]> bbs.cooldavid.org Git - net-next-2.6.git/blame - drivers/net/pppoe.c
ixgbe: add a netdev pointer to the ring structure
[net-next-2.6.git] / drivers / net / pppoe.c
CommitLineData
1da177e4
LT
1/** -*- linux-c -*- ***********************************************************
2 * Linux PPP over Ethernet (PPPoX/PPPoE) Sockets
3 *
4 * PPPoX --- Generic PPP encapsulation socket family
5 * PPPoE --- PPP over Ethernet (RFC 2516)
6 *
7 *
8 * Version: 0.7.0
9 *
90719dbe
FZ
10 * 070228 : Fix to allow multiple sessions with same remote MAC and same
11 * session id by including the local device ifindex in the
12 * tuple identifying a session. This also ensures packets can't
13 * be injected into a session from interfaces other than the one
14 * specified by userspace. Florian Zumbiehl <florz@florz.de>
15 * (Oh, BTW, this one is YYMMDD, in case you were wondering ...)
1da177e4
LT
16 * 220102 : Fix module use count on failure in pppoe_create, pppox_sk -acme
17 * 030700 : Fixed connect logic to allow for disconnect.
18 * 270700 : Fixed potential SMP problems; we must protect against
19 * simultaneous invocation of ppp_input
20 * and ppp_unregister_channel.
21 * 040800 : Respect reference count mechanisms on net-devices.
22 * 200800 : fix kfree(skb) in pppoe_rcv (acme)
23 * Module reference count is decremented in the right spot now,
24 * guards against sock_put not actually freeing the sk
25 * in pppoe_release.
26 * 051000 : Initialization cleanup.
27 * 111100 : Fix recvmsg.
28 * 050101 : Fix PADT procesing.
29 * 140501 : Use pppoe_rcv_core to handle all backlog. (Alexey)
30 * 170701 : Do not lock_sock with rwlock held. (DaveM)
31 * Ignore discovery frames if user has socket
32 * locked. (DaveM)
33 * Ignore return value of dev_queue_xmit in __pppoe_xmit
34 * or else we may kfree an SKB twice. (DaveM)
35 * 190701 : When doing copies of skb's in __pppoe_xmit, always delete
36 * the original skb that was passed in on success, never on
37 * failure. Delete the copy of the skb on failure to avoid
38 * a memory leak.
39 * 081001 : Misc. cleanup (licence string, non-blocking, prevent
40 * reference of device on close).
41 * 121301 : New ppp channels interface; cannot unregister a channel
42 * from interrupts. Thus, we mark the socket as a ZOMBIE
43 * and do the unregistration later.
44 * 081002 : seq_file support for proc stuff -acme
45 * 111602 : Merge all 2.4 fixes into 2.5/2.6 tree. Label 2.5/2.6
46 * as version 0.7. Spacing cleanup.
47 * Author: Michal Ostrowski <mostrows@speakeasy.net>
48 * Contributors:
49 * Arnaldo Carvalho de Melo <acme@conectiva.com.br>
50 * David S. Miller (davem@redhat.com)
51 *
52 * License:
53 * This program is free software; you can redistribute it and/or
54 * modify it under the terms of the GNU General Public License
55 * as published by the Free Software Foundation; either version
56 * 2 of the License, or (at your option) any later version.
57 *
58 */
59
60#include <linux/string.h>
61#include <linux/module.h>
62#include <linux/kernel.h>
63#include <linux/slab.h>
64#include <linux/errno.h>
65#include <linux/netdevice.h>
66#include <linux/net.h>
67#include <linux/inetdevice.h>
68#include <linux/etherdevice.h>
69#include <linux/skbuff.h>
70#include <linux/init.h>
71#include <linux/if_ether.h>
72#include <linux/if_pppox.h>
73#include <linux/ppp_channel.h>
74#include <linux/ppp_defs.h>
75#include <linux/if_ppp.h>
76#include <linux/notifier.h>
77#include <linux/file.h>
78#include <linux/proc_fs.h>
79#include <linux/seq_file.h>
80
a6bcf1c1 81#include <linux/nsproxy.h>
457c4cbc 82#include <net/net_namespace.h>
a6bcf1c1 83#include <net/netns/generic.h>
1da177e4
LT
84#include <net/sock.h>
85
86#include <asm/uaccess.h>
87
88#define PPPOE_HASH_BITS 4
6aba9158
CG
89#define PPPOE_HASH_SIZE (1 << PPPOE_HASH_BITS)
90#define PPPOE_HASH_MASK (PPPOE_HASH_SIZE - 1)
1da177e4 91
1da177e4
LT
92static int __pppoe_xmit(struct sock *sk, struct sk_buff *skb);
93
17ba15fb 94static const struct proto_ops pppoe_ops;
d7100da0 95static const struct ppp_channel_ops pppoe_chan_ops;
a6bcf1c1
CG
96
97/* per-net private data for this module */
f99189b1 98static int pppoe_net_id __read_mostly;
a6bcf1c1
CG
99struct pppoe_net {
100 /*
101 * we could use _single_ hash table for all
102 * nets by injecting net id into the hash but
103 * it would increase hash chains and add
104 * a few additional math comparations messy
105 * as well, moreover in case of SMP less locking
106 * controversy here
107 */
108 struct pppox_sock *hash_table[PPPOE_HASH_SIZE];
109 rwlock_t hash_lock;
110};
111
6aba9158
CG
112/*
113 * PPPoE could be in the following stages:
114 * 1) Discovery stage (to obtain remote MAC and Session ID)
115 * 2) Session stage (MAC and SID are known)
116 *
117 * Ethernet frames have a special tag for this but
118 * we use simplier approach based on session id
