patch-2.1.68 linux/net/ipv4/packet.c

Next file: linux/net/ipv4/proc.c
Previous file: linux/net/ipv4/ipmr.c
Back to the patch index
Back to the overall index

diff -u --recursive --new-file v2.1.67/linux/net/ipv4/packet.c linux/net/ipv4/packet.c
@@ -1,528 +0,0 @@
-/*
- * INET		An implementation of the TCP/IP protocol suite for the LINUX
- *		operating system.  INET is implemented using the  BSD Socket
- *		interface as the means of communication with the user level.
- *
- *		PACKET - implements raw packet sockets.
- *
- *		Doesn't belong in IP but it's currently too hooked into ip
- *		to separate.
- *
- * Version:	@(#)packet.c	1.0.6	05/25/93
- *
- * Authors:	Ross Biro, <bir7@leland.Stanford.Edu>
- *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
- *		Alan Cox, <gw4pts@gw4pts.ampr.org>
- *
- * Fixes:	
- *		Alan Cox	:	verify_area() now used correctly
- *		Alan Cox	:	new skbuff lists, look ma no backlogs!
- *		Alan Cox	:	tidied skbuff lists.
- *		Alan Cox	:	Now uses generic datagram routines I
- *					added. Also fixed the peek/read crash
- *					from all old Linux datagram code.
- *		Alan Cox	:	Uses the improved datagram code.
- *		Alan Cox	:	Added NULL's for socket options.
- *		Alan Cox	:	Re-commented the code.
- *		Alan Cox	:	Use new kernel side addressing
- *		Rob Janssen	:	Correct MTU usage.
- *		Dave Platt	:	Counter leaks caused by incorrect
- *					interrupt locking and some slightly
- *					dubious gcc output. Can you read
- *					compiler: it said _VOLATILE_
- *	Richard Kooijman	:	Timestamp fixes.
- *		Alan Cox	:	New buffers. Use sk->mac.raw.
- *		Alan Cox	:	sendmsg/recvmsg support.
- *		Alan Cox	:	Protocol setting support
- *
- *		This program is free software; you can redistribute it and/or
- *		modify it under the terms of the GNU General Public License
- *		as published by the Free Software Foundation; either version
- *		2 of the License, or (at your option) any later version.
- *
- */
- 
-#include <linux/types.h>
-#include <linux/sched.h>
-#include <linux/mm.h>
-#include <linux/fcntl.h>
-#include <linux/socket.h>
-#include <linux/in.h>
-#include <linux/inet.h>
-#include <linux/netdevice.h>
-#include <linux/if_packet.h>
-#include <net/ip.h>
-#include <net/protocol.h>
-#include <linux/skbuff.h>
-#include <net/sock.h>
-#include <linux/errno.h>
-#include <linux/timer.h>
-#include <asm/system.h>
-#include <asm/uaccess.h>
-
-
-/*
- *	This should be the easiest of all, all we do is copy it into a buffer. 
- */
- 
-int packet_rcv(struct sk_buff *skb, struct device *dev,  struct packet_type *pt)
-{
-	struct sock *sk;
-	
-	/*
-	 *	When we registered the protocol we saved the socket in the data
-	 *	field for just this event.
-	 */
-
-	sk = (struct sock *) pt->data;	
-	
-	/*
-	 *	Yank back the headers [hope the device set this
-	 *	right or kerboom...]
-	 */
-	 
-	skb_push(skb,skb->data-skb->mac.raw);
-
-	/*
-	 *	The SOCK_PACKET socket receives _all_ frames.
-	 */
-	 
-	skb->dev = dev;
-
-	/*
-	 *	Charge the memory to the socket. This is done specifically
-	 *	to prevent sockets using all the memory up.
-	 */
-	 
-	if(sock_queue_rcv_skb(sk,skb)<0)
-	{
-		kfree_skb(skb, FREE_READ);
-		return 0;
-	}
-	/*
-	 *	Processing complete.
