mirror of
https://github.com/torvalds/linux.git
synced 2024-11-22 20:22:09 +00:00
e1d001fa5b
Most of the ioctls to net protocols operates directly on userspace argument (arg). Usually doing get_user()/put_user() directly in the ioctl callback. This is not flexible, because it is hard to reuse these functions without passing userspace buffers. Change the "struct proto" ioctls to avoid touching userspace memory and operate on kernel buffers, i.e., all protocol's ioctl callbacks is adapted to operate on a kernel memory other than on userspace (so, no more {put,get}_user() and friends being called in the ioctl callback). This changes the "struct proto" ioctl format in the following way: int (*ioctl)(struct sock *sk, int cmd, - unsigned long arg); + int *karg); (Important to say that this patch does not touch the "struct proto_ops" protocols) So, the "karg" argument, which is passed to the ioctl callback, is a pointer allocated to kernel space memory (inside a function wrapper). This buffer (karg) may contain input argument (copied from userspace in a prep function) and it might return a value/buffer, which is copied back to userspace if necessary. There is not one-size-fits-all format (that is I am using 'may' above), but basically, there are three type of ioctls: 1) Do not read from userspace, returns a result to userspace 2) Read an input parameter from userspace, and does not return anything to userspace 3) Read an input from userspace, and return a buffer to userspace. The default case (1) (where no input parameter is given, and an "int" is returned to userspace) encompasses more than 90% of the cases, but there are two other exceptions. Here is a list of exceptions: * Protocol RAW: * cmd = SIOCGETVIFCNT: * input and output = struct sioc_vif_req * cmd = SIOCGETSGCNT * input and output = struct sioc_sg_req * Explanation: for the SIOCGETVIFCNT case, userspace passes the input argument, which is struct sioc_vif_req. Then the callback populates the struct, which is copied back to userspace. * Protocol RAW6: * cmd = SIOCGETMIFCNT_IN6 * input and output = struct sioc_mif_req6 * cmd = SIOCGETSGCNT_IN6 * input and output = struct sioc_sg_req6 * Protocol PHONET: * cmd == SIOCPNADDRESOURCE | SIOCPNDELRESOURCE * input int (4 bytes) * Nothing is copied back to userspace. For the exception cases, functions sock_sk_ioctl_inout() will copy the userspace input, and copy it back to kernel space. The wrapper that prepare the buffer and put the buffer back to user is sk_ioctl(), so, instead of calling sk->sk_prot->ioctl(), the callee now calls sk_ioctl(), which will handle all cases. Signed-off-by: Breno Leitao <leitao@debian.org> Reviewed-by: Willem de Bruijn <willemb@google.com> Reviewed-by: David Ahern <dsahern@kernel.org> Reviewed-by: Kuniyuki Iwashima <kuniyu@amazon.com> Link: https://lore.kernel.org/r/20230609152800.830401-1-leitao@debian.org Signed-off-by: Jakub Kicinski <kuba@kernel.org>
347 lines
11 KiB
C
347 lines
11 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/* L2TP internal definitions.
|
|
*
|
|
* Copyright (c) 2008,2009 Katalix Systems Ltd
|
|
*/
|
|
#include <linux/refcount.h>
|
|
|
|
#ifndef _L2TP_CORE_H_
|
|
#define _L2TP_CORE_H_
|
|
|
|
#include <net/dst.h>
|
|
#include <net/sock.h>
|
|
|
|
#ifdef CONFIG_XFRM
|
|
#include <net/xfrm.h>
|
|
#endif
|
|
|
|
/* Random numbers used for internal consistency checks of tunnel and session structures */
|
|
#define L2TP_TUNNEL_MAGIC 0x42114DDA
|
|
#define L2TP_SESSION_MAGIC 0x0C04EB7D
|
|
|
|
/* Per tunnel session hash table size */
|
|
#define L2TP_HASH_BITS 4
|
|
#define L2TP_HASH_SIZE BIT(L2TP_HASH_BITS)
|
|
|
|
/* System-wide session hash table size */
|
|
#define L2TP_HASH_BITS_2 8
|
|
#define L2TP_HASH_SIZE_2 BIT(L2TP_HASH_BITS_2)
|
|
|
|
struct sk_buff;
|
|
|
|
struct l2tp_stats {
|
|
atomic_long_t tx_packets;
|
|
atomic_long_t tx_bytes;
|
|
atomic_long_t tx_errors;
|
|
atomic_long_t rx_packets;
|
|
atomic_long_t rx_bytes;
|
|
atomic_long_t rx_seq_discards;
|
|
atomic_long_t rx_oos_packets;
|
|
atomic_long_t rx_errors;
|
|
atomic_long_t rx_cookie_discards;
|
|
atomic_long_t rx_invalid;
|
|
};
|
|
|
|
struct l2tp_tunnel;
|
|
|
|
/* L2TP session configuration */
|
|
struct l2tp_session_cfg {
|
|
enum l2tp_pwtype pw_type;
|
|
unsigned int recv_seq:1; /* expect receive packets with sequence numbers? */
|
|
unsigned int send_seq:1; /* send packets with sequence numbers? */
|
|
unsigned int lns_mode:1; /* behave as LNS?