119 */
120static inline bool stage_session(__be16 sid)
121{
122 return sid != 0;
123}
1da177e4 124
a6bcf1c1
CG
125static inline struct pppoe_net *pppoe_pernet(struct net *net)
126{
127 BUG_ON(!net);
128
129 return net_generic(net, pppoe_net_id);
130}
131
1da177e4
LT
132static inline int cmp_2_addr(struct pppoe_addr *a, struct pppoe_addr *b)
133{
a6bcf1c1 134 return a->sid == b->sid && !memcmp(a->remote, b->remote, ETH_ALEN);
1da177e4
LT
135}
136
b963dc1d 137static inline int cmp_addr(struct pppoe_addr *a, __be16 sid, char *addr)
1da177e4 138{
a6bcf1c1 139 return a->sid == sid && !memcmp(a->remote, addr, ETH_ALEN);
1da177e4
LT
140}
141
6aba9158 142#if 8 % PPPOE_HASH_BITS
f1543f8b
FZ
143#error 8 must be a multiple of PPPOE_HASH_BITS
144#endif
145
b963dc1d 146static int hash_item(__be16 sid, unsigned char *addr)
1da177e4 147{
f1543f8b
FZ
148 unsigned char hash = 0;
149 unsigned int i;
1da177e4 150
6aba9158 151 for (i = 0; i < ETH_ALEN; i++)
f1543f8b 152 hash ^= addr[i];
6aba9158
CG
153 for (i = 0; i < sizeof(sid_t) * 8; i += 8)
154 hash ^= (__force __u32)sid >> i;
155 for (i = 8; (i >>= 1) >= PPPOE_HASH_BITS;)
156 hash ^= hash >> i;
1da177e4 157
6aba9158 158 return hash & PPPOE_HASH_MASK;
1da177e4
LT
159}
160
1da177e4
LT
161/**********************************************************************
162 *
163 * Set/get/delete/rehash items (internal versions)
164 *
165 **********************************************************************/
a6bcf1c1
CG
166static struct pppox_sock *__get_item(struct pppoe_net *pn, __be16 sid,
167 unsigned char *addr, int ifindex)
1da177e4
LT
168{
169 int hash = hash_item(sid, addr);
170 struct pppox_sock *ret;
171
a6bcf1c1 172 ret = pn->hash_table[hash];
6aba9158
CG
173 while (ret) {
174 if (cmp_addr(&ret->pppoe_pa, sid, addr) &&
175 ret->pppoe_ifindex == ifindex)
176 return ret;
177
1da177e4 178 ret = ret->next;
6aba9158 179 }
1da177e4 180
6aba9158 181 return NULL;
1da177e4
LT
182}
183
a6bcf1c1 184static int __set_item(struct pppoe_net *pn, struct pppox_sock *po)
1da177e4
LT
185{
186 int hash = hash_item(po->pppoe_pa.sid, po->pppoe_pa.remote);
187 struct pppox_sock *ret;
188
a6bcf1c1 189 ret = pn->hash_table[hash];
1da177e4 190 while (ret) {
6aba9158
CG
191 if (cmp_2_addr(&ret->pppoe_pa, &po->pppoe_pa) &&
192 ret->pppoe_ifindex == po->pppoe_ifindex)
1da177e4
LT
193 return -EALREADY;
194
195 ret = ret->next;
196 }
197
a6bcf1c1
CG
198 po->next = pn->hash_table[hash];
199 pn->hash_table[hash] = po;
1da177e4
LT
200
201 return 0;
202}
203
a6bcf1c1
CG
204static struct pppox_sock *__delete_item(struct pppoe_net *pn, __be16 sid,
205 char *addr, int ifindex)
1da177e4
LT
206{
207 int hash = hash_item(sid, addr);
208 struct pppox_sock *ret, **src;
209
a6bcf1c1
CG
210 ret = pn->hash_table[hash];
211 src = &pn->hash_table[hash];
1da177e4
LT
212
213 while (ret) {
6aba9158
CG
214 if (cmp_addr(&ret->pppoe_pa, sid, addr) &&
215 ret->pppoe_ifindex == ifindex) {
1da177e4
LT
216 *src = ret->next;
217 break;
218 }
219
220 src = &ret->next;
221 ret = ret->next;
222 }
223
224 return ret;
225}
226
227/**********************************************************************
228 *
229 * Set/get/delete/rehash items
230 *
231 **********************************************************************/
a6bcf1c1
CG
232static inline struct pppox_sock *get_item(struct pppoe_net *pn, __be16 sid,
233 unsigned char *addr, int ifindex)
1da177e4
LT
234{
235 struct pppox_sock *po;
236
a6bcf1c1
CG
237 read_lock_bh(&pn->hash_lock);
238 po = __get_item(pn, sid, addr, ifindex);
1da177e4
LT
239 if (po)
240 sock_hold(sk_pppox(po));
a6bcf1c1 241 read_unlock_bh(&pn->hash_lock);
1da177e4
LT
242
243 return po;
244}
245
a6bcf1c1
CG
246static inline struct pppox_sock *get_item_by_addr(struct net *net,
247 struct sockaddr_pppox *sp)
1da177e4 248{
bfafb26e 249 struct net_device *dev;
a6bcf1c1 250 struct pppoe_net *pn;
1178f66e 251 struct pppox_sock *pppox_sock = NULL;
a6bcf1c1 252
90719dbe
FZ
253 int ifindex;
254
1178f66e
ED
255 rcu_read_lock();
256 dev = dev_get_by_name_rcu(net, sp->sa_addr.pppoe.dev);
257 if (dev) {
258 ifindex = dev->ifindex;
be9e969d 259 pn = pppoe_pernet(net);
1178f66e 260 pppox_sock = get_item(pn, sp->sa_addr.pppoe.sid,
a6bcf1c1 261 sp->sa_addr.pppoe.remote, ifindex);
1178f66e
ED
262 }
263 rcu_read_unlock();
a6bcf1c1 264 return pppox_sock;
1da177e4
LT
265}
266
a6bcf1c1
CG
267static inline struct pppox_sock *delete_item(struct pppoe_net *pn, __be16 sid,
268 char *addr, int ifindex)
1da177e4
LT
269{
270 struct pppox_sock *ret;
271
a6bcf1c1
CG
272 write_lock_bh(&pn->hash_lock);
273 ret = __delete_item(pn, sid, addr, ifindex);
274 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
275
276 return ret;
277}
278
1da177e4
LT
279/***************************************************************************
280 *
281 * Handler for device events.
