1 /* SPDX-License-Identifier: GPL-2.0-only */
2 /* L2TP internal definitions.
3 *
4 * Copyright (c) 2008,2009 Katalix Systems Ltd
5 */
6 #include <linux/refcount.h>
7
8 #ifndef _L2TP_CORE_H_
9 #define _L2TP_CORE_H_
10
11 #include <net/dst.h>
12 #include <net/sock.h>
13
14 #ifdef CONFIG_XFRM
15 #include <net/xfrm.h>
16 #endif
17
18 /* Random numbers used for internal consistency checks of tunnel and session structures */
19 #define L2TP_SESSION_MAGIC 0x0C04EB7D
20
21 struct sk_buff;
22
23 struct l2tp_stats {
24 atomic_long_t tx_packets;
25 atomic_long_t tx_bytes;
26 atomic_long_t tx_errors;
27 atomic_long_t rx_packets;
28 atomic_long_t rx_bytes;
29 atomic_long_t rx_seq_discards;
30 atomic_long_t rx_oos_packets;
31 atomic_long_t rx_errors;
32 atomic_long_t rx_cookie_discards;
33 atomic_long_t rx_invalid;
34 };
35
36 struct l2tp_tunnel;
37
38 /* L2TP session configuration */
39 struct l2tp_session_cfg {
40 enum l2tp_pwtype pw_type;
41 unsigned int recv_seq:1; /* expect receive packets with sequence numbers? */
42 unsigned int send_seq:1; /* send packets with sequence numbers? */
43 unsigned int lns_mode:1; /* behave as LNS?
44 * LAC enables sequence numbers under LNS control.
45 */
46 u16 l2specific_type; /* Layer 2 specific type */
47 u8 cookie[8]; /* optional cookie */
48 int cookie_len; /* 0, 4 or 8 bytes */
49 u8 peer_cookie[8]; /* peer's cookie */
50 int peer_cookie_len; /* 0, 4 or 8 bytes */
51 int reorder_timeout; /* configured reorder timeout (in jiffies) */
52 char *ifname;
53 };
54
55 struct l2tp_session_coll_list {
56 spinlock_t lock; /* for access to list */
57 struct list_head list;
58 refcount_t ref_count;
59 };
60
61 /* Represents a session (pseudowire) instance.
62 * Tracks runtime state including cookies, dataplane packet sequencing, and IO statistics.
63 * Is linked into a per-tunnel session list and a per-net ("global") IDR tree.
64 */
65 #define L2TP_SESSION_NAME_MAX 32
66 struct l2tp_session {
67 int magic; /* should be L2TP_SESSION_MAGIC */
68 long dead;
69 struct rcu_head rcu;
70
71 struct l2tp_tunnel *tunnel; /* back pointer to tunnel context */
72 u32 session_id;
73 u32 peer_session_id;
74 u8 cookie[8];
75 int cookie_len;
76 u8 peer_cookie[8];
77 int peer_cookie_len;
78 u16 l2specific_type;
79 u16 hdr_len;
80 u32 nr; /* session NR state (receive) */
81 u32 ns; /* session NR state (send) */
82 struct sk_buff_head reorder_q; /* receive reorder queue */
83 u32 nr_max; /* max NR. Depends on tunnel */
84 u32 nr_window_size; /* NR window size */
85 u32 nr_oos; /* NR of last OOS packet */
86 int nr_oos_count; /* for OOS recovery */
87 int nr_oos_count_max;
88 struct list_head list; /* per-tunnel list node */
89 refcount_t ref_count;
90 struct hlist_node hlist; /* per-net session hlist */
91 unsigned long hlist_key; /* key for session hlist */
92 struct l2tp_session_coll_list *coll_list; /* session collision list */
93 struct list_head clist; /* for coll_list */
94
95 char name[L2TP_SESSION_NAME_MAX]; /* for logging */
96 char ifname[IFNAMSIZ];
97 unsigned int recv_seq:1; /* expect receive packets with sequence numbers? */
98 unsigned int send_seq:1; /* send packets with sequence numbers? */
99 unsigned int lns_mode:1; /* behave as LNS?
100 * LAC enables sequence numbers under LNS control.
101 */
102 int reorder_timeout; /* configured reorder timeout (in jiffies) */
103 int reorder_skip; /* set if skip to next nr */
104 enum l2tp_pwtype pwtype;
105 struct l2tp_stats stats;
106 struct work_struct del_work;
107
108 /* Session receive handler for data packets.
109 * Each pseudowire implementation should implement this callback in order to
110 * handle incoming packets. Packets are passed to the pseudowire handler after
111 * reordering, if data sequence numbers are enabled for the session.
112 */
113 void (*recv_skb)(struct l2tp_session *session, struct sk_buff *skb, int data_len);
114
115 /* Session close handler.
116 * Each pseudowire implementation may implement this callback in order to carry
117 * out pseudowire-specific shutdown actions.
