bonding: remove ifenslave.c from kernel source
[GitHub/moto-9609/android_kernel_motorola_exynos9610.git] / drivers / net / ppp / pppoe.c
CommitLineData
1da177e4
LT
1/** -*- linux-c -*- ***********************************************************
2 * Linux PPP over Ethernet (PPPoX/PPPoE) Sockets
3 *
4 * PPPoX --- Generic PPP encapsulation socket family
5 * PPPoE --- PPP over Ethernet (RFC 2516)
6 *
7 *
8 * Version: 0.7.0
9 *
90719dbe
FZ
10 * 070228 : Fix to allow multiple sessions with same remote MAC and same
11 * session id by including the local device ifindex in the
12 * tuple identifying a session. This also ensures packets can't
13 * be injected into a session from interfaces other than the one
14 * specified by userspace. Florian Zumbiehl <florz@florz.de>
15 * (Oh, BTW, this one is YYMMDD, in case you were wondering ...)
1da177e4
LT
16 * 220102 : Fix module use count on failure in pppoe_create, pppox_sk -acme
17 * 030700 : Fixed connect logic to allow for disconnect.
18 * 270700 : Fixed potential SMP problems; we must protect against
19 * simultaneous invocation of ppp_input
20 * and ppp_unregister_channel.
21 * 040800 : Respect reference count mechanisms on net-devices.
22 * 200800 : fix kfree(skb) in pppoe_rcv (acme)
23 * Module reference count is decremented in the right spot now,
24 * guards against sock_put not actually freeing the sk
25 * in pppoe_release.
26 * 051000 : Initialization cleanup.
27 * 111100 : Fix recvmsg.
28 * 050101 : Fix PADT procesing.
29 * 140501 : Use pppoe_rcv_core to handle all backlog. (Alexey)
30 * 170701 : Do not lock_sock with rwlock held. (DaveM)
31 * Ignore discovery frames if user has socket
32 * locked. (DaveM)
33 * Ignore return value of dev_queue_xmit in __pppoe_xmit
34 * or else we may kfree an SKB twice. (DaveM)
35 * 190701 : When doing copies of skb's in __pppoe_xmit, always delete
36 * the original skb that was passed in on success, never on
37 * failure. Delete the copy of the skb on failure to avoid
38 * a memory leak.
39 * 081001 : Misc. cleanup (licence string, non-blocking, prevent
40 * reference of device on close).
41 * 121301 : New ppp channels interface; cannot unregister a channel
42 * from interrupts. Thus, we mark the socket as a ZOMBIE
43 * and do the unregistration later.
44 * 081002 : seq_file support for proc stuff -acme
45 * 111602 : Merge all 2.4 fixes into 2.5/2.6 tree. Label 2.5/2.6
46 * as version 0.7. Spacing cleanup.
47 * Author: Michal Ostrowski <mostrows@speakeasy.net>
48 * Contributors:
49 * Arnaldo Carvalho de Melo <acme@conectiva.com.br>
50 * David S. Miller (davem@redhat.com)
51 *
52 * License:
53 * This program is free software; you can redistribute it and/or
54 * modify it under the terms of the GNU General Public License
55 * as published by the Free Software Foundation; either version
56 * 2 of the License, or (at your option) any later version.
57 *
58 */
59
60#include <linux/string.h>
61#include <linux/module.h>
62#include <linux/kernel.h>
63#include <linux/slab.h>
64#include <linux/errno.h>
65#include <linux/netdevice.h>
66#include <linux/net.h>
67#include <linux/inetdevice.h>
68#include <linux/etherdevice.h>
69#include <linux/skbuff.h>
70#include <linux/init.h>
71#include <linux/if_ether.h>
72#include <linux/if_pppox.h>
73#include <linux/ppp_channel.h>
74#include <linux/ppp_defs.h>
4b32da2b 75#include <linux/ppp-ioctl.h>
1da177e4
LT
76#include <linux/notifier.h>
77#include <linux/file.h>
78#include <linux/proc_fs.h>
79#include <linux/seq_file.h>
80
a6bcf1c1 81#include <linux/nsproxy.h>
457c4cbc 82#include <net/net_namespace.h>
a6bcf1c1 83#include <net/netns/generic.h>
1da177e4
LT
84#include <net/sock.h>
85
86#include <asm/uaccess.h>
87
88#define PPPOE_HASH_BITS 4
6aba9158
CG
89#define PPPOE_HASH_SIZE (1 << PPPOE_HASH_BITS)
90#define PPPOE_HASH_MASK (PPPOE_HASH_SIZE - 1)
1da177e4 91
1da177e4
LT
92static int __pppoe_xmit(struct sock *sk, struct sk_buff *skb);
93
17ba15fb 94static const struct proto_ops pppoe_ops;
d7100da0 95static const struct ppp_channel_ops pppoe_chan_ops;
a6bcf1c1
CG
96
97/* per-net private data for this module */
f99189b1 98static int pppoe_net_id __read_mostly;
a6bcf1c1
CG
99struct pppoe_net {
100 /*
101 * we could use _single_ hash table for all
102 * nets by injecting net id into the hash but
103 * it would increase hash chains and add
104 * a few additional math comparations messy
105 * as well, moreover in case of SMP less locking
106 * controversy here
107 */
108 struct pppox_sock *hash_table[PPPOE_HASH_SIZE];
109 rwlock_t hash_lock;
110};
111
6aba9158
CG
112/*
113 * PPPoE could be in the following stages:
114 * 1) Discovery stage (to obtain remote MAC and Session ID)
115 * 2) Session stage (MAC and SID are known)
116 *
117 * Ethernet frames have a special tag for this but
25985edc 118 * we use simpler approach based on session id