282 * Certain device events require that sockets be unconnected.
283 *
284 **************************************************************************/
285
286static void pppoe_flush_dev(struct net_device *dev)
287{
a6bcf1c1
CG
288 struct pppoe_net *pn;
289 int i;
290
a5e93151 291 pn = pppoe_pernet(dev_net(dev));
a6bcf1c1
CG
292 write_lock_bh(&pn->hash_lock);
293 for (i = 0; i < PPPOE_HASH_SIZE; i++) {
294 struct pppox_sock *po = pn->hash_table[i];
fb64bb56 295 struct sock *sk;
1da177e4 296
fb64bb56
MO
297 while (po) {
298 while (po && po->pppoe_dev != dev) {
42dc9cd5 299 po = po->next;
42dc9cd5 300 }
fb64bb56
MO
301
302 if (!po)
303 break;
304
a6bcf1c1 305 sk = sk_pppox(po);
1da177e4 306
42dc9cd5 307 /* We always grab the socket lock, followed by the
fb64bb56
MO
308 * hash_lock, in that order. Since we should hold the
309 * sock lock while doing any unbinding, we need to
310 * release the lock we're holding. Hold a reference to
311 * the sock so it doesn't disappear as we're jumping
312 * between locks.
42dc9cd5 313 */
1da177e4 314
42dc9cd5 315 sock_hold(sk);
a6bcf1c1 316 write_unlock_bh(&pn->hash_lock);
42dc9cd5 317 lock_sock(sk);
1da177e4 318
8e95a202
JP
319 if (po->pppoe_dev == dev &&
320 sk->sk_state & (PPPOX_CONNECTED | PPPOX_BOUND)) {
42dc9cd5
MO
321 pppox_unbind_sock(sk);
322 sk->sk_state = PPPOX_ZOMBIE;
323 sk->sk_state_change(sk);
fb64bb56
MO
324 po->pppoe_dev = NULL;
325 dev_put(dev);
42dc9cd5 326 }
1da177e4 327
42dc9cd5
MO
328 release_sock(sk);
329 sock_put(sk);
1da177e4 330
fb64bb56
MO
331 /* Restart the process from the start of the current
332 * hash chain. We dropped locks so the world may have
333 * change from underneath us.
42dc9cd5 334 */
fb64bb56
MO
335
336 BUG_ON(pppoe_pernet(dev_net(dev)) == NULL);
a6bcf1c1
CG
337 write_lock_bh(&pn->hash_lock);
338 po = pn->hash_table[i];
1da177e4
LT
339 }
340 }
a6bcf1c1 341 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
342}
343
344static int pppoe_device_event(struct notifier_block *this,
345 unsigned long event, void *ptr)
346{
a6bcf1c1 347 struct net_device *dev = (struct net_device *)ptr;
e9dc8653 348
1da177e4
LT
349 /* Only look at sockets that are using this specific device. */
350 switch (event) {
351 case NETDEV_CHANGEMTU:
352 /* A change in mtu is a bad thing, requiring
353 * LCP re-negotiation.
354 */
355
356 case NETDEV_GOING_DOWN:
357 case NETDEV_DOWN:
358 /* Find every socket on this device and kill it. */
359 pppoe_flush_dev(dev);
360 break;
361
362 default:
363 break;
ee289b64 364 }
1da177e4
LT
365
366 return NOTIFY_DONE;
367}
368
1da177e4
LT
369static struct notifier_block pppoe_notifier = {
370 .notifier_call = pppoe_device_event,
371};
372
1da177e4
LT
373/************************************************************************
374 *
375 * Do the real work of receiving a PPPoE Session frame.
376 *
377 ***********************************************************************/
378static int pppoe_rcv_core(struct sock *sk, struct sk_buff *skb)
379{
380 struct pppox_sock *po = pppox_sk(sk);
bfafb26e 381 struct pppox_sock *relay_po;
1da177e4 382
fb64bb56
MO
383 /* Backlog receive. Semantics of backlog rcv preclude any code from
384 * executing in lock_sock()/release_sock() bounds; meaning sk->sk_state
385 * can't change.
386 */
387
1da177e4 388 if (sk->sk_state & PPPOX_BOUND) {
1da177e4
LT
389 ppp_input(&po->chan, skb);
390 } else if (sk->sk_state & PPPOX_RELAY) {
fb64bb56
MO
391 relay_po = get_item_by_addr(sock_net(sk),
392 &po->pppoe_relay);
1da177e4
LT
393 if (relay_po == NULL)
394 goto abort_kfree;
395
396 if ((sk_pppox(relay_po)->sk_state & PPPOX_CONNECTED) == 0)
397 goto abort_put;
398
1da177e4
LT
399 if (!__pppoe_xmit(sk_pppox(relay_po), skb))
400 goto abort_put;
401 } else {
402 if (sock_queue_rcv_skb(sk, skb))
403 goto abort_kfree;
404 }
405
406 return NET_RX_SUCCESS;
407
408abort_put:
409 sock_put(sk_pppox(relay_po));
410
411abort_kfree:
412 kfree_skb(skb);
413 return NET_RX_DROP;
414}
415
416/************************************************************************
417 *
418 * Receive wrapper called in BH context.
419 *
420 ***********************************************************************/
a6bcf1c1
CG
421static int pppoe_rcv(struct sk_buff *skb, struct net_device *dev,
422 struct packet_type *pt, struct net_device *orig_dev)
1da177e4
LT
423{
424 struct pppoe_hdr *ph;
425 struct pppox_sock *po;
a6bcf1c1 426 struct pppoe_net *pn;
392fdb0e 427 int len;
1da177e4 428
6aba9158
CG
429 skb = skb_share_check(skb, GFP_ATOMIC);
430 if (!skb)
1da177e4
LT
431 goto out;
432
31bac444
HX
433 if (!pskb_may_pull(skb, sizeof(struct pppoe_hdr)))
434 goto drop;
435
797659fb 436 ph = pppoe_hdr(skb);
392fdb0e
HX
437 len = ntohs(ph->length);
438
439 skb_pull_rcsum(skb, sizeof(*ph));
440 if (skb->len < len)
441 goto drop;
1da177e4 442
263e69cb 443 if (pskb_trim_rcsum(skb, len))
392fdb0e
HX
444 goto drop;
445
a6bcf1c1 446 pn = pppoe_pernet(dev_net(dev));
fb64bb56
MO
447
448 /* Note that get_item does a sock_hold(), so sk_pppox(po)
449 * is known to be safe.
