blob: d0653babab923860ac3467bad9a6c918aca0e787 [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001// SPDX-License-Identifier: GPL-2.0-or-later
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/* GTP according to GSM TS 09.60 / 3GPP TS 29.060
3 *
4 * (C) 2012-2014 by sysmocom - s.f.m.c. GmbH
5 * (C) 2016 by Pablo Neira Ayuso <pablo@netfilter.org>
6 *
7 * Author: Harald Welte <hwelte@sysmocom.de>
8 * Pablo Neira Ayuso <pablo@netfilter.org>
9 * Andreas Schultz <aschultz@travelping.com>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000010 */
11
12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
14#include <linux/module.h>
15#include <linux/skbuff.h>
16#include <linux/udp.h>
17#include <linux/rculist.h>
18#include <linux/jhash.h>
19#include <linux/if_tunnel.h>
20#include <linux/net.h>
21#include <linux/file.h>
22#include <linux/gtp.h>
23
24#include <net/net_namespace.h>
25#include <net/protocol.h>
26#include <net/ip.h>
27#include <net/udp.h>
28#include <net/udp_tunnel.h>
29#include <net/icmp.h>
30#include <net/xfrm.h>
31#include <net/genetlink.h>
32#include <net/netns/generic.h>
33#include <net/gtp.h>
34
35/* An active session for the subscriber. */
36struct pdp_ctx {
37 struct hlist_node hlist_tid;
38 struct hlist_node hlist_addr;
39
40 union {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000041 struct {
42 u64 tid;
43 u16 flow;
44 } v0;
45 struct {
46 u32 i_tei;
47 u32 o_tei;
48 } v1;
49 } u;
50 u8 gtp_version;
51 u16 af;
52
53 struct in_addr ms_addr_ip4;
54 struct in_addr peer_addr_ip4;
55
56 struct sock *sk;
57 struct net_device *dev;
58
59 atomic_t tx_seq;
60 struct rcu_head rcu_head;
61};
62
63/* One instance of the GTP device. */
64struct gtp_dev {
65 struct list_head list;
66
67 struct sock *sk0;
68 struct sock *sk1u;
69
70 struct net_device *dev;
71
72 unsigned int role;
73 unsigned int hash_size;
74 struct hlist_head *tid_hash;
75 struct hlist_head *addr_hash;
76};
77
78static unsigned int gtp_net_id __read_mostly;
79
80struct gtp_net {
81 struct list_head gtp_dev_list;
82};
83
84static u32 gtp_h_initval;
85
86static void pdp_context_delete(struct pdp_ctx *pctx);
87
88static inline u32 gtp0_hashfn(u64 tid)
89{
90 u32 *tid32 = (u32 *) &tid;
91 return jhash_2words(tid32[0], tid32[1], gtp_h_initval);
92}
93
94static inline u32 gtp1u_hashfn(u32 tid)
95{
96 return jhash_1word(tid, gtp_h_initval);
97}
98
99static inline u32 ipv4_hashfn(__be32 ip)
100{
101 return jhash_1word((__force u32)ip, gtp_h_initval);
102}
103
104/* Resolve a PDP context structure based on the 64bit TID. */
105static struct pdp_ctx *gtp0_pdp_find(struct gtp_dev *gtp, u64 tid)
106{
107 struct hlist_head *head;
108 struct pdp_ctx *pdp;
109
110 head = &gtp->tid_hash[gtp0_hashfn(tid) % gtp->hash_size];
111
112 hlist_for_each_entry_rcu(pdp, head, hlist_tid) {
113 if (pdp->gtp_version == GTP_V0 &&
114 pdp->u.v0.tid == tid)
115 return pdp;
116 }
117 return NULL;
118}
119
120/* Resolve a PDP context structure based on the 32bit TEI. */
121static struct pdp_ctx *gtp1_pdp_find(struct gtp_dev *gtp, u32 tid)
122{
123 struct hlist_head *head;
124 struct pdp_ctx *pdp;
125
126 head = &gtp->tid_hash[gtp1u_hashfn(tid) % gtp->hash_size];
127
128 hlist_for_each_entry_rcu(pdp, head, hlist_tid) {
129 if (pdp->gtp_version == GTP_V1 &&
130 pdp->u.v1.i_tei == tid)
131 return pdp;
132 }
133 return NULL;
134}
135
136/* Resolve a PDP context based on IPv4 address of MS. */
137static struct pdp_ctx *ipv4_pdp_find(struct gtp_dev *gtp, __be32 ms_addr)
138{
139 struct hlist_head *head;
140 struct pdp_ctx *pdp;
141
142 head = &gtp->addr_hash[ipv4_hashfn(ms_addr) % gtp->hash_size];
143
144 hlist_for_each_entry_rcu(pdp, head, hlist_addr) {
145 if (pdp->af == AF_INET &&
146 pdp->ms_addr_ip4.s_addr == ms_addr)
147 return pdp;
148 }
149
150 return NULL;
151}
152
153static bool gtp_check_ms_ipv4(struct sk_buff *skb, struct pdp_ctx *pctx,
154 unsigned int hdrlen, unsigned int role)
155{
156 struct iphdr *iph;
157
158 if (!pskb_may_pull(skb, hdrlen + sizeof(struct iphdr)))
159 return false;
160
161 iph = (struct iphdr *)(skb->data + hdrlen);
162
163 if (role == GTP_ROLE_SGSN)
164 return iph->daddr == pctx->ms_addr_ip4.s_addr;
165 else
166 return iph->saddr == pctx->ms_addr_ip4.s_addr;
167}
168
169/* Check if the inner IP address in this packet is assigned to any
170 * existing mobile subscriber.
171 */
172static bool gtp_check_ms(struct sk_buff *skb, struct pdp_ctx *pctx,
173 unsigned int hdrlen, unsigned int role)
174{
175 switch (ntohs(skb->protocol)) {
176 case ETH_P_IP:
177 return gtp_check_ms_ipv4(skb, pctx, hdrlen, role);
178 }
179 return false;
180}
181
182static int gtp_rx(struct pdp_ctx *pctx, struct sk_buff *skb,
183 unsigned int hdrlen, unsigned int role)
184{
185 struct pcpu_sw_netstats *stats;
186
187 if (!gtp_check_ms(skb, pctx, hdrlen, role)) {
188 netdev_dbg(pctx->dev, "No PDP ctx for this MS\n");
189 return 1;
190 }
191
192 /* Get rid of the GTP + UDP headers. */
193 if (iptunnel_pull_header(skb, hdrlen, skb->protocol,
194 !net_eq(sock_net(pctx->sk), dev_net(pctx->dev))))
195 return -1;
196
197 netdev_dbg(pctx->dev, "forwarding packet from GGSN to uplink\n");
198
199 /* Now that the UDP and the GTP header have been removed, set up the
200 * new network header. This is required by the upper layer to
201 * calculate the transport header.
