2 * INET An implementation of the TCP/IP protocol suite for the LINUX
3 * operating system. INET is implemented using the BSD Socket
4 * interface as the means of communication with the user level.
6 * PACKET - implements raw packet sockets.
8 * Version: $Id: af_packet.c,v 1.61 2002/02/08 03:57:19 davem Exp $
11 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
12 * Alan Cox, <gw4pts@gw4pts.ampr.org>
15 * Alan Cox : verify_area() now used correctly
16 * Alan Cox : new skbuff lists, look ma no backlogs!
17 * Alan Cox : tidied skbuff lists.
18 * Alan Cox : Now uses generic datagram routines I
19 * added. Also fixed the peek/read crash
20 * from all old Linux datagram code.
21 * Alan Cox : Uses the improved datagram code.
22 * Alan Cox : Added NULL's for socket options.
23 * Alan Cox : Re-commented the code.
24 * Alan Cox : Use new kernel side addressing
25 * Rob Janssen : Correct MTU usage.
26 * Dave Platt : Counter leaks caused by incorrect
27 * interrupt locking and some slightly
28 * dubious gcc output. Can you read
29 * compiler: it said _VOLATILE_
30 * Richard Kooijman : Timestamp fixes.
31 * Alan Cox : New buffers. Use sk->mac.raw.
32 * Alan Cox : sendmsg/recvmsg support.
33 * Alan Cox : Protocol setting support
34 * Alexey Kuznetsov : Untied from IPv4 stack.
35 * Cyrus Durgin : Fixed kerneld for kmod.
36 * Michal Ostrowski : Module initialization cleanup.
37 * Ulises Alonso : Frame number limit removal and
38 * packet_set_ring memory leak.
39 * Eric Biederman : Allow for > 8 byte hardware addresses.
40 * The convention is that longer addresses
41 * will simply extend the hardware address
42 * byte arrays at the end of sockaddr_ll
45 * This program is free software; you can redistribute it and/or
46 * modify it under the terms of the GNU General Public License
47 * as published by the Free Software Foundation; either version
48 * 2 of the License, or (at your option) any later version.
52 #include <linux/types.h>
54 #include <linux/capability.h>
55 #include <linux/fcntl.h>
56 #include <linux/socket.h>
58 #include <linux/inet.h>
59 #include <linux/netdevice.h>
60 #include <linux/if_packet.h>
61 #include <linux/wireless.h>
62 #include <linux/kernel.h>
63 #include <linux/kmod.h>
64 #include <net/net_namespace.h>
66 #include <net/protocol.h>
67 #include <linux/skbuff.h>
69 #include <linux/errno.h>
70 #include <linux/timer.h>
71 #include <asm/system.h>
72 #include <asm/uaccess.h>
73 #include <asm/ioctls.h>
75 #include <asm/cacheflush.h>
77 #include <linux/proc_fs.h>
78 #include <linux/seq_file.h>
79 #include <linux/poll.h>
80 #include <linux/module.h>
81 #include <linux/init.h>
84 #include <net/inet_common.h>
89 - if device has no dev->hard_header routine, it adds and removes ll header
90 inside itself. In this case ll header is invisible outside of device,
91 but higher levels still should reserve dev->hard_header_len.
92 Some devices are enough clever to reallocate skb, when header
93 will not fit to reserved space (tunnel), another ones are silly
95 - packet socket receives packets with pulled ll header,
96 so that SOCK_RAW should push it back.
101 Incoming, dev->hard_header!=NULL
102 mac_header -> ll header
105 Outgoing, dev->hard_header!=NULL
106 mac_header -> ll header
109 Incoming, dev->hard_header==NULL
110 mac_header -> UNKNOWN position. It is very likely, that it points to ll
111 header. PPP makes it, that is wrong, because introduce
112 assymetry between rx and tx paths.
115 Outgoing, dev->hard_header==NULL
116 mac_header -> data. ll header is still not built!
120 If dev->hard_header==NULL we are unlikely to restore sensible ll header.
126 dev->hard_header != NULL
127 mac_header -> ll header
130 dev->hard_header == NULL (ll header is added by device, we cannot control it)
134 We should set nh.raw on output to correct posistion,
135 packet classifier depends on it.
138 /* List of all packet sockets. */
139 static HLIST_HEAD(packet_sklist);
140 static DEFINE_RWLOCK(packet_sklist_lock);
142 static atomic_t packet_socks_nr;
145 /* Private packet socket structures. */
149 struct packet_mclist *next;
154 unsigned char addr[MAX_ADDR_LEN];
156 /* identical to struct packet_mreq except it has
157 * a longer address field.
159 struct packet_mreq_max
162 unsigned short mr_type;
163 unsigned short mr_alen;
164 unsigned char mr_address[MAX_ADDR_LEN];
167 #ifdef CONFIG_PACKET_MMAP
168 static int packet_set_ring(struct sock *sk, struct tpacket_req *req, int closing);
171 static void packet_flush_mclist(struct sock *sk);
174 /* struct sock has to be the first member of packet_sock */
176 struct tpacket_stats stats;
177 #ifdef CONFIG_PACKET_MMAP
180 unsigned int frames_per_block;
181 unsigned int frame_size;
182 unsigned int frame_max;
185 struct packet_type prot_hook;
186 spinlock_t bind_lock;
187 unsigned int running:1, /* prot_hook is attached*/
190 int ifindex; /* bound device */
192 struct packet_mclist *mclist;
193 #ifdef CONFIG_PACKET_MMAP
195 unsigned int pg_vec_order;
196 unsigned int pg_vec_pages;
197 unsigned int pg_vec_len;
201 struct packet_skb_cb {
202 unsigned int origlen;
204 struct sockaddr_pkt pkt;
205 struct sockaddr_ll ll;
209 #define PACKET_SKB_CB(__skb) ((struct packet_skb_cb *)((__skb)->cb))
211 #ifdef CONFIG_PACKET_MMAP
213 static inline struct tpacket_hdr *packet_lookup_frame(struct packet_sock *po, unsigned int position)
215 unsigned int pg_vec_pos, frame_offset;
217 pg_vec_pos = position / po->frames_per_block;
218 frame_offset = position % po->frames_per_block;
220 return (struct tpacket_hdr *)(po->pg_vec[pg_vec_pos] + (frame_offset * po->frame_size));
224 static inline struct packet_sock *pkt_sk(struct sock *sk)
226 return (struct packet_sock *)sk;
229 static void packet_sock_destruct(struct sock *sk)
231 BUG_TRAP(!atomic_read(&sk->sk_rmem_alloc));
232 BUG_TRAP(!atomic_read(&sk->sk_wmem_alloc));
234 if (!sock_flag(sk, SOCK_DEAD)) {
235 printk("Attempt to release alive packet socket: %p\n", sk);
239 atomic_dec(&packet_socks_nr);
240 #ifdef PACKET_REFCNT_DEBUG
241 printk(KERN_DEBUG "PACKET socket %p is free, %d are alive\n", sk, atomic_read(&packet_socks_nr));
246 static const struct proto_ops packet_ops;
248 static const struct proto_ops packet_ops_spkt;
250 static int packet_rcv_spkt(struct sk_buff *skb, struct net_device *dev, struct packet_type *pt, struct net_device *orig_dev)
253 struct sockaddr_pkt *spkt;
255 if (dev->nd_net != &init_net)
259 * When we registered the protocol we saved the socket in the data
260 * field for just this event.
