]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - drivers/net/ppp/pppoe.c
tipc: Don't use iocb argument in socket layer
[mirror_ubuntu-zesty-kernel.git] / drivers / net / ppp / pppoe.c
CommitLineData
1da177e4
LT
1/** -*- linux-c -*- ***********************************************************
2 * Linux PPP over Ethernet (PPPoX/PPPoE) Sockets
3 *
4 * PPPoX --- Generic PPP encapsulation socket family
5 * PPPoE --- PPP over Ethernet (RFC 2516)
6 *
7 *
8 * Version: 0.7.0
9 *
90719dbe
FZ
10 * 070228 : Fix to allow multiple sessions with same remote MAC and same
11 * session id by including the local device ifindex in the
12 * tuple identifying a session. This also ensures packets can't
13 * be injected into a session from interfaces other than the one
14 * specified by userspace. Florian Zumbiehl <florz@florz.de>
15 * (Oh, BTW, this one is YYMMDD, in case you were wondering ...)
1da177e4
LT
16 * 220102 : Fix module use count on failure in pppoe_create, pppox_sk -acme
17 * 030700 : Fixed connect logic to allow for disconnect.
18 * 270700 : Fixed potential SMP problems; we must protect against
19 * simultaneous invocation of ppp_input
20 * and ppp_unregister_channel.
21 * 040800 : Respect reference count mechanisms on net-devices.
22 * 200800 : fix kfree(skb) in pppoe_rcv (acme)
23 * Module reference count is decremented in the right spot now,
24 * guards against sock_put not actually freeing the sk
25 * in pppoe_release.
26 * 051000 : Initialization cleanup.
27 * 111100 : Fix recvmsg.
28 * 050101 : Fix PADT procesing.
29 * 140501 : Use pppoe_rcv_core to handle all backlog. (Alexey)
30 * 170701 : Do not lock_sock with rwlock held. (DaveM)
31 * Ignore discovery frames if user has socket
32 * locked. (DaveM)
33 * Ignore return value of dev_queue_xmit in __pppoe_xmit
34 * or else we may kfree an SKB twice. (DaveM)
35 * 190701 : When doing copies of skb's in __pppoe_xmit, always delete
36 * the original skb that was passed in on success, never on
37 * failure. Delete the copy of the skb on failure to avoid
38 * a memory leak.
39 * 081001 : Misc. cleanup (licence string, non-blocking, prevent
40 * reference of device on close).
41 * 121301 : New ppp channels interface; cannot unregister a channel
42 * from interrupts. Thus, we mark the socket as a ZOMBIE
43 * and do the unregistration later.
44 * 081002 : seq_file support for proc stuff -acme
45 * 111602 : Merge all 2.4 fixes into 2.5/2.6 tree. Label 2.5/2.6
46 * as version 0.7. Spacing cleanup.
47 * Author: Michal Ostrowski <mostrows@speakeasy.net>
48 * Contributors:
49 * Arnaldo Carvalho de Melo <acme@conectiva.com.br>
50 * David S. Miller (davem@redhat.com)
51 *
52 * License:
53 * This program is free software; you can redistribute it and/or
54 * modify it under the terms of the GNU General Public License
55 * as published by the Free Software Foundation; either version
56 * 2 of the License, or (at your option) any later version.
57 *
58 */
59
60#include <linux/string.h>
61#include <linux/module.h>
62#include <linux/kernel.h>
63#include <linux/slab.h>
64#include <linux/errno.h>
65#include <linux/netdevice.h>
66#include <linux/net.h>
67#include <linux/inetdevice.h>
68#include <linux/etherdevice.h>
69#include <linux/skbuff.h>
70#include <linux/init.h>
71#include <linux/if_ether.h>
72#include <linux/if_pppox.h>
73#include <linux/ppp_channel.h>
74#include <linux/ppp_defs.h>
4b32da2b 75#include <linux/ppp-ioctl.h>
1da177e4
LT
76#include <linux/notifier.h>
77#include <linux/file.h>
78#include <linux/proc_fs.h>
79#include <linux/seq_file.h>
80
a6bcf1c1 81#include <linux/nsproxy.h>
457c4cbc 82#include <net/net_namespace.h>
a6bcf1c1 83#include <net/netns/generic.h>
1da177e4
LT
84#include <net/sock.h>
85
86#include <asm/uaccess.h>
87
88#define PPPOE_HASH_BITS 4
6aba9158
CG
89#define PPPOE_HASH_SIZE (1 << PPPOE_HASH_BITS)
90#define PPPOE_HASH_MASK (PPPOE_HASH_SIZE - 1)
1da177e4 91
1da177e4
LT
92static int __pppoe_xmit(struct sock *sk, struct sk_buff *skb);
93
17ba15fb 94static const struct proto_ops pppoe_ops;
d7100da0 95static const struct ppp_channel_ops pppoe_chan_ops;
a6bcf1c1
CG
96
97/* per-net private data for this module */
f99189b1 98static int pppoe_net_id __read_mostly;
a6bcf1c1
CG
99struct pppoe_net {
100 /*
101 * we could use _single_ hash table for all
102 * nets by injecting net id into the hash but
103 * it would increase hash chains and add
104 * a few additional math comparations messy
105 * as well, moreover in case of SMP less locking
106 * controversy here
107 */
108 struct pppox_sock *hash_table[PPPOE_HASH_SIZE];
109 rwlock_t hash_lock;
110};
111
6aba9158
CG
112/*
113 * PPPoE could be in the following stages:
114 * 1) Discovery stage (to obtain remote MAC and Session ID)
115 * 2) Session stage (MAC and SID are known)
116 *
117 * Ethernet frames have a special tag for this but