202 */
203 skb_reset_network_header(skb);
204
205 skb->dev = pctx->dev;
206
207 stats = this_cpu_ptr(pctx->dev->tstats);
208 u64_stats_update_begin(&stats->syncp);
209 stats->rx_packets++;
210 stats->rx_bytes += skb->len;
211 u64_stats_update_end(&stats->syncp);
212
213 netif_rx(skb);
214 return 0;
215}
216
217/* 1 means pass up to the stack, -1 means drop and 0 means decapsulated. */
218static int gtp0_udp_encap_recv(struct gtp_dev *gtp, struct sk_buff *skb)
219{
220 unsigned int hdrlen = sizeof(struct udphdr) +
221 sizeof(struct gtp0_header);
222 struct gtp0_header *gtp0;
223 struct pdp_ctx *pctx;
224
225 if (!pskb_may_pull(skb, hdrlen))
226 return -1;
227
228 gtp0 = (struct gtp0_header *)(skb->data + sizeof(struct udphdr));
229
230 if ((gtp0->flags >> 5) != GTP_V0)
231 return 1;
232
233 if (gtp0->type != GTP_TPDU)
234 return 1;
235
236 pctx = gtp0_pdp_find(gtp, be64_to_cpu(gtp0->tid));
237 if (!pctx) {
238 netdev_dbg(gtp->dev, "No PDP ctx to decap skb=%p\n", skb);
239 return 1;
240 }
241
242 return gtp_rx(pctx, skb, hdrlen, gtp->role);
243}
244
245static int gtp1u_udp_encap_recv(struct gtp_dev *gtp, struct sk_buff *skb)
246{
247 unsigned int hdrlen = sizeof(struct udphdr) +
248 sizeof(struct gtp1_header);
249 struct gtp1_header *gtp1;
250 struct pdp_ctx *pctx;
251
252 if (!pskb_may_pull(skb, hdrlen))
253 return -1;
254
255 gtp1 = (struct gtp1_header *)(skb->data + sizeof(struct udphdr));
256
257 if ((gtp1->flags >> 5) != GTP_V1)
258 return 1;
259
260 if (gtp1->type != GTP_TPDU)
261 return 1;
262
263 /* From 29.060: "This field shall be present if and only if any one or
264 * more of the S, PN and E flags are set.".
265 *
266 * If any of the bit is set, then the remaining ones also have to be
267 * set.
268 */
269 if (gtp1->flags & GTP1_F_MASK)
270 hdrlen += 4;
271
272 /* Make sure the header is larger enough, including extensions. */
273 if (!pskb_may_pull(skb, hdrlen))
274 return -1;
275
276 gtp1 = (struct gtp1_header *)(skb->data + sizeof(struct udphdr));
277
278 pctx = gtp1_pdp_find(gtp, ntohl(gtp1->tid));
279 if (!pctx) {
280 netdev_dbg(gtp->dev, "No PDP ctx to decap skb=%p\n", skb);
281 return 1;
282 }
283
284 return gtp_rx(pctx, skb, hdrlen, gtp->role);
285}
286
David Brazdil0f672f62019-12-10 10:32:29 +0000287static void __gtp_encap_destroy(struct sock *sk)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000288{
289 struct gtp_dev *gtp;
290
David Brazdil0f672f62019-12-10 10:32:29 +0000291 lock_sock(sk);
292 gtp = sk->sk_user_data;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000293 if (gtp) {
David Brazdil0f672f62019-12-10 10:32:29 +0000294 if (gtp->sk0 == sk)
295 gtp->sk0 = NULL;
296 else
297 gtp->sk1u = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000298 udp_sk(sk)->encap_type = 0;
299 rcu_assign_sk_user_data(sk, NULL);
300 sock_put(sk);
301 }
David Brazdil0f672f62019-12-10 10:32:29 +0000302 release_sock(sk);
303}
304
305static void gtp_encap_destroy(struct sock *sk)
306{
307 rtnl_lock();
308 __gtp_encap_destroy(sk);
309 rtnl_unlock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000310}
311
312static void gtp_encap_disable_sock(struct sock *sk)
313{
314 if (!sk)
315 return;
316
David Brazdil0f672f62019-12-10 10:32:29 +0000317 __gtp_encap_destroy(sk);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000318}
319
320static void gtp_encap_disable(struct gtp_dev *gtp)
321{
322 gtp_encap_disable_sock(gtp->sk0);
323 gtp_encap_disable_sock(gtp->sk1u);
324}
325
326/* UDP encapsulation receive handler. See net/ipv4/udp.c.
327 * Return codes: 0: success, <0: error, >0: pass up to userspace UDP socket.
328 */
329static int gtp_encap_recv(struct sock *sk, struct sk_buff *skb)
330{
331 struct gtp_dev *gtp;
332 int ret = 0;
333
334 gtp = rcu_dereference_sk_user_data(sk);
335 if (!gtp)
336 return 1;
337
338 netdev_dbg(gtp->dev, "encap_recv sk=%p\n", sk);
339
340 switch (udp_sk(sk)->encap_type) {
341 case UDP_ENCAP_GTP0:
342 netdev_dbg(gtp->dev, "received GTP0 packet\n");
343 ret = gtp0_udp_encap_recv(gtp, skb);
344 break;
345 case UDP_ENCAP_GTP1U:
346 netdev_dbg(gtp->dev, "received GTP1U packet\n");
347 ret = gtp1u_udp_encap_recv(gtp, skb);
348 break;
349 default:
350 ret = -1; /* Shouldn't happen. */
351 }
352
353 switch (ret) {
354 case 1:
355 netdev_dbg(gtp->dev, "pass up to the process\n");
356 break;
357 case 0:
358 break;
359 case -1:
360 netdev_dbg(gtp->dev, "GTP packet has been dropped\n");
361 kfree_skb(skb);
362 ret = 0;
363 break;
364 }
365
366 return ret;
367}
368
369static int gtp_dev_init(struct net_device *dev)
370{
371 struct gtp_dev *gtp = netdev_priv(dev);
372
373 gtp->dev = dev;
374
375 dev->tstats = netdev_alloc_pcpu_stats(struct pcpu_sw_netstats);
376 if (!dev->tstats)
377 return -ENOMEM;
378
379 return 0;
380}
381
382static void gtp_dev_uninit(struct net_device *dev)
383{
384 struct gtp_dev *gtp = netdev_priv(dev);
385
386 gtp_encap_disable(gtp);
387 free_percpu(dev->tstats);
388}
389
390static struct rtable *ip4_route_output_gtp(struct flowi4 *fl4,
391 const struct sock *sk,
392 __be32 daddr)
393{
394 memset(fl4, 0, sizeof(*fl4));
395 fl4->flowi4_oif = sk->sk_bound_dev_if;
396 fl4->daddr = daddr;
397 fl4->saddr = inet_sk(sk)->inet_saddr;
398 fl4->flowi4_tos = RT_CONN_FLAGS(sk);
399 fl4->flowi4_proto = sk->sk_protocol;
400
401 return ip_route_output_key(sock_net(sk), fl4);
402}
403
404static inline void gtp0_push_header(struct sk_buff *skb, struct pdp_ctx *pctx)
405{
406 int payload_len = skb->len;
407 struct gtp0_header *gtp0;
408
409 gtp0 = skb_push(skb, sizeof(*gtp0));
410
411 gtp0->flags = 0x1e; /* v0, GTP-non-prime. */
412 gtp0->type = GTP_TPDU;
413 gtp0->length = htons(payload_len);
414 gtp0->seq = htons((atomic_inc_return(&pctx->tx_seq) - 1) % 0xffff);
415 gtp0->flow = htons(pctx->u.v0.flow);
416 gtp0->number = 0xff;
417 gtp0->spare[0] = gtp0->spare[1] = gtp0->spare[2] = 0xff;
418 gtp0->tid = cpu_to_be64(pctx->u.v0.tid);
419}
420
421static inline void gtp1_push_header(struct sk_buff *skb, struct pdp_ctx *pctx)
422{
423 int payload_len = skb->len;
424 struct gtp1_header *gtp1;
425
426 gtp1 = skb_push(skb, sizeof(*gtp1));
427
428 /* Bits 8 7 6 5 4 3 2 1
429 * +--+--+--+--+--+--+--+--+
430 * |version |PT| 0| E| S|PN|
431 * +--+--+--+--+--+--+--+--+
432 * 0 0 1 1 1 0 0 0
433 */
434 gtp1->flags = 0x30; /* v1, GTP-non-prime. */
435 gtp1->type = GTP_TPDU;
436 gtp1->length = htons(payload_len);
437 gtp1->tid = htonl(pctx->u.v1.o_tei);
438
439 /* TODO: Suppport for extension header, sequence number and N-PDU.