263 sk = pt->af_packet_priv;
266 * Yank back the headers [hope the device set this
267 * right or kerboom...]
269 * Incoming packets have ll header pulled,
272 * For outgoing ones skb->data == skb_mac_header(skb)
273 * so that this procedure is noop.
276 if (skb->pkt_type == PACKET_LOOPBACK)
279 if ((skb = skb_share_check(skb, GFP_ATOMIC)) == NULL)
282 /* drop any routing info */
283 dst_release(skb->dst);
286 /* drop conntrack reference */
289 spkt = &PACKET_SKB_CB(skb)->sa.pkt;
291 skb_push(skb, skb->data - skb_mac_header(skb));
294 * The SOCK_PACKET socket receives _all_ frames.
297 spkt->spkt_family = dev->type;
298 strlcpy(spkt->spkt_device, dev->name, sizeof(spkt->spkt_device));
299 spkt->spkt_protocol = skb->protocol;
302 * Charge the memory to the socket. This is done specifically
303 * to prevent sockets using all the memory up.
306 if (sock_queue_rcv_skb(sk,skb) == 0)
317 * Output a raw packet to a device layer. This bypasses all the other
318 * protocol layers and you must therefore supply it with a complete frame
321 static int packet_sendmsg_spkt(struct kiocb *iocb, struct socket *sock,
322 struct msghdr *msg, size_t len)
324 struct sock *sk = sock->sk;
325 struct sockaddr_pkt *saddr=(struct sockaddr_pkt *)msg->msg_name;
327 struct net_device *dev;
332 * Get and verify the address.
337 if (msg->msg_namelen < sizeof(struct sockaddr))
339 if (msg->msg_namelen==sizeof(struct sockaddr_pkt))
340 proto=saddr->spkt_protocol;
343 return(-ENOTCONN); /* SOCK_PACKET must be sent giving an address */
346 * Find the device first to size check it
349 saddr->spkt_device[13] = 0;
350 dev = dev_get_by_name(&init_net, saddr->spkt_device);
356 if (!(dev->flags & IFF_UP))
360 * You may not queue a frame bigger than the mtu. This is the lowest level
361 * raw protocol and you must do your own fragmentation at this level.
365 if (len > dev->mtu + dev->hard_header_len)
369 skb = sock_wmalloc(sk, len + LL_RESERVED_SPACE(dev), 0, GFP_KERNEL);
372 * If the write buffer is full, then tough. At this level the user gets to
373 * deal with the problem - do your own algorithmic backoffs. That's far
384 /* FIXME: Save some space for broken drivers that write a
385 * hard header at transmission time by themselves. PPP is the
386 * notable one here. This should really be fixed at the driver level.
388 skb_reserve(skb, LL_RESERVED_SPACE(dev));
389 skb_reset_network_header(skb);
391 /* Try to align data part correctly */
392 if (dev->header_ops) {
393 skb->data -= dev->hard_header_len;
394 skb->tail -= dev->hard_header_len;
395 if (len < dev->hard_header_len)
396 skb_reset_network_header(skb);
399 /* Returns -EFAULT on error */
400 err = memcpy_fromiovec(skb_put(skb,len), msg->msg_iov, len);
401 skb->protocol = proto;
403 skb->priority = sk->sk_priority;
423 static inline unsigned int run_filter(struct sk_buff *skb, struct sock *sk,
426 struct sk_filter *filter;
429 filter = rcu_dereference(sk->sk_filter);
431 res = sk_run_filter(skb, filter->insns, filter->len);
432 rcu_read_unlock_bh();
438 This function makes lazy skb cloning in hope that most of packets
439 are discarded by BPF.
441 Note tricky part: we DO mangle shared skb! skb->data, skb->len
442 and skb->cb are mangled. It works because (and until) packets
443 falling here are owned by current CPU. Output packets are cloned
444 by dev_queue_xmit_nit(), input packets are processed by net_bh
445 sequencially, so that if we return skb to original state on exit,
446 we will not harm anyone.
449 static int packet_rcv(struct sk_buff *skb, struct net_device *dev, struct packet_type *pt, struct net_device *orig_dev)
452 struct sockaddr_ll *sll;
453 struct packet_sock *po;
454 u8 * skb_head = skb->data;
455 int skb_len = skb->len;
456 unsigned int snaplen, res;
458 if (dev->nd_net != &init_net)
461 if (skb->pkt_type == PACKET_LOOPBACK)
464 sk = pt->af_packet_priv;
469 if (dev->header_ops) {
470 /* The device has an explicit notion of ll header,
471 exported to higher levels.
473 Otherwise, the device hides datails of it frame
474 structure, so that corresponding packet head
475 never delivered to user.