6aba9158
CG
119 */
120static inline bool stage_session(__be16 sid)
121{
122 return sid != 0;
123}
1da177e4 124
a6bcf1c1
CG
125static inline struct pppoe_net *pppoe_pernet(struct net *net)
126{
127 BUG_ON(!net);
128
129 return net_generic(net, pppoe_net_id);
130}
131
1da177e4
LT
132static inline int cmp_2_addr(struct pppoe_addr *a, struct pppoe_addr *b)
133{
a6bcf1c1 134 return a->sid == b->sid && !memcmp(a->remote, b->remote, ETH_ALEN);
1da177e4
LT
135}
136
b963dc1d 137static inline int cmp_addr(struct pppoe_addr *a, __be16 sid, char *addr)
1da177e4 138{
a6bcf1c1 139 return a->sid == sid && !memcmp(a->remote, addr, ETH_ALEN);
1da177e4
LT
140}
141
6aba9158 142#if 8 % PPPOE_HASH_BITS
f1543f8b
FZ
143#error 8 must be a multiple of PPPOE_HASH_BITS
144#endif
145
b963dc1d 146static int hash_item(__be16 sid, unsigned char *addr)
1da177e4 147{
f1543f8b
FZ
148 unsigned char hash = 0;
149 unsigned int i;
1da177e4 150
6aba9158 151 for (i = 0; i < ETH_ALEN; i++)
f1543f8b 152 hash ^= addr[i];
6aba9158
CG
153 for (i = 0; i < sizeof(sid_t) * 8; i += 8)
154 hash ^= (__force __u32)sid >> i;
155 for (i = 8; (i >>= 1) >= PPPOE_HASH_BITS;)
156 hash ^= hash >> i;
1da177e4 157
6aba9158 158 return hash & PPPOE_HASH_MASK;
1da177e4
LT
159}
160
1da177e4
LT
161/**********************************************************************
162 *
163 * Set/get/delete/rehash items (internal versions)
164 *
165 **********************************************************************/
a6bcf1c1
CG
166static struct pppox_sock *__get_item(struct pppoe_net *pn, __be16 sid,
167 unsigned char *addr, int ifindex)
1da177e4
LT
168{
169 int hash = hash_item(sid, addr);
170 struct pppox_sock *ret;
171
a6bcf1c1 172 ret = pn->hash_table[hash];
6aba9158
CG
173 while (ret) {
174 if (cmp_addr(&ret->pppoe_pa, sid, addr) &&
175 ret->pppoe_ifindex == ifindex)
176 return ret;
177
1da177e4 178 ret = ret->next;
6aba9158 179 }
1da177e4 180
6aba9158 181 return NULL;
1da177e4
LT
182}
183
a6bcf1c1 184static int __set_item(struct pppoe_net *pn, struct pppox_sock *po)
1da177e4
LT
185{
186 int hash = hash_item(po->pppoe_pa.sid, po->pppoe_pa.remote);
187 struct pppox_sock *ret;
188
a6bcf1c1 189 ret = pn->hash_table[hash];
1da177e4 190 while (ret) {
6aba9158
CG
191 if (cmp_2_addr(&ret->pppoe_pa, &po->pppoe_pa) &&
192 ret->pppoe_ifindex == po->pppoe_ifindex)
1da177e4
LT
193 return -EALREADY;
194
195 ret = ret->next;
196 }
197
a6bcf1c1
CG
198 po->next = pn->hash_table[hash];
199 pn->hash_table[hash] = po;
1da177e4
LT
200
201 return 0;
202}
203
3b12bb60 204static void __delete_item(struct pppoe_net *pn, __be16 sid,
a6bcf1c1 205 char *addr, int ifindex)
1da177e4
LT
206{
207 int hash = hash_item(sid, addr);
208 struct pppox_sock *ret, **src;
209
a6bcf1c1
CG
210 ret = pn->hash_table[hash];
211 src = &pn->hash_table[hash];
1da177e4
LT
212
213 while (ret) {
6aba9158
CG
214 if (cmp_addr(&ret->pppoe_pa, sid, addr) &&
215 ret->pppoe_ifindex == ifindex) {
1da177e4
LT
216 *src = ret->next;
217 break;
218 }
219
220 src = &ret->next;
221 ret = ret->next;
222 }
1da177e4
LT
223}
224
225/**********************************************************************
226 *
227 * Set/get/delete/rehash items
228 *
229 **********************************************************************/
a6bcf1c1
CG
230static inline struct pppox_sock *get_item(struct pppoe_net *pn, __be16 sid,
231 unsigned char *addr, int ifindex)
1da177e4
LT
232{
233 struct pppox_sock *po;
234
a6bcf1c1
CG
235 read_lock_bh(&pn->hash_lock);
236 po = __get_item(pn, sid, addr, ifindex);
1da177e4
LT
237 if (po)
238 sock_hold(sk_pppox(po));
a6bcf1c1 239 read_unlock_bh(&pn->hash_lock);
1da177e4
LT
240
241 return po;
242}
243
a6bcf1c1
CG
244static inline struct pppox_sock *get_item_by_addr(struct net *net,
245 struct sockaddr_pppox *sp)
1da177e4 246{
bfafb26e 247 struct net_device *dev;
a6bcf1c1 248 struct pppoe_net *pn;
1178f66e 249 struct pppox_sock *pppox_sock = NULL;
a6bcf1c1 250
90719dbe
FZ
251 int ifindex;
252
1178f66e
ED
253 rcu_read_lock();
254 dev = dev_get_by_name_rcu(net, sp->sa_addr.pppoe.dev);
255 if (dev) {
256 ifindex = dev->ifindex;
be9e969d 257 pn = pppoe_pernet(net);
1178f66e 258 pppox_sock = get_item(pn, sp->sa_addr.pppoe.sid,
a6bcf1c1 259 sp->sa_addr.pppoe.remote, ifindex);
1178f66e
ED
260 }
261 rcu_read_unlock();
a6bcf1c1 262 return pppox_sock;
1da177e4
LT
263}
264
3b12bb60 265static inline void delete_item(struct pppoe_net *pn, __be16 sid,
a6bcf1c1 266 char *addr, int ifindex)
1da177e4 267{
a6bcf1c1 268 write_lock_bh(&pn->hash_lock);
3b12bb60 269 __delete_item(pn, sid, addr, ifindex);
a6bcf1c1 270 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
271}
272
1da177e4
LT
273/***************************************************************************
274 *
275 * Handler for device events.
276 * Certain device events require that sockets be unconnected.
