Linux Audio

Check our new training course

Loading...
v6.8
  1// SPDX-License-Identifier: GPL-2.0-or-later
  2/* net/atm/pppoatm.c - RFC2364 PPP over ATM/AAL5 */
  3
  4/* Copyright 1999-2000 by Mitchell Blank Jr */
  5/* Based on clip.c; 1995-1999 by Werner Almesberger, EPFL LRC/ICA */
  6/* And on ppp_async.c; Copyright 1999 Paul Mackerras */
  7/* And help from Jens Axboe */
  8
  9/*
 
 
 
 
 10 *
 11 * This driver provides the encapsulation and framing for sending
 12 * and receiving PPP frames in ATM AAL5 PDUs.
 13 */
 14
 15/*
 16 * One shortcoming of this driver is that it does not comply with
 17 * section 8 of RFC2364 - we are supposed to detect a change
 18 * in encapsulation and immediately abort the connection (in order
 19 * to avoid a black-hole being created if our peer loses state
 20 * and changes encapsulation unilaterally.  However, since the
 21 * ppp_generic layer actually does the decapsulation, we need
 22 * a way of notifying it when we _think_ there might be a problem)
 23 * There's two cases:
 24 *   1.	LLC-encapsulation was missing when it was enabled.  In
 25 *	this case, we should tell the upper layer "tear down
 26 *	this session if this skb looks ok to you"
 27 *   2.	LLC-encapsulation was present when it was disabled.  Then
 28 *	we need to tell the upper layer "this packet may be
 29 *	ok, but if its in error tear down the session"
 30 * These hooks are not yet available in ppp_generic
 31 */
 32
 33#define pr_fmt(fmt) KBUILD_MODNAME ":%s: " fmt, __func__
 34
 35#include <linux/module.h>
 36#include <linux/init.h>
 37#include <linux/interrupt.h>
 38#include <linux/skbuff.h>
 39#include <linux/slab.h>
 40#include <linux/atm.h>
 41#include <linux/atmdev.h>
 42#include <linux/capability.h>
 43#include <linux/ppp_defs.h>
 44#include <linux/ppp-ioctl.h>
 45#include <linux/ppp_channel.h>
 46#include <linux/atmppp.h>
 47
 48#include "common.h"
 49
 50enum pppoatm_encaps {
 51	e_autodetect = PPPOATM_ENCAPS_AUTODETECT,
 52	e_vc = PPPOATM_ENCAPS_VC,
 53	e_llc = PPPOATM_ENCAPS_LLC,
 54};
 55
 56struct pppoatm_vcc {
 57	struct atm_vcc	*atmvcc;	/* VCC descriptor */
 58	void (*old_push)(struct atm_vcc *, struct sk_buff *);
 59	void (*old_pop)(struct atm_vcc *, struct sk_buff *);
 60	void (*old_release_cb)(struct atm_vcc *);
 61	struct module *old_owner;
 62					/* keep old push/pop for detaching */
 63	enum pppoatm_encaps encaps;
 64	atomic_t inflight;
 65	unsigned long blocked;
 66	int flags;			/* SC_COMP_PROT - compress protocol */
 67	struct ppp_channel chan;	/* interface to generic ppp layer */
 68	struct tasklet_struct wakeup_tasklet;
 69};
 70
 71/*
 72 * We want to allow two packets in the queue. The one that's currently in
 73 * flight, and *one* queued up ready for the ATM device to send immediately
 74 * from its TX done IRQ. We want to be able to use atomic_inc_not_zero(), so
 75 * inflight == -2 represents an empty queue, -1 one packet, and zero means
 76 * there are two packets in the queue.
 77 */
 78#define NONE_INFLIGHT -2
 79
 80#define BLOCKED 0
 81
 82/*
 83 * Header used for LLC Encapsulated PPP (4 bytes) followed by the LCP protocol
 84 * ID (0xC021) used in autodetection
 85 */
 86static const unsigned char pppllc[6] = { 0xFE, 0xFE, 0x03, 0xCF, 0xC0, 0x21 };
 87#define LLC_LEN		(4)
 88
 89static inline struct pppoatm_vcc *atmvcc_to_pvcc(const struct atm_vcc *atmvcc)
 90{
