Blame view

net/l2tp/l2tp_core.c 51 KB
fd558d186   James Chapman   l2tp: Split pppol...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
  /*
   * L2TP core.
   *
   * Copyright (c) 2008,2009,2010 Katalix Systems Ltd
   *
   * This file contains some code of the original L2TPv2 pppol2tp
   * driver, which has the following copyright:
   *
   * Authors:	Martijn van Oosterhout <kleptog@svana.org>
   *		James Chapman (jchapman@katalix.com)
   * Contributors:
   *		Michal Ostrowski <mostrows@speakeasy.net>
   *		Arnaldo Carvalho de Melo <acme@xconectiva.com.br>
   *		David S. Miller (davem@redhat.com)
   *
   * This program is free software; you can redistribute it and/or modify
   * it under the terms of the GNU General Public License version 2 as
   * published by the Free Software Foundation.
   */
a4ca44fa5   Joe Perches   net: l2tp: Standa...
20
  #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
fd558d186   James Chapman   l2tp: Split pppol...
21
22
23
  #include <linux/module.h>
  #include <linux/string.h>
  #include <linux/list.h>
e02d494d2   James Chapman   l2tp: Convert rwl...
24
  #include <linux/rculist.h>
fd558d186   James Chapman   l2tp: Split pppol...
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
  #include <linux/uaccess.h>
  
  #include <linux/kernel.h>
  #include <linux/spinlock.h>
  #include <linux/kthread.h>
  #include <linux/sched.h>
  #include <linux/slab.h>
  #include <linux/errno.h>
  #include <linux/jiffies.h>
  
  #include <linux/netdevice.h>
  #include <linux/net.h>
  #include <linux/inetdevice.h>
  #include <linux/skbuff.h>
  #include <linux/init.h>
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
40
  #include <linux/in.h>
fd558d186   James Chapman   l2tp: Split pppol...
41
42
  #include <linux/ip.h>
  #include <linux/udp.h>
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
43
  #include <linux/l2tp.h>
fd558d186   James Chapman   l2tp: Split pppol...
44
45
46
47
48
49
50
51
52
  #include <linux/hash.h>
  #include <linux/sort.h>
  #include <linux/file.h>
  #include <linux/nsproxy.h>
  #include <net/net_namespace.h>
  #include <net/netns/generic.h>
  #include <net/dst.h>
  #include <net/ip.h>
  #include <net/udp.h>
85644b4d0   Tom Herbert   l2tp: Call udp_so...
53
  #include <net/udp_tunnel.h>
309795f4b   James Chapman   l2tp: Add netlink...
54
  #include <net/inet_common.h>
fd558d186   James Chapman   l2tp: Split pppol...
55
  #include <net/xfrm.h>
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
56
  #include <net/protocol.h>
d2cf33616   Benjamin LaHaise   net/l2tp: add sup...
57
58
59
  #include <net/inet6_connection_sock.h>
  #include <net/inet_ecn.h>
  #include <net/ip6_route.h>
d499bd2ee   David S. Miller   l2tp: Add missing...
60
  #include <net/ip6_checksum.h>
fd558d186   James Chapman   l2tp: Split pppol...
61
62
  
  #include <asm/byteorder.h>
60063497a   Arun Sharma   atomic: use <linu...
63
  #include <linux/atomic.h>
fd558d186   James Chapman   l2tp: Split pppol...
64
65
66
67
68
69
70
71
72
73
74
75
76
77
  
  #include "l2tp_core.h"
  
  #define L2TP_DRV_VERSION	"V2.0"
  
  /* L2TP header constants */
  #define L2TP_HDRFLAG_T	   0x8000
  #define L2TP_HDRFLAG_L	   0x4000
  #define L2TP_HDRFLAG_S	   0x0800
  #define L2TP_HDRFLAG_O	   0x0200
  #define L2TP_HDRFLAG_P	   0x0100
  
  #define L2TP_HDR_VER_MASK  0x000F
  #define L2TP_HDR_VER_2	   0x0002
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
78
  #define L2TP_HDR_VER_3	   0x0003
fd558d186   James Chapman   l2tp: Split pppol...
79
80
81
82
83
84
85
86
87
88
  
  /* L2TPv3 default L2-specific sublayer */
  #define L2TP_SLFLAG_S	   0x40000000
  #define L2TP_SL_SEQ_MASK   0x00ffffff
  
  #define L2TP_HDR_SIZE_SEQ		10
  #define L2TP_HDR_SIZE_NOSEQ		6
  
  /* Default trace flags */
  #define L2TP_DEFAULT_DEBUG_FLAGS	0
fd558d186   James Chapman   l2tp: Split pppol...
89
90
91
  /* Private data stored for received packets in the skb.
   */
  struct l2tp_skb_cb {
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
92
  	u32			ns;
fd558d186   James Chapman   l2tp: Split pppol...
93
94
95
96
97
98
99
100
101
  	u16			has_seq;
  	u16			length;
  	unsigned long		expires;
  };
  
  #define L2TP_SKB_CB(skb)	((struct l2tp_skb_cb *) &skb->cb[sizeof(struct inet_skb_parm)])
  
  static atomic_t l2tp_tunnel_count;
  static atomic_t l2tp_session_count;
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
102
  static struct workqueue_struct *l2tp_wq;
fd558d186   James Chapman   l2tp: Split pppol...
103
104
105
106
107
  
  /* per-net private data for this module */
  static unsigned int l2tp_net_id;
  struct l2tp_net {
  	struct list_head l2tp_tunnel_list;
e02d494d2   James Chapman   l2tp: Convert rwl...
108
  	spinlock_t l2tp_tunnel_list_lock;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
109
  	struct hlist_head l2tp_session_hlist[L2TP_HASH_SIZE_2];
e02d494d2   James Chapman   l2tp: Convert rwl...
110
  	spinlock_t l2tp_session_hlist_lock;
fd558d186   James Chapman   l2tp: Split pppol...
111
  };
fc130840d   stephen hemminger   l2tp: make local ...
112
  static void l2tp_tunnel_free(struct l2tp_tunnel *tunnel);
fc130840d   stephen hemminger   l2tp: make local ...
113

8d8a51e26   David S. Miller   l2tp: Fix build w...
114
115
116
117
  static inline struct l2tp_tunnel *l2tp_tunnel(struct sock *sk)
  {
  	return sk->sk_user_data;
  }
fd558d186   James Chapman   l2tp: Split pppol...
118
119
120
121
122
123
  static inline struct l2tp_net *l2tp_pernet(struct net *net)
  {
  	BUG_ON(!net);
  
  	return net_generic(net, l2tp_net_id);
  }
fc130840d   stephen hemminger   l2tp: make local ...
124
125
126
127
128
129
130
131
132
133
134
135
136
137
  /* Tunnel reference counts. Incremented per session that is added to
   * the tunnel.
   */
  static inline void l2tp_tunnel_inc_refcount_1(struct l2tp_tunnel *tunnel)
  {
  	atomic_inc(&tunnel->ref_count);
  }
  
  static inline void l2tp_tunnel_dec_refcount_1(struct l2tp_tunnel *tunnel)
  {
  	if (atomic_dec_and_test(&tunnel->ref_count))
  		l2tp_tunnel_free(tunnel);
  }
  #ifdef L2TP_REFCNT_DEBUG
a4ca44fa5   Joe Perches   net: l2tp: Standa...
138
139
140
141
142
143
144
145
  #define l2tp_tunnel_inc_refcount(_t)					\
  do {									\
  	pr_debug("l2tp_tunnel_inc_refcount: %s:%d %s: cnt=%d
  ",	\
  		 __func__, __LINE__, (_t)->name,			\
  		 atomic_read(&_t->ref_count));				\
  	l2tp_tunnel_inc_refcount_1(_t);					\
  } while (0)
29abe2fda   Andy Zhou   l2tp: fix missing...
146
  #define l2tp_tunnel_dec_refcount(_t)					\
a4ca44fa5   Joe Perches   net: l2tp: Standa...
147
148
149
150
151
152
153
  do {									\
  	pr_debug("l2tp_tunnel_dec_refcount: %s:%d %s: cnt=%d
  ",	\
  		 __func__, __LINE__, (_t)->name,			\
  		 atomic_read(&_t->ref_count));				\
  	l2tp_tunnel_dec_refcount_1(_t);					\
  } while (0)
fc130840d   stephen hemminger   l2tp: make local ...
154
155
156
157
  #else
  #define l2tp_tunnel_inc_refcount(t) l2tp_tunnel_inc_refcount_1(t)
  #define l2tp_tunnel_dec_refcount(t) l2tp_tunnel_dec_refcount_1(t)
  #endif
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
158
159
160
161
162
163
164
165
166
167
168
  /* Session hash global list for L2TPv3.
   * The session_id SHOULD be random according to RFC3931, but several
   * L2TP implementations use incrementing session_ids.  So we do a real
   * hash on the session_id, rather than a simple bitmask.
   */
  static inline struct hlist_head *
  l2tp_session_id_hash_2(struct l2tp_net *pn, u32 session_id)
  {
  	return &pn->l2tp_session_hlist[hash_32(session_id, L2TP_HASH_BITS_2)];
  
  }
80d84ef3f   Tom Parkin   l2tp: prevent l2t...
169
170
171
172
  /* Lookup the tunnel socket, possibly involving the fs code if the socket is
   * owned by userspace.  A struct sock returned from this function must be
   * released using l2tp_tunnel_sock_put once you're done with it.
   */
b5d2b2858   stephen hemminger   l2tp: make local ...
173
  static struct sock *l2tp_tunnel_sock_lookup(struct l2tp_tunnel *tunnel)
80d84ef3f   Tom Parkin   l2tp: prevent l2t...
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
  {
  	int err = 0;
  	struct socket *sock = NULL;
  	struct sock *sk = NULL;
  
  	if (!tunnel)
  		goto out;
  
  	if (tunnel->fd >= 0) {
  		/* Socket is owned by userspace, who might be in the process
  		 * of closing it.  Look the socket up using the fd to ensure
  		 * consistency.
  		 */
  		sock = sockfd_lookup(tunnel->fd, &err);
  		if (sock)
  			sk = sock->sk;
  	} else {
  		/* Socket is owned by kernelspace */
  		sk = tunnel->sock;
8abbbe8ff   Tom Parkin   l2tp: take a refe...
193
  		sock_hold(sk);
80d84ef3f   Tom Parkin   l2tp: prevent l2t...
194
195
196
197
198
  	}
  
  out:
  	return sk;
  }
80d84ef3f   Tom Parkin   l2tp: prevent l2t...
199
200
  
  /* Drop a reference to a tunnel socket obtained via. l2tp_tunnel_sock_put */
b5d2b2858   stephen hemminger   l2tp: make local ...
201
  static void l2tp_tunnel_sock_put(struct sock *sk)
80d84ef3f   Tom Parkin   l2tp: prevent l2t...
202
203
204
205
206
207
208
209
210
  {
  	struct l2tp_tunnel *tunnel = l2tp_sock_to_tunnel(sk);
  	if (tunnel) {
  		if (tunnel->fd >= 0) {
  			/* Socket is owned by userspace */
  			sockfd_put(sk->sk_socket);
  		}
  		sock_put(sk);
  	}
8abbbe8ff   Tom Parkin   l2tp: take a refe...
211
  	sock_put(sk);
80d84ef3f   Tom Parkin   l2tp: prevent l2t...
212
  }
80d84ef3f   Tom Parkin   l2tp: prevent l2t...
213

f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
214
215
216
217
218
219
220
221
  /* Lookup a session by id in the global session list
   */
  static struct l2tp_session *l2tp_session_find_2(struct net *net, u32 session_id)
  {
  	struct l2tp_net *pn = l2tp_pernet(net);
  	struct hlist_head *session_list =
  		l2tp_session_id_hash_2(pn, session_id);
  	struct l2tp_session *session;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
222

e02d494d2   James Chapman   l2tp: Convert rwl...
223
  	rcu_read_lock_bh();
b67bfe0d4   Sasha Levin   hlist: drop the n...
224
  	hlist_for_each_entry_rcu(session, session_list, global_hlist) {
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
225
  		if (session->session_id == session_id) {
e02d494d2   James Chapman   l2tp: Convert rwl...
226
  			rcu_read_unlock_bh();
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
227
228
229
  			return session;
  		}
  	}
e02d494d2   James Chapman   l2tp: Convert rwl...
230
  	rcu_read_unlock_bh();
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
231
232
233
  
  	return NULL;
  }
fd558d186   James Chapman   l2tp: Split pppol...
234
235
236
237
238
239
240
241
242
243
244
245
246
247
  /* Session hash list.
   * The session_id SHOULD be random according to RFC2661, but several
   * L2TP implementations (Cisco and Microsoft) use incrementing
   * session_ids.  So we do a real hash on the session_id, rather than a
   * simple bitmask.
   */
  static inline struct hlist_head *
  l2tp_session_id_hash(struct l2tp_tunnel *tunnel, u32 session_id)
  {
  	return &tunnel->session_hlist[hash_32(session_id, L2TP_HASH_BITS)];
  }
  