118 * The callback is called by core after unlisting the session and purging its
119 * reorder queue.
120 */
121 void (*session_close)(struct l2tp_session *session);
122
123 /* Session show handler.
124 * Pseudowire-specific implementation of debugfs session rendering.
125 * The callback is called by l2tp_debugfs.c after rendering core session
126 * information.
127 */
128 void (*show)(struct seq_file *m, void *priv);
129
130 u8 priv[]; /* private data */
131 };
132
133 /* L2TP tunnel configuration */
134 struct l2tp_tunnel_cfg {
135 enum l2tp_encap_type encap;
136
137 /* Used only for kernel-created sockets */
138 struct in_addr local_ip;
139 struct in_addr peer_ip;
140 #if IS_ENABLED(CONFIG_IPV6)
141 struct in6_addr *local_ip6;
142 struct in6_addr *peer_ip6;
143 #endif
144 u16 local_udp_port;
145 u16 peer_udp_port;
146 unsigned int use_udp_checksums:1,
147 udp6_zero_tx_checksums:1,
148 udp6_zero_rx_checksums:1;
149 };
150
151 /* Represents a tunnel instance.
152 * Tracks runtime state including IO statistics.
153 * Holds the tunnel socket (either passed from userspace or directly created by the kernel).
154 * Maintains a list of sessions belonging to the tunnel instance.
155 * Is linked into a per-net list of tunnels.
156 */
157 #define L2TP_TUNNEL_NAME_MAX 20
158 struct l2tp_tunnel {
159 unsigned long dead;
160
161 struct rcu_head rcu;
162 spinlock_t list_lock; /* write-protection for session_list */
163 bool acpt_newsess; /* indicates whether this tunnel accepts
164 * new sessions. Protected by list_lock.
165 */
166 struct list_head session_list; /* list of sessions */
167 u32 tunnel_id;
168 u32 peer_tunnel_id;
169 int version; /* 2=>L2TPv2, 3=>L2TPv3 */
170
171 char name[L2TP_TUNNEL_NAME_MAX]; /* for logging */
172 enum l2tp_encap_type encap;
173 struct l2tp_stats stats;
174
175 struct net *l2tp_net; /* the net we belong to */
176
177 refcount_t ref_count;
178 struct sock *sock; /* parent socket */
179 int fd; /* parent fd, if tunnel socket was created
180 * by userspace
181 */
182
183 struct work_struct del_work;
184 };
185
186 /* Pseudowire ops callbacks for use with the l2tp genetlink interface */
187 struct l2tp_nl_cmd_ops {
188 /* The pseudowire session create callback is responsible for creating a session
189 * instance for a specific pseudowire type.
190 * It must call l2tp_session_create and l2tp_session_register to register the
191 * session instance, as well as carry out any pseudowire-specific initialisation.
192 * It must return >= 0 on success, or an appropriate negative errno value on failure.
193 */
194 int (*session_create)(struct net *net, struct l2tp_tunnel *tunnel,
195 u32 session_id, u32 peer_session_id,
196 struct l2tp_session_cfg *cfg);
197
198 /* The pseudowire session delete callback is responsible for initiating the deletion
199 * of a session instance.
200 * It must call l2tp_session_delete, as well as carry out any pseudowire-specific
201 * teardown actions.
202 */
203 void (*session_delete)(struct l2tp_session *session);
204 };
205
l2tp_session_priv(struct l2tp_session * session)206 static inline void *l2tp_session_priv(struct l2tp_session *session)
207 {
208 return &session->priv[0];
209 }
210
211 /* Tunnel and session refcounts */
212 void l2tp_tunnel_put(struct l2tp_tunnel *tunnel);
213 void l2tp_session_put(struct l2tp_session *session);
214
215 /* Tunnel and session lookup.
216 * These functions take a reference on the instances they return, so
217 * the caller must ensure that the reference is dropped appropriately.
218 */
219 struct l2tp_tunnel *l2tp_tunnel_get(const struct net *net, u32 tunnel_id);
220 struct l2tp_tunnel *l2tp_tunnel_get_next(const struct net *net, unsigned long *key);
221
222 struct l2tp_session *l2tp_v3_session_get(const struct net *net, struct sock *sk, u32 session_id);
223 struct l2tp_session *l2tp_v2_session_get(const struct net *net, u16 tunnel_id, u16 session_id);
224 struct l2tp_session *l2tp_session_get(const struct net *net, struct sock *sk, int pver,
225 u32 tunnel_id, u32 session_id);
226 struct l2tp_session *l2tp_session_get_next(const struct net *net, struct sock *sk, int pver,
227 u32 tunnel_id, unsigned long *key);
228 struct l2tp_session *l2tp_session_get_by_ifname(const struct net *net,
229 const char *ifname);
230
231 /* Tunnel and session lifetime management.
