2010-04-02 14:18:33 +08:00
|
|
|
/*
|
|
|
|
* L2TP internal definitions.
|
|
|
|
*
|
|
|
|
* Copyright (c) 2008,2009 Katalix Systems Ltd
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*/
|
2017-07-04 20:52:57 +08:00
|
|
|
#include <linux/refcount.h>
|
2010-04-02 14:18:33 +08:00
|
|
|
|
|
|
|
#ifndef _L2TP_CORE_H_
|
|
|
|
#define _L2TP_CORE_H_
|
|
|
|
|
|
|
|
/* Just some random numbers */
|
|
|
|
#define L2TP_TUNNEL_MAGIC 0x42114DDA
|
|
|
|
#define L2TP_SESSION_MAGIC 0x0C04EB7D
|
|
|
|
|
2010-04-02 14:18:49 +08:00
|
|
|
/* Per tunnel, session hash table size */
|
2010-04-02 14:18:33 +08:00
|
|
|
#define L2TP_HASH_BITS 4
|
|
|
|
#define L2TP_HASH_SIZE (1 << L2TP_HASH_BITS)
|
|
|
|
|
2010-04-02 14:18:49 +08:00
|
|
|
/* System-wide, session hash table size */
|
|
|
|
#define L2TP_HASH_BITS_2 8
|
|
|
|
#define L2TP_HASH_SIZE_2 (1 << L2TP_HASH_BITS_2)
|
|
|
|
|
2010-04-02 14:18:33 +08:00
|
|
|
struct sk_buff;
|
|
|
|
|
|
|
|
struct l2tp_stats {
|
2013-03-19 14:11:22 +08:00
|
|
|
atomic_long_t tx_packets;
|
|
|
|
atomic_long_t tx_bytes;
|
|
|
|
atomic_long_t tx_errors;
|
|
|
|
atomic_long_t rx_packets;
|
|
|
|
atomic_long_t rx_bytes;
|
|
|
|
atomic_long_t rx_seq_discards;
|
|
|
|
atomic_long_t rx_oos_packets;
|
|
|
|
atomic_long_t rx_errors;
|
|
|
|
atomic_long_t rx_cookie_discards;
|
2010-04-02 14:18:33 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct l2tp_tunnel;
|
|
|
|
|
|
|
|
/* Describes a session. Contains information to determine incoming
|
|
|
|
* packets and transmit outgoing ones.
|
|
|
|
*/
|
|
|
|
struct l2tp_session_cfg {
|
2010-04-02 14:18:49 +08:00
|
|
|
enum l2tp_pwtype pw_type;
|
2012-04-15 13:58:06 +08:00
|
|
|
unsigned int data_seq:2; /* data sequencing level
|
2010-04-02 14:18:33 +08:00
|
|
|
* 0 => none, 1 => IP only,
|
|
|
|
* 2 => all
|
|
|
|
*/
|
2012-04-15 13:58:06 +08:00
|
|
|
unsigned int recv_seq:1; /* expect receive packets with
|
2010-04-02 14:18:33 +08:00
|
|
|
* sequence numbers? */
|
2012-04-15 13:58:06 +08:00
|
|
|
unsigned int send_seq:1; /* send packets with sequence
|
2010-04-02 14:18:33 +08:00
|
|
|
* numbers? */
|
2012-04-15 13:58:06 +08:00
|
|
|
unsigned int lns_mode:1; /* behave as LNS? LAC enables
|
2010-04-02 14:18:33 +08:00
|
|
|
* sequence numbers under
|
|
|
|
* control of LNS. */
|
|
|
|
int debug; /* bitmask of debug message
|
|
|
|
* categories */
|
2010-04-02 14:19:10 +08:00
|
|
|
u16 vlan_id; /* VLAN pseudowire only */
|
2010-04-02 14:18:49 +08:00
|
|
|
u16 offset; /* offset to payload */
|
|
|
|
u16 l2specific_len; /* Layer 2 specific length */
|
|
|
|
u16 l2specific_type; /* Layer 2 specific type */
|
|
|
|
u8 cookie[8]; /* optional cookie */
|
|
|
|
int cookie_len; /* 0, 4 or 8 bytes */
|
|
|
|
u8 peer_cookie[8]; /* peer's cookie */
|
|
|
|
int peer_cookie_len; /* 0, 4 or 8 bytes */
|
2010-04-02 14:18:33 +08:00
|
|
|
int reorder_timeout; /* configured reorder timeout
|
|
|
|
* (in jiffies) */
|
|
|
|
int mtu;
|
|
|
|
int mru;
|
2010-04-02 14:19:10 +08:00
|
|
|
char *ifname;
|
2010-04-02 14:18:33 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct l2tp_session {
|
|
|
|
int magic; /* should be
|
|
|
|
* L2TP_SESSION_MAGIC */
|
l2tp: fix race between l2tp_session_delete() and l2tp_tunnel_closeall()
There are several ways to remove L2TP sessions:
* deleting a session explicitly using the netlink interface (with
L2TP_CMD_SESSION_DELETE),
* deleting the session's parent tunnel (either by closing the
tunnel's file descriptor or using the netlink interface),
* closing the PPPOL2TP file descriptor of a PPP pseudo-wire.