-	 */
-	 
-	return(0);
-}
-
-
-/*
- *	Output a raw packet to a device layer. This bypasses all the other
- *	protocol layers and you must therefore supply it with a complete frame
- */
- 
-static int packet_sendmsg(struct sock *sk, struct msghdr *msg, int len)
-{
-	struct sk_buff *skb;
-	struct device *dev;
-	struct sockaddr_pkt *saddr=(struct sockaddr_pkt *)msg->msg_name;
-	unsigned short proto=0;
-	int err;
-	
-	/*
-	 *	Check the flags. 
-	 */
-
-	if (msg->msg_flags&~MSG_DONTWAIT) 
-		return(-EINVAL);
-
-	/*
-	 *	Get and verify the address. 
-	 */
-	 
-	if (saddr) 
-	{
-		if (msg->msg_namelen < sizeof(struct sockaddr)) 
-			return(-EINVAL);
-		if (msg->msg_namelen==sizeof(struct sockaddr_pkt))
-			proto=saddr->spkt_protocol;
-	} 
-	else
-		return(-ENOTCONN);	/* SOCK_PACKET must be sent giving an address */
-	
-	/*
-	 *	Find the device first to size check it 
-	 */
-
-	saddr->spkt_device[13] = 0;
-	dev = dev_get(saddr->spkt_device);
-	if (dev == NULL) 
-	{
-		return(-ENODEV);
-  	}
-	
-	/*
-	 *	You may not queue a frame bigger than the mtu. This is the lowest level
-	 *	raw protocol and you must do your own fragmentation at this level.
-	 */
-	 
-	if(len>dev->mtu+dev->hard_header_len)
-  		return -EMSGSIZE;
-
-	skb = sock_wmalloc(sk, len+dev->hard_header_len, 0, GFP_KERNEL);
-
-	/*
-	 *	If the write buffer is full, then tough. At this level the user gets to
-	 *	deal with the problem - do your own algorithmic backoffs. That's far
-	 *	more flexible.
-	 */
-	 
-	if (skb == NULL) 
-	{
-		return(-ENOBUFS);
-	}
-	
-	/*
-	 *	Fill it in 
-	 */
-	 
-	/* FIXME: Save some space for broken drivers that write a
-	 * hard header at transmission time by themselves. PPP is the
-	 * notable one here. This should really be fixed at the driver level.
-	 */
-	skb_reserve(skb,dev->hard_header_len);
-	err = memcpy_fromiovec(skb_put(skb,len), msg->msg_iov, len);
-	skb->arp = 1;	/* No ARP needs doing on this (complete) frame */
-	skb->protocol = proto;
-	skb->dev = dev;
-	skb->priority = sk->priority;
-
-	/*
-	 *	Now send it
-	 */
-
-	if (err)
-	{
-		err = -EFAULT;
-	}
-	else
-	{
-		if (!(dev->flags & IFF_UP))
-		{
-			err = -ENODEV;
-		}
-	}
-	
-	if (err) 
-	{
-		kfree_skb(skb, FREE_WRITE);
-		return err;
-	}
-		
-	dev_queue_xmit(skb);
-	return(len);
-}
-
-/*
- *	Close a SOCK_PACKET socket. This is fairly simple. We immediately go
- *	to 'closed' state and remove our protocol entry in the device list.
- *	The release_sock() will destroy the socket if a user has closed the
- *	file side of the object.
- */
-
-static void packet_close(struct sock *sk, unsigned long timeout)
-{
-	/*
-	 *	Stop more data and kill the socket off.
-	 */
-
-	lock_sock(sk);
-	sk->state = TCP_CLOSE;
-
-	/*
-	 *	Unhook the notifier
-	 */
-
-	unregister_netdevice_notifier(&sk->protinfo.af_packet.notifier);
-
-	if(sk->protinfo.af_packet.prot_hook)
-	{
-		/*
-		 *	Remove the protocol hook
-		 */
-		 
-		dev_remove_pack((struct packet_type *)sk->protinfo.af_packet.prot_hook);
-
-		/*
-		 *	Dispose of litter carefully.
