l2tp_core.h 9.6 KB
Newer Older
1 2 3 4 5 6 7 8 9
/*
 * L2TP internal definitions.
 *
 * Copyright (c) 2008,2009 Katalix Systems Ltd
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License version 2 as
 * published by the Free Software Foundation.
 */
10
#include <linux/refcount.h>
11 12 13 14 15 16 17 18

#ifndef _L2TP_CORE_H_
#define _L2TP_CORE_H_

/* Just some random numbers */
#define L2TP_TUNNEL_MAGIC	0x42114DDA
#define L2TP_SESSION_MAGIC	0x0C04EB7D

19
/* Per tunnel, session hash table size */
20 21 22
#define L2TP_HASH_BITS	4
#define L2TP_HASH_SIZE	(1 << L2TP_HASH_BITS)

23 24 25 26
/* System-wide, session hash table size */
#define L2TP_HASH_BITS_2	8
#define L2TP_HASH_SIZE_2	(1 << L2TP_HASH_BITS_2)

27 28 29
struct sk_buff;

struct l2tp_stats {
30 31 32 33 34 35 36 37 38
	atomic_long_t		tx_packets;
	atomic_long_t		tx_bytes;
	atomic_long_t		tx_errors;
	atomic_long_t		rx_packets;
	atomic_long_t		rx_bytes;
	atomic_long_t		rx_seq_discards;
	atomic_long_t		rx_oos_packets;
	atomic_long_t		rx_errors;
	atomic_long_t		rx_cookie_discards;
39 40 41 42 43 44 45 46
};

struct l2tp_tunnel;

/* Describes a session. Contains information to determine incoming
 * packets and transmit outgoing ones.
 */
struct l2tp_session_cfg {
47
	enum l2tp_pwtype	pw_type;
48
	unsigned int		data_seq:2;	/* data sequencing level
49 50 51
						 * 0 => none, 1 => IP only,
						 * 2 => all
						 */
52
	unsigned int		recv_seq:1;	/* expect receive packets with
53
						 * sequence numbers? */
54
	unsigned int		send_seq:1;	/* send packets with sequence
55
						 * numbers? */
56
	unsigned int		lns_mode:1;	/* behave as LNS? LAC enables
57 58 59 60
						 * sequence numbers under
						 * control of LNS. */
	int			debug;		/* bitmask of debug message
						 * categories */
61
	u16			vlan_id;	/* VLAN pseudowire only */
62 63 64 65 66
	u16			l2specific_type; /* Layer 2 specific type */
	u8			cookie[8];	/* optional cookie */
	int			cookie_len;	/* 0, 4 or 8 bytes */
	u8			peer_cookie[8];	/* peer's cookie */
	int			peer_cookie_len; /* 0, 4 or 8 bytes */
67 68 69 70
	int			reorder_timeout; /* configured reorder timeout
						  * (in jiffies) */
	int			mtu;
	int			mru;
71
	char			*ifname;
72 73 74 75 76
};

struct l2tp_session {
	int			magic;		/* should be
						 * L2TP_SESSION_MAGIC */
77
	long			dead;
78 79 80 81 82

	struct l2tp_tunnel	*tunnel;	/* back pointer to tunnel
						 * context */
	u32			session_id;
	u32			peer_session_id;
83 84 85 86 87 88 89 90
	u8			cookie[8];
	int			cookie_len;
	u8			peer_cookie[8];
	int			peer_cookie_len;
	u16			l2specific_type;
	u16			hdr_len;
	u32			nr;		/* session NR state (receive) */
	u32			ns;		/* session NR state (send) */
91
	struct sk_buff_head	reorder_q;	/* receive reorder queue */
92 93
	u32			nr_max;		/* max NR. Depends on tunnel */
	u32			nr_window_size;	/* NR window size */
94 95 96
	u32			nr_oos;		/* NR of last OOS packet */
	int			nr_oos_count;	/* For OOS recovery */
	int			nr_oos_count_max;
97
	struct hlist_node	hlist;		/* Hash list node */
98
	refcount_t		ref_count;
99 100

	char			name[32];	/* for logging */
101
	char			ifname[IFNAMSIZ];
102
	unsigned int		data_seq:2;	/* data sequencing level
103 104 105
						 * 0 => none, 1 => IP only,
						 * 2 => all
						 */
106
	unsigned int		recv_seq:1;	/* expect receive packets with
107
						 * sequence numbers? */
108
	unsigned int		send_seq:1;	/* send packets with sequence
109
						 * numbers? */
110
	unsigned int		lns_mode:1;	/* behave as LNS? LAC enables
111 112 113 114 115 116
						 * sequence numbers under
						 * control of LNS. */
	int			debug;		/* bitmask of debug message
						 * categories */
	int			reorder_timeout; /* configured reorder timeout
						  * (in jiffies) */
117
	int			reorder_skip;	/* set if skip to next nr */
118 119
	int			mtu;
	int			mru;
120
	enum l2tp_pwtype	pwtype;
121
	struct l2tp_stats	stats;
122
	struct hlist_node	global_hlist;	/* Global hash list node */
123

