1 /***************************************************************************** 2 * Linux PPP over L2TP (PPPoX/PPPoL2TP) Sockets 3 * 4 * PPPoX --- Generic PPP encapsulation socket family 5 * PPPoL2TP --- PPP over L2TP (RFC 2661) 6 * 7 * Version: 2.0.0 8 * 9 * Authors: James Chapman (jchapman@katalix.com) 10 * 11 * Based on original work by Martijn van Oosterhout <kleptog@svana.org> 12 * 13 * License: 14 * This program is free software; you can redistribute it and/or 15 * modify it under the terms of the GNU General Public License 16 * as published by the Free Software Foundation; either version 17 * 2 of the License, or (at your option) any later version. 18 * 19 */ 20 21 /* This driver handles only L2TP data frames; control frames are handled by a 22 * userspace application. 23 * 24 * To send data in an L2TP session, userspace opens a PPPoL2TP socket and 25 * attaches it to a bound UDP socket with local tunnel_id / session_id and 26 * peer tunnel_id / session_id set. Data can then be sent or received using 27 * regular socket sendmsg() / recvmsg() calls. Kernel parameters of the socket 28 * can be read or modified using ioctl() or [gs]etsockopt() calls. 29 * 30 * When a PPPoL2TP socket is connected with local and peer session_id values 31 * zero, the socket is treated as a special tunnel management socket. 32 * 33 * Here's example userspace code to create a socket for sending/receiving data 34 * over an L2TP session:- 35 * 36 * struct sockaddr_pppol2tp sax; 37 * int fd; 38 * int session_fd; 39 * 40 * fd = socket(AF_PPPOX, SOCK_DGRAM, PX_PROTO_OL2TP); 41 * 42 * sax.sa_family = AF_PPPOX; 43 * sax.sa_protocol = PX_PROTO_OL2TP; 44 * sax.pppol2tp.fd = tunnel_fd; // bound UDP socket 45 * sax.pppol2tp.addr.sin_addr.s_addr = addr->sin_addr.s_addr; 46 * sax.pppol2tp.addr.sin_port = addr->sin_port; 47 * sax.pppol2tp.addr.sin_family = AF_INET; 48 * sax.pppol2tp.s_tunnel = tunnel_id; 49 * sax.pppol2tp.s_session = session_id; 50 * sax.pppol2tp.d_tunnel = peer_tunnel_id; 51 * sax.pppol2tp.d_session = peer_session_id; 52 * 53 * session_fd = connect(fd, (struct sockaddr *)&sax, sizeof(sax)); 54 * 55 * A pppd plugin that allows PPP traffic to be carried over L2TP using 56 * this driver is available from the OpenL2TP project at 57 * http://openl2tp.sourceforge.net. 58 */ 59 60 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 61 62 #include <linux/module.h> 63 #include <linux/string.h> 64 #include <linux/list.h> 65 #include <linux/uaccess.h> 66 67 #include <linux/kernel.h> 68 #include <linux/spinlock.h> 69 #include <linux/kthread.h> 70 #include <linux/sched.h> 71 #include <linux/slab.h> 72 #include <linux/errno.h> 73 #include <linux/jiffies.h> 74 75 #include <linux/netdevice.h> 76 #include <linux/net.h> 77 #include <linux/inetdevice.h> 78 #include <linux/skbuff.h> 79 #include <linux/init.h> 80 #include <linux/ip.h> 81 #include <linux/udp.h> 82 #include <linux/if_pppox.h> 83 #include <linux/if_pppol2tp.h> 84 #include <net/sock.h> 85 #include <linux/ppp_channel.h> 86 #include <linux/ppp_defs.h> 87 #include <linux/ppp-ioctl.h> 88 #include <linux/file.h> 89 #include <linux/hash.h> 90 #include <linux/sort.h> 91 #include <linux/proc_fs.h> 92 #include <linux/l2tp.h> 93 #include <linux/nsproxy.h> 94 #include <net/net_namespace.h> 95 #include <net/netns/generic.h> 96 #include <net/ip.h> 97 #include <net/udp.h> 98 #include <net/inet_common.h> 99 100 #include <asm/byteorder.h> 101 #include <linux/atomic.h> 102 103 #include "l2tp_core.h" 104 105 #define PPPOL2TP_DRV_VERSION "V2.0" 106 107 /* Space for UDP, L2TP and PPP headers */ 108 #define PPPOL2TP_HEADER_OVERHEAD 40 109 110 /* Number of bytes to build transmit L2TP headers. 111 * Unfortunately the size is different depending on whether sequence numbers 112 * are enabled. 113 */ 114 #define PPPOL2TP_L2TP_HDR_SIZE_SEQ 10 115 #define PPPOL2TP_L2TP_HDR_SIZE_NOSEQ 6 116 117 /* Private data of each session. This data lives at the end of struct 118 * l2tp_session, referenced via session->priv[]. 119 */ 120 struct pppol2tp_session { 121 int owner; /* pid that opened the socket */ 122 123 struct mutex sk_lock; /* Protects .sk */ 124 struct sock __rcu *sk; /* Pointer to the session 125 * PPPoX socket */ 126 struct sock *__sk; /* Copy of .sk, for cleanup */ 127 struct rcu_head rcu; /* For asynchronous release */ 128 }; 129 130 static int pppol2tp_xmit(struct ppp_channel *chan, struct sk_buff *skb); 131 132 static const struct ppp_channel_ops pppol2tp_chan_ops = { 133 .start_xmit = pppol2tp_xmit, 134 }; 135 136 static const struct proto_ops pppol2tp_ops; 137 138 /* Retrieves the pppol2tp socket associated to a session. 139 * A reference is held on the returned socket, so this function must be paired 140 * with sock_put(). 141 */ 142 static struct sock *pppol2tp_session_get_sock(struct l2tp_session *session) 143 { 144 struct pppol2tp_session *ps = l2tp_session_priv(session); 145 struct sock *sk; 146 147 rcu_read_lock(); 148 sk = rcu_dereference(ps->sk); 149 if (sk) 150 sock_hold(sk); 151 rcu_read_unlock(); 152 153 return sk; 154 } 155 156 /* Helpers to obtain tunnel/session contexts from sockets. 157 */ 158 static inline struct l2tp_session *pppol2tp_sock_to_session(struct sock *sk) 159 { 160 struct l2tp_session *session; 161 162 if (sk == NULL) 163 return NULL; 164 165 sock_hold(sk); 166 session = (struct l2tp_session *)(sk->sk_user_data); 167 if (session == NULL) { 168 sock_put(sk); 169 goto out; 170 } 171 172 BUG_ON(session->magic != L2TP_SESSION_MAGIC); 173 174 out: 175 return session; 176 } 177 178 /***************************************************************************** 179 * Receive data handling 180 *****************************************************************************/ 181 182 /* Receive message. This is the recvmsg for the PPPoL2TP socket. 