477 if (sk->sk_type != SOCK_DGRAM)
478 skb_push(skb, skb->data - skb_mac_header(skb));
479 else if (skb->pkt_type == PACKET_OUTGOING) {
480 /* Special case: outgoing packets have ll header at head */
481 skb_pull(skb, skb_network_offset(skb));
487 res = run_filter(skb, sk, snaplen);
493 if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
494 (unsigned)sk->sk_rcvbuf)
497 if (skb_shared(skb)) {
498 struct sk_buff *nskb = skb_clone(skb, GFP_ATOMIC);
502 if (skb_head != skb->data) {
503 skb->data = skb_head;
510 BUILD_BUG_ON(sizeof(*PACKET_SKB_CB(skb)) + MAX_ADDR_LEN - 8 >
513 sll = &PACKET_SKB_CB(skb)->sa.ll;
514 sll->sll_family = AF_PACKET;
515 sll->sll_hatype = dev->type;
516 sll->sll_protocol = skb->protocol;
517 sll->sll_pkttype = skb->pkt_type;
518 if (unlikely(po->origdev) && skb->pkt_type == PACKET_HOST)
519 sll->sll_ifindex = orig_dev->ifindex;
521 sll->sll_ifindex = dev->ifindex;
523 sll->sll_halen = dev_parse_header(skb, sll->sll_addr);
525 PACKET_SKB_CB(skb)->origlen = skb->len;
527 if (pskb_trim(skb, snaplen))
530 skb_set_owner_r(skb, sk);
532 dst_release(skb->dst);
535 /* drop conntrack reference */
538 spin_lock(&sk->sk_receive_queue.lock);
539 po->stats.tp_packets++;
540 __skb_queue_tail(&sk->sk_receive_queue, skb);
541 spin_unlock(&sk->sk_receive_queue.lock);
542 sk->sk_data_ready(sk, skb->len);
546 spin_lock(&sk->sk_receive_queue.lock);
547 po->stats.tp_drops++;
548 spin_unlock(&sk->sk_receive_queue.lock);
551 if (skb_head != skb->data && skb_shared(skb)) {
552 skb->data = skb_head;
560 #ifdef CONFIG_PACKET_MMAP
561 static int tpacket_rcv(struct sk_buff *skb, struct net_device *dev, struct packet_type *pt, struct net_device *orig_dev)
564 struct packet_sock *po;
565 struct sockaddr_ll *sll;
566 struct tpacket_hdr *h;
567 u8 * skb_head = skb->data;
568 int skb_len = skb->len;
569 unsigned int snaplen, res;
570 unsigned long status = TP_STATUS_LOSING|TP_STATUS_USER;
571 unsigned short macoff, netoff;
572 struct sk_buff *copy_skb = NULL;
575 if (dev->nd_net != &init_net)
578 if (skb->pkt_type == PACKET_LOOPBACK)
581 sk = pt->af_packet_priv;
584 if (dev->header_ops) {
585 if (sk->sk_type != SOCK_DGRAM)
586 skb_push(skb, skb->data - skb_mac_header(skb));
587 else if (skb->pkt_type == PACKET_OUTGOING) {
588 /* Special case: outgoing packets have ll header at head */
589 skb_pull(skb, skb_network_offset(skb));
593 if (skb->ip_summed == CHECKSUM_PARTIAL)
594 status |= TP_STATUS_CSUMNOTREADY;
598 res = run_filter(skb, sk, snaplen);
604 if (sk->sk_type == SOCK_DGRAM) {
605 macoff = netoff = TPACKET_ALIGN(TPACKET_HDRLEN) + 16;
607 unsigned maclen = skb_network_offset(skb);
608 netoff = TPACKET_ALIGN(TPACKET_HDRLEN + (maclen < 16 ? 16 : maclen));
609 macoff = netoff - maclen;
612 if (macoff + snaplen > po->frame_size) {
613 if (po->copy_thresh &&
614 atomic_read(&sk->sk_rmem_alloc) + skb->truesize <
615 (unsigned)sk->sk_rcvbuf) {
616 if (skb_shared(skb)) {
617 copy_skb = skb_clone(skb, GFP_ATOMIC);
619 copy_skb = skb_get(skb);
620 skb_head = skb->data;
623 skb_set_owner_r(copy_skb, sk);
625 snaplen = po->frame_size - macoff;
626 if ((int)snaplen < 0)
630 spin_lock(&sk->sk_receive_queue.lock);
631 h = packet_lookup_frame(po, po->head);
635 po->head = po->head != po->frame_max ? po->head+1 : 0;
636 po->stats.tp_packets++;
638 status |= TP_STATUS_COPY;
639 __skb_queue_tail(&sk->sk_receive_queue, copy_skb);
641 if (!po->stats.tp_drops)
642 status &= ~TP_STATUS_LOSING;
643 spin_unlock(&sk->sk_receive_queue.lock);
645 skb_copy_bits(skb, 0, (u8*)h + macoff, snaplen);
647 h->tp_len = skb->len;
648 h->tp_snaplen = snaplen;
651 if (skb->tstamp.tv64)
652 tv = ktime_to_timeval(skb->tstamp);
654 do_gettimeofday(&tv);
655 h->tp_sec = tv.tv_sec;
656 h->tp_usec = tv.tv_usec;
658 sll = (struct sockaddr_ll*)((u8*)h + TPACKET_ALIGN(sizeof(*h)));
659 sll->sll_halen = dev_parse_header(skb, sll->sll_addr);
660 sll->sll_family = AF_PACKET;
661 sll->sll_hatype = dev->type;
662 sll->sll_protocol = skb->protocol;
663 sll->sll_pkttype = skb->pkt_type;
664 if (unlikely(po->origdev) && skb->pkt_type == PACKET_HOST)
665 sll->sll_ifindex = orig_dev->ifindex;
667 sll->sll_ifindex = dev->ifindex;
669 h->tp_status = status;
673 struct page *p_start, *p_end;
674 u8 *h_end = (u8 *)h + macoff + snaplen - 1;
676 p_start = virt_to_page(h);
677 p_end = virt_to_page(h_end);
678 while (p_start <= p_end) {
679 flush_dcache_page(p_start);
684 sk->sk_data_ready(sk, 0);
687 if (skb_head != skb->data && skb_shared(skb)) {
688 skb->data = skb_head;
696 po->stats.tp_drops++;
697 spin_unlock(&sk->sk_receive_queue.lock);
699 sk->sk_data_ready(sk, 0);
708 static int packet_sendmsg(struct kiocb *iocb, struct socket *sock,
709 struct msghdr *msg, size_t len)
711 struct sock *sk = sock->sk;
712 struct sockaddr_ll *saddr=(struct sockaddr_ll *)msg->msg_name;
714 struct net_device *dev;
717 int ifindex, err, reserve = 0;
720 * Get and verify the address.
