]> git.karo-electronics.de Git - karo-tx-linux.git/blob - net/ipv4/tunnel4.c
Merge branch 'mpls-in-ipv4-and-udp'
[karo-tx-linux.git] / net / ipv4 / tunnel4.c
1 /* tunnel4.c: Generic IP tunnel transformer.
2  *
3  * Copyright (C) 2003 David S. Miller (davem@redhat.com)
4  */
5
6 #include <linux/init.h>
7 #include <linux/module.h>
8 #include <linux/mutex.h>
9 #include <linux/mpls.h>
10 #include <linux/netdevice.h>
11 #include <linux/skbuff.h>
12 #include <linux/slab.h>
13 #include <net/icmp.h>
14 #include <net/ip.h>
15 #include <net/protocol.h>
16 #include <net/xfrm.h>
17
18 static struct xfrm_tunnel __rcu *tunnel4_handlers __read_mostly;
19 static struct xfrm_tunnel __rcu *tunnel64_handlers __read_mostly;
20 static struct xfrm_tunnel __rcu *tunnelmpls4_handlers __read_mostly;
21 static DEFINE_MUTEX(tunnel4_mutex);
22
23 static inline struct xfrm_tunnel __rcu **fam_handlers(unsigned short family)
24 {
25         return (family == AF_INET) ? &tunnel4_handlers :
26                 (family == AF_INET6) ? &tunnel64_handlers :
27                 &tunnelmpls4_handlers;
28 }
29
30 int xfrm4_tunnel_register(struct xfrm_tunnel *handler, unsigned short family)
31 {
32         struct xfrm_tunnel __rcu **pprev;
33         struct xfrm_tunnel *t;
34
35         int ret = -EEXIST;
36         int priority = handler->priority;
37
38         mutex_lock(&tunnel4_mutex);
39
40         for (pprev = fam_handlers(family);
41              (t = rcu_dereference_protected(*pprev,
42                         lockdep_is_held(&tunnel4_mutex))) != NULL;
43              pprev = &t->next) {
44                 if (t->priority > priority)
45                         break;
46                 if (t->priority == priority)
47                         goto err;
48         }
49
50         handler->next = *pprev;
51         rcu_assign_pointer(*pprev, handler);
52
53         ret = 0;
54
55 err:
56         mutex_unlock(&tunnel4_mutex);
57
58         return ret;
59 }
60 EXPORT_SYMBOL(xfrm4_tunnel_register);
61
62 int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler, unsigned short family)
63 {
64         struct xfrm_tunnel __rcu **pprev;
65         struct xfrm_tunnel *t;
66         int ret = -ENOENT;
67
68         mutex_lock(&tunnel4_mutex);
69
70         for (pprev = fam_handlers(family);
71              (t = rcu_dereference_protected(*pprev,
72                         lockdep_is_held(&tunnel4_mutex))) != NULL;
73              pprev = &t->next) {
74                 if (t == handler) {
75                         *pprev = handler->next;
76                         ret = 0;
77                         break;
78                 }
79         }
80
81         mutex_unlock(&tunnel4_mutex);
82
83         synchronize_net();
84
85         return ret;
86 }
87 EXPORT_SYMBOL(xfrm4_tunnel_deregister);
88
89 #define for_each_tunnel_rcu(head, handler)              \
90         for (handler = rcu_dereference(head);           \
91              handler != NULL;                           \
92              handler = rcu_dereference(handler->next))  \
93         
94 static int tunnel4_rcv(struct sk_buff *skb)
95 {
96         struct xfrm_tunnel *handler;
97
98         if (!pskb_may_pull(skb, sizeof(struct iphdr)))
99                 goto drop;
100
101         for_each_tunnel_rcu(tunnel4_handlers, handler)
102                 if (!handler->handler(skb))
103                         return 0;
104
105         icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
106
107 drop:
108         kfree_skb(skb);
109         return 0;
110 }
111
112 #if IS_ENABLED(CONFIG_IPV6)
113 static int tunnel64_rcv(struct sk_buff *skb)
114 {
115         struct xfrm_tunnel *handler;
116
117         if (!pskb_may_pull(skb, sizeof(struct ipv6hdr)))
118                 goto drop;
119
120         for_each_tunnel_rcu(tunnel64_handlers, handler)
121                 if (!handler->handler(skb))
122                         return 0;