450 */
a6bcf1c1 451 po = get_item(pn, ph->sid, eth_hdr(skb)->h_source, dev->ifindex);
263e69cb 452 if (!po)
392fdb0e
HX
453 goto drop;
454
455 return sk_receive_skb(sk_pppox(po), skb, 0);
456
1da177e4
LT
457drop:
458 kfree_skb(skb);
459out:
460 return NET_RX_DROP;
461}
462
463/************************************************************************
464 *
465 * Receive a PPPoE Discovery frame.
466 * This is solely for detection of PADT frames
467 *
468 ***********************************************************************/
a6bcf1c1
CG
469static int pppoe_disc_rcv(struct sk_buff *skb, struct net_device *dev,
470 struct packet_type *pt, struct net_device *orig_dev)
1da177e4
LT
471
472{
473 struct pppoe_hdr *ph;
474 struct pppox_sock *po;
a6bcf1c1 475 struct pppoe_net *pn;
e730c155 476
6aba9158
CG
477 skb = skb_share_check(skb, GFP_ATOMIC);
478 if (!skb)
1da177e4
LT
479 goto out;
480
bc6cffd1
HX
481 if (!pskb_may_pull(skb, sizeof(struct pppoe_hdr)))
482 goto abort;
483
797659fb 484 ph = pppoe_hdr(skb);
1da177e4
LT
485 if (ph->code != PADT_CODE)
486 goto abort;
487
a6bcf1c1
CG
488 pn = pppoe_pernet(dev_net(dev));
489 po = get_item(pn, ph->sid, eth_hdr(skb)->h_source, dev->ifindex);
1da177e4
LT
490 if (po) {
491 struct sock *sk = sk_pppox(po);
492
493 bh_lock_sock(sk);
494
495 /* If the user has locked the socket, just ignore
496 * the packet. With the way two rcv protocols hook into
497 * one socket family type, we cannot (easily) distinguish
498 * what kind of SKB it is during backlog rcv.
499 */
500 if (sock_owned_by_user(sk) == 0) {
501 /* We're no longer connect at the PPPOE layer,
502 * and must wait for ppp channel to disconnect us.
503 */
504 sk->sk_state = PPPOX_ZOMBIE;
505 }
506
507 bh_unlock_sock(sk);
508 sock_put(sk);
509 }
510
511abort:
512 kfree_skb(skb);
513out:
514 return NET_RX_SUCCESS; /* Lies... :-) */
515}
516
7546dd97 517static struct packet_type pppoes_ptype __read_mostly = {
09640e63 518 .type = cpu_to_be16(ETH_P_PPP_SES),
1da177e4
LT
519 .func = pppoe_rcv,
520};
521
7546dd97 522static struct packet_type pppoed_ptype __read_mostly = {
09640e63 523 .type = cpu_to_be16(ETH_P_PPP_DISC),
1da177e4
LT
524 .func = pppoe_disc_rcv,
525};
526
7546dd97 527static struct proto pppoe_sk_proto __read_mostly = {
1da177e4
LT
528 .name = "PPPOE",
529 .owner = THIS_MODULE,
530 .obj_size = sizeof(struct pppox_sock),
531};
532
533/***********************************************************************
534 *
535 * Initialize a new struct sock.
536 *
537 **********************************************************************/
1b8d7ae4 538static int pppoe_create(struct net *net, struct socket *sock)
1da177e4 539{
1da177e4
LT
540 struct sock *sk;
541
6257ff21 542 sk = sk_alloc(net, PF_PPPOX, GFP_KERNEL, &pppoe_sk_proto);
1da177e4 543 if (!sk)
6aba9158 544 return -ENOMEM;
1da177e4
LT
545
546 sock_init_data(sock, sk);
547
a6bcf1c1
CG
548 sock->state = SS_UNCONNECTED;
549 sock->ops = &pppoe_ops;
1da177e4 550
a6bcf1c1
CG
551 sk->sk_backlog_rcv = pppoe_rcv_core;
552 sk->sk_state = PPPOX_NONE;
553 sk->sk_type = SOCK_STREAM;
554 sk->sk_family = PF_PPPOX;
555 sk->sk_protocol = PX_PROTO_OE;
1da177e4 556
6aba9158 557 return 0;
1da177e4
LT
558}
559
560static int pppoe_release(struct socket *sock)
561{
562 struct sock *sk = sock->sk;
563 struct pppox_sock *po;
a6bcf1c1 564 struct pppoe_net *pn;
fb64bb56 565 struct net *net = NULL;
1da177e4
LT
566
567 if (!sk)
568 return 0;
569
42dc9cd5 570 lock_sock(sk);
6aba9158 571 if (sock_flag(sk, SOCK_DEAD)) {
42dc9cd5 572 release_sock(sk);
1da177e4 573 return -EBADF;
42dc9cd5 574 }
1da177e4 575
fb64bb56
MO
576 po = pppox_sk(sk);
577
578 if (sk->sk_state & (PPPOX_CONNECTED | PPPOX_BOUND)) {
579 dev_put(po->pppoe_dev);
580 po->pppoe_dev = NULL;
581 }
582
1da177e4
LT
583 pppox_unbind_sock(sk);
584
585 /* Signal the death of the socket. */
586 sk->sk_state = PPPOX_DEAD;
587
fb64bb56
MO
588 net = sock_net(sk);
589 pn = pppoe_pernet(net);
42dc9cd5 590
a6bcf1c1
CG
591 /*
592 * protect "po" from concurrent updates
593 * on pppoe_flush_dev
594 */
fb64bb56
MO
595 delete_item(pn, po->pppoe_pa.sid, po->pppoe_pa.remote,
596 po->pppoe_ifindex);
42dc9cd5 597
1da177e4
LT
598 sock_orphan(sk);