724 struct packet_sock *po = pkt_sk(sk);
726 ifindex = po->ifindex;
731 if (msg->msg_namelen < sizeof(struct sockaddr_ll))
733 if (msg->msg_namelen < (saddr->sll_halen + offsetof(struct sockaddr_ll, sll_addr)))
735 ifindex = saddr->sll_ifindex;
736 proto = saddr->sll_protocol;
737 addr = saddr->sll_addr;
741 dev = dev_get_by_index(&init_net, ifindex);
745 if (sock->type == SOCK_RAW)
746 reserve = dev->hard_header_len;
749 if (!(dev->flags & IFF_UP))
753 if (len > dev->mtu+reserve)
756 skb = sock_alloc_send_skb(sk, len + LL_RESERVED_SPACE(dev),
757 msg->msg_flags & MSG_DONTWAIT, &err);
761 skb_reserve(skb, LL_RESERVED_SPACE(dev));
762 skb_reset_network_header(skb);
765 if (sock->type == SOCK_DGRAM &&
766 dev_hard_header(skb, dev, ntohs(proto), addr, NULL, len) < 0)
769 /* Returns -EFAULT on error */
770 err = memcpy_fromiovec(skb_put(skb,len), msg->msg_iov, len);
774 skb->protocol = proto;
776 skb->priority = sk->sk_priority;
782 err = dev_queue_xmit(skb);
783 if (err > 0 && (err = net_xmit_errno(err)) != 0)
800 * Close a PACKET socket. This is fairly simple. We immediately go
801 * to 'closed' state and remove our protocol entry in the device list.
804 static int packet_release(struct socket *sock)
806 struct sock *sk = sock->sk;
807 struct packet_sock *po;
814 write_lock_bh(&packet_sklist_lock);
815 sk_del_node_init(sk);
816 write_unlock_bh(&packet_sklist_lock);
819 * Unhook packet receive handler.
824 * Remove the protocol hook
826 dev_remove_pack(&po->prot_hook);
832 packet_flush_mclist(sk);
834 #ifdef CONFIG_PACKET_MMAP
836 struct tpacket_req req;
837 memset(&req, 0, sizeof(req));
838 packet_set_ring(sk, &req, 1);
843 * Now the socket is dead. No more input will appear.
851 skb_queue_purge(&sk->sk_receive_queue);
858 * Attach a packet hook.
861 static int packet_do_bind(struct sock *sk, struct net_device *dev, __be16 protocol)
863 struct packet_sock *po = pkt_sk(sk);
865 * Detach an existing hook if present.
870 spin_lock(&po->bind_lock);
875 spin_unlock(&po->bind_lock);
876 dev_remove_pack(&po->prot_hook);
877 spin_lock(&po->bind_lock);
881 po->prot_hook.type = protocol;
882 po->prot_hook.dev = dev;
884 po->ifindex = dev ? dev->ifindex : 0;
890 if (dev->flags&IFF_UP) {
891 dev_add_pack(&po->prot_hook);
895 sk->sk_err = ENETDOWN;
896 if (!sock_flag(sk, SOCK_DEAD))
897 sk->sk_error_report(sk);
900 dev_add_pack(&po->prot_hook);
906 spin_unlock(&po->bind_lock);
912 * Bind a packet socket to a device
915 static int packet_bind_spkt(struct socket *sock, struct sockaddr *uaddr, int addr_len)
917 struct sock *sk=sock->sk;
919 struct net_device *dev;
926 if (addr_len != sizeof(struct sockaddr))
928 strlcpy(name,uaddr->sa_data,sizeof(name));
930 dev = dev_get_by_name(&init_net, name);
932 err = packet_do_bind(sk, dev, pkt_sk(sk)->num);
938 static int packet_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
940 struct sockaddr_ll *sll = (struct sockaddr_ll*)uaddr;
941 struct sock *sk=sock->sk;
942 struct net_device *dev = NULL;
950 if (addr_len < sizeof(struct sockaddr_ll))
952 if (sll->sll_family != AF_PACKET)
955 if (sll->sll_ifindex) {
957 dev = dev_get_by_index(&init_net, sll->sll_ifindex);
961 err = packet_do_bind(sk, dev, sll->sll_protocol ? : pkt_sk(sk)->num);
969 static struct proto packet_proto = {
971 .owner = THIS_MODULE,
972 .obj_size = sizeof(struct packet_sock),
976 * Create a packet of type SOCK_PACKET.
979 static int packet_create(struct net *net, struct socket *sock, int protocol)
982 struct packet_sock *po;
983 __be16 proto = (__force __be16)protocol; /* weird, but documented */
986 if (net != &init_net)
987 return -EAFNOSUPPORT;
989 if (!capable(CAP_NET_RAW))
991 if (sock->type != SOCK_DGRAM && sock->type != SOCK_RAW &&
992 sock->type != SOCK_PACKET)
993 return -ESOCKTNOSUPPORT;
995 sock->state = SS_UNCONNECTED;
998 sk = sk_alloc(net, PF_PACKET, GFP_KERNEL, &packet_proto, 1);
1002 sock->ops = &packet_ops;
1003 if (sock->type == SOCK_PACKET)
1004 sock->ops = &packet_ops_spkt;
1006 sock_init_data(sock, sk);
1009 sk->sk_family = PF_PACKET;
1012 sk->sk_destruct = packet_sock_destruct;
1013 atomic_inc(&packet_socks_nr);
1016 * Attach a protocol block
1019 spin_lock_init(&po->bind_lock);
1020 po->prot_hook.func = packet_rcv;
1022 if (sock->type == SOCK_PACKET)
1023 po->prot_hook.func = packet_rcv_spkt;
1025 po->prot_hook.af_packet_priv = sk;
1028 po->prot_hook.type = proto;
1029 dev_add_pack(&po->prot_hook);
1034 write_lock_bh(&packet_sklist_lock);
1035 sk_add_node(sk, &packet_sklist);
1036 write_unlock_bh(&packet_sklist_lock);
1043 * Pull a packet from our receive queue and hand it to the user.
