ci struct ip6_tnl *tunnel = netdev_priv(dev); 10808c2ecf20Sopenharmony_ci struct __ip6_tnl_parm *parm = &tunnel->parms; 10818c2ecf20Sopenharmony_ci 10828c2ecf20Sopenharmony_ci if (nla_put_u32(skb, IFLA_VTI_LINK, parm->link) || 10838c2ecf20Sopenharmony_ci nla_put_in6_addr(skb, IFLA_VTI_LOCAL, &parm->laddr) || 10848c2ecf20Sopenharmony_ci nla_put_in6_addr(skb, IFLA_VTI_REMOTE, &parm->raddr) || 10858c2ecf20Sopenharmony_ci nla_put_be32(skb, IFLA_VTI_IKEY, parm->i_key) || 10868c2ecf20Sopenharmony_ci nla_put_be32(skb, IFLA_VTI_OKEY, parm->o_key) || 10878c2ecf20Sopenharmony_ci nla_put_u32(skb, IFLA_VTI_FWMARK, parm->fwmark)) 10888c2ecf20Sopenharmony_ci goto nla_put_failure; 10898c2ecf20Sopenharmony_ci return 0; 10908c2ecf20Sopenharmony_ci 10918c2ecf20Sopenharmony_cinla_put_failure: 10928c2ecf20Sopenharmony_ci return -EMSGSIZE; 10938c2ecf20Sopenharmony_ci} 10948c2ecf20Sopenharmony_ci 10958c2ecf20Sopenharmony_cistatic const struct nla_policy vti6_policy[IFLA_VTI_MAX + 1] = { 10968c2ecf20Sopenharmony_ci [IFLA_VTI_LINK] = { .type = NLA_U32 }, 10978c2ecf20Sopenharmony_ci [IFLA_VTI_LOCAL] = { .len = sizeof(struct in6_addr) }, 10988c2ecf20Sopenharmony_ci [IFLA_VTI_REMOTE] = { .len = sizeof(struct in6_addr) }, 10998c2ecf20Sopenharmony_ci [IFLA_VTI_IKEY] = { .type = NLA_U32 }, 11008c2ecf20Sopenharmony_ci [IFLA_VTI_OKEY] = { .type = NLA_U32 }, 11018c2ecf20Sopenharmony_ci [IFLA_VTI_FWMARK] = { .type = NLA_U32 }, 11028c2ecf20Sopenharmony_ci}; 11038c2ecf20Sopenharmony_ci 11048c2ecf20Sopenharmony_cistatic struct rtnl_link_ops vti6_link_ops __read_mostly = { 11058c2ecf20Sopenharmony_ci .kind = "vti6", 11068c2ecf20Sopenharmony_ci .maxtype = IFLA_VTI_MAX, 11078c2ecf20Sopenharmony_ci .policy = vti6_policy, 11088c2ecf20Sopenharmony_ci .priv_size = sizeof(struct ip6_tnl), 11098c2ecf20Sopenharmony_ci .setup = vti6_dev_setup, 11108c2ecf20Sopenharmony_ci .validate = vti6_validate, 11118c2ecf20Sopenharmony_ci .newlink = vti6_newlink, 11128c2ecf20Sopenharmony_ci .dellink = vti6_dellink, 11138c2ecf20Sopenharmony_ci .changelink = vti6_changelink, 11148c2ecf20Sopenharmony_ci .get_size = vti6_get_size, 11158c2ecf20Sopenharmony_ci .fill_info = vti6_fill_info, 11168c2ecf20Sopenharmony_ci .get_link_net = ip6_tnl_get_link_net, 11178c2ecf20Sopenharmony_ci}; 11188c2ecf20Sopenharmony_ci 11198c2ecf20Sopenharmony_cistatic void __net_exit vti6_destroy_tunnels(struct vti6_net *ip6n, 11208c2ecf20Sopenharmony_ci struct list_head *list) 11218c2ecf20Sopenharmony_ci{ 11228c2ecf20Sopenharmony_ci int h; 11238c2ecf20Sopenharmony_ci struct ip6_tnl *t; 11248c2ecf20Sopenharmony_ci 11258c2ecf20Sopenharmony_ci for (h = 0; h < IP6_VTI_HASH_SIZE; h++) { 11268c2ecf20Sopenharmony_ci t = rtnl_dereference(ip6n->tnls_r_l[h]); 