183 */ 184 static int pppol2tp_recvmsg(struct socket *sock, struct msghdr *msg, 185 size_t len, int flags) 186 { 187 int err; 188 struct sk_buff *skb; 189 struct sock *sk = sock->sk; 190 191 err = -EIO; 192 if (sk->sk_state & PPPOX_BOUND) 193 goto end; 194 195 err = 0; 196 skb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT, 197 flags & MSG_DONTWAIT, &err); 198 if (!skb) 199 goto end; 200 201 if (len > skb->len) 202 len = skb->len; 203 else if (len < skb->len) 204 msg->msg_flags |= MSG_TRUNC; 205 206 err = skb_copy_datagram_msg(skb, 0, msg, len); 207 if (likely(err == 0)) 208 err = len; 209 210 kfree_skb(skb); 211 end: 212 return err; 213 } 214 215 static void pppol2tp_recv(struct l2tp_session *session, struct sk_buff *skb, int data_len) 216 { 217 struct pppol2tp_session *ps = l2tp_session_priv(session); 218 struct sock *sk = NULL; 219 220 /* If the socket is bound, send it in to PPP's input queue. Otherwise 221 * queue it on the session socket. 222 */ 223 rcu_read_lock(); 224 sk = rcu_dereference(ps->sk); 225 if (sk == NULL) 226 goto no_sock; 227 228 /* If the first two bytes are 0xFF03, consider that it is the PPP's 229 * Address and Control fields and skip them. The L2TP module has always 230 * worked this way, although, in theory, the use of these fields should 231 * be negociated and handled at the PPP layer. These fields are 232 * constant: 0xFF is the All-Stations Address and 0x03 the Unnumbered 233 * Information command with Poll/Final bit set to zero (RFC 1662). 234 */ 235 if (pskb_may_pull(skb, 2) && skb->data[0] == PPP_ALLSTATIONS && 236 skb->data[1] == PPP_UI) 237 skb_pull(skb, 2); 238 239 /* Decompress protocol field if PFC is enabled */ 240 if ((*skb->data) & 0x1) 241 *(u8 *)skb_push(skb, 1) = 0; 242 243 if (sk->sk_state & PPPOX_BOUND) { 244 struct pppox_sock *po; 245 246 l2tp_dbg(session, L2TP_MSG_DATA, 247 "%s: recv %d byte data frame, passing to ppp\n", 248 session->name, data_len); 249 250 po = pppox_sk(sk); 251 ppp_input(&po->chan, skb); 252 } else { 253 l2tp_dbg(session, L2TP_MSG_DATA, 254 "%s: recv %d byte data frame, passing to L2TP socket\n", 255 session->name, data_len); 256 257 if (sock_queue_rcv_skb(sk, skb) < 0) { 258 atomic_long_inc(&session->stats.rx_errors); 259 kfree_skb(skb); 260 } 261 } 262 rcu_read_unlock(); 263 264 return; 265 266 no_sock: 267 rcu_read_unlock(); 268 l2tp_info(session, L2TP_MSG_DATA, "%s: no socket\n", session->name); 269 kfree_skb(skb); 270 } 271 272 /************************************************************************ 273 * Transmit handling 274 ***********************************************************************/ 275 276 /* This is the sendmsg for the PPPoL2TP pppol2tp_session socket. We come here 277 * when a user application does a sendmsg() on the session socket. L2TP and 278 * PPP headers must be inserted into the user's data. 279 */ 280 static int pppol2tp_sendmsg(struct socket *sock, struct msghdr *m, 281 size_t total_len) 282 { 283 struct sock *sk = sock->sk; 284 struct sk_buff *skb; 285 int error; 286 struct l2tp_session *session; 287 struct l2tp_tunnel *tunnel; 288 int uhlen; 289 290 error = -ENOTCONN; 291 if (sock_flag(sk, SOCK_DEAD) || !(sk->sk_state & PPPOX_CONNECTED)) 292 goto error; 293 294 /* Get session and tunnel contexts */ 295 error = -EBADF; 296 session = pppol2tp_sock_to_session(sk); 297 if (session == NULL) 298 goto error; 299 300 tunnel = session->tunnel; 301 302 uhlen = (tunnel->encap == L2TP_ENCAPTYPE_UDP) ? sizeof(struct udphdr) : 0; 303 304 /* Allocate a socket buffer */ 305 error = -ENOMEM; 306 skb = sock_wmalloc(sk, NET_SKB_PAD + sizeof(struct iphdr) + 307 uhlen + session->hdr_len + 308 2 + total_len, /* 2 bytes for PPP_ALLSTATIONS & PPP_UI */ 309 0, GFP_KERNEL); 310 if (!skb) 311 goto error_put_sess; 312 313 /* Reserve space for headers. */ 314 skb_reserve(skb, NET_SKB_PAD); 315 skb_reset_network_header(skb); 316 skb_reserve(skb, sizeof(struct iphdr)); 317 skb_reset_transport_header(skb); 318 skb_reserve(skb, uhlen); 319 320 /* Add PPP header */ 321 skb->data[0] = PPP_ALLSTATIONS; 322 skb->data[1] = PPP_UI; 323 skb_put(skb, 2); 324 325 /* Copy user data into skb */ 326 error = memcpy_from_msg(skb_put(skb, total_len), m, total_len); 327 if (error < 0) { 328 kfree_skb(skb); 329 goto error_put_sess; 330 } 331 332 local_bh_disable(); 333 l2tp_xmit_skb(session, skb, session->hdr_len); 334 local_bh_enable(); 335 336 sock_put(sk); 337 338 return total_len; 339 340 error_put_sess: 341 sock_put(sk); 342 error: 343 return error; 344 } 345 346 /* Transmit function called by generic PPP driver. Sends PPP frame 347 * over PPPoL2TP socket. 348 * 349 * This is almost the same as pppol2tp_sendmsg(), but rather than 350 * being called with a msghdr from userspace, it is called with a skb 351 * from the kernel. 352 * 353 * The supplied skb from ppp doesn't have enough headroom for the 354 * insertion of L2TP, UDP and IP headers so we need to allocate more 355 * headroom in the skb. This will create a cloned skb. But we must be 356 * careful in the error case because the caller will expect to free 357 * the skb it supplied, not our cloned skb. So we take care to always 358 * leave the original skb unfreed if we return an error. 359 */ 360 static int pppol2tp_xmit(struct ppp_channel *chan, struct sk_buff *skb) 361 { 362 struct sock *sk = (struct sock *) chan->private; 363 struct l2tp_session *session; 364 struct l2tp_tunnel *tunnel; 365 int uhlen, headroom; 366 367 if (sock_flag(sk, SOCK_DEAD) || !(sk->sk_state & PPPOX_CONNECTED)) 368 goto abort; 369 370 /* Get session and tunnel contexts from the socket */ 371 session = pppol2tp_sock_to_session(sk); 372 if (session == NULL) 373 goto abort; 374 375 tunnel = session->tunnel; 376 377 uhlen = (tunnel->encap == L2TP_ENCAPTYPE_UDP) ? sizeof(struct udphdr) : 0; 378 headroom = NET_SKB_PAD + 379 sizeof(struct iphdr) + /* IP header */ 380 uhlen + /* UDP header (if L2TP_ENCAPTYPE_UDP) */ 381 session->hdr_len + /* L2TP header */ 382 2; /* 2 bytes for PPP_ALLSTATIONS & PPP_UI */ 383 if (skb_cow_head(skb, headroom)) 384 goto abort_put_sess; 385 386 /* Setup PPP header */ 387 __skb_push(skb, 2); 388 skb->data[0] = PPP_ALLSTATIONS; 389 skb->data[1] = PPP_UI; 390 391 local_bh_disable(); 392 l2tp_xmit_skb(session, skb, session->hdr_len); 393 local_bh_enable(); 394 395 sock_put(sk); 396 397 return 1; 398 399 abort_put_sess: 400 sock_put(sk); 401 abort: 402 /* Free the original skb */ 403 kfree_skb(skb); 404 return 1; 405 } 406 407 /***************************************************************************** 408 * Session (and tunnel control) socket create/destroy. 