1044 * If necessary we block.
1047 static int packet_recvmsg(struct kiocb *iocb, struct socket *sock,
1048 struct msghdr *msg, size_t len, int flags)
1050 struct sock *sk = sock->sk;
1051 struct sk_buff *skb;
1053 struct sockaddr_ll *sll;
1056 if (flags & ~(MSG_PEEK|MSG_DONTWAIT|MSG_TRUNC|MSG_CMSG_COMPAT))
1060 /* What error should we return now? EUNATTACH? */
1061 if (pkt_sk(sk)->ifindex < 0)
1066 * Call the generic datagram receiver. This handles all sorts
1067 * of horrible races and re-entrancy so we can forget about it
1068 * in the protocol layers.
1070 * Now it will return ENETDOWN, if device have just gone down,
1071 * but then it will block.
1074 skb=skb_recv_datagram(sk,flags,flags&MSG_DONTWAIT,&err);
1077 * An error occurred so return it. Because skb_recv_datagram()
1078 * handles the blocking we don't see and worry about blocking
1086 * If the address length field is there to be filled in, we fill
1090 sll = &PACKET_SKB_CB(skb)->sa.ll;
1091 if (sock->type == SOCK_PACKET)
1092 msg->msg_namelen = sizeof(struct sockaddr_pkt);
1094 msg->msg_namelen = sll->sll_halen + offsetof(struct sockaddr_ll, sll_addr);
1097 * You lose any data beyond the buffer you gave. If it worries a
1098 * user program they can ask the device for its MTU anyway.
1105 msg->msg_flags|=MSG_TRUNC;
1108 err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
1112 sock_recv_timestamp(msg, sk, skb);
1115 memcpy(msg->msg_name, &PACKET_SKB_CB(skb)->sa,
1118 if (pkt_sk(sk)->auxdata) {
1119 struct tpacket_auxdata aux;
1121 aux.tp_status = TP_STATUS_USER;
1122 if (skb->ip_summed == CHECKSUM_PARTIAL)
1123 aux.tp_status |= TP_STATUS_CSUMNOTREADY;
1124 aux.tp_len = PACKET_SKB_CB(skb)->origlen;
1125 aux.tp_snaplen = skb->len;
1127 aux.tp_net = skb_network_offset(skb);
1129 put_cmsg(msg, SOL_PACKET, PACKET_AUXDATA, sizeof(aux), &aux);
1133 * Free or return the buffer as appropriate. Again this
1134 * hides all the races and re-entrancy issues from us.
1136 err = (flags&MSG_TRUNC) ? skb->len : copied;
1139 skb_free_datagram(sk, skb);
1144 static int packet_getname_spkt(struct socket *sock, struct sockaddr *uaddr,
1145 int *uaddr_len, int peer)
1147 struct net_device *dev;
1148 struct sock *sk = sock->sk;
1153 uaddr->sa_family = AF_PACKET;
1154 dev = dev_get_by_index(&init_net, pkt_sk(sk)->ifindex);
1156 strlcpy(uaddr->sa_data, dev->name, 15);
1159 memset(uaddr->sa_data, 0, 14);
1160 *uaddr_len = sizeof(*uaddr);
1165 static int packet_getname(struct socket *sock, struct sockaddr *uaddr,
1166 int *uaddr_len, int peer)
1168 struct net_device *dev;
1169 struct sock *sk = sock->sk;
1170 struct packet_sock *po = pkt_sk(sk);
1171 struct sockaddr_ll *sll = (struct sockaddr_ll*)uaddr;
1176 sll->sll_family = AF_PACKET;
1177 sll->sll_ifindex = po->ifindex;
1178 sll->sll_protocol = po->num;
1179 dev = dev_get_by_index(&init_net, po->ifindex);
1181 sll->sll_hatype = dev->type;
1182 sll->sll_halen = dev->addr_len;
1183 memcpy(sll->sll_addr, dev->dev_addr, dev->addr_len);
1186 sll->sll_hatype = 0; /* Bad: we have no ARPHRD_UNSPEC */
1189 *uaddr_len = offsetof(struct sockaddr_ll, sll_addr) + sll->sll_halen;
1194 static void packet_dev_mc(struct net_device *dev, struct packet_mclist *i, int what)
1197 case PACKET_MR_MULTICAST:
1199 dev_mc_add(dev, i->addr, i->alen, 0);
1201 dev_mc_delete(dev, i->addr, i->alen, 0);
1203 case PACKET_MR_PROMISC:
1204 dev_set_promiscuity(dev, what);
1206 case PACKET_MR_ALLMULTI:
1207 dev_set_allmulti(dev, what);
1213 static void packet_dev_mclist(struct net_device *dev, struct packet_mclist *i, int what)
1215 for ( ; i; i=i->next) {
1216 if (i->ifindex == dev->ifindex)
1217 packet_dev_mc(dev, i, what);
1221 static int packet_mc_add(struct sock *sk, struct packet_mreq_max *mreq)
1223 struct packet_sock *po = pkt_sk(sk);
1224 struct packet_mclist *ml, *i;
1225 struct net_device *dev;
1231 dev = __dev_get_by_index(&init_net, mreq->mr_ifindex);
1236 if (mreq->mr_alen > dev->addr_len)
1240 i = kmalloc(sizeof(*i), GFP_KERNEL);
1245 for (ml = po->mclist; ml; ml = ml->next) {
1246 if (ml->ifindex == mreq->mr_ifindex &&
1247 ml->type == mreq->mr_type &&
1248 ml->alen == mreq->mr_alen &&
1249 memcmp(ml->addr, mreq->mr_address, ml->alen) == 0) {
1251 /* Free the new element ... */
1257 i->type = mreq->mr_type;
1258 i->ifindex = mreq->mr_ifindex;
1259 i->alen = mreq->mr_alen;
1260 memcpy(i->addr, mreq->mr_address, i->alen);