In some cases, when these methods are used concurrently on the same
session, the session can be removed twice, leading to use-after-free
bugs.
This patch adds a 'dead' flag, used by l2tp_session_delete() and
l2tp_tunnel_closeall() to prevent them from stepping on each other's
toes.
The session deletion path used when closing a PPPOL2TP file descriptor
doesn't need to be adapted. It already has to ensure that a session
remains valid for the lifetime of its PPPOL2TP file descriptor.
So it takes an extra reference on the session in the ->session_close()
callback (pppol2tp_session_close()), which is eventually dropped
in the ->sk_destruct() callback of the PPPOL2TP socket
(pppol2tp_session_destruct()).
Still, __l2tp_session_unhash() and l2tp_session_queue_purge() can be
called twice and even concurrently for a given session, but thanks to
proper locking and re-initialisation of list fields, this is not an
issue.
Signed-off-by: Guillaume Nault <g.nault@alphalink.fr>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-22 21:39:24 +08:00
|
|
|
long dead;
|
2010-04-02 14:18:33 +08:00
|
|
|
|
|
|
|
struct l2tp_tunnel *tunnel; /* back pointer to tunnel
|
|
|
|
* context */
|
|
|
|
u32 session_id;
|
|
|
|
u32 peer_session_id;
|
2010-04-02 14:18:49 +08:00
|
|
|
u8 cookie[8];
|
|
|
|
int cookie_len;
|
|
|
|
u8 peer_cookie[8];
|
|
|
|
int peer_cookie_len;
|
|
|
|
u16 offset; /* offset from end of L2TP header
|
|
|
|
to beginning of data */
|
|
|
|
u16 l2specific_len;
|
|
|
|
u16 l2specific_type;
|
|
|
|
u16 hdr_len;
|
|
|
|
u32 nr; /* session NR state (receive) */
|
|
|
|
u32 ns; /* session NR state (send) */
|
2010-04-02 14:18:33 +08:00
|
|
|
struct sk_buff_head reorder_q; /* receive reorder queue */
|
2013-07-03 03:28:59 +08:00
|
|
|
u32 nr_max; /* max NR. Depends on tunnel */
|
|
|
|
u32 nr_window_size; /* NR window size */
|
2013-07-03 03:29:00 +08:00
|
|
|
u32 nr_oos; /* NR of last OOS packet */
|
|
|
|
int nr_oos_count; /* For OOS recovery */
|
|
|
|
int nr_oos_count_max;
|
2010-04-02 14:18:33 +08:00
|
|
|
struct hlist_node hlist; /* Hash list node */
|
2017-07-04 20:52:58 +08:00
|
|
|
refcount_t ref_count;
|
2010-04-02 14:18:33 +08:00
|
|
|
|
|
|
|
char name[32]; /* for logging */
|
2010-04-02 14:19:10 +08:00
|
|
|
char ifname[IFNAMSIZ];
|
2012-04-15 13:58:06 +08:00
|
|
|
unsigned int data_seq:2; /* data sequencing level
|
2010-04-02 14:18:33 +08:00
|
|
|
* 0 => none, 1 => IP only,
|
|
|
|
* 2 => all
|
|
|
|
*/
|
2012-04-15 13:58:06 +08:00
|
|
|
unsigned int recv_seq:1; /* expect receive packets with
|
2010-04-02 14:18:33 +08:00
|
|
|
* sequence numbers? */
|
2012-04-15 13:58:06 +08:00
|
|
|
unsigned int send_seq:1; /* send packets with sequence