|
|
* LAC enables sequence numbers under LNS control.
|
|
*/
|
|
u16 l2specific_type; /* Layer 2 specific type */
|
|
u8 cookie[8]; /* optional cookie */
|
|
int cookie_len; /* 0, 4 or 8 bytes */
|
|
u8 peer_cookie[8]; /* peer's cookie */
|
|
int peer_cookie_len; /* 0, 4 or 8 bytes */
|
|
int reorder_timeout; /* configured reorder timeout (in jiffies) */
|
|
char *ifname;
|
|
};
|
|
|
|
/* Represents a session (pseudowire) instance.
|
|
* Tracks runtime state including cookies, dataplane packet sequencing, and IO statistics.
|
|
* Is linked into a per-tunnel session hashlist; and in the case of an L2TPv3 session into
|
|
* an additional per-net ("global") hashlist.
|
|
*/
|
|
#define L2TP_SESSION_NAME_MAX 32
|
|
struct l2tp_session {
|
|
int magic; /* should be L2TP_SESSION_MAGIC */
|
|
long dead;
|
|
|
|
struct l2tp_tunnel *tunnel; /* back pointer to tunnel context */
|
|
u32 session_id;
|
|
u32 peer_session_id;
|
|
u8 cookie[8];
|
|
int cookie_len;
|
|
u8 peer_cookie[8];
|
|
int peer_cookie_len;
|
|
u16 l2specific_type;
|
|
u16 hdr_len;
|
|
u32 nr; /* session NR state (receive) */
|
|
u32 ns; /* session NR state (send) */
|
|
struct sk_buff_head reorder_q; /* receive reorder queue */
|
|
u32 nr_max; /* max NR. Depends on tunnel */
|
|
u32 nr_window_size; /* NR window size */
|
|
u32 nr_oos; /* NR of last OOS packet */
|
|
int nr_oos_count; /* for OOS recovery */
|
|
int nr_oos_count_max;
|
|
struct hlist_node hlist; /* hash list node */
|
|
refcount_t ref_count;
|
|
|
|
char name[L2TP_SESSION_NAME_MAX]; /* for logging */
|
|
char ifname[IFNAMSIZ];
|
|
unsigned int recv_seq:1; /* expect receive packets with sequence numbers? */
|
|
unsigned int send_seq:1; /* send packets with sequence numbers? */
|
|
unsigned int lns_mode:1; /* behave as LNS?
|
|
* LAC enables sequence numbers under LNS control.
|
|
*/
|
|
int reorder_timeout; /* configured reorder timeout (in jiffies) */
|
|
int reorder_skip; /* set if skip to next nr */
|
|
enum l2tp_pwtype pwtype;
|
|
struct l2tp_stats stats;
|
|
struct hlist_node global_hlist; /* global hash list node */
|
|
|
|
/* Session receive handler for data packets.
|
|
* Each pseudowire implementation should implement this callback in order to
|
|
* handle incoming packets. Packets are passed to the pseudowire handler after
|
|
* reordering, if data sequence numbers are enabled for the session.
|
|
*/
|
|
void (*recv_skb)(struct l2tp_session *session, struct sk_buff *skb, int data_len);
|
|
|
|
/* Session close handler.
|
|
* Each pseudowire implementation may implement this callback in order to carry
|
|
* out pseudowire-specific shutdown actions.
|
|
* The callback is called by core after unhashing the session and purging its
|
|
* reorder queue.
|
|
*/
|
|
void (*session_close)(struct l2tp_session *session);
|
|
|
|
/* Session show handler.
|
|
* Pseudowire-specific implementation of debugfs session rendering.
|
|
* The callback is called by l2tp_debugfs.c after rendering core session
|
|
* information.
|
|
*/
|
|
void (*show)(struct seq_file *m, void *priv);
|
|
|
|
u8 priv[]; /* private data */
|
|
};
|
|
|
|
/* L2TP tunnel configuration */
|
|
struct l2tp_tunnel_cfg {
|
|
enum l2tp_encap_type encap;
|
|
|
|
/* Used only for kernel-created sockets */
|
|
struct in_addr local_ip;
|
|
struct in_addr peer_ip;
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
struct in6_addr *local_ip6;
|
|
struct in6_addr *peer_ip6;
|
|
#endif
|
|
u16 local_udp_port;
|
|
u16 peer_udp_port;
|
|
unsigned int use_udp_checksums:1,
|
|
udp6_zero_tx_checksums:1,
|
|
udp6_zero_rx_checksums:1;
|
|
};
|
|
|
|
/* Represents a tunnel instance.