1262 i->next = po->mclist;
1264 packet_dev_mc(dev, i, +1);
1271 static int packet_mc_drop(struct sock *sk, struct packet_mreq_max *mreq)
1273 struct packet_mclist *ml, **mlp;
1277 for (mlp = &pkt_sk(sk)->mclist; (ml = *mlp) != NULL; mlp = &ml->next) {
1278 if (ml->ifindex == mreq->mr_ifindex &&
1279 ml->type == mreq->mr_type &&
1280 ml->alen == mreq->mr_alen &&
1281 memcmp(ml->addr, mreq->mr_address, ml->alen) == 0) {
1282 if (--ml->count == 0) {
1283 struct net_device *dev;
1285 dev = dev_get_by_index(&init_net, ml->ifindex);
1287 packet_dev_mc(dev, ml, -1);
1297 return -EADDRNOTAVAIL;
1300 static void packet_flush_mclist(struct sock *sk)
1302 struct packet_sock *po = pkt_sk(sk);
1303 struct packet_mclist *ml;
1309 while ((ml = po->mclist) != NULL) {
1310 struct net_device *dev;
1312 po->mclist = ml->next;
1313 if ((dev = dev_get_by_index(&init_net, ml->ifindex)) != NULL) {
1314 packet_dev_mc(dev, ml, -1);
1323 packet_setsockopt(struct socket *sock, int level, int optname, char __user *optval, int optlen)
1325 struct sock *sk = sock->sk;
1326 struct packet_sock *po = pkt_sk(sk);
1329 if (level != SOL_PACKET)
1330 return -ENOPROTOOPT;
1333 case PACKET_ADD_MEMBERSHIP:
1334 case PACKET_DROP_MEMBERSHIP:
1336 struct packet_mreq_max mreq;
1338 memset(&mreq, 0, sizeof(mreq));
1339 if (len < sizeof(struct packet_mreq))
1341 if (len > sizeof(mreq))
1343 if (copy_from_user(&mreq,optval,len))
1345 if (len < (mreq.mr_alen + offsetof(struct packet_mreq, mr_address)))
1347 if (optname == PACKET_ADD_MEMBERSHIP)
1348 ret = packet_mc_add(sk, &mreq);
1350 ret = packet_mc_drop(sk, &mreq);
1354 #ifdef CONFIG_PACKET_MMAP
1355 case PACKET_RX_RING:
1357 struct tpacket_req req;
1359 if (optlen<sizeof(req))
1361 if (copy_from_user(&req,optval,sizeof(req)))
1363 return packet_set_ring(sk, &req, 0);
1365 case PACKET_COPY_THRESH:
1369 if (optlen!=sizeof(val))
1371 if (copy_from_user(&val,optval,sizeof(val)))
1374 pkt_sk(sk)->copy_thresh = val;
1378 case PACKET_AUXDATA:
1382 if (optlen < sizeof(val))
1384 if (copy_from_user(&val, optval, sizeof(val)))
1387 po->auxdata = !!val;
1390 case PACKET_ORIGDEV:
1394 if (optlen < sizeof(val))
1396 if (copy_from_user(&val, optval, sizeof(val)))
1399 po->origdev = !!val;
1403 return -ENOPROTOOPT;
1407 static int packet_getsockopt(struct socket *sock, int level, int optname,
1408 char __user *optval, int __user *optlen)
1412 struct sock *sk = sock->sk;
1413 struct packet_sock *po = pkt_sk(sk);
1415 struct tpacket_stats st;
1417 if (level != SOL_PACKET)
1418 return -ENOPROTOOPT;
1420 if (get_user(len, optlen))
1427 case PACKET_STATISTICS:
1428 if (len > sizeof(struct tpacket_stats))
1429 len = sizeof(struct tpacket_stats);
1430 spin_lock_bh(&sk->sk_receive_queue.lock);
1432 memset(&po->stats, 0, sizeof(st));
1433 spin_unlock_bh(&sk->sk_receive_queue.lock);
1434 st.tp_packets += st.tp_drops;
1438 case PACKET_AUXDATA:
1439 if (len > sizeof(int))
1445 case PACKET_ORIGDEV:
1446 if (len > sizeof(int))
1453 return -ENOPROTOOPT;
1456 if (put_user(len, optlen))
1458 if (copy_to_user(optval, data, len))
1464 static int packet_notifier(struct notifier_block *this, unsigned long msg, void *data)
1467 struct hlist_node *node;
1468 struct net_device *dev = data;
1470 if (dev->nd_net != &init_net)
1473 read_lock(&packet_sklist_lock);
1474 sk_for_each(sk, node, &packet_sklist) {
1475 struct packet_sock *po = pkt_sk(sk);
1478 case NETDEV_UNREGISTER:
1480 packet_dev_mclist(dev, po->mclist, -1);
1484 if (dev->ifindex == po->ifindex) {
1485 spin_lock(&po->bind_lock);
1487 __dev_remove_pack(&po->prot_hook);
1490 sk->sk_err = ENETDOWN;
1491 if (!sock_flag(sk, SOCK_DEAD))
1492 sk->sk_error_report(sk);
1494 if (msg == NETDEV_UNREGISTER) {
1496 po->prot_hook.dev = NULL;
1498 spin_unlock(&po->bind_lock);
1502 spin_lock(&po->bind_lock);
1503 if (dev->ifindex == po->ifindex && po->num &&
1505 dev_add_pack(&po->prot_hook);
1509 spin_unlock(&po->bind_lock);
1513 read_unlock(&packet_sklist_lock);
1518 static int packet_ioctl(struct socket *sock, unsigned int cmd,
1521 struct sock *sk = sock->sk;
1526 int amount = atomic_read(&sk->sk_wmem_alloc);
1527 return put_user(amount, (int __user *)arg);
1531 struct sk_buff *skb;
1534 spin_lock_bh(&sk->sk_receive_queue.lock);
1535 skb = skb_peek(&sk->sk_receive_queue);
1538 spin_unlock_bh(&sk->sk_receive_queue.lock);