440 * Update the length field if any of them is available.
441 */
442}
443
444struct gtp_pktinfo {
445 struct sock *sk;
446 struct iphdr *iph;
447 struct flowi4 fl4;
448 struct rtable *rt;
449 struct pdp_ctx *pctx;
450 struct net_device *dev;
451 __be16 gtph_port;
452};
453
454static void gtp_push_header(struct sk_buff *skb, struct gtp_pktinfo *pktinfo)
455{
456 switch (pktinfo->pctx->gtp_version) {
457 case GTP_V0:
458 pktinfo->gtph_port = htons(GTP0_PORT);
459 gtp0_push_header(skb, pktinfo->pctx);
460 break;
461 case GTP_V1:
462 pktinfo->gtph_port = htons(GTP1U_PORT);
463 gtp1_push_header(skb, pktinfo->pctx);
464 break;
465 }
466}
467
468static inline void gtp_set_pktinfo_ipv4(struct gtp_pktinfo *pktinfo,
469 struct sock *sk, struct iphdr *iph,
470 struct pdp_ctx *pctx, struct rtable *rt,
471 struct flowi4 *fl4,
472 struct net_device *dev)
473{
474 pktinfo->sk = sk;
475 pktinfo->iph = iph;
476 pktinfo->pctx = pctx;
477 pktinfo->rt = rt;
478 pktinfo->fl4 = *fl4;
479 pktinfo->dev = dev;
480}
481
482static int gtp_build_skb_ip4(struct sk_buff *skb, struct net_device *dev,
483 struct gtp_pktinfo *pktinfo)
484{
485 struct gtp_dev *gtp = netdev_priv(dev);
486 struct pdp_ctx *pctx;
487 struct rtable *rt;
488 struct flowi4 fl4;
489 struct iphdr *iph;
490 __be16 df;
491 int mtu;
492
493 /* Read the IP destination address and resolve the PDP context.
494 * Prepend PDP header with TEI/TID from PDP ctx.
495 */
496 iph = ip_hdr(skb);
497 if (gtp->role == GTP_ROLE_SGSN)
498 pctx = ipv4_pdp_find(gtp, iph->saddr);
499 else
500 pctx = ipv4_pdp_find(gtp, iph->daddr);
501
502 if (!pctx) {
503 netdev_dbg(dev, "no PDP ctx found for %pI4, skip\n",
504 &iph->daddr);
505 return -ENOENT;
506 }
507 netdev_dbg(dev, "found PDP context %p\n", pctx);
508
509 rt = ip4_route_output_gtp(&fl4, pctx->sk, pctx->peer_addr_ip4.s_addr);
510 if (IS_ERR(rt)) {
511 netdev_dbg(dev, "no route to SSGN %pI4\n",
512 &pctx->peer_addr_ip4.s_addr);
513 dev->stats.tx_carrier_errors++;
514 goto err;
515 }
516
517 if (rt->dst.dev == dev) {
518 netdev_dbg(dev, "circular route to SSGN %pI4\n",
519 &pctx->peer_addr_ip4.s_addr);
520 dev->stats.collisions++;
521 goto err_rt;
522 }
523
524 skb_dst_drop(skb);
525
526 /* This is similar to tnl_update_pmtu(). */
527 df = iph->frag_off;
528 if (df) {
529 mtu = dst_mtu(&rt->dst) - dev->hard_header_len -
530 sizeof(struct iphdr) - sizeof(struct udphdr);
531 switch (pctx->gtp_version) {
532 case GTP_V0:
533 mtu -= sizeof(struct gtp0_header);
534 break;
535 case GTP_V1:
536 mtu -= sizeof(struct gtp1_header);
537 break;
538 }
539 } else {
540 mtu = dst_mtu(&rt->dst);
541 }
542
Olivier Deprez0e641232021-09-23 10:07:05 +0200543 rt->dst.ops->update_pmtu(&rt->dst, NULL, skb, mtu, false);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000544
545 if (!skb_is_gso(skb) && (iph->frag_off & htons(IP_DF)) &&
546 mtu < ntohs(iph->tot_len)) {
547 netdev_dbg(dev, "packet too big, fragmentation needed\n");
Olivier Deprez0e641232021-09-23 10:07:05 +0200548 icmp_ndo_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED,
549 htonl(mtu));
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000550 goto err_rt;
551 }
552
553 gtp_set_pktinfo_ipv4(pktinfo, pctx->sk, iph, pctx, rt, &fl4, dev);
554 gtp_push_header(skb, pktinfo);
555
556 return 0;
557err_rt:
558 ip_rt_put(rt);
559err:
560 return -EBADMSG;
561}
562
563static netdev_tx_t gtp_dev_xmit(struct sk_buff *skb, struct net_device *dev)
564{
565 unsigned int proto = ntohs(skb->protocol);
566 struct gtp_pktinfo pktinfo;
567 int err;
568
569 /* Ensure there is sufficient headroom. */
570 if (skb_cow_head(skb, dev->needed_headroom))
571 goto tx_err;
572
573 skb_reset_inner_headers(skb);
574
575 /* PDP context lookups in gtp_build_skb_*() need rcu read-side lock. */
576 rcu_read_lock();
577 switch (proto) {
578 case ETH_P_IP:
579 err = gtp_build_skb_ip4(skb, dev, &pktinfo);
580 break;
581 default:
582 err = -EOPNOTSUPP;
583 break;
584 }
585 rcu_read_unlock();
586
587 if (err < 0)
588 goto tx_err;
589
590 switch (proto) {
591 case ETH_P_IP:
592 netdev_dbg(pktinfo.dev, "gtp -> IP src: %pI4 dst: %pI4\n",
593 &pktinfo.iph->saddr, &pktinfo.iph->daddr);
594 udp_tunnel_xmit_skb(pktinfo.rt, pktinfo.sk, skb,
595 pktinfo.fl4.saddr, pktinfo.fl4.daddr,
596 pktinfo.iph->tos,
597 ip4_dst_hoplimit(&pktinfo.rt->dst),
598 0,
599 pktinfo.gtph_port, pktinfo.gtph_port,
600 true, false);
601 break;
602 }
603
604 return NETDEV_TX_OK;
605tx_err:
606 dev->stats.tx_errors++;
607 dev_kfree_skb(skb);
608 return NETDEV_TX_OK;
609}
610
611static const struct net_device_ops gtp_netdev_ops = {
612 .ndo_init = gtp_dev_init,
613 .ndo_uninit = gtp_dev_uninit,
614 .ndo_start_xmit = gtp_dev_xmit,
615 .ndo_get_stats64 = ip_tunnel_get_stats64,
616};
617
618static void gtp_link_setup(struct net_device *dev)
619{
620 dev->netdev_ops = &gtp_netdev_ops;
621 dev->needs_free_netdev = true;