409 *****************************************************************************/ 410 411 static void pppol2tp_put_sk(struct rcu_head *head) 412 { 413 struct pppol2tp_session *ps; 414 415 ps = container_of(head, typeof(*ps), rcu); 416 sock_put(ps->__sk); 417 } 418 419 /* Really kill the session socket. (Called from sock_put() if 420 * refcnt == 0.) 421 */ 422 static void pppol2tp_session_destruct(struct sock *sk) 423 { 424 struct l2tp_session *session = sk->sk_user_data; 425 426 skb_queue_purge(&sk->sk_receive_queue); 427 skb_queue_purge(&sk->sk_write_queue); 428 429 if (session) { 430 sk->sk_user_data = NULL; 431 BUG_ON(session->magic != L2TP_SESSION_MAGIC); 432 l2tp_session_dec_refcount(session); 433 } 434 } 435 436 /* Called when the PPPoX socket (session) is closed. 437 */ 438 static int pppol2tp_release(struct socket *sock) 439 { 440 struct sock *sk = sock->sk; 441 struct l2tp_session *session; 442 int error; 443 444 if (!sk) 445 return 0; 446 447 error = -EBADF; 448 lock_sock(sk); 449 if (sock_flag(sk, SOCK_DEAD) != 0) 450 goto error; 451 452 pppox_unbind_sock(sk); 453 454 /* Signal the death of the socket. */ 455 sk->sk_state = PPPOX_DEAD; 456 sock_orphan(sk); 457 sock->sk = NULL; 458 459 session = pppol2tp_sock_to_session(sk); 460 if (session) { 461 struct pppol2tp_session *ps; 462 463 l2tp_session_delete(session); 464 465 ps = l2tp_session_priv(session); 466 mutex_lock(&ps->sk_lock); 467 ps->__sk = rcu_dereference_protected(ps->sk, 468 lockdep_is_held(&ps->sk_lock)); 469 RCU_INIT_POINTER(ps->sk, NULL); 470 mutex_unlock(&ps->sk_lock); 471 call_rcu(&ps->rcu, pppol2tp_put_sk); 472 473 /* Rely on the sock_put() call at the end of the function for 474 * dropping the reference held by pppol2tp_sock_to_session(). 475 * The last reference will be dropped by pppol2tp_put_sk(). 476 */ 477 } 478 479 release_sock(sk); 480 481 /* This will delete the session context via 482 * pppol2tp_session_destruct() if the socket's refcnt drops to 483 * zero. 484 */ 485 sock_put(sk); 486 487 return 0; 488 489 error: 490 release_sock(sk); 491 return error; 492 } 493 494 static struct proto pppol2tp_sk_proto = { 495 .name = "PPPOL2TP", 496 .owner = THIS_MODULE, 497 .obj_size = sizeof(struct pppox_sock), 498 }; 499 500 static int pppol2tp_backlog_recv(struct sock *sk, struct sk_buff *skb) 501 { 502 int rc; 503 504 rc = l2tp_udp_encap_recv(sk, skb); 505 if (rc) 506 kfree_skb(skb); 507 508 return NET_RX_SUCCESS; 509 } 510 511 /* socket() handler. Initialize a new struct sock. 512 */ 513 static int pppol2tp_create(struct net *net, struct socket *sock, int kern) 514 { 515 int error = -ENOMEM; 516 struct sock *sk; 517 518 sk = sk_alloc(net, PF_PPPOX, GFP_KERNEL, &pppol2tp_sk_proto, kern); 519 if (!sk) 520 goto out; 521 522 sock_init_data(sock, sk); 523 524 sock->state = SS_UNCONNECTED; 525 sock->ops = &pppol2tp_ops; 526 527 sk->sk_backlog_rcv = pppol2tp_backlog_recv; 528 sk->sk_protocol = PX_PROTO_OL2TP; 529 sk->sk_family = PF_PPPOX; 530 sk->sk_state = PPPOX_NONE; 531 sk->sk_type = SOCK_STREAM; 532 sk->sk_destruct = pppol2tp_session_destruct; 533 534 error = 0; 535 536 out: 537 return error; 538 } 539 540 static void pppol2tp_show(struct seq_file *m, void *arg) 541 { 542 struct l2tp_session *session = arg; 543 struct sock *sk; 544 545 sk = pppol2tp_session_get_sock(session); 546 if (sk) { 547 struct pppox_sock *po = pppox_sk(sk); 548 549 seq_printf(m, " interface %s\n", ppp_dev_name(&po->chan)); 550 sock_put(sk); 551 } 552 } 553 554 static void pppol2tp_session_init(struct l2tp_session *session) 555 { 556 struct pppol2tp_session *ps; 557 558 session->recv_skb = pppol2tp_recv; 559 if (IS_ENABLED(CONFIG_L2TP_DEBUGFS)) 560 session->show = pppol2tp_show; 561 562 ps = l2tp_session_priv(session); 563 mutex_init(&ps->sk_lock); 564 ps->owner = current->pid; 565 } 566 567 struct l2tp_connect_info { 568 u8 version; 569 int fd; 570 u32 tunnel_id; 571 u32 peer_tunnel_id; 572 u32 session_id; 573 u32 peer_session_id; 574 }; 575 576 static int pppol2tp_sockaddr_get_info(const void *sa, int sa_len, 577 struct l2tp_connect_info *info) 578 { 579 switch (sa_len) { 580 case sizeof(struct sockaddr_pppol2tp): 581 { 582 const struct sockaddr_pppol2tp *sa_v2in4 = sa; 583 584 if (sa_v2in4->sa_protocol != PX_PROTO_OL2TP) 585 return -EINVAL; 586 587 info->version = 2; 588 info->fd = sa_v2in4->pppol2tp.fd; 589 info->tunnel_id = sa_v2in4->pppol2tp.s_tunnel; 590 info->peer_tunnel_id = sa_v2in4->pppol2tp.d_tunnel; 591 info->session_id = sa_v2in4->pppol2tp.s_session; 592 info->peer_session_id = sa_v2in4->pppol2tp.d_session; 593 594 break; 595 } 596 case sizeof(struct sockaddr_pppol2tpv3): 597 { 598 const struct sockaddr_pppol2tpv3 *sa_v3in4 = sa; 599 600 if (sa_v3in4->sa_protocol != PX_PROTO_OL2TP) 601 return -EINVAL; 602 603 info->version = 3; 604 info->fd = sa_v3in4->pppol2tp.fd; 605 info->tunnel_id = sa_v3in4->pppol2tp.s_tunnel; 606 info->peer_tunnel_id = sa_v3in4->pppol2tp.d_tunnel; 607 info->session_id = sa_v3in4->pppol2tp.s_session; 608 info->peer_session_id = sa_v3in4->pppol2tp.d_session; 609 610 break; 611 } 612 case sizeof(struct sockaddr_pppol2tpin6): 613 { 614 const struct sockaddr_pppol2tpin6 *sa_v2in6 = sa; 615 616 if (sa_v2in6->sa_protocol != PX_PROTO_OL2TP) 617 return -EINVAL; 618 619 info->version = 2; 620 info->fd = sa_v2in6->pppol2tp.fd; 621 info->tunnel_id = sa_v2in6->pppol2tp.s_tunnel; 622 info->peer_tunnel_id = sa_v2in6->pppol2tp.d_tunnel; 623 info->session_id = sa_v2in6->pppol2tp.s_session; 624 info->peer_session_id = sa_v2in6->pppol2tp.d_session; 625 626 break; 627 } 628 case sizeof(struct sockaddr_pppol2tpv3in6): 629 { 630 const struct sockaddr_pppol2tpv3in6 *sa_v3in6 = sa; 631 632 if (sa_v3in6->sa_protocol != PX_PROTO_OL2TP) 633 return -EINVAL; 634 635 info->version = 3; 636 info->fd = sa_v3in6->pppol2tp.fd; 637 info->tunnel_id = sa_v3in6->pppol2tp.s_tunnel; 638 info->peer_tunnel_id = sa_v3in6->pppol2tp.d_tunnel; 639 info->session_id = sa_v3in6->pppol2tp.s_session; 640 info->peer_session_id = sa_v3in6->pppol2tp.d_session; 641 642 break; 643 } 644 default: 645 return -EINVAL; 646 } 647 648 return 0; 649 } 650 651 /* Rough estimation of the maximum payload size a tunnel can transmit without 652 * fragmenting at the lower IP layer. Assumes L2TPv2 with sequence 653 * numbers and no IP option. Not quite accurate, but the result is mostly 654 * unused anyway. 