1539 return put_user(amount, (int __user *)arg);
1542 return sock_get_timestamp(sk, (struct timeval __user *)arg);
1544 return sock_get_timestampns(sk, (struct timespec __user *)arg);
1554 case SIOCGIFBRDADDR:
1555 case SIOCSIFBRDADDR:
1556 case SIOCGIFNETMASK:
1557 case SIOCSIFNETMASK:
1558 case SIOCGIFDSTADDR:
1559 case SIOCSIFDSTADDR:
1561 return inet_dgram_ops.ioctl(sock, cmd, arg);
1565 return -ENOIOCTLCMD;
1570 #ifndef CONFIG_PACKET_MMAP
1571 #define packet_mmap sock_no_mmap
1572 #define packet_poll datagram_poll
1575 static unsigned int packet_poll(struct file * file, struct socket *sock,
1578 struct sock *sk = sock->sk;
1579 struct packet_sock *po = pkt_sk(sk);
1580 unsigned int mask = datagram_poll(file, sock, wait);
1582 spin_lock_bh(&sk->sk_receive_queue.lock);
1584 unsigned last = po->head ? po->head-1 : po->frame_max;
1585 struct tpacket_hdr *h;
1587 h = packet_lookup_frame(po, last);
1590 mask |= POLLIN | POLLRDNORM;
1592 spin_unlock_bh(&sk->sk_receive_queue.lock);
1597 /* Dirty? Well, I still did not learn better way to account
1601 static void packet_mm_open(struct vm_area_struct *vma)
1603 struct file *file = vma->vm_file;
1604 struct socket * sock = file->private_data;
1605 struct sock *sk = sock->sk;
1608 atomic_inc(&pkt_sk(sk)->mapped);
1611 static void packet_mm_close(struct vm_area_struct *vma)
1613 struct file *file = vma->vm_file;
1614 struct socket * sock = file->private_data;
1615 struct sock *sk = sock->sk;
1618 atomic_dec(&pkt_sk(sk)->mapped);
1621 static struct vm_operations_struct packet_mmap_ops = {
1622 .open = packet_mm_open,
1623 .close =packet_mm_close,
1626 static void free_pg_vec(char **pg_vec, unsigned int order, unsigned int len)
1630 for (i = 0; i < len; i++) {
1631 if (likely(pg_vec[i]))
1632 free_pages((unsigned long) pg_vec[i], order);
1637 static inline char *alloc_one_pg_vec_page(unsigned long order)
1639 return (char *) __get_free_pages(GFP_KERNEL | __GFP_COMP | __GFP_ZERO,
1643 static char **alloc_pg_vec(struct tpacket_req *req, int order)
1645 unsigned int block_nr = req->tp_block_nr;
1649 pg_vec = kzalloc(block_nr * sizeof(char *), GFP_KERNEL);
1650 if (unlikely(!pg_vec))
1653 for (i = 0; i < block_nr; i++) {
1654 pg_vec[i] = alloc_one_pg_vec_page(order);
1655 if (unlikely(!pg_vec[i]))
1656 goto out_free_pgvec;
1663 free_pg_vec(pg_vec, order, block_nr);
1668 static int packet_set_ring(struct sock *sk, struct tpacket_req *req, int closing)
1670 char **pg_vec = NULL;
1671 struct packet_sock *po = pkt_sk(sk);
1672 int was_running, order = 0;
1676 if (req->tp_block_nr) {
1679 /* Sanity tests and some calculations */
1681 if (unlikely(po->pg_vec))
1684 if (unlikely((int)req->tp_block_size <= 0))
1686 if (unlikely(req->tp_block_size & (PAGE_SIZE - 1)))
1688 if (unlikely(req->tp_frame_size < TPACKET_HDRLEN))
1690 if (unlikely(req->tp_frame_size & (TPACKET_ALIGNMENT - 1)))
1693 po->frames_per_block = req->tp_block_size/req->tp_frame_size;
1694 if (unlikely(po->frames_per_block <= 0))
1696 if (unlikely((po->frames_per_block * req->tp_block_nr) !=
1701 order = get_order(req->tp_block_size);
1702 pg_vec = alloc_pg_vec(req, order);
1703 if (unlikely(!pg_vec))
1707 for (i = 0; i < req->tp_block_nr; i++) {
1708 char *ptr = pg_vec[i];
1709 struct tpacket_hdr *header;
1712 for (k = 0; k < po->frames_per_block; k++) {
1713 header = (struct tpacket_hdr *) ptr;
1714 header->tp_status = TP_STATUS_KERNEL;
1715 ptr += req->tp_frame_size;
1720 if (unlikely(req->tp_frame_nr))
1726 /* Detach socket from network */
1727 spin_lock(&po->bind_lock);
1728 was_running = po->running;
1731 __dev_remove_pack(&po->prot_hook);
1736 spin_unlock(&po->bind_lock);
1741 if (closing || atomic_read(&po->mapped) == 0) {
1743 #define XC(a, b) ({ __typeof__ ((a)) __t; __t = (a); (a) = (b); __t; })
1745 spin_lock_bh(&sk->sk_receive_queue.lock);
1746 pg_vec = XC(po->pg_vec, pg_vec);
1747 po->frame_max = (req->tp_frame_nr - 1);
1749 po->frame_size = req->tp_frame_size;
1750 spin_unlock_bh(&sk->sk_receive_queue.lock);
1752 order = XC(po->pg_vec_order, order);
1753 req->tp_block_nr = XC(po->pg_vec_len, req->tp_block_nr);
1755 po->pg_vec_pages = req->tp_block_size/PAGE_SIZE;
1756 po->prot_hook.func = po->pg_vec ? tpacket_rcv : packet_rcv;
1757 skb_queue_purge(&sk->sk_receive_queue);
1759 if (atomic_read(&po->mapped))
1760 printk(KERN_DEBUG "packet_mmap: vma is busy: %d\n", atomic_read(&po->mapped));