277 *
278 **************************************************************************/
279
280static void pppoe_flush_dev(struct net_device *dev)
281{
a6bcf1c1
CG
282 struct pppoe_net *pn;
283 int i;
284
a5e93151 285 pn = pppoe_pernet(dev_net(dev));
a6bcf1c1
CG
286 write_lock_bh(&pn->hash_lock);
287 for (i = 0; i < PPPOE_HASH_SIZE; i++) {
288 struct pppox_sock *po = pn->hash_table[i];
fb64bb56 289 struct sock *sk;
1da177e4 290
fb64bb56
MO
291 while (po) {
292 while (po && po->pppoe_dev != dev) {
42dc9cd5 293 po = po->next;
42dc9cd5 294 }
fb64bb56
MO
295
296 if (!po)
297 break;
298
a6bcf1c1 299 sk = sk_pppox(po);
1da177e4 300
42dc9cd5 301 /* We always grab the socket lock, followed by the
fb64bb56
MO
302 * hash_lock, in that order. Since we should hold the
303 * sock lock while doing any unbinding, we need to
304 * release the lock we're holding. Hold a reference to
305 * the sock so it doesn't disappear as we're jumping
306 * between locks.
42dc9cd5 307 */
1da177e4 308
42dc9cd5 309 sock_hold(sk);
a6bcf1c1 310 write_unlock_bh(&pn->hash_lock);
42dc9cd5 311 lock_sock(sk);
1da177e4 312
8e95a202 313 if (po->pppoe_dev == dev &&
ae07b0b2 314 sk->sk_state & (PPPOX_CONNECTED | PPPOX_BOUND | PPPOX_ZOMBIE)) {
42dc9cd5
MO
315 pppox_unbind_sock(sk);
316 sk->sk_state = PPPOX_ZOMBIE;
317 sk->sk_state_change(sk);
fb64bb56
MO
318 po->pppoe_dev = NULL;
319 dev_put(dev);
42dc9cd5 320 }
1da177e4 321
42dc9cd5
MO
322 release_sock(sk);
323 sock_put(sk);
1da177e4 324
fb64bb56
MO
325 /* Restart the process from the start of the current
326 * hash chain. We dropped locks so the world may have
327 * change from underneath us.
42dc9cd5 328 */
fb64bb56
MO
329
330 BUG_ON(pppoe_pernet(dev_net(dev)) == NULL);
a6bcf1c1
CG
331 write_lock_bh(&pn->hash_lock);
332 po = pn->hash_table[i];
1da177e4
LT
333 }
334 }
a6bcf1c1 335 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
336}
337
338static int pppoe_device_event(struct notifier_block *this,
339 unsigned long event, void *ptr)
340{
a6bcf1c1 341 struct net_device *dev = (struct net_device *)ptr;
e9dc8653 342
1da177e4
LT
343 /* Only look at sockets that are using this specific device. */
344 switch (event) {
680ba7ca 345 case NETDEV_CHANGEADDR:
1da177e4 346 case NETDEV_CHANGEMTU:
680ba7ca 347 /* A change in mtu or address is a bad thing, requiring
1da177e4
LT
348 * LCP re-negotiation.
349 */
350
351 case NETDEV_GOING_DOWN:
352 case NETDEV_DOWN:
353 /* Find every socket on this device and kill it. */
354 pppoe_flush_dev(dev);
355 break;
356
357 default:
358 break;
ee289b64 359 }
1da177e4
LT
360
361 return NOTIFY_DONE;
362}
363
1da177e4
LT
364static struct notifier_block pppoe_notifier = {
365 .notifier_call = pppoe_device_event,
366};
367
1da177e4
LT
368/************************************************************************
369 *
370 * Do the real work of receiving a PPPoE Session frame.
371 *
372 ***********************************************************************/
373static int pppoe_rcv_core(struct sock *sk, struct sk_buff *skb)
374{
375 struct pppox_sock *po = pppox_sk(sk);
bfafb26e 376 struct pppox_sock *relay_po;
1da177e4 377
fb64bb56
MO
378 /* Backlog receive. Semantics of backlog rcv preclude any code from
379 * executing in lock_sock()/release_sock() bounds; meaning sk->sk_state
380 * can't change.
381 */
382
1da177e4 383 if (sk->sk_state & PPPOX_BOUND) {
1da177e4
LT
384 ppp_input(&po->chan, skb);
385 } else if (sk->sk_state & PPPOX_RELAY) {
fb64bb56
MO
386 relay_po = get_item_by_addr(sock_net(sk),
387 &po->pppoe_relay);
1da177e4
LT
388 if (relay_po == NULL)
389 goto abort_kfree;
390
391 if ((sk_pppox(relay_po)->sk_state & PPPOX_CONNECTED) == 0)
392 goto abort_put;
393
1da177e4
LT
394 if (!__pppoe_xmit(sk_pppox(relay_po), skb))
395 goto abort_put;
396 } else {
397 if (sock_queue_rcv_skb(sk, skb))
398 goto abort_kfree;
399 }
400
401 return NET_RX_SUCCESS;
402
403abort_put:
404 sock_put(sk_pppox(relay_po));
405
406abort_kfree:
407 kfree_skb(skb);
408 return NET_RX_DROP;
409}
410
411/************************************************************************
412 *
413 * Receive wrapper called in BH context.
414 *
415 ***********************************************************************/
a6bcf1c1
CG
416static int pppoe_rcv(struct sk_buff *skb, struct net_device *dev,
417 struct packet_type *pt, struct net_device *orig_dev)
1da177e4
LT
418{
419 struct pppoe_hdr *ph;
420 struct pppox_sock *po;
a6bcf1c1 421 struct pppoe_net *pn;
392fdb0e 422 int len;
1da177e4 423
6aba9158
CG
424 skb = skb_share_check(skb, GFP_ATOMIC);
425 if (!skb)
1da177e4
LT
426 goto out;
427
31bac444
HX
428 if (!pskb_may_pull(skb, sizeof(struct pppoe_hdr)))
429 goto drop;
430
797659fb 431 ph = pppoe_hdr(skb);
392fdb0e
HX
432 len = ntohs(ph->length);
433
434 skb_pull_rcsum(skb, sizeof(*ph));
435 if (skb->len < len)
436 goto drop;
1da177e4 437
263e69cb 438 if (pskb_trim_rcsum(skb, len))
392fdb0e
HX
439 goto drop;
440
a6bcf1c1 441 pn = pppoe_pernet(dev_net(dev));
fb64bb56
MO
442
443 /* Note that get_item does a sock_hold(), so sk_pppox(po)
444 * is known to be safe.