599 sock->sk = NULL;
600
601 skb_queue_purge(&sk->sk_receive_queue);
42dc9cd5 602 release_sock(sk);
1da177e4
LT
603 sock_put(sk);
604
bfafb26e 605 return 0;
1da177e4
LT
606}
607
1da177e4
LT
608static int pppoe_connect(struct socket *sock, struct sockaddr *uservaddr,
609 int sockaddr_len, int flags)
610{
611 struct sock *sk = sock->sk;
a6bcf1c1 612 struct sockaddr_pppox *sp = (struct sockaddr_pppox *)uservaddr;
1da177e4 613 struct pppox_sock *po = pppox_sk(sk);
fb64bb56 614 struct net_device *dev = NULL;
a6bcf1c1 615 struct pppoe_net *pn;
fb64bb56 616 struct net *net = NULL;
1da177e4
LT
617 int error;
618
619 lock_sock(sk);
620
621 error = -EINVAL;
622 if (sp->sa_protocol != PX_PROTO_OE)
623 goto end;
624
625 /* Check for already bound sockets */
626 error = -EBUSY;
6aba9158
CG
627 if ((sk->sk_state & PPPOX_CONNECTED) &&
628 stage_session(sp->sa_addr.pppoe.sid))
1da177e4
LT
629 goto end;
630
631 /* Check for already disconnected sockets, on attempts to disconnect */
632 error = -EALREADY;
6aba9158
CG
633 if ((sk->sk_state & PPPOX_DEAD) &&
634 !stage_session(sp->sa_addr.pppoe.sid))
1da177e4
LT
635 goto end;
636
637 error = 0;
1da177e4 638
6aba9158
CG
639 /* Delete the old binding */
640 if (stage_session(po->pppoe_pa.sid)) {
641 pppox_unbind_sock(sk);
fb64bb56
MO
642 pn = pppoe_pernet(sock_net(sk));
643 delete_item(pn, po->pppoe_pa.sid,
644 po->pppoe_pa.remote, po->pppoe_ifindex);
a6bcf1c1 645 if (po->pppoe_dev) {
1da177e4 646 dev_put(po->pppoe_dev);
fb64bb56 647 po->pppoe_dev = NULL;
a6bcf1c1 648 }
fb64bb56 649
1da177e4
LT
650 memset(sk_pppox(po) + 1, 0,
651 sizeof(struct pppox_sock) - sizeof(struct sock));
1da177e4
LT
652 sk->sk_state = PPPOX_NONE;
653 }
654
6aba9158
CG
655 /* Re-bind in session stage only */
656 if (stage_session(sp->sa_addr.pppoe.sid)) {
1da177e4 657 error = -ENODEV;
fb64bb56
MO
658 net = sock_net(sk);
659 dev = dev_get_by_name(net, sp->sa_addr.pppoe.dev);
1da177e4 660 if (!dev)
fb64bb56 661 goto err_put;
1da177e4
LT
662
663 po->pppoe_dev = dev;
6f30e186 664 po->pppoe_ifindex = dev->ifindex;
fb64bb56 665 pn = pppoe_pernet(net);
6aba9158 666 if (!(dev->flags & IFF_UP)) {
1da177e4 667 goto err_put;
74b885cf 668 }
1da177e4
LT
669
670 memcpy(&po->pppoe_pa,
671 &sp->sa_addr.pppoe,
672 sizeof(struct pppoe_addr));
673
fb64bb56 674 write_lock_bh(&pn->hash_lock);
a6bcf1c1
CG
675 error = __set_item(pn, po);
676 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
677 if (error < 0)
678 goto err_put;
679
680 po->chan.hdrlen = (sizeof(struct pppoe_hdr) +
681 dev->hard_header_len);
682
c9aa6895 683 po->chan.mtu = dev->mtu - sizeof(struct pppoe_hdr);
1da177e4
LT
684 po->chan.private = sk;
685 po->chan.ops = &pppoe_chan_ops;
686
f5882c30 687 error = ppp_register_net_channel(dev_net(dev), &po->chan);
fb64bb56
MO
688 if (error) {
689 delete_item(pn, po->pppoe_pa.sid,
690 po->pppoe_pa.remote, po->pppoe_ifindex);
1da177e4 691 goto err_put;
fb64bb56 692 }
1da177e4
LT
693
694 sk->sk_state = PPPOX_CONNECTED;
695 }
696
697 po->num = sp->sa_addr.pppoe.sid;
698
6aba9158 699end:
1da177e4
LT
700 release_sock(sk);
701 return error;
702err_put:
703 if (po->pppoe_dev) {
704 dev_put(po->pppoe_dev);
705 po->pppoe_dev = NULL;
706 }
707 goto end;
708}
709
1da177e4
LT
710static int pppoe_getname(struct socket *sock, struct sockaddr *uaddr,
711 int *usockaddr_len, int peer)
712{
713 int len = sizeof(struct sockaddr_pppox);
714 struct sockaddr_pppox sp;
715
716 sp.sa_family = AF_PPPOX;
717 sp.sa_protocol = PX_PROTO_OE;
718 memcpy(&sp.sa_addr.pppoe, &pppox_sk(sock->sk)->pppoe_pa,
719 sizeof(struct pppoe_addr));
720
721 memcpy(uaddr, &sp, len);
722
723 *usockaddr_len = len;
724
725 return 0;
726}
727
1da177e4
LT
728static int pppoe_ioctl(struct socket *sock, unsigned int cmd,
729 unsigned long arg)
730{
731 struct sock *sk = sock->sk;
732 struct pppox_sock *po = pppox_sk(sk);
86c1dcfc
FZ
733 int val;
734 int err;
1da177e4
LT
735
736 switch (cmd) {
737 case PPPIOCGMRU:
738 err = -ENXIO;
1da177e4
LT
739 if (!(sk->sk_state & PPPOX_CONNECTED))
740 break;
741
742 err = -EFAULT;
743 if (put_user(po->pppoe_dev->mtu -
744 sizeof(struct pppoe_hdr) -
745 PPP_HDRLEN,
a6bcf1c1 746 (int __user *)arg))
1da177e4
LT
747 break;
748 err = 0;
749 break;