655 */ 656 static int pppol2tp_tunnel_mtu(const struct l2tp_tunnel *tunnel) 657 { 658 int mtu; 659 660 mtu = l2tp_tunnel_dst_mtu(tunnel); 661 if (mtu <= PPPOL2TP_HEADER_OVERHEAD) 662 return 1500 - PPPOL2TP_HEADER_OVERHEAD; 663 664 return mtu - PPPOL2TP_HEADER_OVERHEAD; 665 } 666 667 /* connect() handler. Attach a PPPoX socket to a tunnel UDP socket 668 */ 669 static int pppol2tp_connect(struct socket *sock, struct sockaddr *uservaddr, 670 int sockaddr_len, int flags) 671 { 672 struct sock *sk = sock->sk; 673 struct pppox_sock *po = pppox_sk(sk); 674 struct l2tp_session *session = NULL; 675 struct l2tp_connect_info info; 676 struct l2tp_tunnel *tunnel; 677 struct pppol2tp_session *ps; 678 struct l2tp_session_cfg cfg = { 0, }; 679 bool drop_refcnt = false; 680 bool drop_tunnel = false; 681 bool new_session = false; 682 bool new_tunnel = false; 683 int error; 684 685 error = pppol2tp_sockaddr_get_info(uservaddr, sockaddr_len, &info); 686 if (error < 0) 687 return error; 688 689 lock_sock(sk); 690 691 /* Check for already bound sockets */ 692 error = -EBUSY; 693 if (sk->sk_state & PPPOX_CONNECTED) 694 goto end; 695 696 /* We don't supporting rebinding anyway */ 697 error = -EALREADY; 698 if (sk->sk_user_data) 699 goto end; /* socket is already attached */ 700 701 /* Don't bind if tunnel_id is 0 */ 702 error = -EINVAL; 703 if (!info.tunnel_id) 704 goto end; 705 706 tunnel = l2tp_tunnel_get(sock_net(sk), info.tunnel_id); 707 if (tunnel) 708 drop_tunnel = true; 709 710 /* Special case: create tunnel context if session_id and 711 * peer_session_id is 0. Otherwise look up tunnel using supplied 712 * tunnel id. 713 */ 714 if (!info.session_id && !info.peer_session_id) { 715 if (tunnel == NULL) { 716 struct l2tp_tunnel_cfg tcfg = { 717 .encap = L2TP_ENCAPTYPE_UDP, 718 .debug = 0, 719 }; 720 721 /* Prevent l2tp_tunnel_register() from trying to set up 722 * a kernel socket. 723 */ 724 if (info.fd < 0) { 725 error = -EBADF; 726 goto end; 727 } 728 729 error = l2tp_tunnel_create(sock_net(sk), info.fd, 730 info.version, 731 info.tunnel_id, 732 info.peer_tunnel_id, &tcfg, 733 &tunnel); 734 if (error < 0) 735 goto end; 736 737 l2tp_tunnel_inc_refcount(tunnel); 738 error = l2tp_tunnel_register(tunnel, sock_net(sk), 739 &tcfg); 740 if (error < 0) { 741 kfree(tunnel); 742 goto end; 743 } 744 drop_tunnel = true; 745 new_tunnel = true; 746 } 747 } else { 748 /* Error if we can't find the tunnel */ 749 error = -ENOENT; 750 if (tunnel == NULL) 751 goto end; 752 753 /* Error if socket is not prepped */ 754 if (tunnel->sock == NULL) 755 goto end; 756 } 757 758 if (tunnel->peer_tunnel_id == 0) 759 tunnel->peer_tunnel_id = info.peer_tunnel_id; 760 761 session = l2tp_tunnel_get_session(tunnel, info.session_id); 762 if (session) { 763 drop_refcnt = true; 764 765 if (session->pwtype != L2TP_PWTYPE_PPP) { 766 error = -EPROTOTYPE; 767 goto end; 768 } 769 770 ps = l2tp_session_priv(session); 771 772 /* Using a pre-existing session is fine as long as it hasn't 773 * been connected yet. 774 */ 775 mutex_lock(&ps->sk_lock); 776 if (rcu_dereference_protected(ps->sk, 777 lockdep_is_held(&ps->sk_lock)) || 778 ps->__sk) { 779 mutex_unlock(&ps->sk_lock); 780 error = -EEXIST; 781 goto end; 782 } 783 } else { 784 cfg.pw_type = L2TP_PWTYPE_PPP; 785 786 session = l2tp_session_create(sizeof(struct pppol2tp_session), 787 tunnel, info.session_id, 788 info.peer_session_id, &cfg); 789 if (IS_ERR(session)) { 790 error = PTR_ERR(session); 791 goto end; 792 } 793 794 pppol2tp_session_init(session); 795 ps = l2tp_session_priv(session); 796 l2tp_session_inc_refcount(session); 797 798 mutex_lock(&ps->sk_lock); 799 error = l2tp_session_register(session, tunnel); 800 if (error < 0) { 801 mutex_unlock(&ps->sk_lock); 802 kfree(session); 803 goto end; 804 } 805 drop_refcnt = true; 806 new_session = true; 807 } 808 809 /* Special case: if source & dest session_id == 0x0000, this 810 * socket is being created to manage the tunnel. Just set up 811 * the internal context for use by ioctl() and sockopt() 812 * handlers. 813 */ 814 if ((session->session_id == 0) && 815 (session->peer_session_id == 0)) { 816 error = 0; 817 goto out_no_ppp; 818 } 819 820 /* The only header we need to worry about is the L2TP 821 * header. This size is different depending on whether 822 * sequence numbers are enabled for the data channel. 823 */ 824 po->chan.hdrlen = PPPOL2TP_L2TP_HDR_SIZE_NOSEQ; 825 826 po->chan.private = sk; 827 po->chan.ops = &pppol2tp_chan_ops; 828 po->chan.mtu = pppol2tp_tunnel_mtu(tunnel); 829 830 error = ppp_register_net_channel(sock_net(sk), &po->chan); 831 if (error) { 832 mutex_unlock(&ps->sk_lock); 833 goto end; 834 } 835 836 out_no_ppp: 837 /* This is how we get the session context from the socket. */ 838 sk->sk_user_data = session; 839 rcu_assign_pointer(ps->sk, sk); 840 mutex_unlock(&ps->sk_lock); 841 842 /* Keep the reference we've grabbed on the session: sk doesn't expect 843 * the session to disappear. pppol2tp_session_destruct() is responsible 844 * for dropping it. 845 */ 846 drop_refcnt = false; 847 848 sk->sk_state = PPPOX_CONNECTED; 849 l2tp_info(session, L2TP_MSG_CONTROL, "%s: created\n", 850 session->name); 851 852 end: 853 if (error) { 854 if (new_session) 855 l2tp_session_delete(session); 856 if (new_tunnel) 857 l2tp_tunnel_delete(tunnel); 858 } 859 if (drop_refcnt) 860 l2tp_session_dec_refcount(session); 861 if (drop_tunnel) 862 l2tp_tunnel_dec_refcount(tunnel); 863 release_sock(sk); 864 865 return error; 866 } 867 868 #ifdef CONFIG_L2TP_V3 869 870 /* Called when creating sessions via the netlink interface. */ 871 static int pppol2tp_session_create(struct net *net, struct l2tp_tunnel *tunnel, 872 u32 session_id, u32 peer_session_id, 873 struct l2tp_session_cfg *cfg) 874 { 875 int error; 876 struct l2tp_session *session; 877 878 /* Error if tunnel socket is not prepped */ 879 if (!tunnel->sock) { 880 error = -ENOENT; 881 goto err; 882 } 883 884 /* Allocate and initialize a new session context. */ 885 session = l2tp_session_create(sizeof(struct pppol2tp_session), 886 tunnel, session_id, 887 peer_session_id, cfg); 888 if (IS_ERR(session)) { 889 error = PTR_ERR(session); 890 goto err; 891 } 892 893 pppol2tp_session_init(session); 894 895 error = l2tp_session_register(session, tunnel); 896 if (error < 0) 897 goto err_sess; 898 899 return 0; 900 901 err_sess: 902 kfree(session); 903 err: 904 return error; 905 } 906 907 #endif /* CONFIG_L2TP_V3 */ 908 909 /* getname() support. 