  /* Lookup a session by id
   */
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
248
  struct l2tp_session *l2tp_session_find(struct net *net, struct l2tp_tunnel *tunnel, u32 session_id)
fd558d186   James Chapman   l2tp: Split pppol...
249
  {
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
250
  	struct hlist_head *session_list;
fd558d186   James Chapman   l2tp: Split pppol...
251
  	struct l2tp_session *session;
fd558d186   James Chapman   l2tp: Split pppol...
252

f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
253
254
255
256
257
258
259
260
  	/* In L2TPv3, session_ids are unique over all tunnels and we
  	 * sometimes need to look them up before we know the
  	 * tunnel.
  	 */
  	if (tunnel == NULL)
  		return l2tp_session_find_2(net, session_id);
  
  	session_list = l2tp_session_id_hash(tunnel, session_id);
fd558d186   James Chapman   l2tp: Split pppol...
261
  	read_lock_bh(&tunnel->hlist_lock);
b67bfe0d4   Sasha Levin   hlist: drop the n...
262
  	hlist_for_each_entry(session, session_list, hlist) {
fd558d186   James Chapman   l2tp: Split pppol...
263
264
265
266
267
268
269
270
271
272
273
274
275
276
  		if (session->session_id == session_id) {
  			read_unlock_bh(&tunnel->hlist_lock);
  			return session;
  		}
  	}
  	read_unlock_bh(&tunnel->hlist_lock);
  
  	return NULL;
  }
  EXPORT_SYMBOL_GPL(l2tp_session_find);
  
  struct l2tp_session *l2tp_session_find_nth(struct l2tp_tunnel *tunnel, int nth)
  {
  	int hash;
fd558d186   James Chapman   l2tp: Split pppol...
277
278
279
280
281
  	struct l2tp_session *session;
  	int count = 0;
  
  	read_lock_bh(&tunnel->hlist_lock);
  	for (hash = 0; hash < L2TP_HASH_SIZE; hash++) {
b67bfe0d4   Sasha Levin   hlist: drop the n...
282
  		hlist_for_each_entry(session, &tunnel->session_hlist[hash], hlist) {
fd558d186   James Chapman   l2tp: Split pppol...
283
284
285
286
287
288
289
290
291
292
293
294
  			if (++count > nth) {
  				read_unlock_bh(&tunnel->hlist_lock);
  				return session;
  			}
  		}
  	}
  
  	read_unlock_bh(&tunnel->hlist_lock);
  
  	return NULL;
  }
  EXPORT_SYMBOL_GPL(l2tp_session_find_nth);
309795f4b   James Chapman   l2tp: Add netlink...
295
296
297
298
299
300
301
  /* Lookup a session by interface name.
   * This is very inefficient but is only used by management interfaces.
   */
  struct l2tp_session *l2tp_session_find_by_ifname(struct net *net, char *ifname)
  {
  	struct l2tp_net *pn = l2tp_pernet(net);
  	int hash;
309795f4b   James Chapman   l2tp: Add netlink...
302
  	struct l2tp_session *session;
e02d494d2   James Chapman   l2tp: Convert rwl...
303
  	rcu_read_lock_bh();
309795f4b   James Chapman   l2tp: Add netlink...
304
  	for (hash = 0; hash < L2TP_HASH_SIZE_2; hash++) {
b67bfe0d4   Sasha Levin   hlist: drop the n...
305
  		hlist_for_each_entry_rcu(session, &pn->l2tp_session_hlist[hash], global_hlist) {
309795f4b   James Chapman   l2tp: Add netlink...
306
  			if (!strcmp(session->ifname, ifname)) {
e02d494d2   James Chapman   l2tp: Convert rwl...
307
  				rcu_read_unlock_bh();
309795f4b   James Chapman   l2tp: Add netlink...
308
309
310
311
  				return session;
  			}
  		}
  	}
e02d494d2   James Chapman   l2tp: Convert rwl...
312
  	rcu_read_unlock_bh();
309795f4b   James Chapman   l2tp: Add netlink...
313
314
315
316
  
  	return NULL;
  }
  EXPORT_SYMBOL_GPL(l2tp_session_find_by_ifname);
fd558d186   James Chapman   l2tp: Split pppol...
317
318
319
320
321
322
  /* Lookup a tunnel by id
   */
  struct l2tp_tunnel *l2tp_tunnel_find(struct net *net, u32 tunnel_id)
  {
  	struct l2tp_tunnel *tunnel;
  	struct l2tp_net *pn = l2tp_pernet(net);
e02d494d2   James Chapman   l2tp: Convert rwl...
323
324
  	rcu_read_lock_bh();
  	list_for_each_entry_rcu(tunnel, &pn->l2tp_tunnel_list, list) {
fd558d186   James Chapman   l2tp: Split pppol...
325
  		if (tunnel->tunnel_id == tunnel_id) {
e02d494d2   James Chapman   l2tp: Convert rwl...
326
  			rcu_read_unlock_bh();
fd558d186   James Chapman   l2tp: Split pppol...
327
328
329
  			return tunnel;
  		}
  	}
e02d494d2   James Chapman   l2tp: Convert rwl...
330
  	rcu_read_unlock_bh();
fd558d186   James Chapman   l2tp: Split pppol...
331
332
333
334
335
336
337
338
339
340
  
  	return NULL;
  }
  EXPORT_SYMBOL_GPL(l2tp_tunnel_find);
  
  struct l2tp_tunnel *l2tp_tunnel_find_nth(struct net *net, int nth)
  {
  	struct l2tp_net *pn = l2tp_pernet(net);
  	struct l2tp_tunnel *tunnel;
  	int count = 0;
e02d494d2   James Chapman   l2tp: Convert rwl...
341
342
  	rcu_read_lock_bh();
  	list_for_each_entry_rcu(tunnel, &pn->l2tp_tunnel_list, list) {
fd558d186   James Chapman   l2tp: Split pppol...
343
  		if (++count > nth) {
e02d494d2   James Chapman   l2tp: Convert rwl...
344
  			rcu_read_unlock_bh();
fd558d186   James Chapman   l2tp: Split pppol...
345
346
347
  			return tunnel;
  		}
  	}
e02d494d2   James Chapman   l2tp: Convert rwl...
348
  	rcu_read_unlock_bh();
fd558d186   James Chapman   l2tp: Split pppol...
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
  
  	return NULL;
  }
  EXPORT_SYMBOL_GPL(l2tp_tunnel_find_nth);
  
  /*****************************************************************************
   * Receive data handling
   *****************************************************************************/
  
  /* Queue a skb in order. We come here only if the skb has an L2TP sequence
   * number.
   */
  static void l2tp_recv_queue_skb(struct l2tp_session *session, struct sk_buff *skb)
  {
  	struct sk_buff *skbp;
  	struct sk_buff *tmp;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
365
  	u32 ns = L2TP_SKB_CB(skb)->ns;
fd558d186   James Chapman   l2tp: Split pppol...
366
367
368
369
370
  
  	spin_lock_bh(&session->reorder_q.lock);
  	skb_queue_walk_safe(&session->reorder_q, skbp, tmp) {
  		if (L2TP_SKB_CB(skbp)->ns > ns) {
  			__skb_queue_before(&session->reorder_q, skbp, skb);
a4ca44fa5   Joe Perches   net: l2tp: Standa...
371
372
373
374
375
  			l2tp_dbg(session, L2TP_MSG_SEQ,
  				 "%s: pkt %hu, inserted before %hu, reorder_q len=%d
  ",
  				 session->name, ns, L2TP_SKB_CB(skbp)->ns,
  				 skb_queue_len(&session->reorder_q));
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
376
  			atomic_long_inc(&session->stats.rx_oos_packets);
fd558d186   James Chapman   l2tp: Split pppol...
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
  			goto out;
  		}
  	}
  
  	__skb_queue_tail(&session->reorder_q, skb);
  
  out:
  	spin_unlock_bh(&session->reorder_q.lock);
  }
  
  /* Dequeue a single skb.
   */
  static void l2tp_recv_dequeue_skb(struct l2tp_session *session, struct sk_buff *skb)
  {
  	struct l2tp_tunnel *tunnel = session->tunnel;
  	int length = L2TP_SKB_CB(skb)->length;
  
  	/* We're about to requeue the skb, so return resources
  	 * to its current owner (a socket receive buffer).
  	 */
  	skb_orphan(skb);
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
398
399
400
401
  	atomic_long_inc(&tunnel->stats.rx_packets);
  	atomic_long_add(length, &tunnel->stats.rx_bytes);
  	atomic_long_inc(&session->stats.rx_packets);
  	atomic_long_add(length, &session->stats.rx_bytes);
fd558d186   James Chapman   l2tp: Split pppol...
402
403
404
405
  
  	if (L2TP_SKB_CB(skb)->has_seq) {
  		/* Bump our Nr */
  		session->nr++;
8a1631d58   James Chapman   l2tp: make datapa...
406
  		session->nr &= session->nr_max;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
407

a4ca44fa5   Joe Perches   net: l2tp: Standa...
408
409
410
  		l2tp_dbg(session, L2TP_MSG_SEQ, "%s: updated nr to %hu
  ",
  			 session->name, session->nr);
fd558d186   James Chapman   l2tp: Split pppol...
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
  	}
  
  	/* call private receive handler */
  	if (session->recv_skb != NULL)
  		(*session->recv_skb)(session, skb, L2TP_SKB_CB(skb)->length);
  	else
  		kfree_skb(skb);
  
  	if (session->deref)
  		(*session->deref)(session);
  }
  
  /* Dequeue skbs from the session's reorder_q, subject to packet order.
   * Skbs that have been in the queue for too long are simply discarded.
   */
  static void l2tp_recv_dequeue(struct l2tp_session *session)
  {
  	struct sk_buff *skb;
  	struct sk_buff *tmp;
  
  	/* If the pkt at the head of the queue has the nr that we
  	 * expect to send up next, dequeue it and any other
  	 * in-sequence packets behind it.
  	 */
e2e210c02   Eric Dumazet   l2tp: fix race in...
435
  start:
fd558d186   James Chapman   l2tp: Split pppol...
436
437
438
  	spin_lock_bh(&session->reorder_q.lock);
  	skb_queue_walk_safe(&session->reorder_q, skb, tmp) {
  		if (time_after(jiffies, L2TP_SKB_CB(skb)->expires)) {
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
439
440
  			atomic_long_inc(&session->stats.rx_seq_discards);
  			atomic_long_inc(&session->stats.rx_errors);
a4ca44fa5   Joe Perches   net: l2tp: Standa...
441
442
443
444
445
446
  			l2tp_dbg(session, L2TP_MSG_SEQ,
  				 "%s: oos pkt %u len %d discarded (too old), waiting for %u, reorder_q_len=%d
  ",
  				 session->name, L2TP_SKB_CB(skb)->ns,
  				 L2TP_SKB_CB(skb)->length, session->nr,
  				 skb_queue_len(&session->reorder_q));
38d40b3f4   James Chapman   l2tp: fix reorder...
447
  			session->reorder_skip = 1;
fd558d186   James Chapman   l2tp: Split pppol...
448
449
450
451
452
453
454
455
  			__skb_unlink(skb, &session->reorder_q);
  			kfree_skb(skb);
  			if (session->deref)
  				(*session->deref)(session);
  			continue;
  		}
  
  		if (L2TP_SKB_CB(skb)->has_seq) {
38d40b3f4   James Chapman   l2tp: fix reorder...
456
  			if (session->reorder_skip) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
457
458
459
460
  				l2tp_dbg(session, L2TP_MSG_SEQ,
  					 "%s: advancing nr to next pkt: %u -> %u",
  					 session->name, session->nr,
  					 L2TP_SKB_CB(skb)->ns);
38d40b3f4   James Chapman   l2tp: fix reorder...
461
462
463
  				session->reorder_skip = 0;
  				session->nr = L2TP_SKB_CB(skb)->ns;
  			}
fd558d186   James Chapman   l2tp: Split pppol...
464
  			if (L2TP_SKB_CB(skb)->ns != session->nr) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
465
466
467
468
469
470
  				l2tp_dbg(session, L2TP_MSG_SEQ,
  					 "%s: holding oos pkt %u len %d, waiting for %u, reorder_q_len=%d
  ",
  					 session->name, L2TP_SKB_CB(skb)->ns,
  					 L2TP_SKB_CB(skb)->length, session->nr,
  					 skb_queue_len(&session->reorder_q));
fd558d186   James Chapman   l2tp: Split pppol...
471
472
473
474
475
476
477
478
479
480
  				goto out;
  			}
  		}
  		__skb_unlink(skb, &session->reorder_q);
  