622
623 dev->hard_header_len = 0;
624 dev->addr_len = 0;
625
626 /* Zero header length. */
627 dev->type = ARPHRD_NONE;
628 dev->flags = IFF_POINTOPOINT | IFF_NOARP | IFF_MULTICAST;
629
630 dev->priv_flags |= IFF_NO_QUEUE;
631 dev->features |= NETIF_F_LLTX;
632 netif_keep_dst(dev);
633
634 /* Assume largest header, ie. GTPv0. */
635 dev->needed_headroom = LL_MAX_HEADER +
636 sizeof(struct iphdr) +
637 sizeof(struct udphdr) +
638 sizeof(struct gtp0_header);
639}
640
641static int gtp_hashtable_new(struct gtp_dev *gtp, int hsize);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000642static int gtp_encap_enable(struct gtp_dev *gtp, struct nlattr *data[]);
643
Olivier Deprez0e641232021-09-23 10:07:05 +0200644static void gtp_destructor(struct net_device *dev)
645{
646 struct gtp_dev *gtp = netdev_priv(dev);
647
648 kfree(gtp->addr_hash);
649 kfree(gtp->tid_hash);
650}
651
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000652static int gtp_newlink(struct net *src_net, struct net_device *dev,
653 struct nlattr *tb[], struct nlattr *data[],
654 struct netlink_ext_ack *extack)
655{
656 struct gtp_dev *gtp;
657 struct gtp_net *gn;
658 int hashsize, err;
659
660 if (!data[IFLA_GTP_FD0] && !data[IFLA_GTP_FD1])
661 return -EINVAL;
662
663 gtp = netdev_priv(dev);
664
Olivier Deprez0e641232021-09-23 10:07:05 +0200665 if (!data[IFLA_GTP_PDP_HASHSIZE]) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000666 hashsize = 1024;
Olivier Deprez0e641232021-09-23 10:07:05 +0200667 } else {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000668 hashsize = nla_get_u32(data[IFLA_GTP_PDP_HASHSIZE]);
Olivier Deprez0e641232021-09-23 10:07:05 +0200669 if (!hashsize)
670 hashsize = 1024;
671 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000672
673 err = gtp_hashtable_new(gtp, hashsize);
674 if (err < 0)
Olivier Deprez0e641232021-09-23 10:07:05 +0200675 return err;
676
677 err = gtp_encap_enable(gtp, data);
678 if (err < 0)
679 goto out_hashtable;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000680
681 err = register_netdevice(dev);
682 if (err < 0) {
683 netdev_dbg(dev, "failed to register new netdev %d\n", err);
Olivier Deprez0e641232021-09-23 10:07:05 +0200684 goto out_encap;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000685 }
686
687 gn = net_generic(dev_net(dev), gtp_net_id);
688 list_add_rcu(&gtp->list, &gn->gtp_dev_list);
Olivier Deprez0e641232021-09-23 10:07:05 +0200689 dev->priv_destructor = gtp_destructor;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000690
691 netdev_dbg(dev, "registered new GTP interface\n");
692
693 return 0;
694
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000695out_encap:
696 gtp_encap_disable(gtp);
Olivier Deprez0e641232021-09-23 10:07:05 +0200697out_hashtable:
698 kfree(gtp->addr_hash);
699 kfree(gtp->tid_hash);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000700 return err;
701}
702
703static void gtp_dellink(struct net_device *dev, struct list_head *head)
704{
705 struct gtp_dev *gtp = netdev_priv(dev);
Olivier Deprez0e641232021-09-23 10:07:05 +0200706 struct pdp_ctx *pctx;
707 int i;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000708
Olivier Deprez0e641232021-09-23 10:07:05 +0200709 for (i = 0; i < gtp->hash_size; i++)
710 hlist_for_each_entry_rcu(pctx, &gtp->tid_hash[i], hlist_tid)
711 pdp_context_delete(pctx);
712
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000713 list_del_rcu(&gtp->list);
714 unregister_netdevice_queue(dev, head);
715}
716
717static const struct nla_policy gtp_policy[IFLA_GTP_MAX + 1] = {
718 [IFLA_GTP_FD0] = { .type = NLA_U32 },
719 [IFLA_GTP_FD1] = { .type = NLA_U32 },
720 [IFLA_GTP_PDP_HASHSIZE] = { .type = NLA_U32 },
721 [IFLA_GTP_ROLE] = { .type = NLA_U32 },
722};
723
724static int gtp_validate(struct nlattr *tb[], struct nlattr *data[],
725 struct netlink_ext_ack *extack)
726{
727 if (!data)
728 return -EINVAL;
729
730 return 0;
731}
732
733static size_t gtp_get_size(const struct net_device *dev)
734{
735 return nla_total_size(sizeof(__u32)); /* IFLA_GTP_PDP_HASHSIZE */
736}
737
738static int gtp_fill_info(struct sk_buff *skb, const struct net_device *dev)
739{
740 struct gtp_dev *gtp = netdev_priv(dev);
741
742 if (nla_put_u32(skb, IFLA_GTP_PDP_HASHSIZE, gtp->hash_size))
743 goto nla_put_failure;
744
745 return 0;
746
747nla_put_failure:
748 return -EMSGSIZE;
749}
750
751static struct rtnl_link_ops gtp_link_ops __read_mostly = {
752 .kind = "gtp",
753 .maxtype = IFLA_GTP_MAX,
754 .policy = gtp_policy,
755 .priv_size = sizeof(struct gtp_dev),
756 .setup = gtp_link_setup,
757 .validate = gtp_validate,
758 .newlink = gtp_newlink,
759 .dellink = gtp_dellink,
760 .get_size = gtp_get_size,
761 .fill_info = gtp_fill_info,
762};
763
764static int gtp_hashtable_new(struct gtp_dev *gtp, int hsize)
765{
766 int i;
767