910 */ 911 static int pppol2tp_getname(struct socket *sock, struct sockaddr *uaddr, 912 int peer) 913 { 914 int len = 0; 915 int error = 0; 916 struct l2tp_session *session; 917 struct l2tp_tunnel *tunnel; 918 struct sock *sk = sock->sk; 919 struct inet_sock *inet; 920 struct pppol2tp_session *pls; 921 922 error = -ENOTCONN; 923 if (sk == NULL) 924 goto end; 925 if (!(sk->sk_state & PPPOX_CONNECTED)) 926 goto end; 927 928 error = -EBADF; 929 session = pppol2tp_sock_to_session(sk); 930 if (session == NULL) 931 goto end; 932 933 pls = l2tp_session_priv(session); 934 tunnel = session->tunnel; 935 936 inet = inet_sk(tunnel->sock); 937 if ((tunnel->version == 2) && (tunnel->sock->sk_family == AF_INET)) { 938 struct sockaddr_pppol2tp sp; 939 len = sizeof(sp); 940 memset(&sp, 0, len); 941 sp.sa_family = AF_PPPOX; 942 sp.sa_protocol = PX_PROTO_OL2TP; 943 sp.pppol2tp.fd = tunnel->fd; 944 sp.pppol2tp.pid = pls->owner; 945 sp.pppol2tp.s_tunnel = tunnel->tunnel_id; 946 sp.pppol2tp.d_tunnel = tunnel->peer_tunnel_id; 947 sp.pppol2tp.s_session = session->session_id; 948 sp.pppol2tp.d_session = session->peer_session_id; 949 sp.pppol2tp.addr.sin_family = AF_INET; 950 sp.pppol2tp.addr.sin_port = inet->inet_dport; 951 sp.pppol2tp.addr.sin_addr.s_addr = inet->inet_daddr; 952 memcpy(uaddr, &sp, len); 953 #if IS_ENABLED(CONFIG_IPV6) 954 } else if ((tunnel->version == 2) && 955 (tunnel->sock->sk_family == AF_INET6)) { 956 struct sockaddr_pppol2tpin6 sp; 957 958 len = sizeof(sp); 959 memset(&sp, 0, len); 960 sp.sa_family = AF_PPPOX; 961 sp.sa_protocol = PX_PROTO_OL2TP; 962 sp.pppol2tp.fd = tunnel->fd; 963 sp.pppol2tp.pid = pls->owner; 964 sp.pppol2tp.s_tunnel = tunnel->tunnel_id; 965 sp.pppol2tp.d_tunnel = tunnel->peer_tunnel_id; 966 sp.pppol2tp.s_session = session->session_id; 967 sp.pppol2tp.d_session = session->peer_session_id; 968 sp.pppol2tp.addr.sin6_family = AF_INET6; 969 sp.pppol2tp.addr.sin6_port = inet->inet_dport; 970 memcpy(&sp.pppol2tp.addr.sin6_addr, &tunnel->sock->sk_v6_daddr, 971 sizeof(tunnel->sock->sk_v6_daddr)); 972 memcpy(uaddr, &sp, len); 973 } else if ((tunnel->version == 3) && 974 (tunnel->sock->sk_family == AF_INET6)) { 975 struct sockaddr_pppol2tpv3in6 sp; 976 977 len = sizeof(sp); 978 memset(&sp, 0, len); 979 sp.sa_family = AF_PPPOX; 980 sp.sa_protocol = PX_PROTO_OL2TP; 981 sp.pppol2tp.fd = tunnel->fd; 982 sp.pppol2tp.pid = pls->owner; 983 sp.pppol2tp.s_tunnel = tunnel->tunnel_id; 984 sp.pppol2tp.d_tunnel = tunnel->peer_tunnel_id; 985 sp.pppol2tp.s_session = session->session_id; 986 sp.pppol2tp.d_session = session->peer_session_id; 987 sp.pppol2tp.addr.sin6_family = AF_INET6; 988 sp.pppol2tp.addr.sin6_port = inet->inet_dport; 989 memcpy(&sp.pppol2tp.addr.sin6_addr, &tunnel->sock->sk_v6_daddr, 990 sizeof(tunnel->sock->sk_v6_daddr)); 991 memcpy(uaddr, &sp, len); 992 #endif 993 } else if (tunnel->version == 3) { 994 struct sockaddr_pppol2tpv3 sp; 995 len = sizeof(sp); 996 memset(&sp, 0, len); 997 sp.sa_family = AF_PPPOX; 998 sp.sa_protocol = PX_PROTO_OL2TP; 999 sp.pppol2tp.fd = tunnel->fd; 1000 sp.pppol2tp.pid = pls->owner; 1001 sp.pppol2tp.s_tunnel = tunnel->tunnel_id; 1002 sp.pppol2tp.d_tunnel = tunnel->peer_tunnel_id; 1003 sp.pppol2tp.s_session = session->session_id; 1004 sp.pppol2tp.d_session = session->peer_session_id; 1005 sp.pppol2tp.addr.sin_family = AF_INET; 1006 sp.pppol2tp.addr.sin_port = inet->inet_dport; 1007 sp.pppol2tp.addr.sin_addr.s_addr = inet->inet_daddr; 1008 memcpy(uaddr, &sp, len); 1009 } 1010 1011 error = len; 1012 1013 sock_put(sk); 1014 end: 1015 return error; 1016 } 1017 1018 /**************************************************************************** 1019 * ioctl() handlers. 1020 * 1021 * The PPPoX socket is created for L2TP sessions: tunnels have their own UDP 1022 * sockets. However, in order to control kernel tunnel features, we allow 1023 * userspace to create a special "tunnel" PPPoX socket which is used for 1024 * control only. Tunnel PPPoX sockets have session_id == 0 and simply allow 1025 * the user application to issue L2TP setsockopt(), getsockopt() and ioctl() 1026 * calls. 1027 ****************************************************************************/ 1028 1029 static void pppol2tp_copy_stats(struct pppol2tp_ioc_stats *dest, 1030 const struct l2tp_stats *stats) 1031 { 1032 memset(dest, 0, sizeof(*dest)); 1033 1034 dest->tx_packets = atomic_long_read(&stats->tx_packets); 1035 dest->tx_bytes = atomic_long_read(&stats->tx_bytes); 1036 dest->tx_errors = atomic_long_read(&stats->tx_errors); 1037 dest->rx_packets = atomic_long_read(&stats->rx_packets); 1038 dest->rx_bytes = atomic_long_read(&stats->rx_bytes); 1039 dest->rx_seq_discards = atomic_long_read(&stats->rx_seq_discards); 1040 dest->rx_oos_packets = atomic_long_read(&stats->rx_oos_packets); 1041 dest->rx_errors = atomic_long_read(&stats->rx_errors); 1042 } 1043 1044 static int pppol2tp_tunnel_copy_stats(struct pppol2tp_ioc_stats *stats, 1045 struct l2tp_tunnel *tunnel) 1046 { 1047 struct l2tp_session *session; 1048 1049 if (!stats->session_id) { 1050 pppol2tp_copy_stats(stats, &tunnel->stats); 1051 return 0; 1052 } 1053 1054 /* If session_id is set, search the corresponding session in the 1055 * context of this tunnel and record the session's statistics. 