  		/* Process the skb. We release the queue lock while we
  		 * do so to let other contexts process the queue.
  		 */
  		spin_unlock_bh(&session->reorder_q.lock);
  		l2tp_recv_dequeue_skb(session, skb);
e2e210c02   Eric Dumazet   l2tp: fix race in...
481
  		goto start;
fd558d186   James Chapman   l2tp: Split pppol...
482
483
484
485
486
  	}
  
  out:
  	spin_unlock_bh(&session->reorder_q.lock);
  }
8a1631d58   James Chapman   l2tp: make datapa...
487
488
489
490
491
492
493
494
495
496
497
  static int l2tp_seq_check_rx_window(struct l2tp_session *session, u32 nr)
  {
  	u32 nws;
  
  	if (nr >= session->nr)
  		nws = nr - session->nr;
  	else
  		nws = (session->nr_max + 1) - (session->nr - nr);
  
  	return nws < session->nr_window_size;
  }
b6dc01a43   James Chapman   l2tp: do data seq...
498
499
500
501
502
  /* If packet has sequence numbers, queue it if acceptable. Returns 0 if
   * acceptable, else non-zero.
   */
  static int l2tp_recv_data_seq(struct l2tp_session *session, struct sk_buff *skb)
  {
8a1631d58   James Chapman   l2tp: make datapa...
503
504
505
506
507
508
509
510
511
512
513
  	if (!l2tp_seq_check_rx_window(session, L2TP_SKB_CB(skb)->ns)) {
  		/* Packet sequence number is outside allowed window.
  		 * Discard it.
  		 */
  		l2tp_dbg(session, L2TP_MSG_SEQ,
  			 "%s: pkt %u len %d discarded, outside window, nr=%u
  ",
  			 session->name, L2TP_SKB_CB(skb)->ns,
  			 L2TP_SKB_CB(skb)->length, session->nr);
  		goto discard;
  	}
b6dc01a43   James Chapman   l2tp: do data seq...
514
515
516
517
518
  	if (session->reorder_timeout != 0) {
  		/* Packet reordering enabled. Add skb to session's
  		 * reorder queue, in order of ns.
  		 */
  		l2tp_recv_queue_skb(session, skb);
a0dbd8222   James Chapman   l2tp: make datapa...
519
520
521
522
523
524
525
526
527
528
  		goto out;
  	}
  
  	/* Packet reordering disabled. Discard out-of-sequence packets, while
  	 * tracking the number if in-sequence packets after the first OOS packet
  	 * is seen. After nr_oos_count_max in-sequence packets, reset the
  	 * sequence number to re-enable packet reception.
  	 */
  	if (L2TP_SKB_CB(skb)->ns == session->nr) {
  		skb_queue_tail(&session->reorder_q, skb);
b6dc01a43   James Chapman   l2tp: do data seq...
529
  	} else {
a0dbd8222   James Chapman   l2tp: make datapa...
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
  		u32 nr_oos = L2TP_SKB_CB(skb)->ns;
  		u32 nr_next = (session->nr_oos + 1) & session->nr_max;
  
  		if (nr_oos == nr_next)
  			session->nr_oos_count++;
  		else
  			session->nr_oos_count = 0;
  
  		session->nr_oos = nr_oos;
  		if (session->nr_oos_count > session->nr_oos_count_max) {
  			session->reorder_skip = 1;
  			l2tp_dbg(session, L2TP_MSG_SEQ,
  				 "%s: %d oos packets received. Resetting sequence numbers
  ",
  				 session->name, session->nr_oos_count);
  		}
  		if (!session->reorder_skip) {
b6dc01a43   James Chapman   l2tp: do data seq...
547
548
549
550
551
552
553
554
555
556
557
  			atomic_long_inc(&session->stats.rx_seq_discards);
  			l2tp_dbg(session, L2TP_MSG_SEQ,
  				 "%s: oos pkt %u len %d discarded, waiting for %u, reorder_q_len=%d
  ",
  				 session->name, L2TP_SKB_CB(skb)->ns,
  				 L2TP_SKB_CB(skb)->length, session->nr,
  				 skb_queue_len(&session->reorder_q));
  			goto discard;
  		}
  		skb_queue_tail(&session->reorder_q, skb);
  	}
a0dbd8222   James Chapman   l2tp: make datapa...
558
  out:
b6dc01a43   James Chapman   l2tp: do data seq...
559
560
561
562
563
  	return 0;
  
  discard:
  	return 1;
  }
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
  /* Do receive processing of L2TP data frames. We handle both L2TPv2
   * and L2TPv3 data frames here.
   *
   * L2TPv2 Data Message Header
   *
   *  0                   1                   2                   3
   *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |T|L|x|x|S|x|O|P|x|x|x|x|  Ver  |          Length (opt)         |
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |           Tunnel ID           |           Session ID          |
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |             Ns (opt)          |             Nr (opt)          |
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |      Offset Size (opt)        |    Offset pad... (opt)
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   *
   * Data frames are marked by T=0. All other fields are the same as
   * those in L2TP control frames.
   *
   * L2TPv3 Data Message Header
   *
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |                      L2TP Session Header                      |
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |                      L2-Specific Sublayer                     |
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |                        Tunnel Payload                      ...
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   *
   * L2TPv3 Session Header Over IP
   *
   *  0                   1                   2                   3
   *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |                           Session ID                          |
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |               Cookie (optional, maximum 64 bits)...
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   *                                                                 |
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   *
   * L2TPv3 L2-Specific Sublayer Format
   *
   *  0                   1                   2                   3
   *  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   * |x|S|x|x|x|x|x|x|              Sequence Number                  |
   * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   *
   * Cookie value, sublayer format and offset (pad) are negotiated with
   * the peer when the session is set up. Unlike L2TPv2, we do not need
   * to parse the packet header to determine if optional fields are
   * present.
   *
   * Caller must already have parsed the frame and determined that it is
   * a data (not control) frame before coming here. Fields up to the
   * session-id have already been parsed and ptr points to the data
   * after the session-id.
fd558d186   James Chapman   l2tp: Split pppol...
623
   */
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
624
625
626
  void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb,
  		      unsigned char *ptr, unsigned char *optr, u16 hdrflags,
  		      int length, int (*payload_hook)(struct sk_buff *skb))
fd558d186   James Chapman   l2tp: Split pppol...
627
  {
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
628
  	struct l2tp_tunnel *tunnel = session->tunnel;
fd558d186   James Chapman   l2tp: Split pppol...
629
  	int offset;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
630
  	u32 ns, nr;
fd558d186   James Chapman   l2tp: Split pppol...
631
632
633
634
635
636
637
638
  
  	/* The ref count is increased since we now hold a pointer to
  	 * the session. Take care to decrement the refcnt when exiting
  	 * this function from now on...
  	 */
  	l2tp_session_inc_refcount(session);
  	if (session->ref)
  		(*session->ref)(session);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
639
640
641
  	/* Parse and check optional cookie */
  	if (session->peer_cookie_len > 0) {
  		if (memcmp(ptr, &session->peer_cookie[0], session->peer_cookie_len)) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
642
643
644
645
646
  			l2tp_info(tunnel, L2TP_MSG_DATA,
  				  "%s: cookie mismatch (%u/%u). Discarding.
  ",
  				  tunnel->name, tunnel->tunnel_id,
  				  session->session_id);
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
647
  			atomic_long_inc(&session->stats.rx_cookie_discards);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
648
649
650
651
  			goto discard;
  		}
  		ptr += session->peer_cookie_len;
  	}
fd558d186   James Chapman   l2tp: Split pppol...
652
653
654
655
656
657
658
659
660
  	/* Handle the optional sequence numbers. Sequence numbers are
  	 * in different places for L2TPv2 and L2TPv3.
  	 *
  	 * If we are the LAC, enable/disable sequence numbers under
  	 * the control of the LNS.  If no sequence numbers present but
  	 * we were expecting them, discard frame.
  	 */
  	ns = nr = 0;
  	L2TP_SKB_CB(skb)->has_seq = 0;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
661
662
663
664
665
666
  	if (tunnel->version == L2TP_HDR_VER_2) {
  		if (hdrflags & L2TP_HDRFLAG_S) {
  			ns = ntohs(*(__be16 *) ptr);
  			ptr += 2;
  			nr = ntohs(*(__be16 *) ptr);
  			ptr += 2;
fd558d186   James Chapman   l2tp: Split pppol...
667

f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
668
669
670
  			/* Store L2TP info in the skb */
  			L2TP_SKB_CB(skb)->ns = ns;
  			L2TP_SKB_CB(skb)->has_seq = 1;
fd558d186   James Chapman   l2tp: Split pppol...
671

a4ca44fa5   Joe Perches   net: l2tp: Standa...
672
673
674
675
  			l2tp_dbg(session, L2TP_MSG_SEQ,
  				 "%s: recv data ns=%u, nr=%u, session nr=%u
  ",
  				 session->name, ns, nr, session->nr);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
676
677
678
679
680
681
682
683
684
685
  		}
  	} else if (session->l2specific_type == L2TP_L2SPECTYPE_DEFAULT) {
  		u32 l2h = ntohl(*(__be32 *) ptr);
  
  		if (l2h & 0x40000000) {
  			ns = l2h & 0x00ffffff;
  
  			/* Store L2TP info in the skb */
  			L2TP_SKB_CB(skb)->ns = ns;
  			L2TP_SKB_CB(skb)->has_seq = 1;
a4ca44fa5   Joe Perches   net: l2tp: Standa...
686
687
688
689
  			l2tp_dbg(session, L2TP_MSG_SEQ,
  				 "%s: recv data ns=%u, session nr=%u
  ",
  				 session->name, ns, session->nr);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
690
  		}
fd558d186   James Chapman   l2tp: Split pppol...
691
  	}
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
692
693
  	/* Advance past L2-specific header, if present */
  	ptr += session->l2specific_len;
fd558d186   James Chapman   l2tp: Split pppol...
694
695
696
697
698
699
  	if (L2TP_SKB_CB(skb)->has_seq) {
  		/* Received a packet with sequence numbers. If we're the LNS,
  		 * check if we sre sending sequence numbers and if not,
  		 * configure it so.
  		 */
  		if ((!session->lns_mode) && (!session->send_seq)) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
700
701
702
703
  			l2tp_info(session, L2TP_MSG_SEQ,
  				  "%s: requested to enable seq numbers by LNS
  ",
  				  session->name);
fd558d186   James Chapman   l2tp: Split pppol...
704
  			session->send_seq = -1;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
705
  			l2tp_session_set_header_len(session, tunnel->version);
fd558d186   James Chapman   l2tp: Split pppol...
706
707
708
709
710
711
  		}
  	} else {
  		/* No sequence numbers.
  		 * If user has configured mandatory sequence numbers, discard.
  		 */
  		if (session->recv_seq) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
712
713
714
715
  			l2tp_warn(session, L2TP_MSG_SEQ,
  				  "%s: recv data has no seq numbers when required. Discarding.
  ",
  				  session->name);
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
716
  			atomic_long_inc(&session->stats.rx_seq_discards);
fd558d186   James Chapman   l2tp: Split pppol...
717
718
719
720
721
722
723
724
725
  			goto discard;
  		}
  
  		/* If we're the LAC and we're sending sequence numbers, the
  		 * LNS has requested that we no longer send sequence numbers.
  		 * If we're the LNS and we're sending sequence numbers, the
  		 * LAC is broken. Discard the frame.
  		 */
  		if ((!session->lns_mode) && (session->send_seq)) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
726
727
728
729
  			l2tp_info(session, L2TP_MSG_SEQ,
  				  "%s: requested to disable seq numbers by LNS
  ",
  				  session->name);
fd558d186   James Chapman   l2tp: Split pppol...
730
  			session->send_seq = 0;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
731
  			l2tp_session_set_header_len(session, tunnel->version);
fd558d186   James Chapman   l2tp: Split pppol...
732
  		} else if (session->send_seq) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
733
734
735
736
  			l2tp_warn(session, L2TP_MSG_SEQ,
  				  "%s: recv data has no seq numbers when required. Discarding.
  ",
  				  session->name);
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
737
  			atomic_long_inc(&session->stats.rx_seq_discards);
fd558d186   James Chapman   l2tp: Split pppol...
738
739
740
  			goto discard;
  		}
  	}
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
741
742
743
744
745
746
747
748
749
750
751
752
753
  	/* Session data offset is handled differently for L2TPv2 and
  	 * L2TPv3. For L2TPv2, there is an optional 16-bit value in
  	 * the header. For L2TPv3, the offset is negotiated using AVPs
  	 * in the session setup control protocol.
  	 */
  	if (tunnel->version == L2TP_HDR_VER_2) {
  		/* If offset bit set, skip it. */
  		if (hdrflags & L2TP_HDRFLAG_O) {
  			offset = ntohs(*(__be16 *)ptr);
  			ptr += 2 + offset;
  		}
  	} else
  		ptr += session->offset;
fd558d186   James Chapman   l2tp: Split pppol...
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
  
  	offset = ptr - optr;
  	if (!pskb_may_pull(skb, offset))
  		goto discard;
  