 91	return (struct pppoatm_vcc *) (atmvcc->user_back);
 92}
 93
 94static inline struct pppoatm_vcc *chan_to_pvcc(const struct ppp_channel *chan)
 95{
 96	return (struct pppoatm_vcc *) (chan->private);
 97}
 98
 99/*
100 * We can't do this directly from our _pop handler, since the ppp code
101 * doesn't want to be called in interrupt context, so we do it from
102 * a tasklet
103 */
104static void pppoatm_wakeup_sender(struct tasklet_struct *t)
105{
106	struct pppoatm_vcc *pvcc = from_tasklet(pvcc, t, wakeup_tasklet);
107
108	ppp_output_wakeup(&pvcc->chan);
109}
110
111static void pppoatm_release_cb(struct atm_vcc *atmvcc)
112{
113	struct pppoatm_vcc *pvcc = atmvcc_to_pvcc(atmvcc);
114
115	/*
116	 * As in pppoatm_pop(), it's safe to clear the BLOCKED bit here because
117	 * the wakeup *can't* race with pppoatm_send(). They both hold the PPP
118	 * channel's ->downl lock. And the potential race with *setting* it,
119	 * which leads to the double-check dance in pppoatm_may_send(), doesn't
120	 * exist here. In the sock_owned_by_user() case in pppoatm_send(), we
121	 * set the BLOCKED bit while the socket is still locked. We know that
122	 * ->release_cb() can't be called until that's done.
123	 */
124	if (test_and_clear_bit(BLOCKED, &pvcc->blocked))
125		tasklet_schedule(&pvcc->wakeup_tasklet);
126	if (pvcc->old_release_cb)
127		pvcc->old_release_cb(atmvcc);
128}
129/*
130 * This gets called every time the ATM card has finished sending our
131 * skb.  The ->old_pop will take care up normal atm flow control,
132 * but we also need to wake up the device if we blocked it
133 */
134static void pppoatm_pop(struct atm_vcc *atmvcc, struct sk_buff *skb)
135{
136	struct pppoatm_vcc *pvcc = atmvcc_to_pvcc(atmvcc);
137
138	pvcc->old_pop(atmvcc, skb);
139	atomic_dec(&pvcc->inflight);
140
141	/*
142	 * We always used to run the wakeup tasklet unconditionally here, for
143	 * fear of race conditions where we clear the BLOCKED flag just as we
144	 * refuse another packet in pppoatm_send(). This was quite inefficient.
145	 *
146	 * In fact it's OK. The PPP core will only ever call pppoatm_send()
147	 * while holding the channel->downl lock. And ppp_output_wakeup() as
148	 * called by the tasklet will *also* grab that lock. So even if another
149	 * CPU is in pppoatm_send() right now, the tasklet isn't going to race
150	 * with it. The wakeup *will* happen after the other CPU is safely out
151	 * of pppoatm_send() again.
152	 *
153	 * So if the CPU in pppoatm_send() has already set the BLOCKED bit and
154	 * it about to return, that's fine. We trigger a wakeup which will
155	 * happen later. And if the CPU in pppoatm_send() *hasn't* set the
156	 * BLOCKED bit yet, that's fine too because of the double check in
157	 * pppoatm_may_send() which is commented there.
158	 */
159	if (test_and_clear_bit(BLOCKED, &pvcc->blocked))
160		tasklet_schedule(&pvcc->wakeup_tasklet);
161}
162
163/*
164 * Unbind from PPP - currently we only do this when closing the socket,
165 * but we could put this into an ioctl if need be
166 */
167static void pppoatm_unassign_vcc(struct atm_vcc *atmvcc)
168{
169	struct pppoatm_vcc *pvcc;
170	pvcc = atmvcc_to_pvcc(atmvcc);
171	atmvcc->push = pvcc->old_push;
172	atmvcc->pop = pvcc->old_pop;
173	atmvcc->release_cb = pvcc->old_release_cb;
174	tasklet_kill(&pvcc->wakeup_tasklet);
175	ppp_unregister_channel(&pvcc->chan);
176	atmvcc->user_back = NULL;
177	kfree(pvcc);
 