768 gtp->addr_hash = kmalloc_array(hsize, sizeof(struct hlist_head),
Olivier Deprez0e641232021-09-23 10:07:05 +0200769 GFP_KERNEL | __GFP_NOWARN);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000770 if (gtp->addr_hash == NULL)
771 return -ENOMEM;
772
773 gtp->tid_hash = kmalloc_array(hsize, sizeof(struct hlist_head),
Olivier Deprez0e641232021-09-23 10:07:05 +0200774 GFP_KERNEL | __GFP_NOWARN);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000775 if (gtp->tid_hash == NULL)
776 goto err1;
777
778 gtp->hash_size = hsize;
779
780 for (i = 0; i < hsize; i++) {
781 INIT_HLIST_HEAD(&gtp->addr_hash[i]);
782 INIT_HLIST_HEAD(&gtp->tid_hash[i]);
783 }
784 return 0;
785err1:
786 kfree(gtp->addr_hash);
787 return -ENOMEM;
788}
789
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000790static struct sock *gtp_encap_enable_socket(int fd, int type,
791 struct gtp_dev *gtp)
792{
793 struct udp_tunnel_sock_cfg tuncfg = {NULL};
794 struct socket *sock;
795 struct sock *sk;
796 int err;
797
798 pr_debug("enable gtp on %d, %d\n", fd, type);
799
800 sock = sockfd_lookup(fd, &err);
801 if (!sock) {
802 pr_debug("gtp socket fd=%d not found\n", fd);
803 return NULL;
804 }
805
Olivier Deprez0e641232021-09-23 10:07:05 +0200806 sk = sock->sk;
807 if (sk->sk_protocol != IPPROTO_UDP ||
808 sk->sk_type != SOCK_DGRAM ||
809 (sk->sk_family != AF_INET && sk->sk_family != AF_INET6)) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000810 pr_debug("socket fd=%d not UDP\n", fd);
811 sk = ERR_PTR(-EINVAL);
812 goto out_sock;
813 }
814
Olivier Deprez0e641232021-09-23 10:07:05 +0200815 lock_sock(sk);
816 if (sk->sk_user_data) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000817 sk = ERR_PTR(-EBUSY);
Olivier Deprez0e641232021-09-23 10:07:05 +0200818 goto out_rel_sock;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000819 }
820
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000821 sock_hold(sk);
822
823 tuncfg.sk_user_data = gtp;
824 tuncfg.encap_type = type;
825 tuncfg.encap_rcv = gtp_encap_recv;
826 tuncfg.encap_destroy = gtp_encap_destroy;
827
828 setup_udp_tunnel_sock(sock_net(sock->sk), sock, &tuncfg);
829
Olivier Deprez0e641232021-09-23 10:07:05 +0200830out_rel_sock:
David Brazdil0f672f62019-12-10 10:32:29 +0000831 release_sock(sock->sk);
Olivier Deprez0e641232021-09-23 10:07:05 +0200832out_sock:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000833 sockfd_put(sock);
834 return sk;
835}
836
837static int gtp_encap_enable(struct gtp_dev *gtp, struct nlattr *data[])
838{
839 struct sock *sk1u = NULL;
840 struct sock *sk0 = NULL;
841 unsigned int role = GTP_ROLE_GGSN;
842
843 if (data[IFLA_GTP_FD0]) {
844 u32 fd0 = nla_get_u32(data[IFLA_GTP_FD0]);
845
846 sk0 = gtp_encap_enable_socket(fd0, UDP_ENCAP_GTP0, gtp);
847 if (IS_ERR(sk0))
848 return PTR_ERR(sk0);
849 }
850
851 if (data[IFLA_GTP_FD1]) {
852 u32 fd1 = nla_get_u32(data[IFLA_GTP_FD1]);
853
854 sk1u = gtp_encap_enable_socket(fd1, UDP_ENCAP_GTP1U, gtp);
855 if (IS_ERR(sk1u)) {
856 if (sk0)
857 gtp_encap_disable_sock(sk0);
858 return PTR_ERR(sk1u);
859 }
860 }
861
862 if (data[IFLA_GTP_ROLE]) {
863 role = nla_get_u32(data[IFLA_GTP_ROLE]);
David Brazdil0f672f62019-12-10 10:32:29 +0000864 if (role > GTP_ROLE_SGSN) {
865 if (sk0)
866 gtp_encap_disable_sock(sk0);
867 if (sk1u)
868 gtp_encap_disable_sock(sk1u);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000869 return -EINVAL;
David Brazdil0f672f62019-12-10 10:32:29 +0000870 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000871 }
872
873 gtp->sk0 = sk0;
874 gtp->sk1u = sk1u;
875 gtp->role = role;
876
877 return 0;
878}
879
880static struct gtp_dev *gtp_find_dev(struct net *src_net, struct nlattr *nla[])
881{
882 struct gtp_dev *gtp = NULL;
883 struct net_device *dev;
884 struct net *net;
885
886 /* Examine the link attributes and figure out which network namespace
887 * we are talking about.
888 */
889 if (nla[GTPA_NET_NS_FD])
890 net = get_net_ns_by_fd(nla_get_u32(nla[GTPA_NET_NS_FD]));
891 else
892 net = get_net(src_net);
893
894 if (IS_ERR(net))
895 return NULL;
896
897 /* Check if there's an existing gtpX device to configure */
898 dev = dev_get_by_index_rcu(net, nla_get_u32(nla[GTPA_LINK]));
899 if (dev && dev->netdev_ops == &gtp_netdev_ops)
900 gtp = netdev_priv(dev);
901
902 put_net(net);
903 return gtp;
904}
905
906static void ipv4_pdp_fill(struct pdp_ctx *pctx, struct genl_info *info)
907{
908 pctx->gtp_version = nla_get_u32(info->attrs[GTPA_VERSION]);
909 pctx->af = AF_INET;
910 pctx->peer_addr_ip4.s_addr =
911 nla_get_be32(info->attrs[GTPA_PEER_ADDRESS]);
912 pctx->ms_addr_ip4.s_addr =
913 nla_get_be32(info->attrs[GTPA_MS_ADDRESS]);
914
915 switch (pctx->gtp_version) {
916 case GTP_V0:
917 /* According to TS 09.60, sections 7.5.1 and 7.5.2, the flow
918 * label needs to be the same for uplink and downlink packets,
919 * so let's annotate this.