  	__skb_pull(skb, offset);
  
  	/* If caller wants to process the payload before we queue the
  	 * packet, do so now.
  	 */
  	if (payload_hook)
  		if ((*payload_hook)(skb))
  			goto discard;
  
  	/* Prepare skb for adding to the session's reorder_q.  Hold
  	 * packets for max reorder_timeout or 1 second if not
  	 * reordering.
  	 */
  	L2TP_SKB_CB(skb)->length = length;
  	L2TP_SKB_CB(skb)->expires = jiffies +
  		(session->reorder_timeout ? session->reorder_timeout : HZ);
  
  	/* Add packet to the session's receive queue. Reordering is done here, if
  	 * enabled. Saved L2TP protocol info is stored in skb->sb[].
  	 */
  	if (L2TP_SKB_CB(skb)->has_seq) {
b6dc01a43   James Chapman   l2tp: do data seq...
780
781
  		if (l2tp_recv_data_seq(session, skb))
  			goto discard;
fd558d186   James Chapman   l2tp: Split pppol...
782
783
784
785
786
787
788
789
790
791
792
793
  	} else {
  		/* No sequence numbers. Add the skb to the tail of the
  		 * reorder queue. This ensures that it will be
  		 * delivered after all previous sequenced skbs.
  		 */
  		skb_queue_tail(&session->reorder_q, skb);
  	}
  
  	/* Try to dequeue as many skbs from reorder_q as we can. */
  	l2tp_recv_dequeue(session);
  
  	l2tp_session_dec_refcount(session);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
794
  	return;
fd558d186   James Chapman   l2tp: Split pppol...
795
796
  
  discard:
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
797
  	atomic_long_inc(&session->stats.rx_errors);
fd558d186   James Chapman   l2tp: Split pppol...
798
799
800
801
802
803
  	kfree_skb(skb);
  
  	if (session->deref)
  		(*session->deref)(session);
  
  	l2tp_session_dec_refcount(session);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
804
805
  }
  EXPORT_SYMBOL(l2tp_recv_common);
48f72f92b   Tom Parkin   l2tp: add session...
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
  /* Drop skbs from the session's reorder_q
   */
  int l2tp_session_queue_purge(struct l2tp_session *session)
  {
  	struct sk_buff *skb = NULL;
  	BUG_ON(!session);
  	BUG_ON(session->magic != L2TP_SESSION_MAGIC);
  	while ((skb = skb_dequeue(&session->reorder_q))) {
  		atomic_long_inc(&session->stats.rx_errors);
  		kfree_skb(skb);
  		if (session->deref)
  			(*session->deref)(session);
  	}
  	return 0;
  }
  EXPORT_SYMBOL_GPL(l2tp_session_queue_purge);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
822
823
824
825
826
827
  /* Internal UDP receive frame. Do the real work of receiving an L2TP data frame
   * here. The skb is not on a list when we get here.
   * Returns 0 if the packet was a data packet and was successfully passed on.
   * Returns 1 if the packet was not a good data packet and could not be
   * forwarded.  All such packets are passed up to userspace to deal with.
   */
fc130840d   stephen hemminger   l2tp: make local ...
828
829
  static int l2tp_udp_recv_core(struct l2tp_tunnel *tunnel, struct sk_buff *skb,
  			      int (*payload_hook)(struct sk_buff *skb))
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
830
831
832
833
834
  {
  	struct l2tp_session *session = NULL;
  	unsigned char *ptr, *optr;
  	u16 hdrflags;
  	u32 tunnel_id, session_id;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
835
836
  	u16 version;
  	int length;
58d6085c1   Tom Herbert   l2tp: Remove UDP ...
837
  	/* UDP has verifed checksum */
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
838
839
840
841
842
843
  
  	/* UDP always verifies the packet length. */
  	__skb_pull(skb, sizeof(struct udphdr));
  
  	/* Short packet? */
  	if (!pskb_may_pull(skb, L2TP_HDR_SIZE_SEQ)) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
844
845
846
847
  		l2tp_info(tunnel, L2TP_MSG_DATA,
  			  "%s: recv short packet (len=%d)
  ",
  			  tunnel->name, skb->len);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
848
849
  		goto error;
  	}
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
850
851
852
853
854
  	/* Trace packet contents, if enabled */
  	if (tunnel->debug & L2TP_MSG_DATA) {
  		length = min(32u, skb->len);
  		if (!pskb_may_pull(skb, length))
  			goto error;
a4ca44fa5   Joe Perches   net: l2tp: Standa...
855
856
857
  		pr_debug("%s: recv
  ", tunnel->name);
  		print_hex_dump_bytes("", DUMP_PREFIX_OFFSET, skb->data, length);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
858
  	}
e50e705ca   Eric Dumazet   l2tp: fix l2tp_ud...
859
860
  	/* Point to L2TP header */
  	optr = ptr = skb->data;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
861
862
863
864
865
866
  	/* Get L2TP header flags */
  	hdrflags = ntohs(*(__be16 *) ptr);
  
  	/* Check protocol version */
  	version = hdrflags & L2TP_HDR_VER_MASK;
  	if (version != tunnel->version) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
867
868
869
870
  		l2tp_info(tunnel, L2TP_MSG_DATA,
  			  "%s: recv protocol version mismatch: got %d expected %d
  ",
  			  tunnel->name, version, tunnel->version);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
871
872
873
874
875
876
877
878
  		goto error;
  	}
  
  	/* Get length of L2TP packet */
  	length = skb->len;
  
  	/* If type is control packet, it is handled by userspace. */
  	if (hdrflags & L2TP_HDRFLAG_T) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
879
880
881
882
  		l2tp_dbg(tunnel, L2TP_MSG_DATA,
  			 "%s: recv control packet, len=%d
  ",
  			 tunnel->name, length);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
  		goto error;
  	}
  
  	/* Skip flags */
  	ptr += 2;
  
  	if (tunnel->version == L2TP_HDR_VER_2) {
  		/* If length is present, skip it */
  		if (hdrflags & L2TP_HDRFLAG_L)
  			ptr += 2;
  
  		/* Extract tunnel and session ID */
  		tunnel_id = ntohs(*(__be16 *) ptr);
  		ptr += 2;
  		session_id = ntohs(*(__be16 *) ptr);
  		ptr += 2;
  	} else {
  		ptr += 2;	/* skip reserved bits */
  		tunnel_id = tunnel->tunnel_id;
  		session_id = ntohl(*(__be32 *) ptr);
  		ptr += 4;
  	}
  
  	/* Find the session context */
  	session = l2tp_session_find(tunnel->l2tp_net, tunnel, session_id);
309795f4b   James Chapman   l2tp: Add netlink...
908
  	if (!session || !session->recv_skb) {
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
909
  		/* Not found? Pass to userspace to deal with */
a4ca44fa5   Joe Perches   net: l2tp: Standa...
910
911
912
913
  		l2tp_info(tunnel, L2TP_MSG_DATA,
  			  "%s: no session found (%u/%u). Passing up.
  ",
  			  tunnel->name, tunnel_id, session_id);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
914
915
916
917
  		goto error;
  	}
  
  	l2tp_recv_common(session, skb, ptr, optr, hdrflags, length, payload_hook);
fd558d186   James Chapman   l2tp: Split pppol...
918
919
  
  	return 0;
fd558d186   James Chapman   l2tp: Split pppol...
920
921
922
923
924
925
  error:
  	/* Put UDP header back */
  	__skb_push(skb, sizeof(struct udphdr));
  
  	return 1;
  }
fd558d186   James Chapman   l2tp: Split pppol...
926
927
928
929
930
931
932
933
934
935
936
937
938
939
  
  /* UDP encapsulation receive handler. See net/ipv4/udp.c.
   * Return codes:
   * 0 : success.
   * <0: error
   * >0: skb should be passed up to userspace as UDP.
   */
  int l2tp_udp_encap_recv(struct sock *sk, struct sk_buff *skb)
  {
  	struct l2tp_tunnel *tunnel;
  
  	tunnel = l2tp_sock_to_tunnel(sk);
  	if (tunnel == NULL)
  		goto pass_up;
a4ca44fa5   Joe Perches   net: l2tp: Standa...
940
941
942
  	l2tp_dbg(tunnel, L2TP_MSG_DATA, "%s: received %d bytes
  ",
  		 tunnel->name, skb->len);
fd558d186   James Chapman   l2tp: Split pppol...
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
  
  	if (l2tp_udp_recv_core(tunnel, skb, tunnel->recv_payload_hook))
  		goto pass_up_put;
  
  	sock_put(sk);
  	return 0;
  
  pass_up_put:
  	sock_put(sk);
  pass_up:
  	return 1;
  }
  EXPORT_SYMBOL_GPL(l2tp_udp_encap_recv);
  
  /************************************************************************
   * Transmit handling
   ***********************************************************************/
  
  /* Build an L2TP header for the session into the buffer provided.
   */
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
963
  static int l2tp_build_l2tpv2_header(struct l2tp_session *session, void *buf)
fd558d186   James Chapman   l2tp: Split pppol...
964
  {
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
965
  	struct l2tp_tunnel *tunnel = session->tunnel;
fd558d186   James Chapman   l2tp: Split pppol...
966
  	__be16 *bufp = buf;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
967
  	__be16 *optr = buf;
fd558d186   James Chapman   l2tp: Split pppol...
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
  	u16 flags = L2TP_HDR_VER_2;
  	u32 tunnel_id = tunnel->peer_tunnel_id;
  	u32 session_id = session->peer_session_id;
  
  	if (session->send_seq)
  		flags |= L2TP_HDRFLAG_S;
  
  	/* Setup L2TP header. */
  	*bufp++ = htons(flags);
  	*bufp++ = htons(tunnel_id);
  	*bufp++ = htons(session_id);
  	if (session->send_seq) {
  		*bufp++ = htons(session->ns);
  		*bufp++ = 0;
  		session->ns++;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
983
  		session->ns &= 0xffff;
a4ca44fa5   Joe Perches   net: l2tp: Standa...
984
985
986
  		l2tp_dbg(session, L2TP_MSG_SEQ, "%s: updated ns to %u
  ",
  			 session->name, session->ns);
fd558d186   James Chapman   l2tp: Split pppol...
987
  	}
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
988
989
  
  	return bufp - optr;
fd558d186   James Chapman   l2tp: Split pppol...
990
  }
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
991
  static int l2tp_build_l2tpv3_header(struct l2tp_session *session, void *buf)
fd558d186   James Chapman   l2tp: Split pppol...
992
  {
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
993
  	struct l2tp_tunnel *tunnel = session->tunnel;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
994
995
  	char *bufp = buf;
  	char *optr = bufp;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
996

0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
997
998
999
1000
1001
1002
1003
1004
1005
1006
  	/* Setup L2TP header. The header differs slightly for UDP and
  	 * IP encapsulations. For UDP, there is 4 bytes of flags.
  	 */
  	if (tunnel->encap == L2TP_ENCAPTYPE_UDP) {
  		u16 flags = L2TP_HDR_VER_3;
  		*((__be16 *) bufp) = htons(flags);
  		bufp += 2;
  		*((__be16 *) bufp) = 0;
  		bufp += 2;
  	}
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
  	*((__be32 *) bufp) = htonl(session->peer_session_id);
  	bufp += 4;
  	if (session->cookie_len) {
  		memcpy(bufp, &session->cookie[0], session->cookie_len);
  		bufp += session->cookie_len;
  	}
  	if (session->l2specific_len) {
  		if (session->l2specific_type == L2TP_L2SPECTYPE_DEFAULT) {
  			u32 l2h = 0;
  			if (session->send_seq) {
  				l2h = 0x40000000 | session->ns;
  				session->ns++;
  				session->ns &= 0xffffff;
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1020
1021
1022
1023
  				l2tp_dbg(session, L2TP_MSG_SEQ,
  					 "%s: updated ns to %u
  ",
  					 session->name, session->ns);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1024
1025
1026
1027
1028
1029
1030
1031
  			}
  