 
178}
179
180/* Called when an AAL5 PDU comes in */
181static void pppoatm_push(struct atm_vcc *atmvcc, struct sk_buff *skb)
182{
183	struct pppoatm_vcc *pvcc = atmvcc_to_pvcc(atmvcc);
184	pr_debug("\n");
185	if (skb == NULL) {			/* VCC was closed */
186		struct module *module;
187
188		pr_debug("removing ATMPPP VCC %p\n", pvcc);
189		module = pvcc->old_owner;
190		pppoatm_unassign_vcc(atmvcc);
191		atmvcc->push(atmvcc, NULL);	/* Pass along bad news */
192		module_put(module);
193		return;
194	}
195	atm_return(atmvcc, skb->truesize);
196	switch (pvcc->encaps) {
197	case e_llc:
198		if (skb->len < LLC_LEN ||
199		    memcmp(skb->data, pppllc, LLC_LEN))
200			goto error;
201		skb_pull(skb, LLC_LEN);
202		break;
203	case e_autodetect:
204		if (pvcc->chan.ppp == NULL) {	/* Not bound yet! */
205			kfree_skb(skb);
206			return;
207		}
208		if (skb->len >= sizeof(pppllc) &&
209		    !memcmp(skb->data, pppllc, sizeof(pppllc))) {
210			pvcc->encaps = e_llc;
211			skb_pull(skb, LLC_LEN);
212			break;
213		}
214		if (skb->len >= (sizeof(pppllc) - LLC_LEN) &&
215		    !memcmp(skb->data, &pppllc[LLC_LEN],
216		    sizeof(pppllc) - LLC_LEN)) {
217			pvcc->encaps = e_vc;
218			pvcc->chan.mtu += LLC_LEN;
219			break;
220		}
221		pr_debug("Couldn't autodetect yet (skb: %6ph)\n", skb->data);
 
 
222		goto error;
223	case e_vc:
224		break;
225	}
226	ppp_input(&pvcc->chan, skb);
227	return;
228
229error:
230	kfree_skb(skb);
231	ppp_input_error(&pvcc->chan, 0);
232}
233
234static int pppoatm_may_send(struct pppoatm_vcc *pvcc, int size)
235{
236	/*
237	 * It's not clear that we need to bother with using atm_may_send()
238	 * to check we don't exceed sk->sk_sndbuf. If userspace sets a
239	 * value of sk_sndbuf which is lower than the MTU, we're going to
240	 * block for ever. But the code always did that before we introduced
241	 * the packet count limit, so...
242	 */
243	if (atm_may_send(pvcc->atmvcc, size) &&
244	    atomic_inc_not_zero(&pvcc->inflight))
245		return 1;
246
247	/*
248	 * We use test_and_set_bit() rather than set_bit() here because
249	 * we need to ensure there's a memory barrier after it. The bit
250	 * *must* be set before we do the atomic_inc() on pvcc->inflight.
251	 * There's no smp_mb__after_set_bit(), so it's this or abuse
252	 * smp_mb__after_atomic().
253	 */
254	test_and_set_bit(BLOCKED, &pvcc->blocked);
255
256	/*
257	 * We may have raced with pppoatm_pop(). If it ran for the
258	 * last packet in the queue, *just* before we set the BLOCKED
259	 * bit, then it might never run again and the channel could
260	 * remain permanently blocked. Cope with that race by checking
261	 * *again*. If it did run in that window, we'll have space on
262	 * the queue now and can return success. It's harmless to leave
263	 * the BLOCKED flag set, since it's only used as a trigger to
264	 * run the wakeup tasklet. Another wakeup will never hurt.
265	 * If pppoatm_pop() is running but hasn't got as far as making
266	 * space on the queue yet, then it hasn't checked the BLOCKED
267	 * flag yet either, so we're safe in that case too. It'll issue
268	 * an "immediate" wakeup... where "immediate" actually involves
269	 * taking the PPP channel's ->downl lock, which is held by the
270	 * code path that calls pppoatm_send(), and is thus going to
271	 * wait for us to finish.
272	 */
273	if (atm_may_send(pvcc->atmvcc, size) &&
274	    atomic_inc_not_zero(&pvcc->inflight))
275		return 1;
276
277	return 0;
278}
279/*
280 * Called by the ppp_generic.c to send a packet - returns true if packet
281 * was accepted.  If we return false, then it's our job to call
282 * ppp_output_wakeup(chan) when we're feeling more up to it.
283 * Note that in the ENOMEM case (as opposed to the !atm_may_send case)
284 * we should really drop the packet, but the generic layer doesn't
285 * support this yet.  We just return 'DROP_PACKET' which we actually define
286 * as success, just to be clear what we're really doing.
287 */
288#define DROP_PACKET 1
289static int pppoatm_send(struct ppp_channel *chan, struct sk_buff *skb)
290{
291	struct pppoatm_vcc *pvcc = chan_to_pvcc(chan);
292	struct atm_vcc *vcc;
293	int ret;
294
295	ATM_SKB(skb)->vcc = pvcc->atmvcc;
296	pr_debug("(skb=0x%p, vcc=0x%p)\n", skb, pvcc->atmvcc);
297	if (skb->data[0] == '\0' && (pvcc->flags & SC_COMP_PROT))
298		(void) skb_pull(skb, 1);
299
300	vcc = ATM_SKB(skb)->vcc;
301	bh_lock_sock(sk_atm(vcc));
302	if (sock_owned_by_user(sk_atm(vcc))) {
303		/*
304		 * Needs to happen (and be flushed, hence test_and_) before we unlock
305		 * the socket. It needs to be seen by the time our ->release_cb gets
306		 * called.
307		 */
308		test_and_set_bit(BLOCKED, &pvcc->blocked);
309		goto nospace;
310	}
311	if (test_bit(ATM_VF_RELEASED, &vcc->flags) ||
312	    test_bit(ATM_VF_CLOSE, &vcc->flags) ||
313	    !test_bit(ATM_VF_READY, &vcc->flags)) {
314		bh_unlock_sock(sk_atm(vcc));
315		kfree_skb(skb);
316		return DROP_PACKET;
317	}
318
319	switch (pvcc->encaps) {		/* LLC encapsulation needed */
320	case e_llc:
321		if (skb_headroom(skb) < LLC_LEN) {
322			struct sk_buff *n;
323			n = skb_realloc_headroom(skb, LLC_LEN);
324			if (n != NULL &&
325			    !pppoatm_may_send(pvcc, n->truesize)) {
326				kfree_skb(n);
327				goto nospace;
328			}
329			consume_skb(skb);
330			skb = n;
331			if (skb == NULL) {
332				bh_unlock_sock(sk_atm(vcc));
333				return DROP_PACKET;
334			}
335		} else if (!pppoatm_may_send(pvcc, skb->truesize))
336			goto nospace;
337		memcpy(skb_push(skb, LLC_LEN), pppllc, LLC_LEN);
338		break;
339	case e_vc:
340		if (!pppoatm_may_send(pvcc, skb->truesize))
341			goto nospace;
342		break;
343	case e_autodetect:
344		bh_unlock_sock(sk_atm(vcc));
345		pr_debug("Trying to send without setting encaps!\n");
346		kfree_skb(skb);
347		return 1;
348	}
349
350	atm_account_tx(vcc, skb);
 