|
2010-04-02 14:18:33 +08:00
|
|
|
* numbers? */
|
2012-04-15 13:58:06 +08:00
|
|
|
unsigned int lns_mode:1; /* behave as LNS? LAC enables
|
2010-04-02 14:18:33 +08:00
|
|
|
* sequence numbers under
|
|
|
|
* control of LNS. */
|
|
|
|
int debug; /* bitmask of debug message
|
|
|
|
* categories */
|
|
|
|
int reorder_timeout; /* configured reorder timeout
|
|
|
|
* (in jiffies) */
|
2012-05-10 07:43:08 +08:00
|
|
|
int reorder_skip; /* set if skip to next nr */
|
2010-04-02 14:18:33 +08:00
|
|
|
int mtu;
|
|
|
|
int mru;
|
2010-04-02 14:18:49 +08:00
|
|
|
enum l2tp_pwtype pwtype;
|
2010-04-02 14:18:33 +08:00
|
|
|
struct l2tp_stats stats;
|
2010-04-02 14:18:49 +08:00
|
|
|
struct hlist_node global_hlist; /* Global hash list node */
|
2010-04-02 14:18:33 +08:00
|
|
|
|
2010-04-02 14:18:49 +08:00
|
|
|
int (*build_header)(struct l2tp_session *session, void *buf);
|
2010-04-02 14:18:33 +08:00
|
|
|
void (*recv_skb)(struct l2tp_session *session, struct sk_buff *skb, int data_len);
|
|
|
|
void (*session_close)(struct l2tp_session *session);
|
2016-09-09 20:43:17 +08:00
|
|
|
#if IS_ENABLED(CONFIG_L2TP_DEBUGFS)
|
2010-04-02 14:19:33 +08:00
|
|
|
void (*show)(struct seq_file *m, void *priv);
|
|
|
|
#endif
|
2010-04-02 14:18:33 +08:00
|
|
|
uint8_t priv[0]; /* private data */
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Describes the tunnel. It contains info to track all the associated
|
|
|
|
* sessions so incoming packets can be sorted out
|
|
|
|
*/
|
|
|
|
struct l2tp_tunnel_cfg {
|
|
|
|
int debug; /* bitmask of debug message
|
|
|
|
* categories */
|
2010-04-02 14:19:00 +08:00
|
|
|
enum l2tp_encap_type encap;
|
2010-04-02 14:19:40 +08:00
|
|
|
|
|
|
|
/* Used only for kernel-created sockets */
|
|
|
|
struct in_addr local_ip;
|
|
|
|
struct in_addr peer_ip;
|
2012-04-30 05:48:52 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
struct in6_addr *local_ip6;
|
|
|
|
struct in6_addr *peer_ip6;
|
|
|
|
#endif
|
2010-04-02 14:19:40 +08:00
|
|
|
u16 local_udp_port;
|
|
|
|
u16 peer_udp_port;
|
2014-05-23 23:47:40 +08:00
|
|
|
unsigned int use_udp_checksums:1,
|
|
|
|
udp6_zero_tx_checksums:1,
|
|
|
|
udp6_zero_rx_checksums:1;
|
2010-04-02 14:18:33 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct l2tp_tunnel {
|
|
|
|
int magic; /* Should be L2TP_TUNNEL_MAGIC */
|
2017-09-26 22:16:43 +08:00
|
|
|
|
|
|
|
unsigned long dead;
|
|
|
|
|
2012-08-24 09:07:38 +08:00
|
|
|
struct rcu_head rcu;
|
2010-04-02 14:18:33 +08:00
|
|
|
rwlock_t hlist_lock; /* protect session_hlist */
|
2017-09-01 23:58:48 +08:00
|
|
|
bool acpt_newsess; /* Indicates whether this
|
|
|
|
* tunnel accepts new sessions.
|
|
|
|
* Protected by hlist_lock.