11278c2ecf20Sopenharmony_ci while (t) { 11288c2ecf20Sopenharmony_ci unregister_netdevice_queue(t->dev, list); 11298c2ecf20Sopenharmony_ci t = rtnl_dereference(t->next); 11308c2ecf20Sopenharmony_ci } 11318c2ecf20Sopenharmony_ci } 11328c2ecf20Sopenharmony_ci 11338c2ecf20Sopenharmony_ci t = rtnl_dereference(ip6n->tnls_wc[0]); 11348c2ecf20Sopenharmony_ci if (t) 11358c2ecf20Sopenharmony_ci unregister_netdevice_queue(t->dev, list); 11368c2ecf20Sopenharmony_ci} 11378c2ecf20Sopenharmony_ci 11388c2ecf20Sopenharmony_cistatic int __net_init vti6_init_net(struct net *net) 11398c2ecf20Sopenharmony_ci{ 11408c2ecf20Sopenharmony_ci struct vti6_net *ip6n = net_generic(net, vti6_net_id); 11418c2ecf20Sopenharmony_ci struct ip6_tnl *t = NULL; 11428c2ecf20Sopenharmony_ci int err; 11438c2ecf20Sopenharmony_ci 11448c2ecf20Sopenharmony_ci ip6n->tnls[0] = ip6n->tnls_wc; 11458c2ecf20Sopenharmony_ci ip6n->tnls[1] = ip6n->tnls_r_l; 11468c2ecf20Sopenharmony_ci 11478c2ecf20Sopenharmony_ci if (!net_has_fallback_tunnels(net)) 11488c2ecf20Sopenharmony_ci return 0; 11498c2ecf20Sopenharmony_ci err = -ENOMEM; 11508c2ecf20Sopenharmony_ci ip6n->fb_tnl_dev = alloc_netdev(sizeof(struct ip6_tnl), "ip6_vti0", 11518c2ecf20Sopenharmony_ci NET_NAME_UNKNOWN, vti6_dev_setup); 11528c2ecf20Sopenharmony_ci 11538c2ecf20Sopenharmony_ci if (!ip6n->fb_tnl_dev) 11548c2ecf20Sopenharmony_ci goto err_alloc_dev; 11558c2ecf20Sopenharmony_ci dev_net_set(ip6n->fb_tnl_dev, net); 11568c2ecf20Sopenharmony_ci ip6n->fb_tnl_dev->rtnl_link_ops = &vti6_link_ops; 11578c2ecf20Sopenharmony_ci 11588c2ecf20Sopenharmony_ci err = vti6_fb_tnl_dev_init(ip6n->fb_tnl_dev); 11598c2ecf20Sopenharmony_ci if (err < 0) 11608c2ecf20Sopenharmony_ci goto err_register; 11618c2ecf20Sopenharmony_ci 11628c2ecf20Sopenharmony_ci err = register_netdev(ip6n->fb_tnl_dev); 11638c2ecf20Sopenharmony_ci if (err < 0) 11648c2ecf20Sopenharmony_ci goto err_register; 11658c2ecf20Sopenharmony_ci 11668c2ecf20Sopenharmony_ci t = netdev_priv(ip6n->fb_tnl_dev); 11678c2ecf20Sopenharmony_ci 11688c2ecf20Sopenharmony_ci strcpy(t->parms.name, ip6n->fb_tnl_dev->name); 11698c2ecf20Sopenharmony_ci return 0; 11708c2ecf20Sopenharmony_ci 11718c2ecf20Sopenharmony_cierr_register: 11728c2ecf20Sopenharmony_ci free_netdev(ip6n->fb_tnl_dev); 11738c2ecf20Sopenharmony_cierr_alloc_dev: 11748c2ecf20Sopenharmony_ci return err; 11758c2ecf20Sopenharmony_ci} 11768c2ecf20Sopenharmony_ci 11778c2ecf20Sopenharmony_cistatic void __net_exit vti6_exit_batch_net(struct list_head *net_list) 11788c2ecf20Sopenharmony_ci{ 11798c2ecf20Sopenharmony_ci struct vti6_net *ip6n; 11808c2ecf20Sopenharmony_ci struct net *net; 11818c2ecf20Sopenharmony_ci LIST_HEAD(list); 11828c2ecf20Sopenharmony_ci 11838c2ecf20Sopenharmony_ci