750
751 case PPPIOCSMRU:
752 err = -ENXIO;
753 if (!(sk->sk_state & PPPOX_CONNECTED))
754 break;
755
756 err = -EFAULT;
6aba9158 757 if (get_user(val, (int __user *)arg))
1da177e4
LT
758 break;
759
760 if (val < (po->pppoe_dev->mtu
761 - sizeof(struct pppoe_hdr)
762 - PPP_HDRLEN))
763 err = 0;
764 else
765 err = -EINVAL;
766 break;
767
768 case PPPIOCSFLAGS:
769 err = -EFAULT;
6aba9158 770 if (get_user(val, (int __user *)arg))
1da177e4
LT
771 break;
772 err = 0;
773 break;
774
775 case PPPOEIOCSFWD:
776 {
777 struct pppox_sock *relay_po;
778
779 err = -EBUSY;
780 if (sk->sk_state & (PPPOX_BOUND | PPPOX_ZOMBIE | PPPOX_DEAD))
781 break;
782
783 err = -ENOTCONN;
784 if (!(sk->sk_state & PPPOX_CONNECTED))
785 break;
786
787 /* PPPoE address from the user specifies an outbound
90719dbe 788 PPPoE address which frames are forwarded to */
1da177e4
LT
789 err = -EFAULT;
790 if (copy_from_user(&po->pppoe_relay,
791 (void __user *)arg,
792 sizeof(struct sockaddr_pppox)))
793 break;
794
795 err = -EINVAL;
796 if (po->pppoe_relay.sa_family != AF_PPPOX ||
6aba9158 797 po->pppoe_relay.sa_protocol != PX_PROTO_OE)
1da177e4
LT
798 break;
799
800 /* Check that the socket referenced by the address
801 actually exists. */
a6bcf1c1 802 relay_po = get_item_by_addr(sock_net(sk), &po->pppoe_relay);
1da177e4
LT
803 if (!relay_po)
804 break;
805
806 sock_put(sk_pppox(relay_po));
807 sk->sk_state |= PPPOX_RELAY;
808 err = 0;
809 break;
810 }
811
812 case PPPOEIOCDFWD:
813 err = -EALREADY;
814 if (!(sk->sk_state & PPPOX_RELAY))
815 break;
816
817 sk->sk_state &= ~PPPOX_RELAY;
818 err = 0;
819 break;
820
86c1dcfc
FZ
821 default:
822 err = -ENOTTY;
823 }
1da177e4
LT
824
825 return err;
826}
827
6aa20a22 828static int pppoe_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
829 struct msghdr *m, size_t total_len)
830{
bfafb26e 831 struct sk_buff *skb;
1da177e4
LT
832 struct sock *sk = sock->sk;
833 struct pppox_sock *po = pppox_sk(sk);
bfafb26e 834 int error;
1da177e4
LT
835 struct pppoe_hdr hdr;
836 struct pppoe_hdr *ph;
837 struct net_device *dev;
838 char *start;
839
8aeca8fe 840 lock_sock(sk);
1da177e4
LT
841 if (sock_flag(sk, SOCK_DEAD) || !(sk->sk_state & PPPOX_CONNECTED)) {
842 error = -ENOTCONN;
843 goto end;
844 }
845
846 hdr.ver = 1;
847 hdr.type = 1;
848 hdr.code = 0;
849 hdr.sid = po->num;
850
1da177e4
LT
851 dev = po->pppoe_dev;
852
853 error = -EMSGSIZE;
6aba9158 854 if (total_len > (dev->mtu + dev->hard_header_len))
1da177e4
LT
855 goto end;
856
857
858 skb = sock_wmalloc(sk, total_len + dev->hard_header_len + 32,
859 0, GFP_KERNEL);
860 if (!skb) {
861 error = -ENOMEM;
862 goto end;
863 }
864
865 /* Reserve space for headers. */
866 skb_reserve(skb, dev->hard_header_len);
c1d2bbe1 867 skb_reset_network_header(skb);
1da177e4
LT
868
869 skb->dev = dev;
870
871 skb->priority = sk->sk_priority;
09640e63 872 skb->protocol = cpu_to_be16(ETH_P_PPP_SES);
1da177e4 873
a6bcf1c1
CG
874 ph = (struct pppoe_hdr *)skb_put(skb, total_len + sizeof(struct pppoe_hdr));
875 start = (char *)&ph->tag[0];
1da177e4
LT
876
877 error = memcpy_fromiovec(start, m->msg_iov, total_len);
1da177e4
LT
878 if (error < 0) {
879 kfree_skb(skb);
880 goto end;
881 }
882
883 error = total_len;
0c4e8581
SH
884 dev_hard_header(skb, dev, ETH_P_PPP_SES,
885 po->pppoe_pa.remote, NULL, total_len);
1da177e4
LT
886
887 memcpy(ph, &hdr, sizeof(struct pppoe_hdr));
888
889 ph->length = htons(total_len);
890
891 dev_queue_xmit(skb);
892
893end:
894 release_sock(sk);
895 return error;
896}
897
1da177e4
LT
898/************************************************************************
899 *
900 * xmit function for internal use.
901 *
902 ***********************************************************************/
903static int __pppoe_xmit(struct sock *sk, struct sk_buff *skb)
904{
905 struct pppox_sock *po = pppox_sk(sk);
906 struct net_device *dev = po->pppoe_dev;
1da177e4 907 struct pppoe_hdr *ph;
1da177e4 908 int data_len = skb->len;
1da177e4 909
fb64bb56
MO
910 /* The higher-level PPP code (ppp_unregister_channel()) ensures the PPP
911 * xmit operations conclude prior to an unregistration call. Thus
912 * sk->sk_state cannot change, so we don't need to do lock_sock().