123
124         icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
125
126 drop:
127         kfree_skb(skb);
128         return 0;
129 }
130 #endif
131
132 #if IS_ENABLED(CONFIG_MPLS)
133 static int tunnelmpls4_rcv(struct sk_buff *skb)
134 {
135         struct xfrm_tunnel *handler;
136
137         if (!pskb_may_pull(skb, sizeof(struct mpls_label)))
138                 goto drop;
139
140         for_each_tunnel_rcu(tunnelmpls4_handlers, handler)
141                 if (!handler->handler(skb))
142                         return 0;
143
144         icmp_send(skb, ICMP_DEST_UNREACH, ICMP_PORT_UNREACH, 0);
145
146 drop:
147         kfree_skb(skb);
148         return 0;
149 }
150 #endif
151
152 static void tunnel4_err(struct sk_buff *skb, u32 info)
153 {
154         struct xfrm_tunnel *handler;
155
156         for_each_tunnel_rcu(tunnel4_handlers, handler)
157                 if (!handler->err_handler(skb, info))
158                         break;
159 }
160
161 #if IS_ENABLED(CONFIG_IPV6)
162 static void tunnel64_err(struct sk_buff *skb, u32 info)
163 {
164         struct xfrm_tunnel *handler;
165
166         for_each_tunnel_rcu(tunnel64_handlers, handler)
167                 if (!handler->err_handler(skb, info))
168                         break;
169 }
170 #endif
171
172 #if IS_ENABLED(CONFIG_MPLS)
173 static void tunnelmpls4_err(struct sk_buff *skb, u32 info)
174 {
175         struct xfrm_tunnel *handler;
176
177         for_each_tunnel_rcu(tunnelmpls4_handlers, handler)
178                 if (!handler->err_handler(skb, info))
179                         break;
180 }
181 #endif
182
183 static const struct net_protocol tunnel4_protocol = {
184         .handler        =       tunnel4_rcv,
185         .err_handler    =       tunnel4_err,
186         .no_policy      =       1,
187         .netns_ok       =       1,
188 };
189
190 #if IS_ENABLED(CONFIG_IPV6)
191 static const struct net_protocol tunnel64_protocol = {
192         .handler        =       tunnel64_rcv,
193         .err_handler    =       tunnel64_err,
194         .no_policy      =       1,
195         .netns_ok       =       1,
196 };
197 #endif
198
199 #if IS_ENABLED(CONFIG_MPLS)
200 static const struct net_protocol tunnelmpls4_protocol = {
201         .handler        =       tunnelmpls4_rcv,
202         .err_handler    =       tunnelmpls4_err,
203         .no_policy      =       1,
204         .netns_ok       =       1,
205 };
206 #endif
207
208 static int __init tunnel4_init(void)
209 {
210         if (inet_add_protocol(&tunnel4_protocol, IPPROTO_IPIP))
211                 goto err_ipip;
212 #if IS_ENABLED(CONFIG_IPV6)
213         if (inet_add_protocol(&tunnel64_protocol, IPPROTO_IPV6))
214                 goto err_ipv6;
215 #endif
216 #if IS_ENABLED(CONFIG_MPLS)
217         if (inet_add_protocol(&tunnelmpls4_protocol, IPPROTO_MPLS))
218                 goto err_mpls;
219 #endif
220         return 0;
221
222 #if IS_ENABLED(CONFIG_IPV6)
223 err_mpls:
224         inet_del_protocol(&tunnel4_protocol, IPPROTO_IPV6);
225 #endif
226 err_ipv6:
227         inet_del_protocol(&tunnel4_protocol, IPPROTO_IPIP);
228 err_ipip:
229         pr_err("%s: can't add protocol\n", __func__);
230         return -EAGAIN;
231 }
232
233 static void __exit tunnel4_fini(void)
234 {
235 #if IS_ENABLED(CONFIG_MPLS)
236         if (inet_del_protocol(&tunnelmpls4_protocol, IPPROTO_MPLS))
237                 pr_err("tunnelmpls4 close: can't remove protocol\n");
238 #endif
239 #if IS_ENABLED(CONFIG_IPV6)
240         if (inet_del_protocol(&tunnel64_protocol, IPPROTO_IPV6))
241                 pr_err("tunnel64 close: can't remove protocol\n");
242 #endif
243         if (inet_del_protocol(&tunnel4_protocol, IPPROTO_IPIP))
244                 pr_err("tunnel4 close: can't remove protocol\n");
245 }
246
247 module_init(tunnel4_init);
248 module_exit(tunnel4_fini);
249 MODULE_LICENSE("GPL");