25985edc 118 * we use simpler approach based on session id
6aba9158
CG
119 */
120static inline bool stage_session(__be16 sid)
121{
122 return sid != 0;
123}
1da177e4 124
a6bcf1c1
CG
125static inline struct pppoe_net *pppoe_pernet(struct net *net)
126{
127 BUG_ON(!net);
128
129 return net_generic(net, pppoe_net_id);
130}
131
1da177e4
LT
132static inline int cmp_2_addr(struct pppoe_addr *a, struct pppoe_addr *b)
133{
7ed8ca5b 134 return a->sid == b->sid && ether_addr_equal(a->remote, b->remote);
1da177e4
LT
135}
136
b963dc1d 137static inline int cmp_addr(struct pppoe_addr *a, __be16 sid, char *addr)
1da177e4 138{
7ed8ca5b 139 return a->sid == sid && ether_addr_equal(a->remote, addr);
1da177e4
LT
140}
141
6aba9158 142#if 8 % PPPOE_HASH_BITS
f1543f8b
FZ
143#error 8 must be a multiple of PPPOE_HASH_BITS
144#endif
145
b963dc1d 146static int hash_item(__be16 sid, unsigned char *addr)
1da177e4 147{
f1543f8b
FZ
148 unsigned char hash = 0;
149 unsigned int i;
1da177e4 150
6aba9158 151 for (i = 0; i < ETH_ALEN; i++)
f1543f8b 152 hash ^= addr[i];
6aba9158
CG
153 for (i = 0; i < sizeof(sid_t) * 8; i += 8)
154 hash ^= (__force __u32)sid >> i;
155 for (i = 8; (i >>= 1) >= PPPOE_HASH_BITS;)
156 hash ^= hash >> i;
1da177e4 157
6aba9158 158 return hash & PPPOE_HASH_MASK;
1da177e4
LT
159}
160
1da177e4
LT
161/**********************************************************************
162 *
163 * Set/get/delete/rehash items (internal versions)
164 *
165 **********************************************************************/
a6bcf1c1
CG
166static struct pppox_sock *__get_item(struct pppoe_net *pn, __be16 sid,
167 unsigned char *addr, int ifindex)
1da177e4
LT
168{
169 int hash = hash_item(sid, addr);
170 struct pppox_sock *ret;
171
a6bcf1c1 172 ret = pn->hash_table[hash];
6aba9158
CG
173 while (ret) {
174 if (cmp_addr(&ret->pppoe_pa, sid, addr) &&
175 ret->pppoe_ifindex == ifindex)
176 return ret;
177
1da177e4 178 ret = ret->next;
6aba9158 179 }
1da177e4 180
6aba9158 181 return NULL;
1da177e4
LT
182}
183
a6bcf1c1 184static int __set_item(struct pppoe_net *pn, struct pppox_sock *po)
1da177e4
LT
185{
186 int hash = hash_item(po->pppoe_pa.sid, po->pppoe_pa.remote);
187 struct pppox_sock *ret;
188
a6bcf1c1 189 ret = pn->hash_table[hash];
1da177e4 190 while (ret) {
6aba9158
CG
191 if (cmp_2_addr(&ret->pppoe_pa, &po->pppoe_pa) &&
192 ret->pppoe_ifindex == po->pppoe_ifindex)
1da177e4
LT
193 return -EALREADY;
194
195 ret = ret->next;
196 }
197
a6bcf1c1
CG
198 po->next = pn->hash_table[hash];
199 pn->hash_table[hash] = po;
1da177e4
LT
200
201 return 0;
202}
203
3b12bb60 204static void __delete_item(struct pppoe_net *pn, __be16 sid,
a6bcf1c1 205 char *addr, int ifindex)
1da177e4
LT
206{
207 int hash = hash_item(sid, addr);
208 struct pppox_sock *ret, **src;
209
a6bcf1c1
CG
210 ret = pn->hash_table[hash];
211 src = &pn->hash_table[hash];
1da177e4
LT
212
213 while (ret) {
6aba9158
CG
214 if (cmp_addr(&ret->pppoe_pa, sid, addr) &&
215 ret->pppoe_ifindex == ifindex) {
1da177e4
LT
216 *src = ret->next;
217 break;
218 }
219
220 src = &ret->next;
221 ret = ret->next;
222 }
1da177e4
LT
223}
224
225/**********************************************************************
226 *
227 * Set/get/delete/rehash items
228 *
229 **********************************************************************/
a6bcf1c1
CG
230static inline struct pppox_sock *get_item(struct pppoe_net *pn, __be16 sid,
231 unsigned char *addr, int ifindex)
1da177e4
LT
232{
233 struct pppox_sock *po;
234
a6bcf1c1
CG
235 read_lock_bh(&pn->hash_lock);
236 po = __get_item(pn, sid, addr, ifindex);
1da177e4
LT
237 if (po)
238 sock_hold(sk_pppox(po));
a6bcf1c1 239 read_unlock_bh(&pn->hash_lock);
1da177e4
LT
240
241 return po;
242}
243
a6bcf1c1
CG
244static inline struct pppox_sock *get_item_by_addr(struct net *net,
245 struct sockaddr_pppox *sp)
1da177e4 246{
bfafb26e 247 struct net_device *dev;
a6bcf1c1 248 struct pppoe_net *pn;
1178f66e 249 struct pppox_sock *pppox_sock = NULL;
a6bcf1c1 250
90719dbe
FZ
251 int ifindex;
252
1178f66e
ED
253 rcu_read_lock();
254 dev = dev_get_by_name_rcu(net, sp->sa_addr.pppoe.dev);
255 if (dev) {
256 ifindex = dev->ifindex;
be9e969d 257 pn = pppoe_pernet(net);
1178f66e 258 pppox_sock = get_item(pn, sp->sa_addr.pppoe.sid,
a6bcf1c1 259 sp->sa_addr.pppoe.remote, ifindex);
1178f66e
ED
260 }
261 rcu_read_unlock();
a6bcf1c1 262 return pppox_sock;
1da177e4
LT
263}
264
3b12bb60 265static inline void delete_item(struct pppoe_net *pn, __be16 sid,
a6bcf1c1 266 char *addr, int ifindex)
1da177e4 267{
a6bcf1c1 268 write_lock_bh(&pn->hash_lock);
3b12bb60 269 __delete_item(pn, sid, addr, ifindex);
a6bcf1c1 270 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
271}
272
1da177e4
LT
273/***************************************************************************
274 *
275 * Handler for device events.
276 * Certain device events require that sockets be unconnected.