1763 spin_lock(&po->bind_lock);
1764 if (was_running && !po->running) {
1768 dev_add_pack(&po->prot_hook);
1770 spin_unlock(&po->bind_lock);
1775 free_pg_vec(pg_vec, order, req->tp_block_nr);
1780 static int packet_mmap(struct file *file, struct socket *sock, struct vm_area_struct *vma)
1782 struct sock *sk = sock->sk;
1783 struct packet_sock *po = pkt_sk(sk);
1785 unsigned long start;
1792 size = vma->vm_end - vma->vm_start;
1795 if (po->pg_vec == NULL)
1797 if (size != po->pg_vec_len*po->pg_vec_pages*PAGE_SIZE)
1800 start = vma->vm_start;
1801 for (i = 0; i < po->pg_vec_len; i++) {
1802 struct page *page = virt_to_page(po->pg_vec[i]);
1805 for (pg_num = 0; pg_num < po->pg_vec_pages; pg_num++, page++) {
1806 err = vm_insert_page(vma, start, page);
1812 atomic_inc(&po->mapped);
1813 vma->vm_ops = &packet_mmap_ops;
1823 static const struct proto_ops packet_ops_spkt = {
1824 .family = PF_PACKET,
1825 .owner = THIS_MODULE,
1826 .release = packet_release,
1827 .bind = packet_bind_spkt,
1828 .connect = sock_no_connect,
1829 .socketpair = sock_no_socketpair,
1830 .accept = sock_no_accept,
1831 .getname = packet_getname_spkt,
1832 .poll = datagram_poll,
1833 .ioctl = packet_ioctl,
1834 .listen = sock_no_listen,
1835 .shutdown = sock_no_shutdown,
1836 .setsockopt = sock_no_setsockopt,
1837 .getsockopt = sock_no_getsockopt,
1838 .sendmsg = packet_sendmsg_spkt,
1839 .recvmsg = packet_recvmsg,
1840 .mmap = sock_no_mmap,
1841 .sendpage = sock_no_sendpage,
1844 static const struct proto_ops packet_ops = {
1845 .family = PF_PACKET,
1846 .owner = THIS_MODULE,
1847 .release = packet_release,
1848 .bind = packet_bind,
1849 .connect = sock_no_connect,
1850 .socketpair = sock_no_socketpair,
1851 .accept = sock_no_accept,
1852 .getname = packet_getname,
1853 .poll = packet_poll,
1854 .ioctl = packet_ioctl,
1855 .listen = sock_no_listen,
1856 .shutdown = sock_no_shutdown,
1857 .setsockopt = packet_setsockopt,
1858 .getsockopt = packet_getsockopt,
1859 .sendmsg = packet_sendmsg,
1860 .recvmsg = packet_recvmsg,
1861 .mmap = packet_mmap,
1862 .sendpage = sock_no_sendpage,
1865 static struct net_proto_family packet_family_ops = {
1866 .family = PF_PACKET,
1867 .create = packet_create,
1868 .owner = THIS_MODULE,
1871 static struct notifier_block packet_netdev_notifier = {
1872 .notifier_call =packet_notifier,
1875 #ifdef CONFIG_PROC_FS
1876 static inline struct sock *packet_seq_idx(loff_t off)
1879 struct hlist_node *node;
1881 sk_for_each(s, node, &packet_sklist) {
1888 static void *packet_seq_start(struct seq_file *seq, loff_t *pos)
1890 read_lock(&packet_sklist_lock);
1891 return *pos ? packet_seq_idx(*pos - 1) : SEQ_START_TOKEN;
1894 static void *packet_seq_next(struct seq_file *seq, void *v, loff_t *pos)
1897 return (v == SEQ_START_TOKEN)
1898 ? sk_head(&packet_sklist)
1899 : sk_next((struct sock*)v) ;
1902 static void packet_seq_stop(struct seq_file *seq, void *v)
1904 read_unlock(&packet_sklist_lock);
1907 static int packet_seq_show(struct seq_file *seq, void *v)
1909 if (v == SEQ_START_TOKEN)
1910 seq_puts(seq, "sk RefCnt Type Proto Iface R Rmem User Inode\n");
1913 const struct packet_sock *po = pkt_sk(s);
1916 "%p %-6d %-4d %04x %-5d %1d %-6u %-6u %-6lu\n",
1918 atomic_read(&s->sk_refcnt),
1923 atomic_read(&s->sk_rmem_alloc),
1931 static const struct seq_operations packet_seq_ops = {
1932 .start = packet_seq_start,
1933 .next = packet_seq_next,
1934 .stop = packet_seq_stop,
1935 .show = packet_seq_show,
1938 static int packet_seq_open(struct inode *inode, struct file *file)
1940 return seq_open(file, &packet_seq_ops);
1943 static const struct file_operations packet_seq_fops = {
1944 .owner = THIS_MODULE,
1945 .open = packet_seq_open,
1947 .llseek = seq_lseek,
1948 .release = seq_release,
1953 static void __exit packet_exit(void)
1955 proc_net_remove(&init_net, "packet");
1956 unregister_netdevice_notifier(&packet_netdev_notifier);
1957 sock_unregister(PF_PACKET);
1958 proto_unregister(&packet_proto);
1961 static int __init packet_init(void)
1963 int rc = proto_register(&packet_proto, 0);
1968 sock_register(&packet_family_ops);
1969 register_netdevice_notifier(&packet_netdev_notifier);
1970 proc_net_fops_create(&init_net, "packet", 0, &packet_seq_fops);
1975 module_init(packet_init);
1976 module_exit(packet_exit);
1977 MODULE_LICENSE("GPL");
1978 MODULE_ALIAS_NETPROTO(PF_PACKET);