|
|
|
|
*/
|
2010-04-02 14:18:33 +08:00
|
|
|
struct hlist_head session_hlist[L2TP_HASH_SIZE];
|
|
|
|
/* hashed list of sessions,
|
|
|
|
* hashed by id */
|
|
|
|
u32 tunnel_id;
|
|
|
|
u32 peer_tunnel_id;
|
|
|
|
int version; /* 2=>L2TPv2, 3=>L2TPv3 */
|
|
|
|
|
|
|
|
char name[20]; /* for logging */
|
|
|
|
int debug; /* bitmask of debug message
|
|
|
|
* categories */
|
2010-04-02 14:19:00 +08:00
|
|
|
enum l2tp_encap_type encap;
|
2010-04-02 14:18:33 +08:00
|
|
|
struct l2tp_stats stats;
|
|
|
|
|
|
|
|
struct list_head list; /* Keep a list of all tunnels */
|
|
|
|
struct net *l2tp_net; /* the net we belong to */
|
|
|
|
|
2017-07-04 20:52:57 +08:00
|
|
|
refcount_t ref_count;
|
2010-04-02 14:19:33 +08:00
|
|
|
#ifdef CONFIG_DEBUG_FS
|
|
|
|
void (*show)(struct seq_file *m, void *arg);
|
|
|
|
#endif
|
2010-04-02 14:18:33 +08:00
|
|
|
int (*recv_payload_hook)(struct sk_buff *skb);
|
|
|
|
void (*old_sk_destruct)(struct sock *);
|
|
|
|
struct sock *sock; /* Parent socket */
|
2013-01-22 13:13:48 +08:00
|
|
|
int fd; /* Parent fd, if tunnel socket
|
|
|
|
* was created by userspace */
|
2013-10-02 16:16:02 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
bool v4mapped;
|
|
|
|
#endif
|
2010-04-02 14:18:33 +08:00
|
|
|
|
2013-02-01 07:43:00 +08:00
|
|
|
struct work_struct del_work;
|
|
|
|
|
2010-04-02 14:18:33 +08:00
|
|
|
uint8_t priv[0]; /* private data */
|
|
|
|
};
|
|
|
|
|
2010-04-02 14:19:10 +08:00
|
|
|
struct l2tp_nl_cmd_ops {
|
2017-09-01 23:58:51 +08:00
|
|
|
int (*session_create)(struct net *net, struct l2tp_tunnel *tunnel,
|
|
|
|
u32 session_id, u32 peer_session_id,
|
|
|
|
struct l2tp_session_cfg *cfg);
|
2010-04-02 14:19:10 +08:00
|
|
|
int (*session_delete)(struct l2tp_session *session);
|
|
|
|
};
|
|
|
|
|
2010-04-02 14:18:33 +08:00
|
|
|
static inline void *l2tp_tunnel_priv(struct l2tp_tunnel *tunnel)
|
|
|
|
{
|
|
|
|
return &tunnel->priv[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void *l2tp_session_priv(struct l2tp_session *session)
|
|
|
|
{
|
|
|
|
return &session->priv[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct l2tp_tunnel *l2tp_sock_to_tunnel(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct l2tp_tunnel *tunnel;
|
|
|
|
|
|
|
|
if (sk == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
sock_hold(sk);
|
|
|
|
tunnel = (struct l2tp_tunnel *)(sk->sk_user_data);
|
|
|
|
if (tunnel == NULL) {
|
|
|
|
sock_put(sk);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
BUG_ON(tunnel->magic != L2TP_TUNNEL_MAGIC);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return tunnel;
|
|
|
|
}
|
|
|
|
|
2017-08-25 22:51:40 +08:00
|
|
|
struct l2tp_tunnel *l2tp_tunnel_get(const struct net *net, u32 tunnel_id);
|
|
|
|
|
2017-04-12 16:05:29 +08:00
|
|
|
struct l2tp_session *l2tp_session_get(const struct net *net,
|
2017-03-31 19:02:25 +08:00
|
|
|
struct l2tp_tunnel *tunnel,
|
2017-11-01 00:36:42 +08:00
|
|
|
u32 session_id);
|
|
|
|
struct l2tp_session *l2tp_session_get_nth(struct l2tp_tunnel *tunnel, int nth);
|
2017-04-12 16:05:29 +08:00
|
|
|
struct l2tp_session *l2tp_session_get_by_ifname(const struct net *net,
|
2017-11-01 00:36:42 +08:00
|
|
|
const char *ifname);
|
2017-04-12 16:05:30 +08:00
|
|
|
struct l2tp_tunnel *l2tp_tunnel_find(const struct net *net, u32 tunnel_id);
|
|
|
|
struct l2tp_tunnel *l2tp_tunnel_find_nth(const struct net *net, int nth);
|
2013-10-19 04:48:25 +08:00
|
|
|
|
|
|
|
int l2tp_tunnel_create(struct net *net, int fd, int version, u32 tunnel_id,
|
|
|
|