277 *
278 **************************************************************************/
279
280static void pppoe_flush_dev(struct net_device *dev)
281{
a6bcf1c1
CG
282 struct pppoe_net *pn;
283 int i;
284
a5e93151 285 pn = pppoe_pernet(dev_net(dev));
a6bcf1c1
CG
286 write_lock_bh(&pn->hash_lock);
287 for (i = 0; i < PPPOE_HASH_SIZE; i++) {
288 struct pppox_sock *po = pn->hash_table[i];
fb64bb56 289 struct sock *sk;
1da177e4 290
fb64bb56
MO
291 while (po) {
292 while (po && po->pppoe_dev != dev) {
42dc9cd5 293 po = po->next;
42dc9cd5 294 }
fb64bb56
MO
295
296 if (!po)
297 break;
298
a6bcf1c1 299 sk = sk_pppox(po);
1da177e4 300
42dc9cd5 301 /* We always grab the socket lock, followed by the
fb64bb56
MO
302 * hash_lock, in that order. Since we should hold the
303 * sock lock while doing any unbinding, we need to
304 * release the lock we're holding. Hold a reference to
305 * the sock so it doesn't disappear as we're jumping
306 * between locks.
42dc9cd5 307 */
1da177e4 308
42dc9cd5 309 sock_hold(sk);
a6bcf1c1 310 write_unlock_bh(&pn->hash_lock);
42dc9cd5 311 lock_sock(sk);
1da177e4 312
8e95a202 313 if (po->pppoe_dev == dev &&
ae07b0b2 314 sk->sk_state & (PPPOX_CONNECTED | PPPOX_BOUND | PPPOX_ZOMBIE)) {
42dc9cd5
MO
315 pppox_unbind_sock(sk);
316 sk->sk_state = PPPOX_ZOMBIE;
317 sk->sk_state_change(sk);
fb64bb56
MO
318 po->pppoe_dev = NULL;
319 dev_put(dev);
42dc9cd5 320 }
1da177e4 321
42dc9cd5
MO
322 release_sock(sk);
323 sock_put(sk);
1da177e4 324
fb64bb56
MO
325 /* Restart the process from the start of the current
326 * hash chain. We dropped locks so the world may have
327 * change from underneath us.
42dc9cd5 328 */
fb64bb56
MO
329
330 BUG_ON(pppoe_pernet(dev_net(dev)) == NULL);
a6bcf1c1
CG
331 write_lock_bh(&pn->hash_lock);
332 po = pn->hash_table[i];
1da177e4
LT
333 }
334 }
a6bcf1c1 335 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
336}
337
338static int pppoe_device_event(struct notifier_block *this,
339 unsigned long event, void *ptr)
340{
351638e7 341 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
e9dc8653 342
1da177e4
LT
343 /* Only look at sockets that are using this specific device. */
344 switch (event) {
680ba7ca 345 case NETDEV_CHANGEADDR:
1da177e4 346 case NETDEV_CHANGEMTU:
680ba7ca 347 /* A change in mtu or address is a bad thing, requiring
1da177e4
LT
348 * LCP re-negotiation.
349 */
350
351 case NETDEV_GOING_DOWN:
352 case NETDEV_DOWN:
353 /* Find every socket on this device and kill it. */
354 pppoe_flush_dev(dev);
355 break;
356
357 default:
358 break;
ee289b64 359 }
1da177e4
LT
360
361 return NOTIFY_DONE;
362}
363
1da177e4
LT
364static struct notifier_block pppoe_notifier = {
365 .notifier_call = pppoe_device_event,
366};
367
1da177e4
LT
368/************************************************************************
369 *
370 * Do the real work of receiving a PPPoE Session frame.
371 *
372 ***********************************************************************/
373static int pppoe_rcv_core(struct sock *sk, struct sk_buff *skb)
374{
375 struct pppox_sock *po = pppox_sk(sk);
bfafb26e 376 struct pppox_sock *relay_po;
1da177e4 377
fb64bb56
MO
378 /* Backlog receive. Semantics of backlog rcv preclude any code from
379 * executing in lock_sock()/release_sock() bounds; meaning sk->sk_state
380 * can't change.
381 */
382
1da177e4 383 if (sk->sk_state & PPPOX_BOUND) {
1da177e4
LT
384 ppp_input(&po->chan, skb);
385 } else if (sk->sk_state & PPPOX_RELAY) {
fb64bb56
MO
386 relay_po = get_item_by_addr(sock_net(sk),
387 &po->pppoe_relay);
1da177e4
LT
388 if (relay_po == NULL)
389 goto abort_kfree;
390
391 if ((sk_pppox(relay_po)->sk_state & PPPOX_CONNECTED) == 0)
392 goto abort_put;
393
1da177e4
LT
394 if (!__pppoe_xmit(sk_pppox(relay_po), skb))
395 goto abort_put;
396 } else {
397 if (sock_queue_rcv_skb(sk, skb))
398 goto abort_kfree;
399 }
400
401 return NET_RX_SUCCESS;
402
403abort_put:
404 sock_put(sk_pppox(relay_po));
405
406abort_kfree:
407 kfree_skb(skb);
408 return NET_RX_DROP;
409}
410
411/************************************************************************
412 *
413 * Receive wrapper called in BH context.
414 *
415 ***********************************************************************/
a6bcf1c1
CG
416static int pppoe_rcv(struct sk_buff *skb, struct net_device *dev,
417 struct packet_type *pt, struct net_device *orig_dev)
1da177e4
LT
418{
419 struct pppoe_hdr *ph;
420 struct pppox_sock *po;
a6bcf1c1 421 struct pppoe_net *pn;
392fdb0e 422 int len;
1da177e4 423
6aba9158
CG
424 skb = skb_share_check(skb, GFP_ATOMIC);
425 if (!skb)
1da177e4
LT
426 goto out;
427
31bac444
HX
428 if (!pskb_may_pull(skb, sizeof(struct pppoe_hdr)))
429 goto drop;
430
797659fb 431 ph = pppoe_hdr(skb);
392fdb0e
HX
432 len = ntohs(ph->length);
433
434 skb_pull_rcsum(skb, sizeof(*ph));
435 if (skb->len < len)
436 goto drop;
1da177e4 437
263e69cb 438 if (pskb_trim_rcsum(skb, len))
392fdb0e
HX
439 goto drop;
440
a6bcf1c1 441 pn = pppoe_pernet(dev_net(dev));
fb64bb56
MO
442
443 /* Note that get_item does a sock_hold(), so sk_pppox(po)
444 * is known to be safe.