124
	int (*build_header)(struct l2tp_session *session, void *buf);
125 126
	void (*recv_skb)(struct l2tp_session *session, struct sk_buff *skb, int data_len);
	void (*session_close)(struct l2tp_session *session);
127
#if IS_ENABLED(CONFIG_L2TP_DEBUGFS)
128 129
	void (*show)(struct seq_file *m, void *priv);
#endif
130 131 132 133 134 135 136 137 138
	uint8_t			priv[0];	/* private data */
};

/* Describes the tunnel. It contains info to track all the associated
 * sessions so incoming packets can be sorted out
 */
struct l2tp_tunnel_cfg {
	int			debug;		/* bitmask of debug message
						 * categories */
139
	enum l2tp_encap_type	encap;
140 141 142 143

	/* Used only for kernel-created sockets */
	struct in_addr		local_ip;
	struct in_addr		peer_ip;
144 145 146 147
#if IS_ENABLED(CONFIG_IPV6)
	struct in6_addr		*local_ip6;
	struct in6_addr		*peer_ip6;
#endif
148 149
	u16			local_udp_port;
	u16			peer_udp_port;
150 151 152
	unsigned int		use_udp_checksums:1,
				udp6_zero_tx_checksums:1,
				udp6_zero_rx_checksums:1;
153 154 155 156
};

struct l2tp_tunnel {
	int			magic;		/* Should be L2TP_TUNNEL_MAGIC */
157 158 159

	unsigned long		dead;

160
	struct rcu_head rcu;
161
	rwlock_t		hlist_lock;	/* protect session_hlist */
162 163 164 165
	bool			acpt_newsess;	/* Indicates whether this
						 * tunnel accepts new sessions.
						 * Protected by hlist_lock.
						 */
166 167 168 169 170 171 172 173 174 175
	struct hlist_head	session_hlist[L2TP_HASH_SIZE];
						/* hashed list of sessions,
						 * hashed by id */
	u32			tunnel_id;
	u32			peer_tunnel_id;
	int			version;	/* 2=>L2TPv2, 3=>L2TPv3 */

	char			name[20];	/* for logging */
	int			debug;		/* bitmask of debug message
						 * categories */
176
	enum l2tp_encap_type	encap;
177 178 179 180 181
	struct l2tp_stats	stats;

	struct list_head	list;		/* Keep a list of all tunnels */
	struct net		*l2tp_net;	/* the net we belong to */

182
	refcount_t		ref_count;
183 184 185
#ifdef CONFIG_DEBUG_FS
	void (*show)(struct seq_file *m, void *arg);
#endif
186 187 188
	int (*recv_payload_hook)(struct sk_buff *skb);
	void (*old_sk_destruct)(struct sock *);
	struct sock		*sock;		/* Parent socket */
189 190
	int			fd;		/* Parent fd, if tunnel socket
						 * was created by userspace */
191 192 193
#if IS_ENABLED(CONFIG_IPV6)
	bool			v4mapped;
#endif
194

195 196
	struct work_struct	del_work;

197 198 199
	uint8_t			priv[0];	/* private data */
};

200
struct l2tp_nl_cmd_ops {
201 202 203
	int (*session_create)(struct net *net, struct l2tp_tunnel *tunnel,
			      u32 session_id, u32 peer_session_id,
			      struct l2tp_session_cfg *cfg);
204 205 206
	int (*session_delete)(struct l2tp_session *session);
};

207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236
static inline void *l2tp_tunnel_priv(struct l2tp_tunnel *tunnel)
{
	return &tunnel->priv[0];
}

static inline void *l2tp_session_priv(struct l2tp_session *session)
{
	return &session->priv[0];
}

static inline struct l2tp_tunnel *l2tp_sock_to_tunnel(struct sock *sk)
{
	struct l2tp_tunnel *tunnel;

	if (sk == NULL)
		return NULL;

	sock_hold(sk);
	tunnel = (struct l2tp_tunnel *)(sk->sk_user_data);
	if (tunnel == NULL) {
		sock_put(sk);
		goto out;
	}

	BUG_ON(tunnel->magic != L2TP_TUNNEL_MAGIC);

out:
	return tunnel;
}

237 238
struct l2tp_tunnel *l2tp_tunnel_get(const struct net *net, u32 tunnel_id);