232 * Creation of a new instance is a two-step process: create, then register.
233 * Destruction is triggered using the *_delete functions, and completes asynchronously.
234 */
235 int l2tp_tunnel_create(int fd, int version, u32 tunnel_id,
236 u32 peer_tunnel_id, struct l2tp_tunnel_cfg *cfg,
237 struct l2tp_tunnel **tunnelp);
238 int l2tp_tunnel_register(struct l2tp_tunnel *tunnel, struct net *net,
239 struct l2tp_tunnel_cfg *cfg);
240 void l2tp_tunnel_delete(struct l2tp_tunnel *tunnel);
241
242 struct l2tp_session *l2tp_session_create(int priv_size,
243 struct l2tp_tunnel *tunnel,
244 u32 session_id, u32 peer_session_id,
245 struct l2tp_session_cfg *cfg);
246 int l2tp_session_register(struct l2tp_session *session,
247 struct l2tp_tunnel *tunnel);
248 void l2tp_session_delete(struct l2tp_session *session);
249
250 /* Receive path helpers. If data sequencing is enabled for the session these
251 * functions handle queuing and reordering prior to passing packets to the
252 * pseudowire code to be passed to userspace.
253 */
254 void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb,
255 unsigned char *ptr, unsigned char *optr, u16 hdrflags,
256 int length);
257 int l2tp_udp_encap_recv(struct sock *sk, struct sk_buff *skb);
258
259 /* Transmit path helpers for sending packets over the tunnel socket. */
260 void l2tp_session_set_header_len(struct l2tp_session *session, int version,
261 enum l2tp_encap_type encap);
262 int l2tp_xmit_skb(struct l2tp_session *session, struct sk_buff *skb);
263
264 /* Pseudowire management.
265 * Pseudowires should register with l2tp core on module init, and unregister
266 * on module exit.
267 */
268 int l2tp_nl_register_ops(enum l2tp_pwtype pw_type, const struct l2tp_nl_cmd_ops *ops);
269 void l2tp_nl_unregister_ops(enum l2tp_pwtype pw_type);
270
271 /* IOCTL helper for IP encap modules. */
272 int l2tp_ioctl(struct sock *sk, int cmd, int *karg);
273
274 struct l2tp_tunnel *l2tp_sk_to_tunnel(const struct sock *sk);
275
l2tp_get_l2specific_len(struct l2tp_session * session)276 static inline int l2tp_get_l2specific_len(struct l2tp_session *session)
277 {
278 switch (session->l2specific_type) {
279 case L2TP_L2SPECTYPE_DEFAULT:
280 return 4;
281 case L2TP_L2SPECTYPE_NONE:
282 default:
283 return 0;
284 }
285 }
286
l2tp_tunnel_dst_mtu(const struct l2tp_tunnel * tunnel)287 static inline u32 l2tp_tunnel_dst_mtu(const struct l2tp_tunnel *tunnel)
288 {
289 struct dst_entry *dst;
290 u32 mtu;
291
292 dst = sk_dst_get(tunnel->sock);
293 if (!dst)
294 return 0;
295
296 mtu = dst_mtu(dst);
297 dst_release(dst);
298
299 return mtu;
300 }
301
302 #ifdef CONFIG_XFRM
l2tp_tunnel_uses_xfrm(const struct l2tp_tunnel * tunnel)303 static inline bool l2tp_tunnel_uses_xfrm(const struct l2tp_tunnel *tunnel)
304 {
305 struct sock *sk = tunnel->sock;
306
307 return sk && (rcu_access_pointer(sk->sk_policy[0]) ||
308 rcu_access_pointer(sk->sk_policy[1]));
309 }
310 #else
l2tp_tunnel_uses_xfrm(const struct l2tp_tunnel * tunnel)311 static inline bool l2tp_tunnel_uses_xfrm(const struct l2tp_tunnel *tunnel)
312 {
313 return false;
314 }
315 #endif
316
l2tp_v3_ensure_opt_in_linear(struct l2tp_session * session,struct sk_buff * skb,unsigned char ** ptr,unsigned char ** optr)317 static inline int l2tp_v3_ensure_opt_in_linear(struct l2tp_session *session, struct sk_buff *skb,
318 unsigned char **ptr, unsigned char **optr)
319 {
320 int opt_len = session->peer_cookie_len + l2tp_get_l2specific_len(session);
321
322 if (opt_len > 0) {
323 int off = *ptr - *optr;
324
325 if (!pskb_may_pull(skb, off + opt_len))
326 return -1;
327
328 if (skb->data != *optr) {
329 *optr = skb->data;
330 *ptr = skb->data + off;
331 }
332 }
333
334 return 0;
335 }
336
337 #define MODULE_ALIAS_L2TP_PWTYPE(type) \
338 MODULE_ALIAS("net-l2tp-type-" __stringify(type))
339
340 #endif /* _L2TP_CORE_H_ */
341