445 */
a6bcf1c1 446 po = get_item(pn, ph->sid, eth_hdr(skb)->h_source, dev->ifindex);
263e69cb 447 if (!po)
392fdb0e
HX
448 goto drop;
449
450 return sk_receive_skb(sk_pppox(po), skb, 0);
451
1da177e4
LT
452drop:
453 kfree_skb(skb);
454out:
455 return NET_RX_DROP;
456}
457
287f3a94
SF
458static void pppoe_unbind_sock_work(struct work_struct *work)
459{
460 struct pppox_sock *po = container_of(work, struct pppox_sock,
461 proto.pppoe.padt_work);
462 struct sock *sk = sk_pppox(po);
463
464 lock_sock(sk);
465 pppox_unbind_sock(sk);
466 release_sock(sk);
467 sock_put(sk);
468}
469
1da177e4
LT
470/************************************************************************
471 *
472 * Receive a PPPoE Discovery frame.
473 * This is solely for detection of PADT frames
474 *
475 ***********************************************************************/
a6bcf1c1
CG
476static int pppoe_disc_rcv(struct sk_buff *skb, struct net_device *dev,
477 struct packet_type *pt, struct net_device *orig_dev)
1da177e4
LT
478
479{
480 struct pppoe_hdr *ph;
481 struct pppox_sock *po;
a6bcf1c1 482 struct pppoe_net *pn;
e730c155 483
6aba9158
CG
484 skb = skb_share_check(skb, GFP_ATOMIC);
485 if (!skb)
1da177e4
LT
486 goto out;
487
bc6cffd1
HX
488 if (!pskb_may_pull(skb, sizeof(struct pppoe_hdr)))
489 goto abort;
490
797659fb 491 ph = pppoe_hdr(skb);
1da177e4
LT
492 if (ph->code != PADT_CODE)
493 goto abort;
494
a6bcf1c1
CG
495 pn = pppoe_pernet(dev_net(dev));
496 po = get_item(pn, ph->sid, eth_hdr(skb)->h_source, dev->ifindex);
1da177e4
LT
497 if (po) {
498 struct sock *sk = sk_pppox(po);
499
500 bh_lock_sock(sk);
501
502 /* If the user has locked the socket, just ignore
503 * the packet. With the way two rcv protocols hook into
504 * one socket family type, we cannot (easily) distinguish
505 * what kind of SKB it is during backlog rcv.
506 */
507 if (sock_owned_by_user(sk) == 0) {
508 /* We're no longer connect at the PPPOE layer,
509 * and must wait for ppp channel to disconnect us.
510 */
511 sk->sk_state = PPPOX_ZOMBIE;
512 }
513
514 bh_unlock_sock(sk);
287f3a94
SF
515 if (!schedule_work(&po->proto.pppoe.padt_work))
516 sock_put(sk);
1da177e4
LT
517 }
518
519abort:
520 kfree_skb(skb);
521out:
522 return NET_RX_SUCCESS; /* Lies... :-) */
523}
524
7546dd97 525static struct packet_type pppoes_ptype __read_mostly = {
09640e63 526 .type = cpu_to_be16(ETH_P_PPP_SES),
1da177e4
LT
527 .func = pppoe_rcv,
528};
529
7546dd97 530static struct packet_type pppoed_ptype __read_mostly = {
09640e63 531 .type = cpu_to_be16(ETH_P_PPP_DISC),
1da177e4
LT
532 .func = pppoe_disc_rcv,
533};
534
7546dd97 535static struct proto pppoe_sk_proto __read_mostly = {
1da177e4
LT
536 .name = "PPPOE",
537 .owner = THIS_MODULE,
538 .obj_size = sizeof(struct pppox_sock),
539};
540
541/***********************************************************************
542 *
543 * Initialize a new struct sock.
544 *
545 **********************************************************************/
1b8d7ae4 546static int pppoe_create(struct net *net, struct socket *sock)
1da177e4 547{
1da177e4
LT
548 struct sock *sk;
549
6257ff21 550 sk = sk_alloc(net, PF_PPPOX, GFP_KERNEL, &pppoe_sk_proto);
1da177e4 551 if (!sk)
6aba9158 552 return -ENOMEM;
1da177e4
LT
553
554 sock_init_data(sock, sk);
555
a6bcf1c1
CG
556 sock->state = SS_UNCONNECTED;
557 sock->ops = &pppoe_ops;
1da177e4 558
a6bcf1c1
CG
559 sk->sk_backlog_rcv = pppoe_rcv_core;
560 sk->sk_state = PPPOX_NONE;
561 sk->sk_type = SOCK_STREAM;
562 sk->sk_family = PF_PPPOX;
563 sk->sk_protocol = PX_PROTO_OE;
1da177e4 564
6aba9158 565 return 0;
1da177e4
LT
566}
567
568static int pppoe_release(struct socket *sock)
569{
570 struct sock *sk = sock->sk;
571 struct pppox_sock *po;
a6bcf1c1 572 struct pppoe_net *pn;
fb64bb56 573 struct net *net = NULL;
1da177e4
LT
574
575 if (!sk)
576 return 0;
577
42dc9cd5 578 lock_sock(sk);
6aba9158 579 if (sock_flag(sk, SOCK_DEAD)) {
42dc9cd5 580 release_sock(sk);
1da177e4 581 return -EBADF;
42dc9cd5 582 }
1da177e4 583
fb64bb56
MO
584 po = pppox_sk(sk);
585
2b018d57 586 if (sk->sk_state & (PPPOX_CONNECTED | PPPOX_BOUND | PPPOX_ZOMBIE)) {
fb64bb56
MO
587 dev_put(po->pppoe_dev);
588 po->pppoe_dev = NULL;
589 }
590
1da177e4
LT
591 pppox_unbind_sock(sk);
592
593 /* Signal the death of the socket. */
594 sk->sk_state = PPPOX_DEAD;
595
fb64bb56
MO
596 net = sock_net(sk);
597 pn = pppoe_pernet(net);