445 */
a6bcf1c1 446 po = get_item(pn, ph->sid, eth_hdr(skb)->h_source, dev->ifindex);
263e69cb 447 if (!po)
392fdb0e
HX
448 goto drop;
449
450 return sk_receive_skb(sk_pppox(po), skb, 0);
451
1da177e4
LT
452drop:
453 kfree_skb(skb);
454out:
455 return NET_RX_DROP;
456}
457
458/************************************************************************
459 *
460 * Receive a PPPoE Discovery frame.
461 * This is solely for detection of PADT frames
462 *
463 ***********************************************************************/
a6bcf1c1
CG
464static int pppoe_disc_rcv(struct sk_buff *skb, struct net_device *dev,
465 struct packet_type *pt, struct net_device *orig_dev)
1da177e4
LT
466
467{
468 struct pppoe_hdr *ph;
469 struct pppox_sock *po;
a6bcf1c1 470 struct pppoe_net *pn;
e730c155 471
6aba9158
CG
472 skb = skb_share_check(skb, GFP_ATOMIC);
473 if (!skb)
1da177e4
LT
474 goto out;
475
bc6cffd1
HX
476 if (!pskb_may_pull(skb, sizeof(struct pppoe_hdr)))
477 goto abort;
478
797659fb 479 ph = pppoe_hdr(skb);
1da177e4
LT
480 if (ph->code != PADT_CODE)
481 goto abort;
482
a6bcf1c1
CG
483 pn = pppoe_pernet(dev_net(dev));
484 po = get_item(pn, ph->sid, eth_hdr(skb)->h_source, dev->ifindex);
1da177e4
LT
485 if (po) {
486 struct sock *sk = sk_pppox(po);
487
488 bh_lock_sock(sk);
489
490 /* If the user has locked the socket, just ignore
491 * the packet. With the way two rcv protocols hook into
492 * one socket family type, we cannot (easily) distinguish
493 * what kind of SKB it is during backlog rcv.
494 */
495 if (sock_owned_by_user(sk) == 0) {
496 /* We're no longer connect at the PPPOE layer,
497 * and must wait for ppp channel to disconnect us.
498 */
499 sk->sk_state = PPPOX_ZOMBIE;
500 }
501
502 bh_unlock_sock(sk);
503 sock_put(sk);
504 }
505
506abort:
507 kfree_skb(skb);
508out:
509 return NET_RX_SUCCESS; /* Lies... :-) */
510}
511
7546dd97 512static struct packet_type pppoes_ptype __read_mostly = {
09640e63 513 .type = cpu_to_be16(ETH_P_PPP_SES),
1da177e4
LT
514 .func = pppoe_rcv,
515};
516
7546dd97 517static struct packet_type pppoed_ptype __read_mostly = {
09640e63 518 .type = cpu_to_be16(ETH_P_PPP_DISC),
1da177e4
LT
519 .func = pppoe_disc_rcv,
520};
521
7546dd97 522static struct proto pppoe_sk_proto __read_mostly = {
1da177e4
LT
523 .name = "PPPOE",
524 .owner = THIS_MODULE,
525 .obj_size = sizeof(struct pppox_sock),
526};
527
528/***********************************************************************
529 *
530 * Initialize a new struct sock.
531 *
532 **********************************************************************/
1b8d7ae4 533static int pppoe_create(struct net *net, struct socket *sock)
1da177e4 534{
1da177e4
LT
535 struct sock *sk;
536
6257ff21 537 sk = sk_alloc(net, PF_PPPOX, GFP_KERNEL, &pppoe_sk_proto);
1da177e4 538 if (!sk)
6aba9158 539 return -ENOMEM;
1da177e4
LT
540
541 sock_init_data(sock, sk);
542
a6bcf1c1
CG
543 sock->state = SS_UNCONNECTED;
544 sock->ops = &pppoe_ops;
1da177e4 545
a6bcf1c1
CG
546 sk->sk_backlog_rcv = pppoe_rcv_core;
547 sk->sk_state = PPPOX_NONE;
548 sk->sk_type = SOCK_STREAM;
549 sk->sk_family = PF_PPPOX;
550 sk->sk_protocol = PX_PROTO_OE;
1da177e4 551
6aba9158 552 return 0;
1da177e4
LT
553}
554
555static int pppoe_release(struct socket *sock)
556{
557 struct sock *sk = sock->sk;
558 struct pppox_sock *po;
a6bcf1c1 559 struct pppoe_net *pn;
fb64bb56 560 struct net *net = NULL;
1da177e4
LT
561
562 if (!sk)
563 return 0;
564
42dc9cd5 565 lock_sock(sk);
6aba9158 566 if (sock_flag(sk, SOCK_DEAD)) {
42dc9cd5 567 release_sock(sk);
1da177e4 568 return -EBADF;
42dc9cd5 569 }
1da177e4 570
fb64bb56
MO
571 po = pppox_sk(sk);
572
2b018d57 573 if (sk->sk_state & (PPPOX_CONNECTED | PPPOX_BOUND | PPPOX_ZOMBIE)) {
fb64bb56
MO
574 dev_put(po->pppoe_dev);
575 po->pppoe_dev = NULL;
576 }
577
1da177e4
LT
578 pppox_unbind_sock(sk);
579
580 /* Signal the death of the socket. */
581 sk->sk_state = PPPOX_DEAD;
582
fb64bb56
MO
583 net = sock_net(sk);
584 pn = pppoe_pernet(net);
42dc9cd5 585
a6bcf1c1
CG
586 /*
587 * protect "po" from concurrent updates
588 * on pppoe_flush_dev
589 */
fb64bb56
MO
590 delete_item(pn, po->pppoe_pa.sid, po->pppoe_pa.remote,
591 po->pppoe_ifindex);
42dc9cd5 592
1da177e4
LT