|
|
* Tracks runtime state including IO statistics.
|
|
* Holds the tunnel socket (either passed from userspace or directly created by the kernel).
|
|
* Maintains a hashlist of sessions belonging to the tunnel instance.
|
|
* Is linked into a per-net list of tunnels.
|
|
*/
|
|
#define L2TP_TUNNEL_NAME_MAX 20
|
|
struct l2tp_tunnel {
|
|
int magic; /* Should be L2TP_TUNNEL_MAGIC */
|
|
|
|
unsigned long dead;
|
|
|
|
struct rcu_head rcu;
|
|
spinlock_t hlist_lock; /* write-protection for session_hlist */
|
|
bool acpt_newsess; /* indicates whether this tunnel accepts
|
|
* new sessions. Protected by hlist_lock.
|
|
*/
|
|
struct hlist_head session_hlist[L2TP_HASH_SIZE];
|
|
/* hashed list of sessions, hashed by id */
|
|
u32 tunnel_id;
|
|
u32 peer_tunnel_id;
|
|
int version; /* 2=>L2TPv2, 3=>L2TPv3 */
|
|
|
|
char name[L2TP_TUNNEL_NAME_MAX]; /* for logging */
|
|
enum l2tp_encap_type encap;
|
|
struct l2tp_stats stats;
|
|
|
|
struct list_head list; /* list node on per-namespace list of tunnels */
|
|
struct net *l2tp_net; /* the net we belong to */
|
|
|
|
refcount_t ref_count;
|
|
void (*old_sk_destruct)(struct sock *sk);
|
|
struct sock *sock; /* parent socket */
|
|
int fd; /* parent fd, if tunnel socket was created
|
|
* by userspace
|
|
*/
|
|
|
|
struct work_struct del_work;
|
|
};
|
|
|
|
/* Pseudowire ops callbacks for use with the l2tp genetlink interface */
|
|
struct l2tp_nl_cmd_ops {
|
|
/* The pseudowire session create callback is responsible for creating a session
|
|
* instance for a specific pseudowire type.
|
|
* It must call l2tp_session_create and l2tp_session_register to register the
|
|
* session instance, as well as carry out any pseudowire-specific initialisation.
|
|
* It must return >= 0 on success, or an appropriate negative errno value on failure.
|
|
*/
|
|
int (*session_create)(struct net *net, struct l2tp_tunnel *tunnel,
|
|
u32 session_id, u32 peer_session_id,
|
|
struct l2tp_session_cfg *cfg);
|
|
|
|
/* The pseudowire session delete callback is responsible for initiating the deletion
|
|
* of a session instance.
|
|
* It must call l2tp_session_delete, as well as carry out any pseudowire-specific
|
|
* teardown actions.
|
|
*/
|
|
void (*session_delete)(struct l2tp_session *session);
|
|
};
|
|
|
|
static inline void *l2tp_session_priv(struct l2tp_session *session)
|
|
{
|
|
return &session->priv[0];
|
|
}
|
|
|
|
/* Tunnel and session refcounts */
|
|
void l2tp_tunnel_inc_refcount(struct l2tp_tunnel *tunnel);
|
|
void l2tp_tunnel_dec_refcount(struct l2tp_tunnel *tunnel);
|
|
void l2tp_session_inc_refcount(struct l2tp_session *session);
|
|
void l2tp_session_dec_refcount(struct l2tp_session *session);
|
|
|
|
/* Tunnel and session lookup.
|
|
* These functions take a reference on the instances they return, so
|
|
* the caller must ensure that the reference is dropped appropriately.
|
|
*/
|
|
struct l2tp_tunnel *l2tp_tunnel_get(const struct net *net, u32 tunnel_id);
|
|
struct l2tp_tunnel *l2tp_tunnel_get_nth(const struct net *net, int nth);
|
|
struct l2tp_session *l2tp_tunnel_get_session(struct l2tp_tunnel *tunnel,
|
|
u32 session_id);
|
|
|
|
struct l2tp_session *l2tp_session_get(const struct net *net, u32 session_id);
|
|
struct l2tp_session *l2tp_session_get_nth(struct l2tp_tunnel *tunnel, int nth);
|
|
struct l2tp_session *l2tp_session_get_by_ifname(const struct net *net,
|
|
const char *ifname);
|
|
|
|
/* Tunnel and session lifetime management.
|
|
* Creation of a new instance is a two-step process: create, then register.
|
|
* Destruction is triggered using the *_delete functions, and completes asynchronously.