42dc9cd5 598
a6bcf1c1
CG
599 /*
600 * protect "po" from concurrent updates
601 * on pppoe_flush_dev
602 */
fb64bb56
MO
603 delete_item(pn, po->pppoe_pa.sid, po->pppoe_pa.remote,
604 po->pppoe_ifindex);
42dc9cd5 605
1da177e4
LT
606 sock_orphan(sk);
607 sock->sk = NULL;
608
609 skb_queue_purge(&sk->sk_receive_queue);
42dc9cd5 610 release_sock(sk);
1da177e4
LT
611 sock_put(sk);
612
bfafb26e 613 return 0;
1da177e4
LT
614}
615
1da177e4
LT
616static int pppoe_connect(struct socket *sock, struct sockaddr *uservaddr,
617 int sockaddr_len, int flags)
618{
619 struct sock *sk = sock->sk;
a6bcf1c1 620 struct sockaddr_pppox *sp = (struct sockaddr_pppox *)uservaddr;
1da177e4 621 struct pppox_sock *po = pppox_sk(sk);
fb64bb56 622 struct net_device *dev = NULL;
a6bcf1c1 623 struct pppoe_net *pn;
fb64bb56 624 struct net *net = NULL;
1da177e4
LT
625 int error;
626
627 lock_sock(sk);
628
287f3a94
SF
629 INIT_WORK(&po->proto.pppoe.padt_work, pppoe_unbind_sock_work);
630
1da177e4
LT
631 error = -EINVAL;
632 if (sp->sa_protocol != PX_PROTO_OE)
633 goto end;
634
635 /* Check for already bound sockets */
636 error = -EBUSY;
6aba9158
CG
637 if ((sk->sk_state & PPPOX_CONNECTED) &&
638 stage_session(sp->sa_addr.pppoe.sid))
1da177e4
LT
639 goto end;
640
641 /* Check for already disconnected sockets, on attempts to disconnect */
642 error = -EALREADY;
6aba9158
CG
643 if ((sk->sk_state & PPPOX_DEAD) &&
644 !stage_session(sp->sa_addr.pppoe.sid))
1da177e4
LT
645 goto end;
646
647 error = 0;
1da177e4 648
6aba9158
CG
649 /* Delete the old binding */
650 if (stage_session(po->pppoe_pa.sid)) {
651 pppox_unbind_sock(sk);
fb64bb56
MO
652 pn = pppoe_pernet(sock_net(sk));
653 delete_item(pn, po->pppoe_pa.sid,
654 po->pppoe_pa.remote, po->pppoe_ifindex);
a6bcf1c1 655 if (po->pppoe_dev) {
1da177e4 656 dev_put(po->pppoe_dev);
fb64bb56 657 po->pppoe_dev = NULL;
a6bcf1c1 658 }
fb64bb56 659
1da177e4
LT
660 memset(sk_pppox(po) + 1, 0,
661 sizeof(struct pppox_sock) - sizeof(struct sock));
1da177e4
LT
662 sk->sk_state = PPPOX_NONE;
663 }
664
6aba9158
CG
665 /* Re-bind in session stage only */
666 if (stage_session(sp->sa_addr.pppoe.sid)) {
1da177e4 667 error = -ENODEV;
fb64bb56
MO
668 net = sock_net(sk);
669 dev = dev_get_by_name(net, sp->sa_addr.pppoe.dev);
1da177e4 670 if (!dev)
fb64bb56 671 goto err_put;
1da177e4
LT
672
673 po->pppoe_dev = dev;
6f30e186 674 po->pppoe_ifindex = dev->ifindex;
fb64bb56 675 pn = pppoe_pernet(net);
6aba9158 676 if (!(dev->flags & IFF_UP)) {
1da177e4 677 goto err_put;
74b885cf 678 }
1da177e4
LT
679
680 memcpy(&po->pppoe_pa,
681 &sp->sa_addr.pppoe,
682 sizeof(struct pppoe_addr));
683
fb64bb56 684 write_lock_bh(&pn->hash_lock);
a6bcf1c1
CG
685 error = __set_item(pn, po);
686 write_unlock_bh(&pn->hash_lock);
1da177e4
LT
687 if (error < 0)
688 goto err_put;
689
690 po->chan.hdrlen = (sizeof(struct pppoe_hdr) +
691 dev->hard_header_len);
692
a8a3e41c 693 po->chan.mtu = dev->mtu - sizeof(struct pppoe_hdr) - 2;
1da177e4
LT
694 po->chan.private = sk;
695 po->chan.ops = &pppoe_chan_ops;
696
f5882c30 697 error = ppp_register_net_channel(dev_net(dev), &po->chan);
fb64bb56
MO
698 if (error) {
699 delete_item(pn, po->pppoe_pa.sid,
700 po->pppoe_pa.remote, po->pppoe_ifindex);
1da177e4 701 goto err_put;
fb64bb56 702 }
1da177e4
LT
703
704 sk->sk_state = PPPOX_CONNECTED;
705 }
706
707 po->num = sp->sa_addr.pppoe.sid;
708
6aba9158 709end:
1da177e4
LT
710 release_sock(sk);
711 return error;
712err_put:
713 if (po->pppoe_dev) {
714 dev_put(po->pppoe_dev);
715 po->pppoe_dev = NULL;
716 }
717 goto end;
718}
719
1da177e4
LT
720static int pppoe_getname(struct socket *sock, struct sockaddr *uaddr,
721 int *usockaddr_len, int peer)
722{
723 int len = sizeof(struct sockaddr_pppox);
724 struct sockaddr_pppox sp;
725
726 sp.sa_family = AF_PPPOX;
727 sp.sa_protocol = PX_PROTO_OE;
728 memcpy(&sp.sa_addr.pppoe, &pppox_sk(sock->sk)->pppoe_pa,
729 sizeof(struct pppoe_addr));
730
731 memcpy(uaddr, &sp, len);
732
733 *usockaddr_len = len;
734
735 return 0;
736}
737
1da177e4
LT
738static int pppoe_ioctl(struct socket *sock, unsigned int cmd,
739 unsigned long arg)
740{
741 struct sock *sk = sock->sk;
742 struct pppox_sock *po = pppox_sk(sk);
86c1dcfc
FZ
743 int val;
744 int err;
1da177e4
LT
745
746 switch (cmd) {
747 case PPPIOCGMRU:
748 err = -ENXIO;
1da177e4
LT
749 if (!(sk->sk_state & PPPOX_CONNECTED))
750 break;
751