  			*((__be32 *) bufp) = htonl(l2h);
  		}
  		bufp += session->l2specific_len;
  	}
  	if (session->offset)
  		bufp += session->offset;
fd558d186   James Chapman   l2tp: Split pppol...
1032

f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1033
  	return bufp - optr;
fd558d186   James Chapman   l2tp: Split pppol...
1034
  }
fd558d186   James Chapman   l2tp: Split pppol...
1035

fc130840d   stephen hemminger   l2tp: make local ...
1036
  static int l2tp_xmit_core(struct l2tp_session *session, struct sk_buff *skb,
d9d8da805   David S. Miller   inet: Pass flowi ...
1037
  			  struct flowi *fl, size_t data_len)
fd558d186   James Chapman   l2tp: Split pppol...
1038
1039
1040
1041
1042
1043
1044
  {
  	struct l2tp_tunnel *tunnel = session->tunnel;
  	unsigned int len = skb->len;
  	int error;
  
  	/* Debug */
  	if (session->send_seq)
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1045
1046
1047
  		l2tp_dbg(session, L2TP_MSG_DATA, "%s: send %Zd bytes, ns=%u
  ",
  			 session->name, data_len, session->ns - 1);
fd558d186   James Chapman   l2tp: Split pppol...
1048
  	else
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1049
1050
1051
  		l2tp_dbg(session, L2TP_MSG_DATA, "%s: send %Zd bytes
  ",
  			 session->name, data_len);
fd558d186   James Chapman   l2tp: Split pppol...
1052
1053
  
  	if (session->debug & L2TP_MSG_DATA) {
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1054
1055
  		int uhlen = (tunnel->encap == L2TP_ENCAPTYPE_UDP) ? sizeof(struct udphdr) : 0;
  		unsigned char *datap = skb->data + uhlen;
fd558d186   James Chapman   l2tp: Split pppol...
1056

a4ca44fa5   Joe Perches   net: l2tp: Standa...
1057
1058
1059
1060
  		pr_debug("%s: xmit
  ", session->name);
  		print_hex_dump_bytes("", DUMP_PREFIX_OFFSET,
  				     datap, min_t(size_t, 32, len - uhlen));
fd558d186   James Chapman   l2tp: Split pppol...
1061
1062
1063
  	}
  
  	/* Queue the packet to IP for output */
60ff74673   WANG Cong   net: rename local...
1064
  	skb->ignore_df = 1;
d2cf33616   Benjamin LaHaise   net/l2tp: add sup...
1065
  #if IS_ENABLED(CONFIG_IPV6)
746e34998   Eric Dumazet   l2tp: fix unused ...
1066
  	if (tunnel->sock->sk_family == PF_INET6 && !tunnel->v4mapped)
b0270e910   Eric Dumazet   ipv4: add a sock ...
1067
  		error = inet6_csk_xmit(tunnel->sock, skb, NULL);
d2cf33616   Benjamin LaHaise   net/l2tp: add sup...
1068
1069
  	else
  #endif
b0270e910   Eric Dumazet   ipv4: add a sock ...
1070
  		error = ip_queue_xmit(tunnel->sock, skb, fl);
fd558d186   James Chapman   l2tp: Split pppol...
1071
1072
1073
  
  	/* Update stats */
  	if (error >= 0) {
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
1074
1075
1076
1077
  		atomic_long_inc(&tunnel->stats.tx_packets);
  		atomic_long_add(len, &tunnel->stats.tx_bytes);
  		atomic_long_inc(&session->stats.tx_packets);
  		atomic_long_add(len, &session->stats.tx_bytes);
fd558d186   James Chapman   l2tp: Split pppol...
1078
  	} else {
7b7c0719c   Tom Parkin   l2tp: avoid deadl...
1079
1080
  		atomic_long_inc(&tunnel->stats.tx_errors);
  		atomic_long_inc(&session->stats.tx_errors);
fd558d186   James Chapman   l2tp: Split pppol...
1081
1082
1083
1084
  	}
  
  	return 0;
  }
fd558d186   James Chapman   l2tp: Split pppol...
1085

fd558d186   James Chapman   l2tp: Split pppol...
1086
1087
1088
1089
1090
1091
  /* If caller requires the skb to have a ppp header, the header must be
   * inserted in the skb data before calling this function.
   */
  int l2tp_xmit_skb(struct l2tp_session *session, struct sk_buff *skb, int hdr_len)
  {
  	int data_len = skb->len;
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1092
1093
  	struct l2tp_tunnel *tunnel = session->tunnel;
  	struct sock *sk = tunnel->sock;
d9d8da805   David S. Miller   inet: Pass flowi ...
1094
  	struct flowi *fl;
fd558d186   James Chapman   l2tp: Split pppol...
1095
  	struct udphdr *uh;
fd558d186   James Chapman   l2tp: Split pppol...
1096
  	struct inet_sock *inet;
fd558d186   James Chapman   l2tp: Split pppol...
1097
  	int headroom;
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1098
1099
  	int uhlen = (tunnel->encap == L2TP_ENCAPTYPE_UDP) ? sizeof(struct udphdr) : 0;
  	int udp_len;
b8c843072   Eric Dumazet   net: l2tp_eth: pr...
1100
  	int ret = NET_XMIT_SUCCESS;
fd558d186   James Chapman   l2tp: Split pppol...
1101
1102
1103
1104
1105
1106
  
  	/* Check that there's enough headroom in the skb to insert IP,
  	 * UDP and L2TP headers. If not enough, expand it to
  	 * make room. Adjust truesize.
  	 */
  	headroom = NET_SKB_PAD + sizeof(struct iphdr) +
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1107
  		uhlen + hdr_len;
835acf5da   Eric Dumazet   l2tp: fix a poten...
1108
  	if (skb_cow_head(skb, headroom)) {
b8c843072   Eric Dumazet   net: l2tp_eth: pr...
1109
1110
  		kfree_skb(skb);
  		return NET_XMIT_DROP;
835acf5da   Eric Dumazet   l2tp: fix a poten...
1111
  	}
fd558d186   James Chapman   l2tp: Split pppol...
1112

fd558d186   James Chapman   l2tp: Split pppol...
1113
  	/* Setup L2TP header */
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1114
  	session->build_header(session, __skb_push(skb, hdr_len));
fd558d186   James Chapman   l2tp: Split pppol...
1115

0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1116
  	/* Reset skb netfilter state */
fd558d186   James Chapman   l2tp: Split pppol...
1117
1118
1119
1120
  	memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
  	IPCB(skb)->flags &= ~(IPSKB_XFRM_TUNNEL_SIZE | IPSKB_XFRM_TRANSFORMED |
  			      IPSKB_REROUTED);
  	nf_reset(skb);
6af88da14   David S. Miller   l2tp: Fix locking...
1121
1122
  	bh_lock_sock(sk);
  	if (sock_owned_by_user(sk)) {
b8c843072   Eric Dumazet   net: l2tp_eth: pr...
1123
1124
  		kfree_skb(skb);
  		ret = NET_XMIT_DROP;
6af88da14   David S. Miller   l2tp: Fix locking...
1125
1126
  		goto out_unlock;
  	}
fd558d186   James Chapman   l2tp: Split pppol...
1127
1128
  	/* Get routing info from the tunnel socket */
  	skb_dst_drop(skb);
71b1391a4   Florian Westphal   l2tp: ensure sk->...
1129
  	skb_dst_set(skb, dst_clone(__sk_dst_check(sk, 0)));
fd558d186   James Chapman   l2tp: Split pppol...
1130

d9d8da805   David S. Miller   inet: Pass flowi ...
1131
1132
  	inet = inet_sk(sk);
  	fl = &inet->cork.fl;
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1133
1134
1135
  	switch (tunnel->encap) {
  	case L2TP_ENCAPTYPE_UDP:
  		/* Setup UDP header */
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1136
1137
1138
1139
1140
1141
1142
  		__skb_push(skb, sizeof(*uh));
  		skb_reset_transport_header(skb);
  		uh = udp_hdr(skb);
  		uh->source = inet->inet_sport;
  		uh->dest = inet->inet_dport;
  		udp_len = uhlen + hdr_len + data_len;
  		uh->len = htons(udp_len);
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1143
1144
  
  		/* Calculate UDP checksum if configured to do so */
d2cf33616   Benjamin LaHaise   net/l2tp: add sup...
1145
  #if IS_ENABLED(CONFIG_IPV6)
e18503f41   François Cachereul   l2tp: fix kernel ...
1146
  		if (sk->sk_family == PF_INET6 && !tunnel->v4mapped)
77157e197   Tom Herbert   l2tp: call udp{6}...
1147
1148
1149
  			udp6_set_csum(udp_get_no_check6_tx(sk),
  				      skb, &inet6_sk(sk)->saddr,
  				      &sk->sk_v6_daddr, udp_len);
d2cf33616   Benjamin LaHaise   net/l2tp: add sup...
1150
1151
  		else
  #endif
77157e197   Tom Herbert   l2tp: call udp{6}...
1152
1153
  		udp_set_csum(sk->sk_no_check_tx, skb, inet->inet_saddr,
  			     inet->inet_daddr, udp_len);
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1154
1155
1156
1157
  		break;
  
  	case L2TP_ENCAPTYPE_IP:
  		break;
fd558d186   James Chapman   l2tp: Split pppol...
1158
  	}
d9d8da805   David S. Miller   inet: Pass flowi ...
1159
  	l2tp_xmit_core(session, skb, fl, data_len);
6af88da14   David S. Miller   l2tp: Fix locking...
1160
1161
  out_unlock:
  	bh_unlock_sock(sk);
fd558d186   James Chapman   l2tp: Split pppol...
1162

b8c843072   Eric Dumazet   net: l2tp_eth: pr...
1163
  	return ret;
fd558d186   James Chapman   l2tp: Split pppol...
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
  }
  EXPORT_SYMBOL_GPL(l2tp_xmit_skb);
  
  /*****************************************************************************
   * Tinnel and session create/destroy.
   *****************************************************************************/
  
  /* Tunnel socket destruct hook.
   * The tunnel context is deleted only when all session sockets have been
   * closed.
   */
fc130840d   stephen hemminger   l2tp: make local ...
1175
  static void l2tp_tunnel_destruct(struct sock *sk)
fd558d186   James Chapman   l2tp: Split pppol...
1176
  {
8d8a51e26   David S. Miller   l2tp: Fix build w...
1177
  	struct l2tp_tunnel *tunnel = l2tp_tunnel(sk);
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1178
  	struct l2tp_net *pn;
fd558d186   James Chapman   l2tp: Split pppol...
1179

fd558d186   James Chapman   l2tp: Split pppol...
1180
1181
  	if (tunnel == NULL)
  		goto end;
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1182
1183
  	l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: closing...
  ", tunnel->name);
fd558d186   James Chapman   l2tp: Split pppol...
1184

fd558d186   James Chapman   l2tp: Split pppol...
1185

f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1186
  	/* Disable udp encapsulation */
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1187
1188
1189
1190
1191
  	switch (tunnel->encap) {
  	case L2TP_ENCAPTYPE_UDP:
  		/* No longer an encapsulation socket. See net/ipv4/udp.c */
  		(udp_sk(sk))->encap_type = 0;
  		(udp_sk(sk))->encap_rcv = NULL;
9980d001c   Tom Parkin   l2tp: add udp enc...
1192
  		(udp_sk(sk))->encap_destroy = NULL;
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1193
1194
1195
1196
  		break;
  	case L2TP_ENCAPTYPE_IP:
  		break;
  	}
fd558d186   James Chapman   l2tp: Split pppol...
1197
1198
  
  	/* Remove hooks into tunnel socket */
fd558d186   James Chapman   l2tp: Split pppol...
1199
1200
  	sk->sk_destruct = tunnel->old_sk_destruct;
  	sk->sk_user_data = NULL;
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1201
  	tunnel->sock = NULL;
fd558d186   James Chapman   l2tp: Split pppol...
1202

f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1203
1204
1205
1206
1207
1208
  	/* Remove the tunnel struct from the tunnel list */
  	pn = l2tp_pernet(tunnel->l2tp_net);
  	spin_lock_bh(&pn->l2tp_tunnel_list_lock);
  	list_del_rcu(&tunnel->list);
  	spin_unlock_bh(&pn->l2tp_tunnel_list_lock);
  	atomic_dec(&l2tp_tunnel_count);
fd558d186   James Chapman   l2tp: Split pppol...
1209

f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1210
  	l2tp_tunnel_closeall(tunnel);
fd558d186   James Chapman   l2tp: Split pppol...
1211
  	l2tp_tunnel_dec_refcount(tunnel);
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1212
1213
1214
  	/* Call the original destructor */
  	if (sk->sk_destruct)
  		(*sk->sk_destruct)(sk);
fd558d186   James Chapman   l2tp: Split pppol...
1215
1216
1217
  end:
  	return;
  }
fd558d186   James Chapman   l2tp: Split pppol...
1218
1219
1220
  