-		 */
-	 
-		kfree_s((void *)sk->protinfo.af_packet.prot_hook, sizeof(struct packet_type));
-		sk->protinfo.af_packet.prot_hook = NULL;
-	}
-	
-	release_sock(sk);
-	sk->dead = 1;
-	destroy_sock(sk);
-}
-
-/*
- *	Attach a packet hook to a device.
- */
-
-int packet_attach(struct sock *sk, struct device *dev)
-{
-	struct packet_type *p = (struct packet_type *) kmalloc(sizeof(*p), GFP_KERNEL);
-	if (p == NULL) 
-		return(-ENOMEM);
-
-	p->func = packet_rcv;
-	p->type = sk->num;
-	p->data = (void *)sk;
-	p->dev = dev;
-	dev_add_pack(p);
-   
-	/*
-	 *	We need to remember this somewhere. 
-	 */
-   
-	sk->protinfo.af_packet.prot_hook = p;
-	sk->protinfo.af_packet.bound_dev = dev;
-	return 0;	
-}
- 
-/*
- *	Bind a packet socket to a device
- */
-
-static int packet_bind(struct sock *sk, struct sockaddr *uaddr, int addr_len)
-{
-	char name[15];
-	struct device *dev;
-	
-	/*
-	 *	Check legality
-	 */
-	 
-	if(addr_len!=sizeof(struct sockaddr))
-		return -EINVAL;
-	strncpy(name,uaddr->sa_data,14);
-	name[14]=0;
-	
-	/*
-	 *	Lock the device chain while we sanity check
-	 *	the bind request.
-	 */
-	 
-	dev_lock_list();
-	dev=dev_get(name);
-	if(dev==NULL)
-	{
-		dev_unlock_list();
-		return -ENODEV;
-	}
-	
-	if(!(dev->flags&IFF_UP))
-	{
-		dev_unlock_list();
-		return -ENETDOWN;
-	}
-	
-	/*
-	 *	Perform the request.
-	 */
-	 
-	memcpy(sk->protinfo.af_packet.device_name,name,15);
-	
-	/*
-	 *	Rewrite an existing hook if present.
-	 */
-	 
-	if(sk->protinfo.af_packet.prot_hook)
-	{
-		dev_remove_pack(sk->protinfo.af_packet.prot_hook);
-		sk->protinfo.af_packet.prot_hook->dev=dev;
-		sk->protinfo.af_packet.bound_dev=dev;
-		dev_add_pack(sk->protinfo.af_packet.prot_hook);
-	}
-	else
-	{
-		int err=packet_attach(sk, dev);
-		if(err)
-		{
-			dev_unlock_list();
-			return err;
-		}
-	}
-	/*
-	 *	Now the notifier is set up right this lot is safe.
-	 */
-	dev_unlock_list();
-	return 0;
-}
-
-/*
- *	This hook is called when a device goes up or down so that
- *	SOCK_PACKET sockets can come unbound properly.
- */
-
-static int packet_unbind(struct notifier_block *this, unsigned long msg, void *data)
-{
-	struct inet_packet_opt *ipo=(struct inet_packet_opt *)this;
-	if(msg==NETDEV_DOWN && data==ipo->bound_dev)
-	{
-		/*
-		 *	Our device has gone down.
-		 */
-		ipo->bound_dev=NULL;
-		dev_remove_pack(ipo->prot_hook);
-		kfree(ipo->prot_hook);
-		ipo->prot_hook=NULL;
-	}
-	return NOTIFY_DONE;
-}
-
-
-/*
- *	Create a packet of type SOCK_PACKET. 
- */
-
-static int packet_init(struct sock *sk)
-{
-	/*
-	 *	Attach a protocol block
-	 */
-	 
-	int err=packet_attach(sk, NULL);
-	if(err)
-		return err;
-		
-	/*
-	 *	Set up the per socket notifier.
-	 */
-	 
-	sk->protinfo.af_packet.notifier.notifier_call=packet_unbind;
-	sk->protinfo.af_packet.notifier.priority=0;
-
-	register_netdevice_notifier(&sk->protinfo.af_packet.notifier);
-
-	return(0);
-}
-
-
-/*
- *	Pull a packet from our receive queue and hand it to the user.