1056 */ 1057 session = l2tp_tunnel_get_session(tunnel, stats->session_id); 1058 if (!session) 1059 return -EBADR; 1060 1061 if (session->pwtype != L2TP_PWTYPE_PPP) { 1062 l2tp_session_dec_refcount(session); 1063 return -EBADR; 1064 } 1065 1066 pppol2tp_copy_stats(stats, &session->stats); 1067 l2tp_session_dec_refcount(session); 1068 1069 return 0; 1070 } 1071 1072 static int pppol2tp_ioctl(struct socket *sock, unsigned int cmd, 1073 unsigned long arg) 1074 { 1075 struct pppol2tp_ioc_stats stats; 1076 struct l2tp_session *session; 1077 int val; 1078 1079 switch (cmd) { 1080 case PPPIOCGMRU: 1081 case PPPIOCGFLAGS: 1082 session = sock->sk->sk_user_data; 1083 if (!session) 1084 return -ENOTCONN; 1085 1086 /* Not defined for tunnels */ 1087 if (!session->session_id && !session->peer_session_id) 1088 return -ENOSYS; 1089 1090 if (put_user(0, (int __user *)arg)) 1091 return -EFAULT; 1092 break; 1093 1094 case PPPIOCSMRU: 1095 case PPPIOCSFLAGS: 1096 session = sock->sk->sk_user_data; 1097 if (!session) 1098 return -ENOTCONN; 1099 1100 /* Not defined for tunnels */ 1101 if (!session->session_id && !session->peer_session_id) 1102 return -ENOSYS; 1103 1104 if (get_user(val, (int __user *)arg)) 1105 return -EFAULT; 1106 break; 1107 1108 case PPPIOCGL2TPSTATS: 1109 session = sock->sk->sk_user_data; 1110 if (!session) 1111 return -ENOTCONN; 1112 1113 /* Session 0 represents the parent tunnel */ 1114 if (!session->session_id && !session->peer_session_id) { 1115 u32 session_id; 1116 int err; 1117 1118 if (copy_from_user(&stats, (void __user *)arg, 1119 sizeof(stats))) 1120 return -EFAULT; 1121 1122 session_id = stats.session_id; 1123 err = pppol2tp_tunnel_copy_stats(&stats, 1124 session->tunnel); 1125 if (err < 0) 1126 return err; 1127 1128 stats.session_id = session_id; 1129 } else { 1130 pppol2tp_copy_stats(&stats, &session->stats); 1131 stats.session_id = session->session_id; 1132 } 1133 stats.tunnel_id = session->tunnel->tunnel_id; 1134 stats.using_ipsec = l2tp_tunnel_uses_xfrm(session->tunnel); 1135 1136 if (copy_to_user((void __user *)arg, &stats, sizeof(stats))) 1137 return -EFAULT; 1138 break; 1139 1140 default: 1141 return -ENOIOCTLCMD; 1142 } 1143 1144 return 0; 1145 } 1146 1147 /***************************************************************************** 1148 * setsockopt() / getsockopt() support. 1149 * 1150 * The PPPoX socket is created for L2TP sessions: tunnels have their own UDP 1151 * sockets. In order to control kernel tunnel features, we allow userspace to 1152 * create a special "tunnel" PPPoX socket which is used for control only. 1153 * Tunnel PPPoX sockets have session_id == 0 and simply allow the user 1154 * application to issue L2TP setsockopt(), getsockopt() and ioctl() calls. 1155 *****************************************************************************/ 1156 1157 /* Tunnel setsockopt() helper. 1158 */ 1159 static int pppol2tp_tunnel_setsockopt(struct sock *sk, 1160 struct l2tp_tunnel *tunnel, 1161 int optname, int val) 1162 { 1163 int err = 0; 1164 1165 switch (optname) { 1166 case PPPOL2TP_SO_DEBUG: 1167 tunnel->debug = val; 1168 l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: set debug=%x\n", 1169 tunnel->name, tunnel->debug); 1170 break; 1171 1172 default: 1173 err = -ENOPROTOOPT; 1174 break; 1175 } 1176 1177 return err; 1178 } 1179 1180 /* Session setsockopt helper. 1181 */ 1182 static int pppol2tp_session_setsockopt(struct sock *sk, 1183 struct l2tp_session *session, 1184 int optname, int val) 1185 { 1186 int err = 0; 1187 1188 switch (optname) { 1189 case PPPOL2TP_SO_RECVSEQ: 1190 if ((val != 0) && (val != 1)) { 1191 err = -EINVAL; 1192 break; 1193 } 1194 session->recv_seq = !!val; 1195 l2tp_info(session, L2TP_MSG_CONTROL, 1196 "%s: set recv_seq=%d\n", 1197 session->name, session->recv_seq); 1198 break; 1199 1200 case PPPOL2TP_SO_SENDSEQ: 1201 if ((val != 0) && (val != 1)) { 1202 err = -EINVAL; 1203 break; 1204 } 1205 session->send_seq = !!val; 1206 { 1207 struct pppox_sock *po = pppox_sk(sk); 1208 1209 po->chan.hdrlen = val ? PPPOL2TP_L2TP_HDR_SIZE_SEQ : 1210 PPPOL2TP_L2TP_HDR_SIZE_NOSEQ; 1211 } 1212 l2tp_session_set_header_len(session, session->tunnel->version); 1213 l2tp_info(session, L2TP_MSG_CONTROL, 1214 "%s: set send_seq=%d\n", 1215 session->name, session->send_seq); 1216 break; 1217 1218 case PPPOL2TP_SO_LNSMODE: 1219 if ((val != 0) && (val != 1)) { 1220 err = -EINVAL; 1221 break; 1222 } 1223 session->lns_mode = !!val; 1224 l2tp_info(session, L2TP_MSG_CONTROL, 1225 "%s: set lns_mode=%d\n", 1226 session->name, session->lns_mode); 1227 break; 1228 1229 case PPPOL2TP_SO_DEBUG: 1230 session->debug = val; 1231 l2tp_info(session, L2TP_MSG_CONTROL, "%s: set debug=%x\n", 1232 session->name, session->debug); 1233 break; 1234 1235 case PPPOL2TP_SO_REORDERTO: 1236 session->reorder_timeout = msecs_to_jiffies(val); 1237 l2tp_info(session, L2TP_MSG_CONTROL, 1238 "%s: set reorder_timeout=%d\n", 1239 session->name, session->reorder_timeout); 1240 break; 1241 1242 default: 1243 err = -ENOPROTOOPT; 1244 break; 1245 } 1246 1247 return err; 1248 } 1249 1250 /* Main setsockopt() entry point. 1251 * Does API checks, then calls either the tunnel or session setsockopt 1252 * handler, according to whether the PPPoL2TP socket is a for a regular 1253 * session or the special tunnel type. 1254 */ 1255 static int pppol2tp_setsockopt(struct socket *sock, int level, int optname, 1256 char __user *optval, unsigned int optlen) 1257 { 1258 struct sock *sk = sock->sk; 1259 struct l2tp_session *session; 1260 struct l2tp_tunnel *tunnel; 1261 int val; 1262 int err; 1263 1264 if (level != SOL_PPPOL2TP) 1265 return -EINVAL; 1266 1267 if (optlen < sizeof(int)) 1268 return -EINVAL; 1269 1270 if (get_user(val, (int __user *)optval)) 1271 return -EFAULT; 1272 1273 err = -ENOTCONN; 1274 if (sk->sk_user_data == NULL) 1275 goto end; 1276 1277 /* Get session context from the socket */ 1278 err = -EBADF; 1279 session = pppol2tp_sock_to_session(sk); 1280 if (session == NULL) 1281 goto end; 1282 1283 /* Special case: if session_id == 0x0000, treat as operation on tunnel 1284 */ 1285 if ((session->session_id == 0) && 1286 (session->peer_session_id == 0)) { 1287 tunnel = session->tunnel; 1288 err = pppol2tp_tunnel_setsockopt(sk, tunnel, optname, val); 1289 } else { 1290 err = pppol2tp_session_setsockopt(sk, session, optname, val); 1291 } 1292 1293 sock_put(sk); 1294 end: 1295 return err; 1296 } 1297 1298 /* Tunnel getsockopt helper. Called with sock locked. 1299 */ 1300 static int pppol2tp_tunnel_getsockopt(struct sock *sk, 1301 struct l2tp_tunnel *tunnel, 1302 int optname, int *val) 1303 { 1304 int err = 0; 1305 1306 switch (optname) { 1307 case PPPOL2TP_SO_DEBUG: 1308 *val = tunnel->debug; 1309 l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: get debug=%x\n", 1310 tunnel->name, tunnel->debug); 1311 break; 1312 1313 default: 1314 err = -ENOPROTOOPT; 1315 break; 1316 } 1317 1318 return err; 1319 } 1320 1321 /* Session getsockopt helper. Called with sock locked. 