|
|
*/
|
|
int l2tp_tunnel_create(int fd, int version, u32 tunnel_id,
|
|
u32 peer_tunnel_id, struct l2tp_tunnel_cfg *cfg,
|
|
struct l2tp_tunnel **tunnelp);
|
|
int l2tp_tunnel_register(struct l2tp_tunnel *tunnel, struct net *net,
|
|
struct l2tp_tunnel_cfg *cfg);
|
|
void l2tp_tunnel_delete(struct l2tp_tunnel *tunnel);
|
|
|
|
struct l2tp_session *l2tp_session_create(int priv_size,
|
|
struct l2tp_tunnel *tunnel,
|
|
u32 session_id, u32 peer_session_id,
|
|
struct l2tp_session_cfg *cfg);
|
|
int l2tp_session_register(struct l2tp_session *session,
|
|
struct l2tp_tunnel *tunnel);
|
|
void l2tp_session_delete(struct l2tp_session *session);
|
|
|
|
/* Receive path helpers. If data sequencing is enabled for the session these
|
|
* functions handle queuing and reordering prior to passing packets to the
|
|
* pseudowire code to be passed to userspace.
|
|
*/
|
|
void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb,
|
|
unsigned char *ptr, unsigned char *optr, u16 hdrflags,
|
|
int length);
|
|
int l2tp_udp_encap_recv(struct sock *sk, struct sk_buff *skb);
|
|
|
|
/* Transmit path helpers for sending packets over the tunnel socket. */
|
|
void l2tp_session_set_header_len(struct l2tp_session *session, int version);
|
|
int l2tp_xmit_skb(struct l2tp_session *session, struct sk_buff *skb);
|
|
|
|
/* Pseudowire management.
|
|
* Pseudowires should register with l2tp core on module init, and unregister
|
|
* on module exit.
|
|
*/
|
|
int l2tp_nl_register_ops(enum l2tp_pwtype pw_type, const struct l2tp_nl_cmd_ops *ops);
|
|
void l2tp_nl_unregister_ops(enum l2tp_pwtype pw_type);
|
|
|
|
/* IOCTL helper for IP encap modules. */
|
|
int l2tp_ioctl(struct sock *sk, int cmd, int *karg);
|
|
|
|
/* Extract the tunnel structure from a socket's sk_user_data pointer,
|
|
* validating the tunnel magic feather.
|
|
*/
|
|
struct l2tp_tunnel *l2tp_sk_to_tunnel(struct sock *sk);
|
|
|
|
static inline int l2tp_get_l2specific_len(struct l2tp_session *session)
|
|
{
|
|
switch (session->l2specific_type) {
|
|
case L2TP_L2SPECTYPE_DEFAULT:
|
|
return 4;
|
|
case L2TP_L2SPECTYPE_NONE:
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
static inline u32 l2tp_tunnel_dst_mtu(const struct l2tp_tunnel *tunnel)
|
|
{
|
|
struct dst_entry *dst;
|
|
u32 mtu;
|
|
|
|
dst = sk_dst_get(tunnel->sock);
|
|
if (!dst)
|
|
return 0;
|
|
|
|
mtu = dst_mtu(dst);
|
|
dst_release(dst);
|
|
|
|
return mtu;
|
|
}
|
|
|
|
#ifdef CONFIG_XFRM
|
|
static inline bool l2tp_tunnel_uses_xfrm(const struct l2tp_tunnel *tunnel)
|
|
{
|
|
struct sock *sk = tunnel->sock;
|
|
|
|
return sk && (rcu_access_pointer(sk->sk_policy[0]) ||
|
|
rcu_access_pointer(sk->sk_policy[1]));
|
|
}
|
|
#else
|
|
static inline bool l2tp_tunnel_uses_xfrm(const struct l2tp_tunnel *tunnel)
|
|
{
|
|
return false;
|
|
}
|
|
#endif
|
|
|
|
static inline int l2tp_v3_ensure_opt_in_linear(struct l2tp_session *session, struct sk_buff *skb,
|
|
unsigned char **ptr, unsigned char **optr)
|
|
{
|
|
int opt_len = session->peer_cookie_len + l2tp_get_l2specific_len(session);
|
|
|
|
if (opt_len > 0) {
|
|
int off = *ptr - *optr;
|
|
|
|
if (!pskb_may_pull(skb, off + opt_len))
|
|
return -1;
|
|
|
|
if (skb->data != *optr) {
|
|
*optr = skb->data;
|
|
*ptr = skb->data + off;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#define MODULE_ALIAS_L2TP_PWTYPE(type) \
|
|
MODULE_ALIAS("net-l2tp-type-" __stringify(type))
|
|
|
|
#endif /* _L2TP_CORE_H_ */
|