rtnl_lock(); 11848c2ecf20Sopenharmony_ci list_for_each_entry(net, net_list, exit_list) { 11858c2ecf20Sopenharmony_ci ip6n = net_generic(net, vti6_net_id); 11868c2ecf20Sopenharmony_ci vti6_destroy_tunnels(ip6n, &list); 11878c2ecf20Sopenharmony_ci } 11888c2ecf20Sopenharmony_ci unregister_netdevice_many(&list); 11898c2ecf20Sopenharmony_ci rtnl_unlock(); 11908c2ecf20Sopenharmony_ci} 11918c2ecf20Sopenharmony_ci 11928c2ecf20Sopenharmony_cistatic struct pernet_operations vti6_net_ops = { 11938c2ecf20Sopenharmony_ci .init = vti6_init_net, 11948c2ecf20Sopenharmony_ci .exit_batch = vti6_exit_batch_net, 11958c2ecf20Sopenharmony_ci .id = &vti6_net_id, 11968c2ecf20Sopenharmony_ci .size = sizeof(struct vti6_net), 11978c2ecf20Sopenharmony_ci}; 11988c2ecf20Sopenharmony_ci 11998c2ecf20Sopenharmony_cistatic struct xfrm6_protocol vti_esp6_protocol __read_mostly = { 12008c2ecf20Sopenharmony_ci .handler = vti6_rcv, 12018c2ecf20Sopenharmony_ci .input_handler = vti6_input_proto, 12028c2ecf20Sopenharmony_ci .cb_handler = vti6_rcv_cb, 12038c2ecf20Sopenharmony_ci .err_handler = vti6_err, 12048c2ecf20Sopenharmony_ci .priority = 100, 12058c2ecf20Sopenharmony_ci}; 12068c2ecf20Sopenharmony_ci 12078c2ecf20Sopenharmony_cistatic struct xfrm6_protocol vti_ah6_protocol __read_mostly = { 12088c2ecf20Sopenharmony_ci .handler = vti6_rcv, 12098c2ecf20Sopenharmony_ci .input_handler = vti6_input_proto, 12108c2ecf20Sopenharmony_ci .cb_handler = vti6_rcv_cb, 12118c2ecf20Sopenharmony_ci .err_handler = vti6_err, 12128c2ecf20Sopenharmony_ci .priority = 100, 12138c2ecf20Sopenharmony_ci}; 12148c2ecf20Sopenharmony_ci 12158c2ecf20Sopenharmony_cistatic struct xfrm6_protocol vti_ipcomp6_protocol __read_mostly = { 12168c2ecf20Sopenharmony_ci .handler = vti6_rcv, 12178c2ecf20Sopenharmony_ci .input_handler = vti6_input_proto, 12188c2ecf20Sopenharmony_ci .cb_handler = vti6_rcv_cb, 12198c2ecf20Sopenharmony_ci .err_handler = vti6_err, 12208c2ecf20Sopenharmony_ci .priority = 100, 12218c2ecf20Sopenharmony_ci}; 12228c2ecf20Sopenharmony_ci 12238c2ecf20Sopenharmony_ci#if IS_REACHABLE(CONFIG_INET6_XFRM_TUNNEL) 12248c2ecf20Sopenharmony_cistatic int vti6_rcv_tunnel(struct sk_buff *skb) 12258c2ecf20Sopenharmony_ci{ 12268c2ecf20Sopenharmony_ci const xfrm_address_t *saddr; 12278c2ecf20Sopenharmony_ci __be32 spi; 12288c2ecf20Sopenharmony_ci 12298c2ecf20Sopenharmony_ci saddr = (const xfrm_address_t *)&ipv6_hdr(skb)->saddr; 12308c2ecf20Sopenharmony_ci spi = xfrm6_tunnel_spi_lookup(dev_net(skb->dev), saddr); 12318c2ecf20Sopenharmony_ci 12328c2ecf20Sopenharmony_ci return vti6_input_proto(skb, IPPROTO_IPV6, spi, 0); 12338c2ecf20Sopenharmony_ci} 12348c2ecf20Sopenharmony_ci 12358c2ecf20Sopenharmony_cistatic struct xfrm6_tunnel vti_ipv6_handler __read_mostly = { 12368c2ecf20Sopenharmony_ci .handler = vti6_rcv_tunnel, 12378c2ecf20Sopenharmony_ci .cb_handler = vti6_rcv_cb, 12388c2ecf20Sopenharmony_ci .err_handler = vti6_err, 12398c2ecf20Sopenharmony_ci .priority = 0, 12408c2ecf20Sopenharmony_ci}; 12418c2ecf20Sopenharmony_ci 12428c2ecf20Sopenharmony_cistatic struct xfrm6_tunnel vti_ip6ip_handler __read_mostly = { 12438c2ecf20Sopenharmony_ci .handler = vti6_rcv_tunnel, 12448c2ecf20Sopenharmony_ci .cb_handler = vti6_rcv_cb, 12458c2ecf20Sopenharmony_ci .err_handler = vti6_err, 12468c2ecf20Sopenharmony_ci .priority = 0, 12478c2ecf20Sopenharmony_ci}; 12488c2ecf20Sopenharmony_ci#endif 12498c2ecf20Sopenharmony_ci 12508c2ecf20Sopenharmony_ci/** 12518c2ecf20Sopenharmony_ci * vti6_tunnel_init - register protocol and reserve needed resources 12528c2ecf20Sopenharmony_ci * 12538c2ecf20Sopenharmony_ci * Return: 0 on success 12548c2ecf20Sopenharmony_ci **/ 12558c2ecf20Sopenharmony_cistatic int __init vti6_tunnel_init(void) 12568c2ecf20Sopenharmony_ci{ 12578c2ecf20Sopenharmony_ci const char *msg; 12588c2ecf20Sopenharmony_ci int err; 12598c2ecf20Sopenharmony_ci 12608c2ecf20Sopenharmony_ci msg = "tunnel device"; 12618c2ecf20Sopenharmony_ci err = register_pernet_device(&vti6_net_ops); 12628c2ecf20Sopenharmony_ci if (err < 0) 12638c2ecf20Sopenharmony_ci goto pernet_dev_failed; 12648c2ecf20Sopenharmony_ci 12658c2ecf20Sopenharmony_ci msg = "tunnel protocols"; 12668c2ecf20Sopenharmony_ci err = xfrm6_protocol_register(&vti_esp6_protocol, IPPROTO_ESP); 12678c2ecf20Sopenharmony_ci if (err < 0) 12688c2ecf20Sopenharmony_ci goto xfrm_proto_esp_failed; 12698c2ecf20Sopenharmony_ci err = xfrm6_protocol_register(&vti_ah6_protocol, IPPROTO_AH); 12708c2ecf20Sopenharmony_ci if (err < 0) 12718c2ecf20Sopenharmony_ci goto xfrm_proto_ah_failed; 12728c2ecf20Sopenharmony_ci err = xfrm6_protocol_register(&vti_ipcomp6_protocol, IPPROTO_COMP); 12738c2ecf20Sopenharmony_ci if (err < 0) 12748c2ecf20Sopenharmony_ci goto xfrm_proto_comp_failed; 12758c2ecf20Sopenharmony_ci#if IS_REACHABLE(CONFIG_INET6_XFRM_TUNNEL) 12768c2ecf20Sopenharmony_ci msg = "ipv6 tunnel"; 12778c2ecf20Sopenharmony_ci err = xfrm6_tunnel_register(&vti_ipv6_handler, AF_INET6); 12788c2ecf20Sopenharmony_ci if (err < 0) 12798c2ecf20Sopenharmony_ci goto vti_tunnel_ipv6_failed; 12808c2ecf20Sopenharmony_ci err = xfrm6_tunnel_register(&vti_ip6ip_handler, AF_INET); 12818c2ecf20Sopenharmony_ci if (err < 0) 12828c2ecf20Sopenharmony_ci goto vti_tunnel_ip6ip_failed; 12838c2ecf20Sopenharmony_ci#endif 12848c2ecf20Sopenharmony_ci 12858c2ecf20Sopenharmony_ci msg = "netlink interface"; 12868c2ecf20Sopenharmony_ci err = rtnl_link_register(&vti6_link_ops); 12878c2ecf20Sopenharmony_ci if (err < 0) 