752 err = -EFAULT;
753 if (put_user(po->pppoe_dev->mtu -
754 sizeof(struct pppoe_hdr) -
755 PPP_HDRLEN,
a6bcf1c1 756 (int __user *)arg))
1da177e4
LT
757 break;
758 err = 0;
759 break;
760
761 case PPPIOCSMRU:
762 err = -ENXIO;
763 if (!(sk->sk_state & PPPOX_CONNECTED))
764 break;
765
766 err = -EFAULT;
6aba9158 767 if (get_user(val, (int __user *)arg))
1da177e4
LT
768 break;
769
770 if (val < (po->pppoe_dev->mtu
771 - sizeof(struct pppoe_hdr)
772 - PPP_HDRLEN))
773 err = 0;
774 else
775 err = -EINVAL;
776 break;
777
778 case PPPIOCSFLAGS:
779 err = -EFAULT;
6aba9158 780 if (get_user(val, (int __user *)arg))
1da177e4
LT
781 break;
782 err = 0;
783 break;
784
785 case PPPOEIOCSFWD:
786 {
787 struct pppox_sock *relay_po;
788
789 err = -EBUSY;
790 if (sk->sk_state & (PPPOX_BOUND | PPPOX_ZOMBIE | PPPOX_DEAD))
791 break;
792
793 err = -ENOTCONN;
794 if (!(sk->sk_state & PPPOX_CONNECTED))
795 break;
796
797 /* PPPoE address from the user specifies an outbound
90719dbe 798 PPPoE address which frames are forwarded to */
1da177e4
LT
799 err = -EFAULT;
800 if (copy_from_user(&po->pppoe_relay,
801 (void __user *)arg,
802 sizeof(struct sockaddr_pppox)))
803 break;
804
805 err = -EINVAL;
806 if (po->pppoe_relay.sa_family != AF_PPPOX ||
6aba9158 807 po->pppoe_relay.sa_protocol != PX_PROTO_OE)
1da177e4
LT
808 break;
809
810 /* Check that the socket referenced by the address
811 actually exists. */
a6bcf1c1 812 relay_po = get_item_by_addr(sock_net(sk), &po->pppoe_relay);
1da177e4
LT
813 if (!relay_po)
814 break;
815
816 sock_put(sk_pppox(relay_po));
817 sk->sk_state |= PPPOX_RELAY;
818 err = 0;
819 break;
820 }
821
822 case PPPOEIOCDFWD:
823 err = -EALREADY;
824 if (!(sk->sk_state & PPPOX_RELAY))
825 break;
826
827 sk->sk_state &= ~PPPOX_RELAY;
828 err = 0;
829 break;
830
86c1dcfc
FZ
831 default:
832 err = -ENOTTY;
833 }
1da177e4
LT
834
835 return err;
836}
837
6aa20a22 838static int pppoe_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
839 struct msghdr *m, size_t total_len)
840{
bfafb26e 841 struct sk_buff *skb;
1da177e4
LT
842 struct sock *sk = sock->sk;
843 struct pppox_sock *po = pppox_sk(sk);
bfafb26e 844 int error;
1da177e4
LT
845 struct pppoe_hdr hdr;
846 struct pppoe_hdr *ph;
847 struct net_device *dev;
848 char *start;
849
8aeca8fe 850 lock_sock(sk);
1da177e4
LT
851 if (sock_flag(sk, SOCK_DEAD) || !(sk->sk_state & PPPOX_CONNECTED)) {
852 error = -ENOTCONN;
853 goto end;
854 }
855
856 hdr.ver = 1;
857 hdr.type = 1;
858 hdr.code = 0;
859 hdr.sid = po->num;
860
1da177e4
LT
861 dev = po->pppoe_dev;
862
863 error = -EMSGSIZE;
6aba9158 864 if (total_len > (dev->mtu + dev->hard_header_len))
1da177e4
LT
865 goto end;
866
867
868 skb = sock_wmalloc(sk, total_len + dev->hard_header_len + 32,
869 0, GFP_KERNEL);
870 if (!skb) {
871 error = -ENOMEM;
872 goto end;
873 }
874
875 /* Reserve space for headers. */
876 skb_reserve(skb, dev->hard_header_len);
c1d2bbe1 877 skb_reset_network_header(skb);
1da177e4
LT
878
879 skb->dev = dev;
880
881 skb->priority = sk->sk_priority;
09640e63 882 skb->protocol = cpu_to_be16(ETH_P_PPP_SES);
1da177e4 883
a6bcf1c1
CG
884 ph = (struct pppoe_hdr *)skb_put(skb, total_len + sizeof(struct pppoe_hdr));
885 start = (char *)&ph->tag[0];
1da177e4 886
6ce8e9ce 887 error = memcpy_from_msg(start, m, total_len);
1da177e4
LT
888 if (error < 0) {
889 kfree_skb(skb);
890 goto end;
891 }
892
893 error = total_len;
0c4e8581
SH
894 dev_hard_header(skb, dev, ETH_P_PPP_SES,
895 po->pppoe_pa.remote, NULL, total_len);
1da177e4
LT
896
897 memcpy(ph, &hdr, sizeof(struct pppoe_hdr));
898
899 ph->length = htons(total_len);
900
901 dev_queue_xmit(skb);
902
903end:
904 release_sock(sk);
905 return error;
906}
907
1da177e4
LT
908/************************************************************************
909 *
910 * xmit function for internal use.
911 *
912 ***********************************************************************/
913static int __pppoe_xmit(struct sock *sk, struct sk_buff *skb)
914{
915 struct pppox_sock *po = pppox_sk(sk);
916 struct net_device *dev = po->pppoe_dev;
1da177e4 917 struct pppoe_hdr *ph;
1da177e4 918 int data_len = skb->len;
1da177e4 919
fb64bb56
MO
920 /* The higher-level PPP code (ppp_unregister_channel()) ensures the PPP
921 * xmit operations conclude prior to an unregistration call. Thus
922 * sk->sk_state cannot change, so we don't need to do lock_sock().