  /* When the tunnel is closed, all the attached sessions need to go too.
   */
e34f4c705   Tom Parkin   l2tp: export l2tp...
1221
  void l2tp_tunnel_closeall(struct l2tp_tunnel *tunnel)
fd558d186   James Chapman   l2tp: Split pppol...
1222
1223
1224
1225
1226
1227
1228
  {
  	int hash;
  	struct hlist_node *walk;
  	struct hlist_node *tmp;
  	struct l2tp_session *session;
  
  	BUG_ON(tunnel == NULL);
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1229
1230
1231
  	l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: closing all sessions...
  ",
  		  tunnel->name);
fd558d186   James Chapman   l2tp: Split pppol...
1232
1233
1234
1235
1236
1237
  
  	write_lock_bh(&tunnel->hlist_lock);
  	for (hash = 0; hash < L2TP_HASH_SIZE; hash++) {
  again:
  		hlist_for_each_safe(walk, tmp, &tunnel->session_hlist[hash]) {
  			session = hlist_entry(walk, struct l2tp_session, hlist);
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1238
1239
1240
  			l2tp_info(session, L2TP_MSG_CONTROL,
  				  "%s: closing session
  ", session->name);
fd558d186   James Chapman   l2tp: Split pppol...
1241
1242
  
  			hlist_del_init(&session->hlist);
fd558d186   James Chapman   l2tp: Split pppol...
1243
1244
1245
1246
  			if (session->ref != NULL)
  				(*session->ref)(session);
  
  			write_unlock_bh(&tunnel->hlist_lock);
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1247
  			__l2tp_session_unhash(session);
4c6e2fd35   Tom Parkin   l2tp: purge sessi...
1248
  			l2tp_session_queue_purge(session);
fd558d186   James Chapman   l2tp: Split pppol...
1249
1250
1251
1252
1253
  			if (session->session_close != NULL)
  				(*session->session_close)(session);
  
  			if (session->deref != NULL)
  				(*session->deref)(session);
9980d001c   Tom Parkin   l2tp: add udp enc...
1254
  			l2tp_session_dec_refcount(session);
fd558d186   James Chapman   l2tp: Split pppol...
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
  			write_lock_bh(&tunnel->hlist_lock);
  
  			/* Now restart from the beginning of this hash
  			 * chain.  We always remove a session from the
  			 * list so we are guaranteed to make forward
  			 * progress.
  			 */
  			goto again;
  		}
  	}
  	write_unlock_bh(&tunnel->hlist_lock);
  }
e34f4c705   Tom Parkin   l2tp: export l2tp...
1267
  EXPORT_SYMBOL_GPL(l2tp_tunnel_closeall);
fd558d186   James Chapman   l2tp: Split pppol...
1268

9980d001c   Tom Parkin   l2tp: add udp enc...
1269
1270
1271
1272
1273
1274
1275
1276
1277
  /* Tunnel socket destroy hook for UDP encapsulation */
  static void l2tp_udp_encap_destroy(struct sock *sk)
  {
  	struct l2tp_tunnel *tunnel = l2tp_sock_to_tunnel(sk);
  	if (tunnel) {
  		l2tp_tunnel_closeall(tunnel);
  		sock_put(sk);
  	}
  }
fd558d186   James Chapman   l2tp: Split pppol...
1278
1279
1280
  /* Really kill the tunnel.
   * Come here only when all sessions have been cleared from the tunnel.
   */
fc130840d   stephen hemminger   l2tp: make local ...
1281
  static void l2tp_tunnel_free(struct l2tp_tunnel *tunnel)
fd558d186   James Chapman   l2tp: Split pppol...
1282
  {
fd558d186   James Chapman   l2tp: Split pppol...
1283
1284
  	BUG_ON(atomic_read(&tunnel->ref_count) != 0);
  	BUG_ON(tunnel->sock != NULL);
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1285
1286
  	l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: free...
  ", tunnel->name);
99469c32f   xeb@mail.ru   l2tp: avoid to us...
1287
  	kfree_rcu(tunnel, rcu);
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1288
  }
fd558d186   James Chapman   l2tp: Split pppol...
1289

f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
  /* Workqueue tunnel deletion function */
  static void l2tp_tunnel_del_work(struct work_struct *work)
  {
  	struct l2tp_tunnel *tunnel = NULL;
  	struct socket *sock = NULL;
  	struct sock *sk = NULL;
  
  	tunnel = container_of(work, struct l2tp_tunnel, del_work);
  	sk = l2tp_tunnel_sock_lookup(tunnel);
  	if (!sk)
  		return;
  
  	sock = sk->sk_socket;
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1303

02d13ed5f   Tom Parkin   l2tp: don't BUG_O...
1304
1305
1306
1307
  	/* If the tunnel socket was created by userspace, then go through the
  	 * inet layer to shut the socket down, and let userspace close it.
  	 * Otherwise, if we created the socket directly within the kernel, use
  	 * the sk API to release it here.
167eb17e0   Tom Parkin   l2tp: create tunn...
1308
1309
  	 * In either case the tunnel resources are freed in the socket
  	 * destructor when the tunnel socket goes away.
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1310
  	 */
02d13ed5f   Tom Parkin   l2tp: don't BUG_O...
1311
1312
1313
  	if (tunnel->fd >= 0) {
  		if (sock)
  			inet_shutdown(sock, 2);
167eb17e0   Tom Parkin   l2tp: create tunn...
1314
  	} else {
02d13ed5f   Tom Parkin   l2tp: don't BUG_O...
1315
1316
1317
  		if (sock)
  			kernel_sock_shutdown(sock, SHUT_RDWR);
  		sk_release_kernel(sk);
167eb17e0   Tom Parkin   l2tp: create tunn...
1318
  	}
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1319
1320
  
  	l2tp_tunnel_sock_put(sk);
fd558d186   James Chapman   l2tp: Split pppol...
1321
  }
fd558d186   James Chapman   l2tp: Split pppol...
1322

789a4a2c6   James Chapman   l2tp: Add support...
1323
1324
1325
  /* Create a socket for the tunnel, if one isn't set up by
   * userspace. This is used for static tunnels where there is no
   * managing L2TP daemon.
167eb17e0   Tom Parkin   l2tp: create tunn...
1326
1327
1328
1329
1330
   *
   * Since we don't want these sockets to keep a namespace alive by
   * themselves, we drop the socket's namespace refcount after creation.
   * These sockets are freed when the namespace exits using the pernet
   * exit hook.
789a4a2c6   James Chapman   l2tp: Add support...
1331
   */
167eb17e0   Tom Parkin   l2tp: create tunn...
1332
1333
1334
1335
1336
  static int l2tp_tunnel_sock_create(struct net *net,
  				u32 tunnel_id,
  				u32 peer_tunnel_id,
  				struct l2tp_tunnel_cfg *cfg,
  				struct socket **sockp)
789a4a2c6   James Chapman   l2tp: Add support...
1337
1338
  {
  	int err = -EINVAL;
167eb17e0   Tom Parkin   l2tp: create tunn...
1339
  	struct socket *sock = NULL;
85644b4d0   Tom Herbert   l2tp: Call udp_so...
1340
  	struct udp_port_cfg udp_conf;
789a4a2c6   James Chapman   l2tp: Add support...
1341
1342
1343
  
  	switch (cfg->encap) {
  	case L2TP_ENCAPTYPE_UDP:
85644b4d0   Tom Herbert   l2tp: Call udp_so...
1344
  		memset(&udp_conf, 0, sizeof(udp_conf));
f9bac8df9   Chris Elston   l2tp: netlink api...
1345
1346
  #if IS_ENABLED(CONFIG_IPV6)
  		if (cfg->local_ip6 && cfg->peer_ip6) {
85644b4d0   Tom Herbert   l2tp: Call udp_so...
1347
1348
1349
1350
1351
1352
1353
1354
1355
  			udp_conf.family = AF_INET6;
  			memcpy(&udp_conf.local_ip6, cfg->local_ip6,
  			       sizeof(udp_conf.local_ip6));
  			memcpy(&udp_conf.peer_ip6, cfg->peer_ip6,
  			       sizeof(udp_conf.peer_ip6));
  			udp_conf.use_udp6_tx_checksums =
  			    cfg->udp6_zero_tx_checksums;
  			udp_conf.use_udp6_rx_checksums =
  			    cfg->udp6_zero_rx_checksums;
f9bac8df9   Chris Elston   l2tp: netlink api...
1356
1357
1358
  		} else
  #endif
  		{
85644b4d0   Tom Herbert   l2tp: Call udp_so...
1359
1360
1361
1362
  			udp_conf.family = AF_INET;
  			udp_conf.local_ip = cfg->local_ip;
  			udp_conf.peer_ip = cfg->peer_ip;
  			udp_conf.use_udp_checksums = cfg->use_udp_checksums;
f9bac8df9   Chris Elston   l2tp: netlink api...
1363
  		}
789a4a2c6   James Chapman   l2tp: Add support...
1364

85644b4d0   Tom Herbert   l2tp: Call udp_so...
1365
1366
1367
1368
1369
1370
  		udp_conf.local_udp_port = htons(cfg->local_udp_port);
  		udp_conf.peer_udp_port = htons(cfg->peer_udp_port);
  
  		err = udp_sock_create(net, &udp_conf, &sock);
  		if (err < 0)
  			goto out;
789a4a2c6   James Chapman   l2tp: Add support...
1371
1372
1373
1374
  
  		break;
  
  	case L2TP_ENCAPTYPE_IP:
f9bac8df9   Chris Elston   l2tp: netlink api...
1375
1376
  #if IS_ENABLED(CONFIG_IPV6)
  		if (cfg->local_ip6 && cfg->peer_ip6) {
85644b4d0   Tom Herbert   l2tp: Call udp_so...
1377
  			struct sockaddr_l2tpip6 ip6_addr = {0};
167eb17e0   Tom Parkin   l2tp: create tunn...
1378
1379
  			err = sock_create_kern(AF_INET6, SOCK_DGRAM,
  					  IPPROTO_L2TP, &sock);
5dac94e10   James Chapman   l2tp: let iproute...
1380
1381
  			if (err < 0)
  				goto out;
789a4a2c6   James Chapman   l2tp: Add support...
1382

167eb17e0   Tom Parkin   l2tp: create tunn...
1383
  			sk_change_net(sock->sk, net);
789a4a2c6   James Chapman   l2tp: Add support...
1384

5dac94e10   James Chapman   l2tp: let iproute...
1385
1386
1387
1388
1389
1390
1391
1392
  			ip6_addr.l2tp_family = AF_INET6;
  			memcpy(&ip6_addr.l2tp_addr, cfg->local_ip6,
  			       sizeof(ip6_addr.l2tp_addr));
  			ip6_addr.l2tp_conn_id = tunnel_id;
  			err = kernel_bind(sock, (struct sockaddr *) &ip6_addr,
  					  sizeof(ip6_addr));
  			if (err < 0)
  				goto out;
789a4a2c6   James Chapman   l2tp: Add support...
1393

5dac94e10   James Chapman   l2tp: let iproute...
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
  			ip6_addr.l2tp_family = AF_INET6;
  			memcpy(&ip6_addr.l2tp_addr, cfg->peer_ip6,
  			       sizeof(ip6_addr.l2tp_addr));
  			ip6_addr.l2tp_conn_id = peer_tunnel_id;
  			err = kernel_connect(sock,
  					     (struct sockaddr *) &ip6_addr,
  					     sizeof(ip6_addr), 0);
  			if (err < 0)
  				goto out;
  		} else
  #endif
  		{
85644b4d0   Tom Herbert   l2tp: Call udp_so...
1406
  			struct sockaddr_l2tpip ip_addr = {0};
167eb17e0   Tom Parkin   l2tp: create tunn...
1407
1408
  			err = sock_create_kern(AF_INET, SOCK_DGRAM,
  					  IPPROTO_L2TP, &sock);
5dac94e10   James Chapman   l2tp: let iproute...
1409
1410
  			if (err < 0)
  				goto out;
789a4a2c6   James Chapman   l2tp: Add support...
1411

167eb17e0   Tom Parkin   l2tp: create tunn...
1412
  			sk_change_net(sock->sk, net);
5dac94e10   James Chapman   l2tp: let iproute...
1413