920 */
921 pctx->u.v0.tid = nla_get_u64(info->attrs[GTPA_TID]);
922 pctx->u.v0.flow = nla_get_u16(info->attrs[GTPA_FLOW]);
923 break;
924 case GTP_V1:
925 pctx->u.v1.i_tei = nla_get_u32(info->attrs[GTPA_I_TEI]);
926 pctx->u.v1.o_tei = nla_get_u32(info->attrs[GTPA_O_TEI]);
927 break;
928 default:
929 break;
930 }
931}
932
Olivier Deprez0e641232021-09-23 10:07:05 +0200933static int gtp_pdp_add(struct gtp_dev *gtp, struct sock *sk,
934 struct genl_info *info)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000935{
Olivier Deprez0e641232021-09-23 10:07:05 +0200936 struct pdp_ctx *pctx, *pctx_tid = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000937 struct net_device *dev = gtp->dev;
938 u32 hash_ms, hash_tid = 0;
Olivier Deprez0e641232021-09-23 10:07:05 +0200939 unsigned int version;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000940 bool found = false;
941 __be32 ms_addr;
942
943 ms_addr = nla_get_be32(info->attrs[GTPA_MS_ADDRESS]);
944 hash_ms = ipv4_hashfn(ms_addr) % gtp->hash_size;
Olivier Deprez0e641232021-09-23 10:07:05 +0200945 version = nla_get_u32(info->attrs[GTPA_VERSION]);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000946
Olivier Deprez0e641232021-09-23 10:07:05 +0200947 pctx = ipv4_pdp_find(gtp, ms_addr);
948 if (pctx)
949 found = true;
950 if (version == GTP_V0)
951 pctx_tid = gtp0_pdp_find(gtp,
952 nla_get_u64(info->attrs[GTPA_TID]));
953 else if (version == GTP_V1)
954 pctx_tid = gtp1_pdp_find(gtp,
955 nla_get_u32(info->attrs[GTPA_I_TEI]));
956 if (pctx_tid)
957 found = true;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000958
959 if (found) {
960 if (info->nlhdr->nlmsg_flags & NLM_F_EXCL)
961 return -EEXIST;
962 if (info->nlhdr->nlmsg_flags & NLM_F_REPLACE)
963 return -EOPNOTSUPP;
964
Olivier Deprez0e641232021-09-23 10:07:05 +0200965 if (pctx && pctx_tid)
966 return -EEXIST;
967 if (!pctx)
968 pctx = pctx_tid;
969
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000970 ipv4_pdp_fill(pctx, info);
971
972 if (pctx->gtp_version == GTP_V0)
973 netdev_dbg(dev, "GTPv0-U: update tunnel id = %llx (pdp %p)\n",
974 pctx->u.v0.tid, pctx);
975 else if (pctx->gtp_version == GTP_V1)
976 netdev_dbg(dev, "GTPv1-U: update tunnel id = %x/%x (pdp %p)\n",
977 pctx->u.v1.i_tei, pctx->u.v1.o_tei, pctx);
978
979 return 0;
980
981 }
982
David Brazdil0f672f62019-12-10 10:32:29 +0000983 pctx = kmalloc(sizeof(*pctx), GFP_ATOMIC);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000984 if (pctx == NULL)
985 return -ENOMEM;
986
987 sock_hold(sk);
988 pctx->sk = sk;
989 pctx->dev = gtp->dev;
990 ipv4_pdp_fill(pctx, info);
991 atomic_set(&pctx->tx_seq, 0);
992
993 switch (pctx->gtp_version) {
994 case GTP_V0:
995 /* TS 09.60: "The flow label identifies unambiguously a GTP
996 * flow.". We use the tid for this instead, I cannot find a
997 * situation in which this doesn't unambiguosly identify the
998 * PDP context.
999 */
1000 hash_tid = gtp0_hashfn(pctx->u.v0.tid) % gtp->hash_size;
1001 break;
1002 case GTP_V1:
1003 hash_tid = gtp1u_hashfn(pctx->u.v1.i_tei) % gtp->hash_size;
1004 break;
1005 }
1006
1007 hlist_add_head_rcu(&pctx->hlist_addr, &gtp->addr_hash[hash_ms]);
1008 hlist_add_head_rcu(&pctx->hlist_tid, &gtp->tid_hash[hash_tid]);
1009
1010 switch (pctx->gtp_version) {
1011 case GTP_V0:
1012 netdev_dbg(dev, "GTPv0-U: new PDP ctx id=%llx ssgn=%pI4 ms=%pI4 (pdp=%p)\n",
1013 pctx->u.v0.tid, &pctx->peer_addr_ip4,
1014 &pctx->ms_addr_ip4, pctx);
1015 break;
1016 case GTP_V1:
1017 netdev_dbg(dev, "GTPv1-U: new PDP ctx id=%x/%x ssgn=%pI4 ms=%pI4 (pdp=%p)\n",
1018 pctx->u.v1.i_tei, pctx->u.v1.o_tei,
1019 &pctx->peer_addr_ip4, &pctx->ms_addr_ip4, pctx);
1020 break;
1021 }
1022
1023 return 0;
1024}
1025
1026static void pdp_context_free(struct rcu_head *head)
1027{
1028 struct pdp_ctx *pctx = container_of(head, struct pdp_ctx, rcu_head);
1029
1030 sock_put(pctx->sk);
1031 kfree(pctx);
1032}
1033
1034static void pdp_context_delete(struct pdp_ctx *pctx)
1035{
1036 hlist_del_rcu(&pctx->hlist_tid);
1037 hlist_del_rcu(&pctx->hlist_addr);
1038 call_rcu(&pctx->rcu_head, pdp_context_free);
1039}
1040
1041static int gtp_genl_new_pdp(struct sk_buff *skb, struct genl_info *info)
1042{
1043 unsigned int version;
1044 struct gtp_dev *gtp;
1045 struct sock *sk;
1046 int err;
1047
1048 if (!info->attrs[GTPA_VERSION] ||
1049 !info->attrs[GTPA_LINK] ||
1050 !info->attrs[GTPA_PEER_ADDRESS] ||
1051 !info->attrs[GTPA_MS_ADDRESS])
1052 return -EINVAL;
1053
1054 version = nla_get_u32(info->attrs[GTPA_VERSION]);
1055
1056 switch (version) {
1057 case GTP_V0:
1058 if (!info->attrs[GTPA_TID] ||
1059 !info->attrs[GTPA_FLOW])
1060 return -EINVAL;
1061 break;
1062 case GTP_V1:
1063 if (!info->attrs[GTPA_I_TEI] ||
1064 !info->attrs[GTPA_O_TEI])
1065 return -EINVAL;
1066 break;
1067
1068 default:
1069 return -EINVAL;
1070 }
1071
David Brazdil0f672f62019-12-10 10:32:29 +00001072 rtnl_lock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001073 rcu_read_lock();
1074
1075 gtp = gtp_find_dev(sock_net(skb->sk), info->attrs);
1076 if (!gtp) {
1077 err = -ENODEV;
1078 goto out_unlock;
1079 }
1080
1081 if (version == GTP_V0)
1082 sk = gtp->sk0;
1083 else if (version == GTP_V1)
1084 sk = gtp->sk1u;
1085 else
1086 sk = NULL;
1087
1088 if (!sk) {
1089 err = -ENODEV;
1090 goto out_unlock;
1091 }
1092