923 * But, we also can't do a lock_sock since that introduces a potential
924 * deadlock as we'd reverse the lock ordering used when calling
925 * ppp_unregister_channel().
926 */
927
1da177e4
LT
928 if (sock_flag(sk, SOCK_DEAD) || !(sk->sk_state & PPPOX_CONNECTED))
929 goto abort;
930
1da177e4
LT
931 if (!dev)
932 goto abort;
933
db7bf6d9
HX
934 /* Copy the data if there is no space for the header or if it's
935 * read-only.
936 */
d9cc2048 937 if (skb_cow_head(skb, sizeof(*ph) + dev->hard_header_len))
db7bf6d9 938 goto abort;
1da177e4 939
9355ec23 940 __skb_push(skb, sizeof(*ph));
db7bf6d9 941 skb_reset_network_header(skb);
1da177e4 942
9355ec23
HX
943 ph = pppoe_hdr(skb);
944 ph->ver = 1;
945 ph->type = 1;
946 ph->code = 0;
947 ph->sid = po->num;
948 ph->length = htons(data_len);
949
09640e63 950 skb->protocol = cpu_to_be16(ETH_P_PPP_SES);
db7bf6d9 951 skb->dev = dev;
1da177e4 952
0c4e8581
SH
953 dev_hard_header(skb, dev, ETH_P_PPP_SES,
954 po->pppoe_pa.remote, NULL, data_len);
1da177e4 955
21d0c833 956 dev_queue_xmit(skb);
1da177e4
LT
957 return 1;
958
959abort:
db7bf6d9 960 kfree_skb(skb);
2a27a03d 961 return 1;
1da177e4
LT
962}
963
1da177e4
LT
964/************************************************************************
965 *
966 * xmit function called by generic PPP driver
967 * sends PPP frame over PPPoE socket
968 *
969 ***********************************************************************/
970static int pppoe_xmit(struct ppp_channel *chan, struct sk_buff *skb)
971{
a6bcf1c1 972 struct sock *sk = (struct sock *)chan->private;
1da177e4
LT
973 return __pppoe_xmit(sk, skb);
974}
975
d7100da0 976static const struct ppp_channel_ops pppoe_chan_ops = {
6aa20a22 977 .start_xmit = pppoe_xmit,
1da177e4
LT
978};
979
980static int pppoe_recvmsg(struct kiocb *iocb, struct socket *sock,
981 struct msghdr *m, size_t total_len, int flags)
982{
983 struct sock *sk = sock->sk;
bfafb26e 984 struct sk_buff *skb;
1da177e4 985 int error = 0;
1da177e4
LT
986
987 if (sk->sk_state & PPPOX_BOUND) {
988 error = -EIO;
989 goto end;
990 }
991
992 skb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT,
993 flags & MSG_DONTWAIT, &error);
bfafb26e 994 if (error < 0)
1da177e4 995 goto end;
1da177e4 996
1da177e4 997 if (skb) {
2645a3c3 998 total_len = min_t(size_t, total_len, skb->len);
51f3d02b 999 error = skb_copy_datagram_msg(skb, 0, m, total_len);
968d7018
ED
1000 if (error == 0) {
1001 consume_skb(skb);
1002 return total_len;
1003 }
1da177e4
LT
1004 }
1005
797659fb 1006 kfree_skb(skb);
1da177e4
LT
1007end:
1008 return error;
1009}
1010
1011#ifdef CONFIG_PROC_FS
1012static int pppoe_seq_show(struct seq_file *seq, void *v)
1013{
1014 struct pppox_sock *po;
1015 char *dev_name;
1016
1017 if (v == SEQ_START_TOKEN) {
1018 seq_puts(seq, "Id Address Device\n");
1019 goto out;
1020 }
1021
1022 po = v;
1023 dev_name = po->pppoe_pa.dev;
1024
e174961c 1025 seq_printf(seq, "%08X %pM %8s\n",
a6bcf1c1 1026 po->pppoe_pa.sid, po->pppoe_pa.remote, dev_name);
1da177e4
LT
1027out:
1028 return 0;
1029}
1030
a6bcf1c1 1031static inline struct pppox_sock *pppoe_get_idx(struct pppoe_net *pn, loff_t pos)
1da177e4 1032{
bfafb26e 1033 struct pppox_sock *po;
6aba9158 1034 int i;
1da177e4 1035
6aba9158 1036 for (i = 0; i < PPPOE_HASH_SIZE; i++) {
a6bcf1c1 1037 po = pn->hash_table[i];
1da177e4
LT
1038 while (po) {
1039 if (!pos--)
1040 goto out;
1041 po = po->next;
1042 }
1043 }
a6bcf1c1 1044
1da177e4
LT
1045out:
1046 return po;
1047}
1048
1049static void *pppoe_seq_start(struct seq_file *seq, loff_t *pos)
a6bcf1c1 1050 __acquires(pn->hash_lock)
1da177e4 1051{
3617aa48 1052 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
1da177e4
LT
1053 loff_t l = *pos;
1054
a6bcf1c1
CG
1055 read_lock_bh(&pn->hash_lock);
1056 return l ? pppoe_get_idx(pn, --l) : SEQ_START_TOKEN;
1da177e4
LT
1057}
1058
1059static void *pppoe_seq_next(struct seq_file *seq, void *v, loff_t *pos)
1060{
3617aa48 1061 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
1da177e4
LT
1062 struct pppox_sock *po;
1063
1064 ++*pos;
1065 if (v == SEQ_START_TOKEN) {
a6bcf1c1 1066 po = pppoe_get_idx(pn, 0);
1da177e4
LT
1067 goto out;
1068 }
1069 po = v;
6aa20a22 1070 if (po->next)
1da177e4
LT
1071 po = po->next;
1072 else {
1073 int hash = hash_item(po->pppoe_pa.sid, po->pppoe_pa.remote);
1074
72fc9397 1075 po = NULL;