12888c2ecf20Sopenharmony_ci goto rtnl_link_failed; 12898c2ecf20Sopenharmony_ci 12908c2ecf20Sopenharmony_ci return 0; 12918c2ecf20Sopenharmony_ci 12928c2ecf20Sopenharmony_cirtnl_link_failed: 12938c2ecf20Sopenharmony_ci#if IS_REACHABLE(CONFIG_INET6_XFRM_TUNNEL) 12948c2ecf20Sopenharmony_ci err = xfrm6_tunnel_deregister(&vti_ip6ip_handler, AF_INET); 12958c2ecf20Sopenharmony_civti_tunnel_ip6ip_failed: 12968c2ecf20Sopenharmony_ci err = xfrm6_tunnel_deregister(&vti_ipv6_handler, AF_INET6); 12978c2ecf20Sopenharmony_civti_tunnel_ipv6_failed: 12988c2ecf20Sopenharmony_ci#endif 12998c2ecf20Sopenharmony_ci xfrm6_protocol_deregister(&vti_ipcomp6_protocol, IPPROTO_COMP); 13008c2ecf20Sopenharmony_cixfrm_proto_comp_failed: 13018c2ecf20Sopenharmony_ci xfrm6_protocol_deregister(&vti_ah6_protocol, IPPROTO_AH); 13028c2ecf20Sopenharmony_cixfrm_proto_ah_failed: 13038c2ecf20Sopenharmony_ci xfrm6_protocol_deregister(&vti_esp6_protocol, IPPROTO_ESP); 13048c2ecf20Sopenharmony_cixfrm_proto_esp_failed: 13058c2ecf20Sopenharmony_ci unregister_pernet_device(&vti6_net_ops); 13068c2ecf20Sopenharmony_cipernet_dev_failed: 13078c2ecf20Sopenharmony_ci pr_err("vti6 init: failed to register %s\n", msg); 13088c2ecf20Sopenharmony_ci return err; 13098c2ecf20Sopenharmony_ci} 13108c2ecf20Sopenharmony_ci 13118c2ecf20Sopenharmony_ci/** 13128c2ecf20Sopenharmony_ci * vti6_tunnel_cleanup - free resources and unregister protocol 13138c2ecf20Sopenharmony_ci **/ 13148c2ecf20Sopenharmony_cistatic void __exit vti6_tunnel_cleanup(void) 13158c2ecf20Sopenharmony_ci{ 13168c2ecf20Sopenharmony_ci rtnl_link_unregister(&vti6_link_ops); 13178c2ecf20Sopenharmony_ci#if IS_REACHABLE(CONFIG_INET6_XFRM_TUNNEL) 13188c2ecf20Sopenharmony_ci xfrm6_tunnel_deregister(&vti_ip6ip_handler, AF_INET); 13198c2ecf20Sopenharmony_ci xfrm6_tunnel_deregister(&vti_ipv6_handler, AF_INET6); 13208c2ecf20Sopenharmony_ci#endif 13218c2ecf20Sopenharmony_ci xfrm6_protocol_deregister(&vti_ipcomp6_protocol, IPPROTO_COMP); 13228c2ecf20Sopenharmony_ci xfrm6_protocol_deregister(&vti_ah6_protocol, IPPROTO_AH); 13238c2ecf20Sopenharmony_ci xfrm6_protocol_deregister(&vti_esp6_protocol, IPPROTO_ESP); 13248c2ecf20Sopenharmony_ci unregister_pernet_device(&vti6_net_ops); 13258c2ecf20Sopenharmony_ci} 13268c2ecf20Sopenharmony_ci 13278c2ecf20Sopenharmony_cimodule_init(vti6_tunnel_init); 13288c2ecf20Sopenharmony_cimodule_exit(vti6_tunnel_cleanup); 13298c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 13308c2ecf20Sopenharmony_ciMODULE_ALIAS_RTNL_LINK("vti6"); 13318c2ecf20Sopenharmony_ciMODULE_ALIAS_NETDEV("ip6_vti0"); 13328c2ecf20Sopenharmony_ciMODULE_AUTHOR("Steffen Klassert"); 13338c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("IPv6 virtual tunnel interface"); 1334