Olivier Deprez0e641232021-09-23 10:07:05 +02001093 err = gtp_pdp_add(gtp, sk, info);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001094
1095out_unlock:
1096 rcu_read_unlock();
David Brazdil0f672f62019-12-10 10:32:29 +00001097 rtnl_unlock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001098 return err;
1099}
1100
1101static struct pdp_ctx *gtp_find_pdp_by_link(struct net *net,
1102 struct nlattr *nla[])
1103{
1104 struct gtp_dev *gtp;
1105
1106 gtp = gtp_find_dev(net, nla);
1107 if (!gtp)
1108 return ERR_PTR(-ENODEV);
1109
1110 if (nla[GTPA_MS_ADDRESS]) {
1111 __be32 ip = nla_get_be32(nla[GTPA_MS_ADDRESS]);
1112
1113 return ipv4_pdp_find(gtp, ip);
1114 } else if (nla[GTPA_VERSION]) {
1115 u32 gtp_version = nla_get_u32(nla[GTPA_VERSION]);
1116
1117 if (gtp_version == GTP_V0 && nla[GTPA_TID])
1118 return gtp0_pdp_find(gtp, nla_get_u64(nla[GTPA_TID]));
1119 else if (gtp_version == GTP_V1 && nla[GTPA_I_TEI])
1120 return gtp1_pdp_find(gtp, nla_get_u32(nla[GTPA_I_TEI]));
1121 }
1122
1123 return ERR_PTR(-EINVAL);
1124}
1125
1126static struct pdp_ctx *gtp_find_pdp(struct net *net, struct nlattr *nla[])
1127{
1128 struct pdp_ctx *pctx;
1129
1130 if (nla[GTPA_LINK])
1131 pctx = gtp_find_pdp_by_link(net, nla);
1132 else
1133 pctx = ERR_PTR(-EINVAL);
1134
1135 if (!pctx)
1136 pctx = ERR_PTR(-ENOENT);
1137
1138 return pctx;
1139}
1140
1141static int gtp_genl_del_pdp(struct sk_buff *skb, struct genl_info *info)
1142{
1143 struct pdp_ctx *pctx;
1144 int err = 0;
1145
1146 if (!info->attrs[GTPA_VERSION])
1147 return -EINVAL;
1148
1149 rcu_read_lock();
1150
1151 pctx = gtp_find_pdp(sock_net(skb->sk), info->attrs);
1152 if (IS_ERR(pctx)) {
1153 err = PTR_ERR(pctx);
1154 goto out_unlock;
1155 }
1156
1157 if (pctx->gtp_version == GTP_V0)
1158 netdev_dbg(pctx->dev, "GTPv0-U: deleting tunnel id = %llx (pdp %p)\n",
1159 pctx->u.v0.tid, pctx);
1160 else if (pctx->gtp_version == GTP_V1)
1161 netdev_dbg(pctx->dev, "GTPv1-U: deleting tunnel id = %x/%x (pdp %p)\n",
1162 pctx->u.v1.i_tei, pctx->u.v1.o_tei, pctx);
1163
1164 pdp_context_delete(pctx);
1165
1166out_unlock:
1167 rcu_read_unlock();
1168 return err;
1169}
1170
1171static struct genl_family gtp_genl_family;
1172
1173static int gtp_genl_fill_info(struct sk_buff *skb, u32 snd_portid, u32 snd_seq,
Olivier Deprez0e641232021-09-23 10:07:05 +02001174 int flags, u32 type, struct pdp_ctx *pctx)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001175{
1176 void *genlh;
1177
Olivier Deprez0e641232021-09-23 10:07:05 +02001178 genlh = genlmsg_put(skb, snd_portid, snd_seq, &gtp_genl_family, flags,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001179 type);
1180 if (genlh == NULL)
1181 goto nlmsg_failure;
1182
1183 if (nla_put_u32(skb, GTPA_VERSION, pctx->gtp_version) ||
Olivier Deprez0e641232021-09-23 10:07:05 +02001184 nla_put_u32(skb, GTPA_LINK, pctx->dev->ifindex) ||
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001185 nla_put_be32(skb, GTPA_PEER_ADDRESS, pctx->peer_addr_ip4.s_addr) ||
1186 nla_put_be32(skb, GTPA_MS_ADDRESS, pctx->ms_addr_ip4.s_addr))
1187 goto nla_put_failure;
1188
1189 switch (pctx->gtp_version) {
1190 case GTP_V0:
1191 if (nla_put_u64_64bit(skb, GTPA_TID, pctx->u.v0.tid, GTPA_PAD) ||
1192 nla_put_u16(skb, GTPA_FLOW, pctx->u.v0.flow))
1193 goto nla_put_failure;
1194 break;
1195 case GTP_V1:
1196 if (nla_put_u32(skb, GTPA_I_TEI, pctx->u.v1.i_tei) ||
1197 nla_put_u32(skb, GTPA_O_TEI, pctx->u.v1.o_tei))
1198 goto nla_put_failure;
1199 break;
1200 }
1201 genlmsg_end(skb, genlh);
1202 return 0;
1203
1204nlmsg_failure:
1205nla_put_failure:
1206 genlmsg_cancel(skb, genlh);
1207 return -EMSGSIZE;
1208}
1209
1210static int gtp_genl_get_pdp(struct sk_buff *skb, struct genl_info *info)
1211{
1212 struct pdp_ctx *pctx = NULL;
1213 struct sk_buff *skb2;
1214 int err;
1215
1216 if (!info->attrs[GTPA_VERSION])
1217 return -EINVAL;
1218
1219 rcu_read_lock();
1220
1221 pctx = gtp_find_pdp(sock_net(skb->sk), info->attrs);
1222 if (IS_ERR(pctx)) {
1223 err = PTR_ERR(pctx);
1224 goto err_unlock;
1225 }
1226
1227 skb2 = genlmsg_new(NLMSG_GOODSIZE, GFP_ATOMIC);
1228 if (skb2 == NULL) {
1229 err = -ENOMEM;
1230 goto err_unlock;
1231 }
1232
Olivier Deprez0e641232021-09-23 10:07:05 +02001233 err = gtp_genl_fill_info(skb2, NETLINK_CB(skb).portid, info->snd_seq,
1234 0, info->nlhdr->nlmsg_type, pctx);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001235 if (err < 0)
1236 goto err_unlock_free;
1237
1238 rcu_read_unlock();
1239 return genlmsg_unicast(genl_info_net(info), skb2, info->snd_portid);
1240
1241err_unlock_free:
1242 kfree_skb(skb2);
1243err_unlock:
1244 rcu_read_unlock();
1245 return err;
1246}
1247
1248static int gtp_genl_dump_pdp(struct sk_buff *skb,
1249 struct netlink_callback *cb)
1250{
1251 struct gtp_dev *last_gtp = (struct gtp_dev *)cb->args[2], *gtp;
Olivier Deprez0e641232021-09-23 10:07:05 +02001252 int i, j, bucket = cb->args[0], skip = cb->args[1];
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001253 struct net *net = sock_net(skb->sk);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001254 struct pdp_ctx *pctx;
Olivier Deprez0e641232021-09-23 10:07:05 +02001255 struct gtp_net *gn;
1256
1257 gn = net_generic(net, gtp_net_id);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001258
1259 if (cb->args[4])
1260 return 0;
1261