1322 */ 1323 static int pppol2tp_session_getsockopt(struct sock *sk, 1324 struct l2tp_session *session, 1325 int optname, int *val) 1326 { 1327 int err = 0; 1328 1329 switch (optname) { 1330 case PPPOL2TP_SO_RECVSEQ: 1331 *val = session->recv_seq; 1332 l2tp_info(session, L2TP_MSG_CONTROL, 1333 "%s: get recv_seq=%d\n", session->name, *val); 1334 break; 1335 1336 case PPPOL2TP_SO_SENDSEQ: 1337 *val = session->send_seq; 1338 l2tp_info(session, L2TP_MSG_CONTROL, 1339 "%s: get send_seq=%d\n", session->name, *val); 1340 break; 1341 1342 case PPPOL2TP_SO_LNSMODE: 1343 *val = session->lns_mode; 1344 l2tp_info(session, L2TP_MSG_CONTROL, 1345 "%s: get lns_mode=%d\n", session->name, *val); 1346 break; 1347 1348 case PPPOL2TP_SO_DEBUG: 1349 *val = session->debug; 1350 l2tp_info(session, L2TP_MSG_CONTROL, "%s: get debug=%d\n", 1351 session->name, *val); 1352 break; 1353 1354 case PPPOL2TP_SO_REORDERTO: 1355 *val = (int) jiffies_to_msecs(session->reorder_timeout); 1356 l2tp_info(session, L2TP_MSG_CONTROL, 1357 "%s: get reorder_timeout=%d\n", session->name, *val); 1358 break; 1359 1360 default: 1361 err = -ENOPROTOOPT; 1362 } 1363 1364 return err; 1365 } 1366 1367 /* Main getsockopt() entry point. 1368 * Does API checks, then calls either the tunnel or session getsockopt 1369 * handler, according to whether the PPPoX socket is a for a regular session 1370 * or the special tunnel type. 1371 */ 1372 static int pppol2tp_getsockopt(struct socket *sock, int level, int optname, 1373 char __user *optval, int __user *optlen) 1374 { 1375 struct sock *sk = sock->sk; 1376 struct l2tp_session *session; 1377 struct l2tp_tunnel *tunnel; 1378 int val, len; 1379 int err; 1380 1381 if (level != SOL_PPPOL2TP) 1382 return -EINVAL; 1383 1384 if (get_user(len, optlen)) 1385 return -EFAULT; 1386 1387 len = min_t(unsigned int, len, sizeof(int)); 1388 1389 if (len < 0) 1390 return -EINVAL; 1391 1392 err = -ENOTCONN; 1393 if (sk->sk_user_data == NULL) 1394 goto end; 1395 1396 /* Get the session context */ 1397 err = -EBADF; 1398 session = pppol2tp_sock_to_session(sk); 1399 if (session == NULL) 1400 goto end; 1401 1402 /* Special case: if session_id == 0x0000, treat as operation on tunnel */ 1403 if ((session->session_id == 0) && 1404 (session->peer_session_id == 0)) { 1405 tunnel = session->tunnel; 1406 err = pppol2tp_tunnel_getsockopt(sk, tunnel, optname, &val); 1407 if (err) 1408 goto end_put_sess; 1409 } else { 1410 err = pppol2tp_session_getsockopt(sk, session, optname, &val); 1411 if (err) 1412 goto end_put_sess; 1413 } 1414 1415 err = -EFAULT; 1416 if (put_user(len, optlen)) 1417 goto end_put_sess; 1418 1419 if (copy_to_user((void __user *) optval, &val, len)) 1420 goto end_put_sess; 1421 1422 err = 0; 1423 1424 end_put_sess: 1425 sock_put(sk); 1426 end: 1427 return err; 1428 } 1429 1430 /***************************************************************************** 1431 * /proc filesystem for debug 1432 * Since the original pppol2tp driver provided /proc/net/pppol2tp for 1433 * L2TPv2, we dump only L2TPv2 tunnels and sessions here. 1434 *****************************************************************************/ 1435 1436 static unsigned int pppol2tp_net_id; 1437 1438 #ifdef CONFIG_PROC_FS 1439 1440 struct pppol2tp_seq_data { 1441 struct seq_net_private p; 1442 int tunnel_idx; /* current tunnel */ 1443 int session_idx; /* index of session within current tunnel */ 1444 struct l2tp_tunnel *tunnel; 1445 struct l2tp_session *session; /* NULL means get next tunnel */ 1446 }; 1447 1448 static void pppol2tp_next_tunnel(struct net *net, struct pppol2tp_seq_data *pd) 1449 { 1450 /* Drop reference taken during previous invocation */ 1451 if (pd->tunnel) 1452 l2tp_tunnel_dec_refcount(pd->tunnel); 1453 1454 for (;;) { 1455 pd->tunnel = l2tp_tunnel_get_nth(net, pd->tunnel_idx); 1456 pd->tunnel_idx++; 1457 1458 /* Only accept L2TPv2 tunnels */ 1459 if (!pd->tunnel || pd->tunnel->version == 2) 1460 return; 1461 1462 l2tp_tunnel_dec_refcount(pd->tunnel); 1463 } 1464 } 1465 1466 static void pppol2tp_next_session(struct net *net, struct pppol2tp_seq_data *pd) 1467 { 1468 /* Drop reference taken during previous invocation */ 1469 if (pd->session) 1470 l2tp_session_dec_refcount(pd->session); 1471 1472 pd->session = l2tp_session_get_nth(pd->tunnel, pd->session_idx); 1473 pd->session_idx++; 1474 1475 if (pd->session == NULL) { 1476 pd->session_idx = 0; 1477 pppol2tp_next_tunnel(net, pd); 1478 } 1479 } 1480 1481 static void *pppol2tp_seq_start(struct seq_file *m, loff_t *offs) 1482 { 1483 struct pppol2tp_seq_data *pd = SEQ_START_TOKEN; 1484 loff_t pos = *offs; 1485 struct net *net; 1486 1487 if (!pos) 1488 goto out; 1489 1490 BUG_ON(m->private == NULL); 1491 pd = m->private; 1492 net = seq_file_net(m); 1493 1494 if (pd->tunnel == NULL) 1495 pppol2tp_next_tunnel(net, pd); 1496 else 1497 pppol2tp_next_session(net, pd); 1498 1499 /* NULL tunnel and session indicates end of list */ 1500 if ((pd->tunnel == NULL) && (pd->session == NULL)) 1501 pd = NULL; 1502 1503 out: 1504 return pd; 1505 } 1506 1507 static void *pppol2tp_seq_next(struct seq_file *m, void *v, loff_t *pos) 1508 { 1509 (*pos)++; 1510 return NULL; 1511 } 1512 1513 static void pppol2tp_seq_stop(struct seq_file *p, void *v) 1514 { 1515 struct pppol2tp_seq_data *pd = v; 1516 1517 if (!pd || pd == SEQ_START_TOKEN) 1518 return; 1519 1520 /* Drop reference taken by last invocation of pppol2tp_next_session() 1521 * or pppol2tp_next_tunnel(). 1522 */ 1523 if (pd->session) { 1524 l2tp_session_dec_refcount(pd->session); 1525 pd->session = NULL; 1526 } 1527 if (pd->tunnel) { 1528 l2tp_tunnel_dec_refcount(pd->tunnel); 1529 pd->tunnel = NULL; 1530 } 1531 } 1532 1533 static void pppol2tp_seq_tunnel_show(struct seq_file *m, void *v) 1534 { 1535 struct l2tp_tunnel *tunnel = v; 1536 1537 seq_printf(m, "\nTUNNEL '%s', %c %d\n", 1538 tunnel->name, 1539 (tunnel == tunnel->sock->sk_user_data) ? 'Y' : 'N', 1540 refcount_read(&tunnel->ref_count) - 1); 1541 seq_printf(m, " %08x %ld/%ld/%ld %ld/%ld/%ld\n", 1542 tunnel->debug, 1543 atomic_long_read(&tunnel->stats.tx_packets), 1544 atomic_long_read(&tunnel->stats.tx_bytes), 1545 atomic_long_read(&tunnel->stats.tx_errors), 1546 atomic_long_read(&tunnel->stats.rx_packets), 1547 atomic_long_read(&tunnel->stats.rx_bytes), 1548 atomic_long_read(&tunnel->stats.rx_errors)); 1549 } 1550 1551 static void pppol2tp_seq_session_show(struct seq_file *m, void *v) 1552 { 1553 struct l2tp_session *session = v; 1554 struct l2tp_tunnel *tunnel = session->tunnel; 1555 unsigned char state; 1556 char user_data_ok; 1557 struct sock *sk; 1558 u32 ip = 0; 1559 u16 port = 0; 1560 1561 if (tunnel->sock) { 1562 struct inet_sock *inet = inet_sk(tunnel->sock); 1563 ip = ntohl(inet->inet_saddr); 1564 port = ntohs(inet->inet_sport); 1565 } 1566 1567 sk = pppol2tp_session_get_sock(session); 1568 if (sk) { 1569 state = sk->sk_state; 1570 user_data_ok = (session == sk->sk_user_data) ? 