u32 peer_tunnel_id, struct l2tp_tunnel_cfg *cfg,
|
|
|
|
struct l2tp_tunnel **tunnelp);
|
|
|
|
void l2tp_tunnel_closeall(struct l2tp_tunnel *tunnel);
|
2017-09-26 22:16:43 +08:00
|
|
|
void l2tp_tunnel_delete(struct l2tp_tunnel *tunnel);
|
2013-10-19 04:48:25 +08:00
|
|
|
struct l2tp_session *l2tp_session_create(int priv_size,
|
|
|
|
struct l2tp_tunnel *tunnel,
|
|
|
|
u32 session_id, u32 peer_session_id,
|
|
|
|
struct l2tp_session_cfg *cfg);
|
2017-10-27 22:51:50 +08:00
|
|
|
int l2tp_session_register(struct l2tp_session *session,
|
|
|
|
struct l2tp_tunnel *tunnel);
|
|
|
|
|
2013-10-19 04:48:25 +08:00
|
|
|
void __l2tp_session_unhash(struct l2tp_session *session);
|
|
|
|
int l2tp_session_delete(struct l2tp_session *session);
|
|
|
|
void l2tp_session_free(struct l2tp_session *session);
|
|
|
|
void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb,
|
|
|
|
unsigned char *ptr, unsigned char *optr, u16 hdrflags,
|
|
|
|
int length, int (*payload_hook)(struct sk_buff *skb));
|
|
|
|
int l2tp_session_queue_purge(struct l2tp_session *session);
|
|
|
|
int l2tp_udp_encap_recv(struct sock *sk, struct sk_buff *skb);
|
2014-03-06 18:14:30 +08:00
|
|
|
void l2tp_session_set_header_len(struct l2tp_session *session, int version);
|
2013-10-19 04:48:25 +08:00
|
|
|
|
|
|
|
int l2tp_xmit_skb(struct l2tp_session *session, struct sk_buff *skb,
|
|
|
|
int hdr_len);
|
|
|
|
|
|
|
|
int l2tp_nl_register_ops(enum l2tp_pwtype pw_type,
|
|
|
|
const struct l2tp_nl_cmd_ops *ops);
|
|
|
|
void l2tp_nl_unregister_ops(enum l2tp_pwtype pw_type);
|
2017-02-10 08:15:52 +08:00
|
|
|
int l2tp_ioctl(struct sock *sk, int cmd, unsigned long arg);
|
2010-04-02 14:19:10 +08:00
|
|
|
|
2017-08-25 22:51:40 +08:00
|
|
|
static inline void l2tp_tunnel_inc_refcount(struct l2tp_tunnel *tunnel)
|
|
|
|
{
|
|
|
|
refcount_inc(&tunnel->ref_count);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void l2tp_tunnel_dec_refcount(struct l2tp_tunnel *tunnel)
|
|
|
|
{
|
|
|
|
if (refcount_dec_and_test(&tunnel->ref_count))
|
|
|
|
kfree_rcu(tunnel, rcu);
|
|
|
|
}
|
|
|
|
|
2010-04-02 14:18:33 +08:00
|
|
|
/* Session reference counts. Incremented when code obtains a reference
|
|
|
|
* to a session.
|
|
|
|
*/
|
2017-11-01 00:36:44 +08:00
|
|
|
static inline void l2tp_session_inc_refcount(struct l2tp_session *session)
|
2010-04-02 14:18:33 +08:00
|
|
|
{
|
2017-07-04 20:52:58 +08:00
|
|
|
refcount_inc(&session->ref_count);
|
2010-04-02 14:18:33 +08:00
|
|
|
}
|
|
|
|
|
2017-11-01 00:36:44 +08:00
|
|
|
static inline void l2tp_session_dec_refcount(struct l2tp_session *session)
|
2010-04-02 14:18:33 +08:00
|
|
|
{
|
2017-07-04 20:52:58 +08:00
|
|
|
if (refcount_dec_and_test(&session->ref_count))
|
2010-04-02 14:18:33 +08:00
|
|
|
l2tp_session_free(session);
|
|
|
|
}
|
|
|
|
|
2012-05-16 17:55:56 +08:00
|
|
|
#define l2tp_printk(ptr, type, func, fmt, ...) \
|
|
|
|
do { \
|
|
|
|
if (((ptr)->debug) & (type)) \
|
|
|
|
func(fmt, ##__VA_ARGS__); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define l2tp_warn(ptr, type, fmt, ...) \
|
|
|
|
l2tp_printk(ptr, type, pr_warn, fmt, ##__VA_ARGS__)
|
|
|
|
#define l2tp_info(ptr, type, fmt, ...) \
|
|
|
|
l2tp_printk(ptr, type, pr_info, fmt, ##__VA_ARGS__)
|
|
|
|
#define l2tp_dbg(ptr, type, fmt, ...) \
|
|
|
|
l2tp_printk(ptr, type, pr_debug, fmt, ##__VA_ARGS__)
|
|
|
|
|
2015-09-24 12:33:34 +08:00
|
|
|
#define MODULE_ALIAS_L2TP_PWTYPE(type) \
|
|
|
|
MODULE_ALIAS("net-l2tp-type-" __stringify(type))
|
|
|
|
|
2010-04-02 14:18:33 +08:00
|
|
|
#endif /* _L2TP_CORE_H_ */
|