593 sock_orphan(sk);
594 sock->sk = NULL;
595
596 skb_queue_purge(&sk->sk_receive_queue);
42dc9cd5 597 release_sock(sk);
1da177e4
LT
598 sock_put(sk);
599
bfafb26e 600 return 0;
1da177e4
LT
601}
602
1da177e4
LT
603static int pppoe_connect(struct socket *sock, struct sockaddr *uservaddr,
604 int sockaddr_len, int flags)
605{
606 struct sock *sk = sock->sk;
a6bcf1c1 607 struct sockaddr_pppox *sp = (struct sockaddr_pppox *)uservaddr;
1da177e4 608 struct pppox_sock *po = pppox_sk(sk);
fb64bb56 609 struct net_device *dev = NULL;
a6bcf1c1 610 struct pppoe_net *pn;
fb64bb56 611 struct net *net = NULL;
1da177e4
LT
612 int error;
613
614 lock_sock(sk);
615
616 error = -EINVAL;
617 if (sp->sa_protocol != PX_PROTO_OE)
618 goto end;
619
620 /* Check for already bound sockets */
621 error = -EBUSY;
6aba9158
CG
622 if ((sk->sk_state & PPPOX_CONNECTED) &&
623 stage_session(sp->sa_addr.pppoe.sid))
1da177e4
LT
624 goto end;
625
626 /* Check for already disconnected sockets, on attempts to disconnect */
627 error = -EALREADY;
6aba9158
CG
628 if ((sk->sk_state & PPPOX_DEAD) &&
629 !stage_session(sp->sa_addr.pppoe.sid))
1da177e4
LT
630 goto end;
631
632 error = 0;
1da177e4 633
6aba9158
CG
634 /* Delete the old binding */
635 if (stage_session(po->pppoe_pa.sid)) {
636 pppox_unbind_sock(sk);
fb64bb56
MO
637 pn = pppoe_pernet(sock_net(sk));
638 delete_item(pn, po->pppoe_pa.sid,
639 po->pppoe_pa.remote, po->pppoe_ifindex);
a6bcf1c1 640 if (po->pppoe_dev) {
1da177e4 641 dev_put(po->pppoe_dev);
fb64bb56 642 po->pppoe_dev = NULL;
a6bcf1c1 643 }
fb64bb56 644
1da177e4
LT
645 memset(sk_pppox(po) + 1, 0,
646 sizeof(struct pppox_sock) - sizeof(struct sock));
1da177e4
LT
647 sk->sk_state = PPPOX_NONE;
648 }
649
6aba9158
CG
650 /* Re-bind in session stage only */
651 if (stage_session(sp->sa_addr.pppoe.sid)) {
1da177e4 652 error = -ENODEV;
fb64bb56
MO
653 net = sock_net(sk);
654 dev = dev_get_by_name(net, sp->sa_addr.pppoe.dev);
1da177e4 655 if (!dev)
fb64bb56 656 goto err_put;
1da177e4
LT
657
658 po->pppoe_dev = dev;
6f30e186 659 po->pppoe_ifindex = dev->ifindex;
fb64bb56 660 pn = pppoe_pernet(net);
6aba9158 661 if (!(dev->flags & IFF_UP)) {
1da177e4 662 goto err_put;
74b885cf 663 }
1da177e4
LT
664
665 memcpy(&po->pppoe_pa,
666 &sp->sa_addr.pppoe,
667 sizeof(struct pppoe_addr));
668
fb64bb56 669 write_lock_bh(&pn->hash_lock);
a6bcf1c1
CG
670 error = __set_item(pn, po);
671 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
672 if (error < 0)
673 goto err_put;
674
675 po->chan.hdrlen = (sizeof(struct pppoe_hdr) +
676 dev->hard_header_len);
677
c9aa6895 678 po->chan.mtu = dev->mtu - sizeof(struct pppoe_hdr);
1da177e4
LT
679 po->chan.private = sk;
680 po->chan.ops = &pppoe_chan_ops;
681
f5882c30 682 error = ppp_register_net_channel(dev_net(dev), &po->chan);
fb64bb56
MO
683 if (error) {
684 delete_item(pn, po->pppoe_pa.sid,
685 po->pppoe_pa.remote, po->pppoe_ifindex);
1da177e4 686 goto err_put;
fb64bb56 687 }
1da177e4
LT
688
689 sk->sk_state = PPPOX_CONNECTED;
690 }
691
692 po->num = sp->sa_addr.pppoe.sid;
693
6aba9158 694end:
1da177e4
LT
695 release_sock(sk);
696 return error;
697err_put:
698 if (po->pppoe_dev) {
699 dev_put(po->pppoe_dev);
700 po->pppoe_dev = NULL;
701 }
702 goto end;
703}
704
1da177e4
LT
705static int pppoe_getname(struct socket *sock, struct sockaddr *uaddr,
706 int *usockaddr_len, int peer)
707{
708 int len = sizeof(struct sockaddr_pppox);
709 struct sockaddr_pppox sp;
710
711 sp.sa_family = AF_PPPOX;
712 sp.sa_protocol = PX_PROTO_OE;
713 memcpy(&sp.sa_addr.pppoe, &pppox_sk(sock->sk)->pppoe_pa,
714 sizeof(struct pppoe_addr));
715
716 memcpy(uaddr, &sp, len);
717
718 *usockaddr_len = len;
719
720 return 0;
721}
722
1da177e4
LT
723static int pppoe_ioctl(struct socket *sock, unsigned int cmd,
724 unsigned long arg)
725{
726 struct sock *sk = sock->sk;
727 struct pppox_sock *po = pppox_sk(sk);
86c1dcfc
FZ
728 int val;
729 int err;
1da177e4
LT
730
731 switch (cmd) {
732 case PPPIOCGMRU:
733 err = -ENXIO;
1da177e4
LT
734 if (!(sk->sk_state & PPPOX_CONNECTED))
735 break;
736
737 err = -EFAULT;
738 if (put_user(po->pppoe_dev->mtu -
739 sizeof(struct pppoe_hdr) -
740 PPP_HDRLEN,
a6bcf1c1 741 (int __user *)arg))
1da177e4
LT
742 break;
743 err = 0;