351	pr_debug("atm_skb(%p)->vcc(%p)->dev(%p)\n",
352		 skb, ATM_SKB(skb)->vcc, ATM_SKB(skb)->vcc->dev);
353	ret = ATM_SKB(skb)->vcc->send(ATM_SKB(skb)->vcc, skb)
354	    ? DROP_PACKET : 1;
355	bh_unlock_sock(sk_atm(vcc));
356	return ret;
357nospace:
358	bh_unlock_sock(sk_atm(vcc));
359	/*
360	 * We don't have space to send this SKB now, but we might have
361	 * already applied SC_COMP_PROT compression, so may need to undo
362	 */
363	if ((pvcc->flags & SC_COMP_PROT) && skb_headroom(skb) > 0 &&
364	    skb->data[-1] == '\0')
365		(void) skb_push(skb, 1);
366	return 0;
367}
368
369/* This handles ioctls sent to the /dev/ppp interface */
370static int pppoatm_devppp_ioctl(struct ppp_channel *chan, unsigned int cmd,
371	unsigned long arg)
372{
373	switch (cmd) {
374	case PPPIOCGFLAGS:
375		return put_user(chan_to_pvcc(chan)->flags, (int __user *) arg)
376		    ? -EFAULT : 0;
377	case PPPIOCSFLAGS:
378		return get_user(chan_to_pvcc(chan)->flags, (int __user *) arg)
379		    ? -EFAULT : 0;
380	}
381	return -ENOTTY;
382}
383
384static const struct ppp_channel_ops pppoatm_ops = {
385	.start_xmit = pppoatm_send,
386	.ioctl = pppoatm_devppp_ioctl,
387};
388
389static int pppoatm_assign_vcc(struct atm_vcc *atmvcc, void __user *arg)
390{
391	struct atm_backend_ppp be;
392	struct pppoatm_vcc *pvcc;
393	int err;
394
 
 
 