Olivier Deprez0e641232021-09-23 10:07:05 +02001262 rcu_read_lock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001263 list_for_each_entry_rcu(gtp, &gn->gtp_dev_list, list) {
1264 if (last_gtp && last_gtp != gtp)
1265 continue;
1266 else
1267 last_gtp = NULL;
1268
Olivier Deprez0e641232021-09-23 10:07:05 +02001269 for (i = bucket; i < gtp->hash_size; i++) {
1270 j = 0;
1271 hlist_for_each_entry_rcu(pctx, &gtp->tid_hash[i],
1272 hlist_tid) {
1273 if (j >= skip &&
1274 gtp_genl_fill_info(skb,
1275 NETLINK_CB(cb->skb).portid,
1276 cb->nlh->nlmsg_seq,
1277 NLM_F_MULTI,
1278 cb->nlh->nlmsg_type, pctx)) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001279 cb->args[0] = i;
Olivier Deprez0e641232021-09-23 10:07:05 +02001280 cb->args[1] = j;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001281 cb->args[2] = (unsigned long)gtp;
1282 goto out;
1283 }
Olivier Deprez0e641232021-09-23 10:07:05 +02001284 j++;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001285 }
Olivier Deprez0e641232021-09-23 10:07:05 +02001286 skip = 0;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001287 }
Olivier Deprez0e641232021-09-23 10:07:05 +02001288 bucket = 0;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001289 }
1290 cb->args[4] = 1;
1291out:
Olivier Deprez0e641232021-09-23 10:07:05 +02001292 rcu_read_unlock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001293 return skb->len;
1294}
1295
1296static const struct nla_policy gtp_genl_policy[GTPA_MAX + 1] = {
1297 [GTPA_LINK] = { .type = NLA_U32, },
1298 [GTPA_VERSION] = { .type = NLA_U32, },
1299 [GTPA_TID] = { .type = NLA_U64, },
1300 [GTPA_PEER_ADDRESS] = { .type = NLA_U32, },
1301 [GTPA_MS_ADDRESS] = { .type = NLA_U32, },
1302 [GTPA_FLOW] = { .type = NLA_U16, },
1303 [GTPA_NET_NS_FD] = { .type = NLA_U32, },
1304 [GTPA_I_TEI] = { .type = NLA_U32, },
1305 [GTPA_O_TEI] = { .type = NLA_U32, },
1306};
1307
1308static const struct genl_ops gtp_genl_ops[] = {
1309 {
1310 .cmd = GTP_CMD_NEWPDP,
David Brazdil0f672f62019-12-10 10:32:29 +00001311 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001312 .doit = gtp_genl_new_pdp,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001313 .flags = GENL_ADMIN_PERM,
1314 },
1315 {
1316 .cmd = GTP_CMD_DELPDP,
David Brazdil0f672f62019-12-10 10:32:29 +00001317 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001318 .doit = gtp_genl_del_pdp,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001319 .flags = GENL_ADMIN_PERM,
1320 },
1321 {
1322 .cmd = GTP_CMD_GETPDP,
David Brazdil0f672f62019-12-10 10:32:29 +00001323 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001324 .doit = gtp_genl_get_pdp,
1325 .dumpit = gtp_genl_dump_pdp,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001326 .flags = GENL_ADMIN_PERM,
1327 },
1328};
1329
1330static struct genl_family gtp_genl_family __ro_after_init = {
1331 .name = "gtp",
1332 .version = 0,
1333 .hdrsize = 0,
1334 .maxattr = GTPA_MAX,
David Brazdil0f672f62019-12-10 10:32:29 +00001335 .policy = gtp_genl_policy,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001336 .netnsok = true,
1337 .module = THIS_MODULE,
1338 .ops = gtp_genl_ops,
1339 .n_ops = ARRAY_SIZE(gtp_genl_ops),
1340};
1341
1342static int __net_init gtp_net_init(struct net *net)
1343{
1344 struct gtp_net *gn = net_generic(net, gtp_net_id);
1345
1346 INIT_LIST_HEAD(&gn->gtp_dev_list);
1347 return 0;
1348}
1349
1350static void __net_exit gtp_net_exit(struct net *net)
1351{
1352 struct gtp_net *gn = net_generic(net, gtp_net_id);
1353 struct gtp_dev *gtp;
1354 LIST_HEAD(list);
1355
1356 rtnl_lock();
1357 list_for_each_entry(gtp, &gn->gtp_dev_list, list)
1358 gtp_dellink(gtp->dev, &list);
1359
1360 unregister_netdevice_many(&list);
1361 rtnl_unlock();
1362}
1363
1364static struct pernet_operations gtp_net_ops = {
1365 .init = gtp_net_init,
1366 .exit = gtp_net_exit,
1367 .id = &gtp_net_id,
1368 .size = sizeof(struct gtp_net),
1369};
1370
1371static int __init gtp_init(void)
1372{
1373 int err;
1374
1375 get_random_bytes(&gtp_h_initval, sizeof(gtp_h_initval));
1376
1377 err = rtnl_link_register(&gtp_link_ops);
1378 if (err < 0)
1379 goto error_out;
1380
1381 err = genl_register_family(&gtp_genl_family);
1382 if (err < 0)
1383 goto unreg_rtnl_link;
1384
1385 err = register_pernet_subsys(&gtp_net_ops);
1386 if (err < 0)
1387 goto unreg_genl_family;
1388
1389 pr_info("GTP module loaded (pdp ctx size %zd bytes)\n",
1390 sizeof(struct pdp_ctx));
1391 return 0;
1392
1393unreg_genl_family:
1394 genl_unregister_family(&gtp_genl_family);
1395unreg_rtnl_link:
1396 rtnl_link_unregister(&gtp_link_ops);
1397error_out:
1398 pr_err("error loading GTP module loaded\n");
1399 return err;
1400}
1401late_initcall(gtp_init);
1402
1403static void __exit gtp_fini(void)
1404{
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001405 genl_unregister_family(&gtp_genl_family);
1406 rtnl_link_unregister(&gtp_link_ops);
David Brazdil0f672f62019-12-10 10:32:29 +00001407 unregister_pernet_subsys(&gtp_net_ops);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001408
1409 pr_info("GTP module unloaded\n");
1410}
1411module_exit(gtp_fini);
1412
1413MODULE_LICENSE("GPL");
1414MODULE_AUTHOR("Harald Welte <hwelte@sysmocom.de>");
1415MODULE_DESCRIPTION("Interface driver for GTP encapsulated traffic");
1416MODULE_ALIAS_RTNL_LINK("gtp");
1417MODULE_ALIAS_GENL_FAMILY("gtp");