744 break;
745
746 case PPPIOCSMRU:
747 err = -ENXIO;
748 if (!(sk->sk_state & PPPOX_CONNECTED))
749 break;
750
751 err = -EFAULT;
6aba9158 752 if (get_user(val, (int __user *)arg))
1da177e4
LT
753 break;
754
755 if (val < (po->pppoe_dev->mtu
756 - sizeof(struct pppoe_hdr)
757 - PPP_HDRLEN))
758 err = 0;
759 else
760 err = -EINVAL;
761 break;
762
763 case PPPIOCSFLAGS:
764 err = -EFAULT;
6aba9158 765 if (get_user(val, (int __user *)arg))
1da177e4
LT
766 break;
767 err = 0;
768 break;
769
770 case PPPOEIOCSFWD:
771 {
772 struct pppox_sock *relay_po;
773
774 err = -EBUSY;
775 if (sk->sk_state & (PPPOX_BOUND | PPPOX_ZOMBIE | PPPOX_DEAD))
776 break;
777
778 err = -ENOTCONN;
779 if (!(sk->sk_state & PPPOX_CONNECTED))
780 break;
781
782 /* PPPoE address from the user specifies an outbound
90719dbe 783 PPPoE address which frames are forwarded to */
1da177e4
LT
784 err = -EFAULT;
785 if (copy_from_user(&po->pppoe_relay,
786 (void __user *)arg,
787 sizeof(struct sockaddr_pppox)))
788 break;
789
790 err = -EINVAL;
791 if (po->pppoe_relay.sa_family != AF_PPPOX ||
6aba9158 792 po->pppoe_relay.sa_protocol != PX_PROTO_OE)
1da177e4
LT
793 break;
794
795 /* Check that the socket referenced by the address
796 actually exists. */
a6bcf1c1 797 relay_po = get_item_by_addr(sock_net(sk), &po->pppoe_relay);
1da177e4
LT
798 if (!relay_po)
799 break;
800
801 sock_put(sk_pppox(relay_po));
802 sk->sk_state |= PPPOX_RELAY;
803 err = 0;
804 break;
805 }
806
807 case PPPOEIOCDFWD:
808 err = -EALREADY;
809 if (!(sk->sk_state & PPPOX_RELAY))
810 break;
811
812 sk->sk_state &= ~PPPOX_RELAY;
813 err = 0;
814 break;
815
86c1dcfc
FZ
816 default:
817 err = -ENOTTY;
818 }
1da177e4
LT
819
820 return err;
821}
822
6aa20a22 823static int pppoe_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
824 struct msghdr *m, size_t total_len)
825{
bfafb26e 826 struct sk_buff *skb;
1da177e4
LT
827 struct sock *sk = sock->sk;
828 struct pppox_sock *po = pppox_sk(sk);
bfafb26e 829 int error;
1da177e4
LT
830 struct pppoe_hdr hdr;
831 struct pppoe_hdr *ph;
832 struct net_device *dev;
833 char *start;
834
8aeca8fe 835 lock_sock(sk);
1da177e4
LT
836 if (sock_flag(sk, SOCK_DEAD) || !(sk->sk_state & PPPOX_CONNECTED)) {
837 error = -ENOTCONN;
838 goto end;
839 }
840
841 hdr.ver = 1;
842 hdr.type = 1;
843 hdr.code = 0;
844 hdr.sid = po->num;
845
1da177e4
LT
846 dev = po->pppoe_dev;
847
848 error = -EMSGSIZE;
6aba9158 849 if (total_len > (dev->mtu + dev->hard_header_len))
1da177e4
LT
850 goto end;
851
852
853 skb = sock_wmalloc(sk, total_len + dev->hard_header_len + 32,
854 0, GFP_KERNEL);
855 if (!skb) {
856 error = -ENOMEM;
857 goto end;
858 }
859
860 /* Reserve space for headers. */
861 skb_reserve(skb, dev->hard_header_len);
c1d2bbe1 862 skb_reset_network_header(skb);
1da177e4
LT
863
864 skb->dev = dev;
865
866 skb->priority = sk->sk_priority;
09640e63 867 skb->protocol = cpu_to_be16(ETH_P_PPP_SES);
1da177e4 868
a6bcf1c1
CG
869 ph = (struct pppoe_hdr *)skb_put(skb, total_len + sizeof(struct pppoe_hdr));
870 start = (char *)&ph->tag[0];
1da177e4
LT
871
872 error = memcpy_fromiovec(start, m->msg_iov, total_len);
1da177e4
LT
873 if (error < 0) {
874 kfree_skb(skb);
875 goto end;
876 }
877
878 error = total_len;
0c4e8581
SH
879 dev_hard_header(skb, dev, ETH_P_PPP_SES,
880 po->pppoe_pa.remote, NULL, total_len);
1da177e4
LT
881
882 memcpy(ph, &hdr, sizeof(struct pppoe_hdr));
883
884 ph->length = htons(total_len);
885
886 dev_queue_xmit(skb);
887
888end:
889 release_sock(sk);
890 return error;
891}
892
1da177e4
LT
893/************************************************************************
894 *
895 * xmit function for internal use.
896 *
897 ***********************************************************************/
898static int __pppoe_xmit(struct sock *sk, struct sk_buff *skb)
899{
900 struct pppox_sock *po = pppox_sk(sk);
901 struct net_device *dev = po->pppoe_dev;
1da177e4 902 struct pppoe_hdr *ph;
1da177e4 903 int data_len = skb->len;
1da177e4 904
fb64bb56
MO
905 /* The higher-level PPP code (ppp_unregister_channel()) ensures the PPP
906 * xmit operations conclude prior to an unregistration call. Thus
907 * sk->sk_state cannot change, so we don't need to do lock_sock().