5dac94e10   James Chapman   l2tp: let iproute...
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
  			ip_addr.l2tp_family = AF_INET;
  			ip_addr.l2tp_addr = cfg->local_ip;
  			ip_addr.l2tp_conn_id = tunnel_id;
  			err = kernel_bind(sock, (struct sockaddr *) &ip_addr,
  					  sizeof(ip_addr));
  			if (err < 0)
  				goto out;
  
  			ip_addr.l2tp_family = AF_INET;
  			ip_addr.l2tp_addr = cfg->peer_ip;
  			ip_addr.l2tp_conn_id = peer_tunnel_id;
  			err = kernel_connect(sock, (struct sockaddr *) &ip_addr,
  					     sizeof(ip_addr), 0);
  			if (err < 0)
  				goto out;
  		}
789a4a2c6   James Chapman   l2tp: Add support...
1430
1431
1432
1433
1434
1435
1436
  		break;
  
  	default:
  		goto out;
  	}
  
  out:
167eb17e0   Tom Parkin   l2tp: create tunn...
1437
  	*sockp = sock;
789a4a2c6   James Chapman   l2tp: Add support...
1438
  	if ((err < 0) && sock) {
167eb17e0   Tom Parkin   l2tp: create tunn...
1439
1440
  		kernel_sock_shutdown(sock, SHUT_RDWR);
  		sk_release_kernel(sock->sk);
789a4a2c6   James Chapman   l2tp: Add support...
1441
1442
1443
1444
1445
  		*sockp = NULL;
  	}
  
  	return err;
  }
37159ef2c   Eric Dumazet   l2tp: fix a lockd...
1446
  static struct lock_class_key l2tp_socket_class;
fd558d186   James Chapman   l2tp: Split pppol...
1447
1448
1449
1450
1451
1452
1453
  int l2tp_tunnel_create(struct net *net, int fd, int version, u32 tunnel_id, u32 peer_tunnel_id, struct l2tp_tunnel_cfg *cfg, struct l2tp_tunnel **tunnelp)
  {
  	struct l2tp_tunnel *tunnel = NULL;
  	int err;
  	struct socket *sock = NULL;
  	struct sock *sk = NULL;
  	struct l2tp_net *pn;
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1454
  	enum l2tp_encap_type encap = L2TP_ENCAPTYPE_UDP;
fd558d186   James Chapman   l2tp: Split pppol...
1455
1456
  
  	/* Get the tunnel socket from the fd, which was opened by
789a4a2c6   James Chapman   l2tp: Add support...
1457
1458
  	 * the userspace L2TP daemon. If not specified, create a
  	 * kernel socket.
fd558d186   James Chapman   l2tp: Split pppol...
1459
  	 */
789a4a2c6   James Chapman   l2tp: Add support...
1460
  	if (fd < 0) {
167eb17e0   Tom Parkin   l2tp: create tunn...
1461
1462
  		err = l2tp_tunnel_sock_create(net, tunnel_id, peer_tunnel_id,
  				cfg, &sock);
789a4a2c6   James Chapman   l2tp: Add support...
1463
1464
1465
  		if (err < 0)
  			goto err;
  	} else {
789a4a2c6   James Chapman   l2tp: Add support...
1466
1467
  		sock = sockfd_lookup(fd, &err);
  		if (!sock) {
cbb95e0ca   Tom Parkin   l2tp: prevent tun...
1468
1469
  			pr_err("tunl %u: sockfd_lookup(fd=%d) returned %d
  ",
789a4a2c6   James Chapman   l2tp: Add support...
1470
  			       tunnel_id, fd, err);
cbb95e0ca   Tom Parkin   l2tp: prevent tun...
1471
1472
1473
1474
1475
1476
1477
1478
1479
  			err = -EBADF;
  			goto err;
  		}
  
  		/* Reject namespace mismatches */
  		if (!net_eq(sock_net(sock->sk), net)) {
  			pr_err("tunl %u: netns mismatch
  ", tunnel_id);
  			err = -EINVAL;
789a4a2c6   James Chapman   l2tp: Add support...
1480
1481
  			goto err;
  		}
fd558d186   James Chapman   l2tp: Split pppol...
1482
1483
1484
  	}
  
  	sk = sock->sk;
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1485
1486
  	if (cfg != NULL)
  		encap = cfg->encap;
fd558d186   James Chapman   l2tp: Split pppol...
1487
  	/* Quick sanity checks */
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1488
1489
1490
1491
  	switch (encap) {
  	case L2TP_ENCAPTYPE_UDP:
  		err = -EPROTONOSUPPORT;
  		if (sk->sk_protocol != IPPROTO_UDP) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1492
1493
  			pr_err("tunl %hu: fd %d wrong protocol, got %d, expected %d
  ",
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1494
1495
1496
1497
1498
1499
1500
  			       tunnel_id, fd, sk->sk_protocol, IPPROTO_UDP);
  			goto err;
  		}
  		break;
  	case L2TP_ENCAPTYPE_IP:
  		err = -EPROTONOSUPPORT;
  		if (sk->sk_protocol != IPPROTO_L2TP) {
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1501
1502
  			pr_err("tunl %hu: fd %d wrong protocol, got %d, expected %d
  ",
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1503
1504
1505
1506
  			       tunnel_id, fd, sk->sk_protocol, IPPROTO_L2TP);
  			goto err;
  		}
  		break;
fd558d186   James Chapman   l2tp: Split pppol...
1507
1508
1509
  	}
  
  	/* Check if this socket has already been prepped */
8d8a51e26   David S. Miller   l2tp: Fix build w...
1510
  	tunnel = l2tp_tunnel(sk);
fd558d186   James Chapman   l2tp: Split pppol...
1511
1512
1513
1514
1515
  	if (tunnel != NULL) {
  		/* This socket has already been prepped */
  		err = -EBUSY;
  		goto err;
  	}
fd558d186   James Chapman   l2tp: Split pppol...
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
  	tunnel = kzalloc(sizeof(struct l2tp_tunnel), GFP_KERNEL);
  	if (tunnel == NULL) {
  		err = -ENOMEM;
  		goto err;
  	}
  
  	tunnel->version = version;
  	tunnel->tunnel_id = tunnel_id;
  	tunnel->peer_tunnel_id = peer_tunnel_id;
  	tunnel->debug = L2TP_DEFAULT_DEBUG_FLAGS;
  
  	tunnel->magic = L2TP_TUNNEL_MAGIC;
  	sprintf(&tunnel->name[0], "tunl %u", tunnel_id);
  	rwlock_init(&tunnel->hlist_lock);
  
  	/* The net we belong to */
  	tunnel->l2tp_net = net;
  	pn = l2tp_pernet(net);
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1534
  	if (cfg != NULL)
fd558d186   James Chapman   l2tp: Split pppol...
1535
  		tunnel->debug = cfg->debug;
e18503f41   François Cachereul   l2tp: fix kernel ...
1536
1537
1538
1539
1540
  #if IS_ENABLED(CONFIG_IPV6)
  	if (sk->sk_family == PF_INET6) {
  		struct ipv6_pinfo *np = inet6_sk(sk);
  
  		if (ipv6_addr_v4mapped(&np->saddr) &&
efe4208f4   Eric Dumazet   ipv6: make lookup...
1541
  		    ipv6_addr_v4mapped(&sk->sk_v6_daddr)) {
e18503f41   François Cachereul   l2tp: fix kernel ...
1542
1543
1544
1545
  			struct inet_sock *inet = inet_sk(sk);
  
  			tunnel->v4mapped = true;
  			inet->inet_saddr = np->saddr.s6_addr32[3];
efe4208f4   Eric Dumazet   ipv6: make lookup...
1546
1547
  			inet->inet_rcv_saddr = sk->sk_v6_rcv_saddr.s6_addr32[3];
  			inet->inet_daddr = sk->sk_v6_daddr.s6_addr32[3];
e18503f41   François Cachereul   l2tp: fix kernel ...
1548
1549
1550
1551
1552
  		} else {
  			tunnel->v4mapped = false;
  		}
  	}
  #endif
fd558d186   James Chapman   l2tp: Split pppol...
1553
  	/* Mark socket as an encapsulation socket. See net/ipv4/udp.c */
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1554
1555
  	tunnel->encap = encap;
  	if (encap == L2TP_ENCAPTYPE_UDP) {
c8fffcea0   Andy Zhou   l2tp: Refactor l2...
1556
1557
1558
1559
1560
1561
  		struct udp_tunnel_sock_cfg udp_cfg;
  
  		udp_cfg.sk_user_data = tunnel;
  		udp_cfg.encap_type = UDP_ENCAP_L2TPINUDP;
  		udp_cfg.encap_rcv = l2tp_udp_encap_recv;
  		udp_cfg.encap_destroy = l2tp_udp_encap_destroy;
fd558d186   James Chapman   l2tp: Split pppol...
1562

c8fffcea0   Andy Zhou   l2tp: Refactor l2...
1563
1564
1565
1566
  		setup_udp_tunnel_sock(net, sock, &udp_cfg);
  	} else {
  		sk->sk_user_data = tunnel;
  	}
fd558d186   James Chapman   l2tp: Split pppol...
1567
1568
1569
1570
1571
1572
1573
  
  	/* Hook on the tunnel socket destructor so that we can cleanup
  	 * if the tunnel socket goes away.
  	 */
  	tunnel->old_sk_destruct = sk->sk_destruct;
  	sk->sk_destruct = &l2tp_tunnel_destruct;
  	tunnel->sock = sk;
80d84ef3f   Tom Parkin   l2tp: prevent l2t...
1574
  	tunnel->fd = fd;
37159ef2c   Eric Dumazet   l2tp: fix a lockd...
1575
  	lockdep_set_class_and_name(&sk->sk_lock.slock, &l2tp_socket_class, "l2tp_sock");
fd558d186   James Chapman   l2tp: Split pppol...
1576
  	sk->sk_allocation = GFP_ATOMIC;
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1577
1578
  	/* Init delete workqueue struct */
  	INIT_WORK(&tunnel->del_work, l2tp_tunnel_del_work);
fd558d186   James Chapman   l2tp: Split pppol...
1579
1580
  	/* Add tunnel to our list */
  	INIT_LIST_HEAD(&tunnel->list);
fd558d186   James Chapman   l2tp: Split pppol...
1581
1582
1583
  	atomic_inc(&l2tp_tunnel_count);
  
  	/* Bump the reference count. The tunnel context is deleted
1769192a3   Eric Dumazet   l2tp: fix potenti...
1584
  	 * only when this drops to zero. Must be done before list insertion
fd558d186   James Chapman   l2tp: Split pppol...
1585
1586
  	 */
  	l2tp_tunnel_inc_refcount(tunnel);
1769192a3   Eric Dumazet   l2tp: fix potenti...
1587
1588
1589
  	spin_lock_bh(&pn->l2tp_tunnel_list_lock);
  	list_add_rcu(&tunnel->list, &pn->l2tp_tunnel_list);
  	spin_unlock_bh(&pn->l2tp_tunnel_list_lock);
fd558d186   James Chapman   l2tp: Split pppol...
1590
1591
1592
1593
1594
  
  	err = 0;
  err:
  	if (tunnelp)
  		*tunnelp = tunnel;
789a4a2c6   James Chapman   l2tp: Add support...
1595
1596
1597
1598
  	/* If tunnel's socket was created by the kernel, it doesn't
  	 *  have a file.
  	 */
  	if (sock && sock->file)
fd558d186   James Chapman   l2tp: Split pppol...
1599
1600
1601
1602
1603
  		sockfd_put(sock);
  
  	return err;
  }
  EXPORT_SYMBOL_GPL(l2tp_tunnel_create);
309795f4b   James Chapman   l2tp: Add netlink...
1604
1605
1606
1607
  /* This function is used by the netlink TUNNEL_DELETE command.
   */
  int l2tp_tunnel_delete(struct l2tp_tunnel *tunnel)
  {
2b551c6e7   Tom Parkin   l2tp: close sessi...
1608
  	l2tp_tunnel_closeall(tunnel);
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1609
  	return (false == queue_work(l2tp_wq, &tunnel->del_work));
309795f4b   James Chapman   l2tp: Add netlink...
1610
1611
  }
  EXPORT_SYMBOL_GPL(l2tp_tunnel_delete);
fd558d186   James Chapman   l2tp: Split pppol...
1612
1613
1614
1615
  /* Really kill the session.
   */
  void l2tp_session_free(struct l2tp_session *session)
  {
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1616
  	struct l2tp_tunnel *tunnel = session->tunnel;
fd558d186   James Chapman   l2tp: Split pppol...
1617
1618
  
  	BUG_ON(atomic_read(&session->ref_count) != 0);
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1619
  	if (tunnel) {
fd558d186   James Chapman   l2tp: Split pppol...
1620
  		BUG_ON(tunnel->magic != L2TP_TUNNEL_MAGIC);
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1621
1622
1623
1624
1625
1626
1627
1628
  		if (session->session_id != 0)
  			atomic_dec(&l2tp_session_count);
  		sock_put(tunnel->sock);
  		session->tunnel = NULL;
  		l2tp_tunnel_dec_refcount(tunnel);
  	}
  
  	kfree(session);
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
  }
  EXPORT_SYMBOL_GPL(l2tp_session_free);
  