'Y' : 'N'; 1571 } else { 1572 state = 0; 1573 user_data_ok = 'N'; 1574 } 1575 1576 seq_printf(m, " SESSION '%s' %08X/%d %04X/%04X -> " 1577 "%04X/%04X %d %c\n", 1578 session->name, ip, port, 1579 tunnel->tunnel_id, 1580 session->session_id, 1581 tunnel->peer_tunnel_id, 1582 session->peer_session_id, 1583 state, user_data_ok); 1584 seq_printf(m, " 0/0/%c/%c/%s %08x %u\n", 1585 session->recv_seq ? 'R' : '-', 1586 session->send_seq ? 'S' : '-', 1587 session->lns_mode ? "LNS" : "LAC", 1588 session->debug, 1589 jiffies_to_msecs(session->reorder_timeout)); 1590 seq_printf(m, " %hu/%hu %ld/%ld/%ld %ld/%ld/%ld\n", 1591 session->nr, session->ns, 1592 atomic_long_read(&session->stats.tx_packets), 1593 atomic_long_read(&session->stats.tx_bytes), 1594 atomic_long_read(&session->stats.tx_errors), 1595 atomic_long_read(&session->stats.rx_packets), 1596 atomic_long_read(&session->stats.rx_bytes), 1597 atomic_long_read(&session->stats.rx_errors)); 1598 1599 if (sk) { 1600 struct pppox_sock *po = pppox_sk(sk); 1601 1602 seq_printf(m, " interface %s\n", ppp_dev_name(&po->chan)); 1603 sock_put(sk); 1604 } 1605 } 1606 1607 static int pppol2tp_seq_show(struct seq_file *m, void *v) 1608 { 1609 struct pppol2tp_seq_data *pd = v; 1610 1611 /* display header on line 1 */ 1612 if (v == SEQ_START_TOKEN) { 1613 seq_puts(m, "PPPoL2TP driver info, " PPPOL2TP_DRV_VERSION "\n"); 1614 seq_puts(m, "TUNNEL name, user-data-ok session-count\n"); 1615 seq_puts(m, " debug tx-pkts/bytes/errs rx-pkts/bytes/errs\n"); 1616 seq_puts(m, " SESSION name, addr/port src-tid/sid " 1617 "dest-tid/sid state user-data-ok\n"); 1618 seq_puts(m, " mtu/mru/rcvseq/sendseq/lns debug reorderto\n"); 1619 seq_puts(m, " nr/ns tx-pkts/bytes/errs rx-pkts/bytes/errs\n"); 1620 goto out; 1621 } 1622 1623 if (!pd->session) 1624 pppol2tp_seq_tunnel_show(m, pd->tunnel); 1625 else 1626 pppol2tp_seq_session_show(m, pd->session); 1627 1628 out: 1629 return 0; 1630 } 1631 1632 static const struct seq_operations pppol2tp_seq_ops = { 1633 .start = pppol2tp_seq_start, 1634 .next = pppol2tp_seq_next, 1635 .stop = pppol2tp_seq_stop, 1636 .show = pppol2tp_seq_show, 1637 }; 1638 #endif /* CONFIG_PROC_FS */ 1639 1640 /***************************************************************************** 1641 * Network namespace 1642 *****************************************************************************/ 1643 1644 static __net_init int pppol2tp_init_net(struct net *net) 1645 { 1646 struct proc_dir_entry *pde; 1647 int err = 0; 1648 1649 pde = proc_create_net("pppol2tp", 0444, net->proc_net, 1650 &pppol2tp_seq_ops, sizeof(struct pppol2tp_seq_data)); 1651 if (!pde) { 1652 err = -ENOMEM; 1653 goto out; 1654 } 1655 1656 out: 1657 return err; 1658 } 1659 1660 static __net_exit void pppol2tp_exit_net(struct net *net) 1661 { 1662 remove_proc_entry("pppol2tp", net->proc_net); 1663 } 1664 1665 static struct pernet_operations pppol2tp_net_ops = { 1666 .init = pppol2tp_init_net, 1667 .exit = pppol2tp_exit_net, 1668 .id = &pppol2tp_net_id, 1669 }; 1670 1671 /***************************************************************************** 1672 * Init and cleanup 1673 *****************************************************************************/ 1674 1675 static const struct proto_ops pppol2tp_ops = { 1676 .family = AF_PPPOX, 1677 .owner = THIS_MODULE, 1678 .release = pppol2tp_release, 1679 .bind = sock_no_bind, 1680 .connect = pppol2tp_connect, 1681 .socketpair = sock_no_socketpair, 1682 .accept = sock_no_accept, 1683 .getname = pppol2tp_getname, 1684 .poll = datagram_poll, 1685 .listen = sock_no_listen, 1686 .shutdown = sock_no_shutdown, 1687 .setsockopt = pppol2tp_setsockopt, 1688 .getsockopt = pppol2tp_getsockopt, 1689 .sendmsg = pppol2tp_sendmsg, 1690 .recvmsg = pppol2tp_recvmsg, 1691 .mmap = sock_no_mmap, 1692 .ioctl = pppox_ioctl, 1693 }; 1694 1695 static const struct pppox_proto pppol2tp_proto = { 1696 .create = pppol2tp_create, 1697 .ioctl = pppol2tp_ioctl, 1698 .owner = THIS_MODULE, 1699 }; 1700 1701 #ifdef CONFIG_L2TP_V3 1702 1703 static const struct l2tp_nl_cmd_ops pppol2tp_nl_cmd_ops = { 1704 .session_create = pppol2tp_session_create, 1705 .session_delete = l2tp_session_delete, 1706 }; 1707 1708 #endif /* CONFIG_L2TP_V3 */ 1709 1710 static int __init pppol2tp_init(void) 1711 { 1712 int err; 1713 1714 err = register_pernet_device(&pppol2tp_net_ops); 1715 if (err) 1716 goto out; 1717 1718 err = proto_register(&pppol2tp_sk_proto, 0); 1719 if (err) 1720 goto out_unregister_pppol2tp_pernet; 1721 1722 err = register_pppox_proto(PX_PROTO_OL2TP, &pppol2tp_proto); 1723 if (err) 1724 goto out_unregister_pppol2tp_proto; 1725 1726 #ifdef CONFIG_L2TP_V3 1727 err = l2tp_nl_register_ops(L2TP_PWTYPE_PPP, &pppol2tp_nl_cmd_ops); 1728 if (err) 1729 goto out_unregister_pppox; 1730 #endif 1731 1732 pr_info("PPPoL2TP kernel driver, %s\n", PPPOL2TP_DRV_VERSION); 1733 1734 out: 1735 return err; 1736 1737 #ifdef CONFIG_L2TP_V3 1738 out_unregister_pppox: 1739 unregister_pppox_proto(PX_PROTO_OL2TP); 1740 #endif 1741 out_unregister_pppol2tp_proto: 1742 proto_unregister(&pppol2tp_sk_proto); 1743 out_unregister_pppol2tp_pernet: 1744 unregister_pernet_device(&pppol2tp_net_ops); 1745 goto out; 1746 } 1747 1748 static void __exit pppol2tp_exit(void) 1749 { 1750 #ifdef CONFIG_L2TP_V3 1751 l2tp_nl_unregister_ops(L2TP_PWTYPE_PPP); 1752 #endif 1753 unregister_pppox_proto(PX_PROTO_OL2TP); 1754 proto_unregister(&pppol2tp_sk_proto); 1755 unregister_pernet_device(&pppol2tp_net_ops); 1756 } 1757 1758 module_init(pppol2tp_init); 1759 module_exit(pppol2tp_exit); 1760 1761 MODULE_AUTHOR("James Chapman <jchapman@katalix.com>"); 1762 MODULE_DESCRIPTION("PPP over L2TP over UDP"); 1763 MODULE_LICENSE("GPL"); 1764 MODULE_VERSION(PPPOL2TP_DRV_VERSION); 1765 MODULE_ALIAS_NET_PF_PROTO(PF_PPPOX, PX_PROTO_OL2TP); 1766 MODULE_ALIAS_L2TP_PWTYPE(7); 1767