908 * But, we also can't do a lock_sock since that introduces a potential
909 * deadlock as we'd reverse the lock ordering used when calling
910 * ppp_unregister_channel().
911 */
912
1da177e4
LT
913 if (sock_flag(sk, SOCK_DEAD) || !(sk->sk_state & PPPOX_CONNECTED))
914 goto abort;
915
1da177e4
LT
916 if (!dev)
917 goto abort;
918
db7bf6d9
HX
919 /* Copy the data if there is no space for the header or if it's
920 * read-only.
921 */
d9cc2048 922 if (skb_cow_head(skb, sizeof(*ph) + dev->hard_header_len))
db7bf6d9 923 goto abort;
1da177e4 924
9355ec23 925 __skb_push(skb, sizeof(*ph));
db7bf6d9 926 skb_reset_network_header(skb);
1da177e4 927
9355ec23
HX
928 ph = pppoe_hdr(skb);
929 ph->ver = 1;
930 ph->type = 1;
931 ph->code = 0;
932 ph->sid = po->num;
933 ph->length = htons(data_len);
934
09640e63 935 skb->protocol = cpu_to_be16(ETH_P_PPP_SES);
db7bf6d9 936 skb->dev = dev;
1da177e4 937
0c4e8581
SH
938 dev_hard_header(skb, dev, ETH_P_PPP_SES,
939 po->pppoe_pa.remote, NULL, data_len);
1da177e4 940
21d0c833 941 dev_queue_xmit(skb);
1da177e4
LT
942 return 1;
943
944abort:
db7bf6d9 945 kfree_skb(skb);
2a27a03d 946 return 1;
1da177e4
LT
947}
948
1da177e4
LT
949/************************************************************************
950 *
951 * xmit function called by generic PPP driver
952 * sends PPP frame over PPPoE socket
953 *
954 ***********************************************************************/
955static int pppoe_xmit(struct ppp_channel *chan, struct sk_buff *skb)
956{
a6bcf1c1 957 struct sock *sk = (struct sock *)chan->private;
1da177e4
LT
958 return __pppoe_xmit(sk, skb);
959}
960
d7100da0 961static const struct ppp_channel_ops pppoe_chan_ops = {
6aa20a22 962 .start_xmit = pppoe_xmit,
1da177e4
LT
963};
964
965static int pppoe_recvmsg(struct kiocb *iocb, struct socket *sock,
966 struct msghdr *m, size_t total_len, int flags)
967{
968 struct sock *sk = sock->sk;
bfafb26e 969 struct sk_buff *skb;
1da177e4 970 int error = 0;
1da177e4
LT
971
972 if (sk->sk_state & PPPOX_BOUND) {
973 error = -EIO;
974 goto end;
975 }
976
977 skb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT,
978 flags & MSG_DONTWAIT, &error);
bfafb26e 979 if (error < 0)
1da177e4 980 goto end;
1da177e4
LT
981
982 m->msg_namelen = 0;
983
984 if (skb) {
2645a3c3 985 total_len = min_t(size_t, total_len, skb->len);
392fdb0e 986 error = skb_copy_datagram_iovec(skb, 0, m->msg_iov, total_len);
968d7018
ED
987 if (error == 0) {
988 consume_skb(skb);
989 return total_len;
990 }
1da177e4
LT
991 }
992
797659fb 993 kfree_skb(skb);
1da177e4
LT
994end:
995 return error;
996}
997
998#ifdef CONFIG_PROC_FS
999static int pppoe_seq_show(struct seq_file *seq, void *v)
1000{
1001 struct pppox_sock *po;
1002 char *dev_name;
1003
1004 if (v == SEQ_START_TOKEN) {
1005 seq_puts(seq, "Id Address Device\n");
1006 goto out;
1007 }
1008
1009 po = v;
1010 dev_name = po->pppoe_pa.dev;
1011
e174961c 1012 seq_printf(seq, "%08X %pM %8s\n",
a6bcf1c1 1013 po->pppoe_pa.sid, po->pppoe_pa.remote, dev_name);
1da177e4
LT
1014out:
1015 return 0;
1016}
1017
a6bcf1c1 1018static inline struct pppox_sock *pppoe_get_idx(struct pppoe_net *pn, loff_t pos)
1da177e4 1019{
bfafb26e 1020 struct pppox_sock *po;
6aba9158 1021 int i;
1da177e4 1022
6aba9158 1023 for (i = 0; i < PPPOE_HASH_SIZE; i++) {
a6bcf1c1 1024 po = pn->hash_table[i];
1da177e4
LT
1025 while (po) {
1026 if (!pos--)
1027 goto out;
1028 po = po->next;
1029 }
1030 }
a6bcf1c1 1031
1da177e4
LT
1032out:
1033 return po;
1034}
1035
1036static void *pppoe_seq_start(struct seq_file *seq, loff_t *pos)
a6bcf1c1 1037 __acquires(pn->hash_lock)
1da177e4 1038{
3617aa48 1039 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
1da177e4
LT
1040 loff_t l = *pos;
1041
a6bcf1c1
CG
1042 read_lock_bh(&pn->hash_lock);
1043 return l ? pppoe_get_idx(pn, --l) : SEQ_START_TOKEN;
1da177e4
LT
1044}
1045
1046static void *pppoe_seq_next(struct seq_file *seq, void *v, loff_t *pos)
1047{
3617aa48 1048 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
1da177e4
LT
1049 struct pppox_sock *po;
1050
1051 ++*pos;
1052 if (v == SEQ_START_TOKEN) {
a6bcf1c1 1053 po = pppoe_get_idx(pn, 0);
1da177e4
LT
1054 goto out;
1055 }
1056 po = v;
6aa20a22 1057 if (po->next)
1da177e4
LT
1058 po = po->next;
1059 else {
1060 int hash = hash_item(po->pppoe_pa.sid, po->pppoe_pa.remote);
1061
72fc9397 1062 po = NULL;