239
struct l2tp_session *l2tp_session_get(const struct net *net,
240
				      struct l2tp_tunnel *tunnel,
241 242
				      u32 session_id);
struct l2tp_session *l2tp_session_get_nth(struct l2tp_tunnel *tunnel, int nth);
243
struct l2tp_session *l2tp_session_get_by_ifname(const struct net *net,
244
						const char *ifname);
245 246
struct l2tp_tunnel *l2tp_tunnel_find(const struct net *net, u32 tunnel_id);
struct l2tp_tunnel *l2tp_tunnel_find_nth(const struct net *net, int nth);
247 248 249 250 251

int l2tp_tunnel_create(struct net *net, int fd, int version, u32 tunnel_id,
		       u32 peer_tunnel_id, struct l2tp_tunnel_cfg *cfg,
		       struct l2tp_tunnel **tunnelp);
void l2tp_tunnel_closeall(struct l2tp_tunnel *tunnel);
252
void l2tp_tunnel_delete(struct l2tp_tunnel *tunnel);
253 254 255 256
struct l2tp_session *l2tp_session_create(int priv_size,
					 struct l2tp_tunnel *tunnel,
					 u32 session_id, u32 peer_session_id,
					 struct l2tp_session_cfg *cfg);
257 258 259
int l2tp_session_register(struct l2tp_session *session,
			  struct l2tp_tunnel *tunnel);

260 261 262 263 264 265 266 267
void __l2tp_session_unhash(struct l2tp_session *session);
int l2tp_session_delete(struct l2tp_session *session);
void l2tp_session_free(struct l2tp_session *session);
void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb,
		      unsigned char *ptr, unsigned char *optr, u16 hdrflags,
		      int length, int (*payload_hook)(struct sk_buff *skb));
int l2tp_session_queue_purge(struct l2tp_session *session);
int l2tp_udp_encap_recv(struct sock *sk, struct sk_buff *skb);
268
void l2tp_session_set_header_len(struct l2tp_session *session, int version);
269 270 271 272 273 274 275

int l2tp_xmit_skb(struct l2tp_session *session, struct sk_buff *skb,
		  int hdr_len);

int l2tp_nl_register_ops(enum l2tp_pwtype pw_type,
			 const struct l2tp_nl_cmd_ops *ops);
void l2tp_nl_unregister_ops(enum l2tp_pwtype pw_type);
E
Eric Dumazet 已提交
276
int l2tp_ioctl(struct sock *sk, int cmd, unsigned long arg);
277

278 279 280 281 282 283 284 285 286 287 288
static inline void l2tp_tunnel_inc_refcount(struct l2tp_tunnel *tunnel)
{
	refcount_inc(&tunnel->ref_count);
}

static inline void l2tp_tunnel_dec_refcount(struct l2tp_tunnel *tunnel)
{
	if (refcount_dec_and_test(&tunnel->ref_count))
		kfree_rcu(tunnel, rcu);
}

289 290 291
/* Session reference counts. Incremented when code obtains a reference
 * to a session.
 */
292
static inline void l2tp_session_inc_refcount(struct l2tp_session *session)
293
{
294
	refcount_inc(&session->ref_count);
295 296
}

297
static inline void l2tp_session_dec_refcount(struct l2tp_session *session)
298
{
299
	if (refcount_dec_and_test(&session->ref_count))
300 301 302
		l2tp_session_free(session);
}

303 304 305 306 307 308 309 310 311 312 313
static inline int l2tp_get_l2specific_len(struct l2tp_session *session)
{
	switch (session->l2specific_type) {
	case L2TP_L2SPECTYPE_DEFAULT:
		return 4;
	case L2TP_L2SPECTYPE_NONE:
	default:
		return 0;
	}
}

314 315 316 317 318 319 320 321 322 323 324 325 326
#define l2tp_printk(ptr, type, func, fmt, ...)				\
do {									\
	if (((ptr)->debug) & (type))					\
		func(fmt, ##__VA_ARGS__);				\
} while (0)

#define l2tp_warn(ptr, type, fmt, ...)					\
	l2tp_printk(ptr, type, pr_warn, fmt, ##__VA_ARGS__)
#define l2tp_info(ptr, type, fmt, ...)					\
	l2tp_printk(ptr, type, pr_info, fmt, ##__VA_ARGS__)
#define l2tp_dbg(ptr, type, fmt, ...)					\
	l2tp_printk(ptr, type, pr_debug, fmt, ##__VA_ARGS__)

S
stephen hemminger 已提交
327 328 329
#define MODULE_ALIAS_L2TP_PWTYPE(type) \
	MODULE_ALIAS("net-l2tp-type-" __stringify(type))

330
#endif /* _L2TP_CORE_H_ */