  /* Remove an l2tp session from l2tp_core's hash lists.
   * Provides a tidyup interface for pseudowire code which can't just route all
   * shutdown via. l2tp_session_delete and a pseudowire-specific session_close
   * callback.
   */
  void __l2tp_session_unhash(struct l2tp_session *session)
  {
  	struct l2tp_tunnel *tunnel = session->tunnel;
fd558d186   James Chapman   l2tp: Split pppol...
1640

f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1641
1642
1643
  	/* Remove the session from core hashes */
  	if (tunnel) {
  		/* Remove from the per-tunnel hash */
fd558d186   James Chapman   l2tp: Split pppol...
1644
1645
1646
  		write_lock_bh(&tunnel->hlist_lock);
  		hlist_del_init(&session->hlist);
  		write_unlock_bh(&tunnel->hlist_lock);
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1647
  		/* For L2TPv3 we have a per-net hash: remove from there, too */
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1648
1649
  		if (tunnel->version != L2TP_HDR_VER_2) {
  			struct l2tp_net *pn = l2tp_pernet(tunnel->l2tp_net);
e02d494d2   James Chapman   l2tp: Convert rwl...
1650
1651
1652
1653
  			spin_lock_bh(&pn->l2tp_session_hlist_lock);
  			hlist_del_init_rcu(&session->global_hlist);
  			spin_unlock_bh(&pn->l2tp_session_hlist_lock);
  			synchronize_rcu();
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1654
  		}
fd558d186   James Chapman   l2tp: Split pppol...
1655
  	}
fd558d186   James Chapman   l2tp: Split pppol...
1656
  }
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1657
  EXPORT_SYMBOL_GPL(__l2tp_session_unhash);
fd558d186   James Chapman   l2tp: Split pppol...
1658

309795f4b   James Chapman   l2tp: Add netlink...
1659
1660
1661
1662
1663
  /* This function is used by the netlink SESSION_DELETE command and by
     pseudowire modules.
   */
  int l2tp_session_delete(struct l2tp_session *session)
  {
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1664
1665
1666
  	if (session->ref)
  		(*session->ref)(session);
  	__l2tp_session_unhash(session);
4c6e2fd35   Tom Parkin   l2tp: purge sessi...
1667
  	l2tp_session_queue_purge(session);
309795f4b   James Chapman   l2tp: Add netlink...
1668
1669
  	if (session->session_close != NULL)
  		(*session->session_close)(session);
f6e16b299   Tom Parkin   l2tp: unhash l2tp...
1670
  	if (session->deref)
1b7c92b90   Dan Carpenter   l2tp: calling the...
1671
  		(*session->deref)(session);
309795f4b   James Chapman   l2tp: Add netlink...
1672
  	l2tp_session_dec_refcount(session);
309795f4b   James Chapman   l2tp: Add netlink...
1673
1674
1675
  	return 0;
  }
  EXPORT_SYMBOL_GPL(l2tp_session_delete);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1676
1677
1678
  /* We come here whenever a session's send_seq, cookie_len or
   * l2specific_len parameters are set.
   */
bb5016eac   Guillaume Nault   l2tp: fix manual ...
1679
  void l2tp_session_set_header_len(struct l2tp_session *session, int version)
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1680
1681
1682
1683
1684
1685
  {
  	if (version == L2TP_HDR_VER_2) {
  		session->hdr_len = 6;
  		if (session->send_seq)
  			session->hdr_len += 4;
  	} else {
0d76751fa   James Chapman   l2tp: Add L2TPv3 ...
1686
1687
1688
  		session->hdr_len = 4 + session->cookie_len + session->l2specific_len + session->offset;
  		if (session->tunnel->encap == L2TP_ENCAPTYPE_UDP)
  			session->hdr_len += 4;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1689
1690
1691
  	}
  
  }
bb5016eac   Guillaume Nault   l2tp: fix manual ...
1692
  EXPORT_SYMBOL_GPL(l2tp_session_set_header_len);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1693

fd558d186   James Chapman   l2tp: Split pppol...
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
  struct l2tp_session *l2tp_session_create(int priv_size, struct l2tp_tunnel *tunnel, u32 session_id, u32 peer_session_id, struct l2tp_session_cfg *cfg)
  {
  	struct l2tp_session *session;
  
  	session = kzalloc(sizeof(struct l2tp_session) + priv_size, GFP_KERNEL);
  	if (session != NULL) {
  		session->magic = L2TP_SESSION_MAGIC;
  		session->tunnel = tunnel;
  
  		session->session_id = session_id;
  		session->peer_session_id = peer_session_id;
d301e3256   James Chapman   l2tp: fix data pa...
1705
  		session->nr = 0;
8a1631d58   James Chapman   l2tp: make datapa...
1706
1707
1708
1709
1710
  		if (tunnel->version == L2TP_HDR_VER_2)
  			session->nr_max = 0xffff;
  		else
  			session->nr_max = 0xffffff;
  		session->nr_window_size = session->nr_max / 2;
a0dbd8222   James Chapman   l2tp: make datapa...
1711
1712
1713
1714
  		session->nr_oos_count_max = 4;
  
  		/* Use NR of first received packet */
  		session->reorder_skip = 1;
fd558d186   James Chapman   l2tp: Split pppol...
1715
1716
1717
1718
1719
1720
1721
  
  		sprintf(&session->name[0], "sess %u/%u",
  			tunnel->tunnel_id, session->session_id);
  
  		skb_queue_head_init(&session->reorder_q);
  
  		INIT_HLIST_NODE(&session->hlist);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1722
  		INIT_HLIST_NODE(&session->global_hlist);
fd558d186   James Chapman   l2tp: Split pppol...
1723
1724
1725
1726
1727
  
  		/* Inherit debug options from tunnel */
  		session->debug = tunnel->debug;
  
  		if (cfg) {
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1728
  			session->pwtype = cfg->pw_type;
fd558d186   James Chapman   l2tp: Split pppol...
1729
  			session->debug = cfg->debug;
fd558d186   James Chapman   l2tp: Split pppol...
1730
1731
1732
1733
1734
  			session->mtu = cfg->mtu;
  			session->mru = cfg->mru;
  			session->send_seq = cfg->send_seq;
  			session->recv_seq = cfg->recv_seq;
  			session->lns_mode = cfg->lns_mode;
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1735
1736
1737
1738
1739
1740
1741
1742
  			session->reorder_timeout = cfg->reorder_timeout;
  			session->offset = cfg->offset;
  			session->l2specific_type = cfg->l2specific_type;
  			session->l2specific_len = cfg->l2specific_len;
  			session->cookie_len = cfg->cookie_len;
  			memcpy(&session->cookie[0], &cfg->cookie[0], cfg->cookie_len);
  			session->peer_cookie_len = cfg->peer_cookie_len;
  			memcpy(&session->peer_cookie[0], &cfg->peer_cookie[0], cfg->peer_cookie_len);
fd558d186   James Chapman   l2tp: Split pppol...
1743
  		}
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1744
1745
1746
1747
1748
1749
  		if (tunnel->version == L2TP_HDR_VER_2)
  			session->build_header = l2tp_build_l2tpv2_header;
  		else
  			session->build_header = l2tp_build_l2tpv3_header;
  
  		l2tp_session_set_header_len(session, tunnel->version);
fd558d186   James Chapman   l2tp: Split pppol...
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
  		/* Bump the reference count. The session context is deleted
  		 * only when this drops to zero.
  		 */
  		l2tp_session_inc_refcount(session);
  		l2tp_tunnel_inc_refcount(tunnel);
  
  		/* Ensure tunnel socket isn't deleted */
  		sock_hold(tunnel->sock);
  
  		/* Add session to the tunnel's hash list */
  		write_lock_bh(&tunnel->hlist_lock);
  		hlist_add_head(&session->hlist,
  			       l2tp_session_id_hash(tunnel, session_id));
  		write_unlock_bh(&tunnel->hlist_lock);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1764
1765
1766
  		/* And to the global session list if L2TPv3 */
  		if (tunnel->version != L2TP_HDR_VER_2) {
  			struct l2tp_net *pn = l2tp_pernet(tunnel->l2tp_net);
e02d494d2   James Chapman   l2tp: Convert rwl...
1767
1768
1769
1770
  			spin_lock_bh(&pn->l2tp_session_hlist_lock);
  			hlist_add_head_rcu(&session->global_hlist,
  					   l2tp_session_id_hash_2(pn, session_id));
  			spin_unlock_bh(&pn->l2tp_session_hlist_lock);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1771
  		}
fd558d186   James Chapman   l2tp: Split pppol...
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
  		/* Ignore management session in session count value */
  		if (session->session_id != 0)
  			atomic_inc(&l2tp_session_count);
  	}
  
  	return session;
  }
  EXPORT_SYMBOL_GPL(l2tp_session_create);
  
  /*****************************************************************************
   * Init and cleanup
   *****************************************************************************/
  
  static __net_init int l2tp_init_net(struct net *net)
  {
e773aaff8   Jiri Pirko   l2tp: fix memory ...
1787
  	struct l2tp_net *pn = net_generic(net, l2tp_net_id);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1788
  	int hash;
fd558d186   James Chapman   l2tp: Split pppol...
1789

fd558d186   James Chapman   l2tp: Split pppol...
1790
  	INIT_LIST_HEAD(&pn->l2tp_tunnel_list);
e02d494d2   James Chapman   l2tp: Convert rwl...
1791
  	spin_lock_init(&pn->l2tp_tunnel_list_lock);
fd558d186   James Chapman   l2tp: Split pppol...
1792

f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1793
1794
  	for (hash = 0; hash < L2TP_HASH_SIZE_2; hash++)
  		INIT_HLIST_HEAD(&pn->l2tp_session_hlist[hash]);
e02d494d2   James Chapman   l2tp: Convert rwl...
1795
  	spin_lock_init(&pn->l2tp_session_hlist_lock);
f7faffa3f   James Chapman   l2tp: Add L2TPv3 ...
1796

fd558d186   James Chapman   l2tp: Split pppol...
1797
  	return 0;
fd558d186   James Chapman   l2tp: Split pppol...
1798
  }
167eb17e0   Tom Parkin   l2tp: create tunn...
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
  static __net_exit void l2tp_exit_net(struct net *net)
  {
  	struct l2tp_net *pn = l2tp_pernet(net);
  	struct l2tp_tunnel *tunnel = NULL;
  
  	rcu_read_lock_bh();
  	list_for_each_entry_rcu(tunnel, &pn->l2tp_tunnel_list, list) {
  		(void)l2tp_tunnel_delete(tunnel);
  	}
  	rcu_read_unlock_bh();
  }
fd558d186   James Chapman   l2tp: Split pppol...
1810
1811
  static struct pernet_operations l2tp_net_ops = {
  	.init = l2tp_init_net,
167eb17e0   Tom Parkin   l2tp: create tunn...
1812
  	.exit = l2tp_exit_net,
fd558d186   James Chapman   l2tp: Split pppol...
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
  	.id   = &l2tp_net_id,
  	.size = sizeof(struct l2tp_net),
  };
  
  static int __init l2tp_init(void)
  {
  	int rc = 0;
  
  	rc = register_pernet_device(&l2tp_net_ops);
  	if (rc)
  		goto out;
59ff3eb6d   ZhangZhen   workqueue: remove...
1824
  	l2tp_wq = alloc_workqueue("l2tp", WQ_UNBOUND, 0);
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1825
1826
1827
1828
1829
1830
  	if (!l2tp_wq) {
  		pr_err("alloc_workqueue failed
  ");
  		rc = -ENOMEM;
  		goto out;
  	}
a4ca44fa5   Joe Perches   net: l2tp: Standa...
1831
1832
  	pr_info("L2TP core driver, %s
  ", L2TP_DRV_VERSION);
fd558d186   James Chapman   l2tp: Split pppol...
1833
1834
1835
1836
1837
1838
1839
1840
  
  out:
  	return rc;
  }
  
  static void __exit l2tp_exit(void)
  {
  	unregister_pernet_device(&l2tp_net_ops);
f8ccac0e4   Tom Parkin   l2tp: put tunnel ...
1841
1842
1843
1844
  	if (l2tp_wq) {
  		destroy_workqueue(l2tp_wq);
  		l2tp_wq = NULL;
  	}
fd558d186   James Chapman   l2tp: Split pppol...
1845
1846
1847
1848
1849
1850
1851
1852
1853
  }
  
  module_init(l2tp_init);
  module_exit(l2tp_exit);
  
  MODULE_AUTHOR("James Chapman <jchapman@katalix.com>");
  MODULE_DESCRIPTION("L2TP core");
  MODULE_LICENSE("GPL");
  MODULE_VERSION(L2TP_DRV_VERSION);