1da177e4 1063 while (++hash < PPPOE_HASH_SIZE) {
a6bcf1c1 1064 po = pn->hash_table[hash];
1da177e4
LT
1065 if (po)
1066 break;
1067 }
1068 }
a6bcf1c1 1069
1da177e4
LT
1070out:
1071 return po;
1072}
1073
1074static void pppoe_seq_stop(struct seq_file *seq, void *v)
a6bcf1c1 1075 __releases(pn->hash_lock)
1da177e4 1076{
3617aa48 1077 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
a6bcf1c1 1078 read_unlock_bh(&pn->hash_lock);
1da177e4
LT
1079}
1080
4101dec9 1081static const struct seq_operations pppoe_seq_ops = {
1da177e4
LT
1082 .start = pppoe_seq_start,
1083 .next = pppoe_seq_next,
1084 .stop = pppoe_seq_stop,
1085 .show = pppoe_seq_show,
1086};
1087
1088static int pppoe_seq_open(struct inode *inode, struct file *file)
1089{
3617aa48
CG
1090 return seq_open_net(inode, file, &pppoe_seq_ops,
1091 sizeof(struct seq_net_private));
1da177e4
LT
1092}
1093
d54b1fdb 1094static const struct file_operations pppoe_seq_fops = {
1da177e4
LT
1095 .owner = THIS_MODULE,
1096 .open = pppoe_seq_open,
1097 .read = seq_read,
1098 .llseek = seq_lseek,
3617aa48 1099 .release = seq_release_net,
1da177e4
LT
1100};
1101
1da177e4
LT
1102#endif /* CONFIG_PROC_FS */
1103
17ba15fb 1104static const struct proto_ops pppoe_ops = {
6aba9158
CG
1105 .family = AF_PPPOX,
1106 .owner = THIS_MODULE,
1107 .release = pppoe_release,
1108 .bind = sock_no_bind,
1109 .connect = pppoe_connect,
1110 .socketpair = sock_no_socketpair,
1111 .accept = sock_no_accept,
1112 .getname = pppoe_getname,
1113 .poll = datagram_poll,
1114 .listen = sock_no_listen,
1115 .shutdown = sock_no_shutdown,
1116 .setsockopt = sock_no_setsockopt,
1117 .getsockopt = sock_no_getsockopt,
1118 .sendmsg = pppoe_sendmsg,
1119 .recvmsg = pppoe_recvmsg,
1120 .mmap = sock_no_mmap,
1121 .ioctl = pppox_ioctl,
1da177e4
LT
1122};
1123
756e64a0 1124static const struct pppox_proto pppoe_proto = {
6aba9158
CG
1125 .create = pppoe_create,
1126 .ioctl = pppoe_ioctl,
1127 .owner = THIS_MODULE,
1da177e4
LT
1128};
1129
a6bcf1c1
CG
1130static __net_init int pppoe_init_net(struct net *net)
1131{
c879a6fc 1132 struct pppoe_net *pn = pppoe_pernet(net);
a6bcf1c1 1133 struct proc_dir_entry *pde;
a6bcf1c1
CG
1134
1135 rwlock_init(&pn->hash_lock);
1136
d4beaa66 1137 pde = proc_create("pppoe", S_IRUGO, net->proc_net, &pppoe_seq_fops);
a6bcf1c1 1138#ifdef CONFIG_PROC_FS
c879a6fc
EB
1139 if (!pde)
1140 return -ENOMEM;
a6bcf1c1
CG
1141#endif
1142
1143 return 0;
a6bcf1c1
CG
1144}
1145
1146static __net_exit void pppoe_exit_net(struct net *net)
1147{
ece31ffd 1148 remove_proc_entry("pppoe", net->proc_net);
a6bcf1c1
CG
1149}
1150
0012985d 1151static struct pernet_operations pppoe_net_ops = {
a6bcf1c1
CG
1152 .init = pppoe_init_net,
1153 .exit = pppoe_exit_net,
c879a6fc
EB
1154 .id = &pppoe_net_id,
1155 .size = sizeof(struct pppoe_net),
a6bcf1c1
CG
1156};
1157
1da177e4
LT
1158static int __init pppoe_init(void)
1159{
a6bcf1c1 1160 int err;
1da177e4 1161
c879a6fc 1162 err = register_pernet_device(&pppoe_net_ops);
1da177e4
LT
1163 if (err)
1164 goto out;
1165
07f6642e 1166 err = proto_register(&pppoe_sk_proto, 0);
1da177e4 1167 if (err)
07f6642e 1168 goto out_unregister_net_ops;
1da177e4 1169
07f6642e 1170 err = register_pppox_proto(PX_PROTO_OE, &pppoe_proto);
1da177e4 1171 if (err)
07f6642e 1172 goto out_unregister_pppoe_proto;
6aa20a22 1173
1da177e4
LT
1174 dev_add_pack(&pppoes_ptype);
1175 dev_add_pack(&pppoed_ptype);
1176 register_netdevice_notifier(&pppoe_notifier);
a6bcf1c1
CG
1177
1178 return 0;
1179
1da177e4
LT
1180out_unregister_pppoe_proto:
1181 proto_unregister(&pppoe_sk_proto);
07f6642e 1182out_unregister_net_ops:
c879a6fc 1183 unregister_pernet_device(&pppoe_net_ops);
a6bcf1c1
CG
1184out:
1185 return err;
1da177e4
LT
1186}
1187
1188static void __exit pppoe_exit(void)
1189{
1da177e4 1190 unregister_netdevice_notifier(&pppoe_notifier);
07f6642e
CG
1191 dev_remove_pack(&pppoed_ptype);
1192 dev_remove_pack(&pppoes_ptype);
1193 unregister_pppox_proto(PX_PROTO_OE);
1da177e4 1194 proto_unregister(&pppoe_sk_proto);
c879a6fc 1195 unregister_pernet_device(&pppoe_net_ops);
1da177e4
LT
1196}
1197
1198module_init(pppoe_init);
1199module_exit(pppoe_exit);
1200
1201MODULE_AUTHOR("Michal Ostrowski <mostrows@speakeasy.net>");
1202MODULE_DESCRIPTION("PPP over Ethernet driver");
1203MODULE_LICENSE("GPL");
1204MODULE_ALIAS_NETPROTO(PF_PPPOX);