- *	If necessary we block.
- */
- 
-int packet_recvmsg(struct sock *sk, struct msghdr *msg, int len,
-	        int noblock, int flags,int *addr_len)
-{
-	int copied=0;
-	struct sk_buff *skb;
-	struct sockaddr_pkt *saddr=(struct sockaddr_pkt *)msg->msg_name;
-	int err;
-
-	/*
-	 *	If there is no protocol hook then the device is down.
-	 */
-	 
-	if(sk->protinfo.af_packet.prot_hook==NULL)
-		return -ENETDOWN;
-		
-	/*
-	 *	If the address length field is there to be filled in, we fill
-	 *	it in now.
-	 */
-
-	if (addr_len) 
-		*addr_len=sizeof(*saddr);
-	
-	/*
-	 *	Call the generic datagram receiver. This handles all sorts
-	 *	of horrible races and re-entrancy so we can forget about it
-	 *	in the protocol layers.
-	 */
-	 
-	skb=skb_recv_datagram(sk,flags,noblock,&err);
-	
-	/*
-	 *	An error occurred so return it. Because skb_recv_datagram() 
-	 *	handles the blocking we don't see and worry about blocking
-	 *	retries.
-	 */
-	 
-	if(skb==NULL)
-		return err;
-		
-	/*
-	 *	You lose any data beyond the buffer you gave. If it worries a
-	 *	user program they can ask the device for its MTU anyway.
-	 */
-	 
-	copied = skb->len;
-	if(copied>len)
-	{
-		copied=len;
-		msg->msg_flags|=MSG_TRUNC;
-	}
-	
-	/* We can't use skb_copy_datagram here */
-	err = memcpy_toiovec(msg->msg_iov, skb->data, copied);
-	if (err)
-	{
-		return -EFAULT;
-	}
-
-	sk->stamp=skb->stamp;
-
-	/*
-	 *	Copy the address. 
-	 */
-	 
-	if (saddr) 
-	{
-		saddr->spkt_family = skb->dev->type;
-		strncpy(saddr->spkt_device,skb->dev->name, 15);
-		saddr->spkt_protocol = skb->protocol;
-	}
-	
-	/*
-	 *	Free or return the buffer as appropriate. Again this hides all the
-	 *	races and re-entrancy issues from us.
-	 */
-
-	skb_free_datagram(sk, skb);
-
-	return(copied);
-}
-
-/*
- *	This structure declares to the lower layer socket subsystem currently
- *	incorrectly embedded in the IP code how to behave. This interface needs
- *	a lot of work and will change.
- */
- 
-struct proto packet_prot = 
-{
-	(struct sock *)&packet_prot,	/* sklist_next */
-	(struct sock *)&packet_prot,	/* sklist_prev */
-	packet_close,			/* close */
-	NULL,				/* connect */
-	NULL,				/* accept */
-	NULL,				/* retransmit */
-	NULL,				/* write_wakeup */
-	NULL,				/* read_wakeup */
-	datagram_poll,			/* poll */
-	NULL,				/* ioctl */
-	packet_init,			/* init */
-	NULL,				/* destroy */
-	NULL,				/* shutdown */
-	NULL,				/* setsockopt */
-	NULL,				/* getsockopt */
-	packet_sendmsg,			/* Sendmsg */
-	packet_recvmsg,			/* Recvmsg */
-	packet_bind,			/* bind */
-	NULL,				/* backlog_rcv */
-	NULL,				/* hash */
-	NULL,				/* unhash */
-	NULL,				/* rehash */
-	NULL,				/* good_socknum */
-	NULL,				/* verify_bind */
-	128,				/* max_header */
-	0,				/* retransmits */
-	"PACKET",			/* name */
-	0,				/* inuse */
-	0				/* highestinuse */
-};

FUNET's LINUX-ADM group, linux-adm@nic.funet.fi
TCL-scripts by Sam Shen, slshen@lbl.gov