913 * But, we also can't do a lock_sock since that introduces a potential
914 * deadlock as we'd reverse the lock ordering used when calling
915 * ppp_unregister_channel().
916 */
917
1da177e4
LT
918 if (sock_flag(sk, SOCK_DEAD) || !(sk->sk_state & PPPOX_CONNECTED))
919 goto abort;
920
1da177e4
LT
921 if (!dev)
922 goto abort;
923
db7bf6d9
HX
924 /* Copy the data if there is no space for the header or if it's
925 * read-only.
926 */
d9cc2048 927 if (skb_cow_head(skb, sizeof(*ph) + dev->hard_header_len))
db7bf6d9 928 goto abort;
1da177e4 929
9355ec23 930 __skb_push(skb, sizeof(*ph));
db7bf6d9 931 skb_reset_network_header(skb);
1da177e4 932
9355ec23
HX
933 ph = pppoe_hdr(skb);
934 ph->ver = 1;
935 ph->type = 1;
936 ph->code = 0;
937 ph->sid = po->num;
938 ph->length = htons(data_len);
939
09640e63 940 skb->protocol = cpu_to_be16(ETH_P_PPP_SES);
db7bf6d9 941 skb->dev = dev;
1da177e4 942
0c4e8581
SH
943 dev_hard_header(skb, dev, ETH_P_PPP_SES,
944 po->pppoe_pa.remote, NULL, data_len);
1da177e4 945
21d0c833 946 dev_queue_xmit(skb);
1da177e4
LT
947 return 1;
948
949abort:
db7bf6d9 950 kfree_skb(skb);
55c95e73 951 return 0;
1da177e4
LT
952}
953
1da177e4
LT
954/************************************************************************
955 *
956 * xmit function called by generic PPP driver
957 * sends PPP frame over PPPoE socket
958 *
959 ***********************************************************************/
960static int pppoe_xmit(struct ppp_channel *chan, struct sk_buff *skb)
961{
a6bcf1c1 962 struct sock *sk = (struct sock *)chan->private;
1da177e4
LT
963 return __pppoe_xmit(sk, skb);
964}
965
d7100da0 966static const struct ppp_channel_ops pppoe_chan_ops = {
6aa20a22 967 .start_xmit = pppoe_xmit,
1da177e4
LT
968};
969
970static int pppoe_recvmsg(struct kiocb *iocb, struct socket *sock,
971 struct msghdr *m, size_t total_len, int flags)
972{
973 struct sock *sk = sock->sk;
bfafb26e 974 struct sk_buff *skb;
1da177e4 975 int error = 0;
1da177e4
LT
976
977 if (sk->sk_state & PPPOX_BOUND) {
978 error = -EIO;
979 goto end;
980 }
981
982 skb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT,
983 flags & MSG_DONTWAIT, &error);
bfafb26e 984 if (error < 0)
1da177e4 985 goto end;
1da177e4
LT
986
987 m->msg_namelen = 0;
988
989 if (skb) {
2645a3c3 990 total_len = min_t(size_t, total_len, skb->len);
392fdb0e 991 error = skb_copy_datagram_iovec(skb, 0, m->msg_iov, total_len);
797659fb 992 if (error == 0)
392fdb0e 993 error = total_len;
1da177e4
LT
994 }
995
797659fb 996 kfree_skb(skb);
1da177e4
LT
997end:
998 return error;
999}
1000
1001#ifdef CONFIG_PROC_FS
1002static int pppoe_seq_show(struct seq_file *seq, void *v)
1003{
1004 struct pppox_sock *po;
1005 char *dev_name;
1006
1007 if (v == SEQ_START_TOKEN) {
1008 seq_puts(seq, "Id Address Device\n");
1009 goto out;
1010 }
1011
1012 po = v;
1013 dev_name = po->pppoe_pa.dev;
1014
e174961c 1015 seq_printf(seq, "%08X %pM %8s\n",
a6bcf1c1 1016 po->pppoe_pa.sid, po->pppoe_pa.remote, dev_name);
1da177e4
LT
1017out:
1018 return 0;
1019}
1020
a6bcf1c1 1021static inline struct pppox_sock *pppoe_get_idx(struct pppoe_net *pn, loff_t pos)
1da177e4 1022{
bfafb26e 1023 struct pppox_sock *po;
6aba9158 1024 int i;
1da177e4 1025
6aba9158 1026 for (i = 0; i < PPPOE_HASH_SIZE; i++) {
a6bcf1c1 1027 po = pn->hash_table[i];
1da177e4
LT
1028 while (po) {
1029 if (!pos--)
1030 goto out;
1031 po = po->next;
1032 }
1033 }
a6bcf1c1 1034
1da177e4
LT
1035out:
1036 return po;
1037}
1038
1039static void *pppoe_seq_start(struct seq_file *seq, loff_t *pos)
a6bcf1c1 1040 __acquires(pn->hash_lock)
1da177e4 1041{
3617aa48 1042 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
1da177e4
LT
1043 loff_t l = *pos;
1044
a6bcf1c1
CG
1045 read_lock_bh(&pn->hash_lock);
1046 return l ? pppoe_get_idx(pn, --l) : SEQ_START_TOKEN;
1da177e4
LT
1047}
1048
1049static void *pppoe_seq_next(struct seq_file *seq, void *v, loff_t *pos)
1050{
3617aa48 1051 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
1da177e4
LT
1052 struct pppox_sock *po;
1053
1054 ++*pos;
1055 if (v == SEQ_START_TOKEN) {
a6bcf1c1 1056 po = pppoe_get_idx(pn, 0);
1da177e4
LT
1057 goto out;
1058 }
1059 po = v;
6aa20a22 1060 if (po->next)
1da177e4
LT
1061 po = po->next;
1062 else {
1063 int hash = hash_item(po->pppoe_pa.sid, po->pppoe_pa.remote);
1064
72fc9397 1065 po = NULL;