1da177e4 1076 while (++hash < PPPOE_HASH_SIZE) {
a6bcf1c1 1077 po = pn->hash_table[hash];
1da177e4
LT
1078 if (po)
1079 break;
1080 }
1081 }
a6bcf1c1 1082
1da177e4
LT
1083out:
1084 return po;
1085}
1086
1087static void pppoe_seq_stop(struct seq_file *seq, void *v)
a6bcf1c1 1088 __releases(pn->hash_lock)
1da177e4 1089{
3617aa48 1090 struct pppoe_net *pn = pppoe_pernet(seq_file_net(seq));
a6bcf1c1 1091 read_unlock_bh(&pn->hash_lock);
1da177e4
LT
1092}
1093
4101dec9 1094static const struct seq_operations pppoe_seq_ops = {
1da177e4
LT
1095 .start = pppoe_seq_start,
1096 .next = pppoe_seq_next,
1097 .stop = pppoe_seq_stop,
1098 .show = pppoe_seq_show,
1099};
1100
1101static int pppoe_seq_open(struct inode *inode, struct file *file)
1102{
3617aa48
CG
1103 return seq_open_net(inode, file, &pppoe_seq_ops,
1104 sizeof(struct seq_net_private));
1da177e4
LT
1105}
1106
d54b1fdb 1107static const struct file_operations pppoe_seq_fops = {
1da177e4
LT
1108 .owner = THIS_MODULE,
1109 .open = pppoe_seq_open,
1110 .read = seq_read,
1111 .llseek = seq_lseek,
3617aa48 1112 .release = seq_release_net,
1da177e4
LT
1113};
1114
1da177e4
LT
1115#endif /* CONFIG_PROC_FS */
1116
17ba15fb 1117static const struct proto_ops pppoe_ops = {
6aba9158
CG
1118 .family = AF_PPPOX,
1119 .owner = THIS_MODULE,
1120 .release = pppoe_release,
1121 .bind = sock_no_bind,
1122 .connect = pppoe_connect,
1123 .socketpair = sock_no_socketpair,
1124 .accept = sock_no_accept,
1125 .getname = pppoe_getname,
1126 .poll = datagram_poll,
1127 .listen = sock_no_listen,
1128 .shutdown = sock_no_shutdown,
1129 .setsockopt = sock_no_setsockopt,
1130 .getsockopt = sock_no_getsockopt,
1131 .sendmsg = pppoe_sendmsg,
1132 .recvmsg = pppoe_recvmsg,
1133 .mmap = sock_no_mmap,
1134 .ioctl = pppox_ioctl,
1da177e4
LT
1135};
1136
756e64a0 1137static const struct pppox_proto pppoe_proto = {
6aba9158
CG
1138 .create = pppoe_create,
1139 .ioctl = pppoe_ioctl,
1140 .owner = THIS_MODULE,
1da177e4
LT
1141};
1142
a6bcf1c1
CG
1143static __net_init int pppoe_init_net(struct net *net)
1144{
c879a6fc 1145 struct pppoe_net *pn = pppoe_pernet(net);
a6bcf1c1 1146 struct proc_dir_entry *pde;
a6bcf1c1
CG
1147
1148 rwlock_init(&pn->hash_lock);
1149
d4beaa66 1150 pde = proc_create("pppoe", S_IRUGO, net->proc_net, &pppoe_seq_fops);
a6bcf1c1 1151#ifdef CONFIG_PROC_FS
c879a6fc
EB
1152 if (!pde)
1153 return -ENOMEM;
a6bcf1c1
CG
1154#endif
1155
1156 return 0;
a6bcf1c1
CG
1157}
1158
1159static __net_exit void pppoe_exit_net(struct net *net)
1160{
ece31ffd 1161 remove_proc_entry("pppoe", net->proc_net);
a6bcf1c1
CG
1162}
1163
0012985d 1164static struct pernet_operations pppoe_net_ops = {
a6bcf1c1
CG
1165 .init = pppoe_init_net,
1166 .exit = pppoe_exit_net,
c879a6fc
EB
1167 .id = &pppoe_net_id,
1168 .size = sizeof(struct pppoe_net),
a6bcf1c1
CG
1169};
1170
1da177e4
LT
1171static int __init pppoe_init(void)
1172{
a6bcf1c1 1173 int err;
1da177e4 1174
c879a6fc 1175 err = register_pernet_device(&pppoe_net_ops);
1da177e4
LT
1176 if (err)
1177 goto out;
1178
07f6642e 1179 err = proto_register(&pppoe_sk_proto, 0);
1da177e4 1180 if (err)
07f6642e 1181 goto out_unregister_net_ops;
1da177e4 1182
07f6642e 1183 err = register_pppox_proto(PX_PROTO_OE, &pppoe_proto);
1da177e4 1184 if (err)
07f6642e 1185 goto out_unregister_pppoe_proto;
6aa20a22 1186
1da177e4
LT
1187 dev_add_pack(&pppoes_ptype);
1188 dev_add_pack(&pppoed_ptype);
1189 register_netdevice_notifier(&pppoe_notifier);
a6bcf1c1
CG
1190
1191 return 0;
1192
1da177e4
LT
1193out_unregister_pppoe_proto:
1194 proto_unregister(&pppoe_sk_proto);
07f6642e 1195out_unregister_net_ops:
c879a6fc 1196 unregister_pernet_device(&pppoe_net_ops);
a6bcf1c1
CG
1197out:
1198 return err;
1da177e4
LT
1199}
1200
1201static void __exit pppoe_exit(void)
1202{
1da177e4 1203 unregister_netdevice_notifier(&pppoe_notifier);
07f6642e
CG
1204 dev_remove_pack(&pppoed_ptype);
1205 dev_remove_pack(&pppoes_ptype);
1206 unregister_pppox_proto(PX_PROTO_OE);
1da177e4 1207 proto_unregister(&pppoe_sk_proto);
c879a6fc 1208 unregister_pernet_device(&pppoe_net_ops);
1da177e4
LT
1209}
1210
1211module_init(pppoe_init);
1212module_exit(pppoe_exit);
1213
1214MODULE_AUTHOR("Michal Ostrowski <mostrows@speakeasy.net>");
1215MODULE_DESCRIPTION("PPP over Ethernet driver");
1216MODULE_LICENSE("GPL");
1217MODULE_ALIAS_NETPROTO(PF_PPPOX);