1da177e4 1066 while (++hash < PPPOE_HASH_SIZE) {
a6bcf1c1 1067 po = pn->hash_table[hash];
1da177e4
LT
1068 if (po)
1069 break;
1070 }
1071 }
a6bcf1c1 1072
1da177e4
LT
1073out:
1074 return po;
1075}
1076
1077static void pppoe_seq_stop(struct seq_file *seq, void *v)
a6bcf1c1 1078 __releases(pn->hash_lock)
1da177e4 1079{
3617aa48 1080 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
a6bcf1c1 1081 read_unlock_bh(&pn->hash_lock);
1da177e4
LT
1082}
1083
4101dec9 1084static const struct seq_operations pppoe_seq_ops = {
1da177e4
LT
1085 .start = pppoe_seq_start,
1086 .next = pppoe_seq_next,
1087 .stop = pppoe_seq_stop,
1088 .show = pppoe_seq_show,
1089};
1090
1091static int pppoe_seq_open(struct inode *inode, struct file *file)
1092{
3617aa48
CG
1093 return seq_open_net(inode, file, &pppoe_seq_ops,
1094 sizeof(struct seq_net_private));
1da177e4
LT
1095}
1096
d54b1fdb 1097static const struct file_operations pppoe_seq_fops = {
1da177e4
LT
1098 .owner = THIS_MODULE,
1099 .open = pppoe_seq_open,
1100 .read = seq_read,
1101 .llseek = seq_lseek,
3617aa48 1102 .release = seq_release_net,
1da177e4
LT
1103};
1104
1da177e4
LT
1105#endif /* CONFIG_PROC_FS */
1106
17ba15fb 1107static const struct proto_ops pppoe_ops = {
6aba9158
CG
1108 .family = AF_PPPOX,
1109 .owner = THIS_MODULE,
1110 .release = pppoe_release,
1111 .bind = sock_no_bind,
1112 .connect = pppoe_connect,
1113 .socketpair = sock_no_socketpair,
1114 .accept = sock_no_accept,
1115 .getname = pppoe_getname,
1116 .poll = datagram_poll,
1117 .listen = sock_no_listen,
1118 .shutdown = sock_no_shutdown,
1119 .setsockopt = sock_no_setsockopt,
1120 .getsockopt = sock_no_getsockopt,
1121 .sendmsg = pppoe_sendmsg,
1122 .recvmsg = pppoe_recvmsg,
1123 .mmap = sock_no_mmap,
1124 .ioctl = pppox_ioctl,
1da177e4
LT
1125};
1126
756e64a0 1127static const struct pppox_proto pppoe_proto = {
6aba9158
CG
1128 .create = pppoe_create,
1129 .ioctl = pppoe_ioctl,
1130 .owner = THIS_MODULE,
1da177e4
LT
1131};
1132
a6bcf1c1
CG
1133static __net_init int pppoe_init_net(struct net *net)
1134{
c879a6fc 1135 struct pppoe_net *pn = pppoe_pernet(net);
a6bcf1c1 1136 struct proc_dir_entry *pde;
a6bcf1c1
CG
1137
1138 rwlock_init(&pn->hash_lock);
1139
a6bcf1c1
CG
1140 pde = proc_net_fops_create(net, "pppoe", S_IRUGO, &pppoe_seq_fops);
1141#ifdef CONFIG_PROC_FS
c879a6fc
EB
1142 if (!pde)
1143 return -ENOMEM;
a6bcf1c1
CG
1144#endif
1145
1146 return 0;
a6bcf1c1
CG
1147}
1148
1149static __net_exit void pppoe_exit_net(struct net *net)
1150{
a6bcf1c1 1151 proc_net_remove(net, "pppoe");
a6bcf1c1
CG
1152}
1153
0012985d 1154static struct pernet_operations pppoe_net_ops = {
a6bcf1c1
CG
1155 .init = pppoe_init_net,
1156 .exit = pppoe_exit_net,
c879a6fc
EB
1157 .id = &pppoe_net_id,
1158 .size = sizeof(struct pppoe_net),
a6bcf1c1
CG
1159};
1160
1da177e4
LT
1161static int __init pppoe_init(void)
1162{
a6bcf1c1 1163 int err;
1da177e4 1164
c879a6fc 1165 err = register_pernet_device(&pppoe_net_ops);
1da177e4
LT
1166 if (err)
1167 goto out;
1168
07f6642e 1169 err = proto_register(&pppoe_sk_proto, 0);
1da177e4 1170 if (err)
07f6642e 1171 goto out_unregister_net_ops;
1da177e4 1172
07f6642e 1173 err = register_pppox_proto(PX_PROTO_OE, &pppoe_proto);
1da177e4 1174 if (err)
07f6642e 1175 goto out_unregister_pppoe_proto;
6aa20a22 1176
1da177e4
LT
1177 dev_add_pack(&pppoes_ptype);
1178 dev_add_pack(&pppoed_ptype);
1179 register_netdevice_notifier(&pppoe_notifier);
a6bcf1c1
CG
1180
1181 return 0;
1182
1da177e4
LT
1183out_unregister_pppoe_proto:
1184 proto_unregister(&pppoe_sk_proto);
07f6642e 1185out_unregister_net_ops:
c879a6fc 1186 unregister_pernet_device(&pppoe_net_ops);
a6bcf1c1
CG
1187out:
1188 return err;
1da177e4
LT
1189}
1190
1191static void __exit pppoe_exit(void)
1192{
1da177e4 1193 unregister_netdevice_notifier(&pppoe_notifier);
07f6642e
CG
1194 dev_remove_pack(&pppoed_ptype);
1195 dev_remove_pack(&pppoes_ptype);
1196 unregister_pppox_proto(PX_PROTO_OE);
1da177e4 1197 proto_unregister(&pppoe_sk_proto);
c879a6fc 1198 unregister_pernet_device(&pppoe_net_ops);
1da177e4
LT
1199}
1200
1201module_init(pppoe_init);
1202module_exit(pppoe_exit);
1203
1204MODULE_AUTHOR("Michal Ostrowski <mostrows@speakeasy.net>");
1205MODULE_DESCRIPTION("PPP over Ethernet driver");
1206MODULE_LICENSE("GPL");
1207MODULE_ALIAS_NETPROTO(PF_PPPOX);