 
395	if (copy_from_user(&be, arg, sizeof be))
396		return -EFAULT;
397	if (be.encaps != PPPOATM_ENCAPS_AUTODETECT &&
398	    be.encaps != PPPOATM_ENCAPS_VC && be.encaps != PPPOATM_ENCAPS_LLC)
399		return -EINVAL;
400	pvcc = kzalloc(sizeof(*pvcc), GFP_KERNEL);
401	if (pvcc == NULL)
402		return -ENOMEM;
403	pvcc->atmvcc = atmvcc;
404
405	/* Maximum is zero, so that we can use atomic_inc_not_zero() */
406	atomic_set(&pvcc->inflight, NONE_INFLIGHT);
407	pvcc->old_push = atmvcc->push;
408	pvcc->old_pop = atmvcc->pop;
409	pvcc->old_owner = atmvcc->owner;
410	pvcc->old_release_cb = atmvcc->release_cb;
411	pvcc->encaps = (enum pppoatm_encaps) be.encaps;
412	pvcc->chan.private = pvcc;
413	pvcc->chan.ops = &pppoatm_ops;
414	pvcc->chan.mtu = atmvcc->qos.txtp.max_sdu - PPP_HDRLEN -
415	    (be.encaps == e_vc ? 0 : LLC_LEN);
416	tasklet_setup(&pvcc->wakeup_tasklet, pppoatm_wakeup_sender);
 
417	err = ppp_register_channel(&pvcc->chan);
418	if (err != 0) {
419		kfree(pvcc);
420		return err;
421	}
422	atmvcc->user_back = pvcc;
423	atmvcc->push = pppoatm_push;
424	atmvcc->pop = pppoatm_pop;
425	atmvcc->release_cb = pppoatm_release_cb;
426	__module_get(THIS_MODULE);
427	atmvcc->owner = THIS_MODULE;
428
429	/* re-process everything received between connection setup and
430	   backend setup */
431	vcc_process_recv_queue(atmvcc);
432	return 0;
433}
434
435/*
436 * This handles ioctls actually performed on our vcc - we must return
437 * -ENOIOCTLCMD for any unrecognized ioctl
438 */
439static int pppoatm_ioctl(struct socket *sock, unsigned int cmd,
440	unsigned long arg)
441{
442	struct atm_vcc *atmvcc = ATM_SD(sock);
443	void __user *argp = (void __user *)arg;
444
445	if (cmd != ATM_SETBACKEND && atmvcc->push != pppoatm_push)
446		return -ENOIOCTLCMD;
447	switch (cmd) {
448	case ATM_SETBACKEND: {
449		atm_backend_t b;
450		if (get_user(b, (atm_backend_t __user *) argp))
451			return -EFAULT;
452		if (b != ATM_BACKEND_PPP)
453			return -ENOIOCTLCMD;
454		if (!capable(CAP_NET_ADMIN))
455			return -EPERM;
456		if (sock->state != SS_CONNECTED)
457			return -EINVAL;
458		return pppoatm_assign_vcc(atmvcc, argp);
459		}
460	case PPPIOCGCHAN:
461		return put_user(ppp_channel_index(&atmvcc_to_pvcc(atmvcc)->
462		    chan), (int __user *) argp) ? -EFAULT : 0;
463	case PPPIOCGUNIT:
464		return put_user(ppp_unit_number(&atmvcc_to_pvcc(atmvcc)->
465		    chan), (int __user *) argp) ? -EFAULT : 0;
466	}
467	return -ENOIOCTLCMD;
468}
469
470static struct atm_ioctl pppoatm_ioctl_ops = {
471	.owner	= THIS_MODULE,
472	.ioctl	= pppoatm_ioctl,
473};
474
475static int __init pppoatm_init(void)
476{
477	register_atm_ioctl(&pppoatm_ioctl_ops);
478	return 0;
479}
480
481static void __exit pppoatm_exit(void)
482{
483	deregister_atm_ioctl(&pppoatm_ioctl_ops);
484}
485
486module_init(pppoatm_init);
487module_exit(pppoatm_exit);
488
489MODULE_AUTHOR("Mitchell Blank Jr <mitch@sfgoth.com>");
490MODULE_DESCRIPTION("RFC2364 PPP over ATM/AAL5");
491MODULE_LICENSE("GPL");
v3.5.6
 
  1/* net/atm/pppoatm.c - RFC2364 PPP over ATM/AAL5 */
  2
  3/* Copyright 1999-2000 by Mitchell Blank Jr */
  4/* Based on clip.c; 1995-1999 by Werner Almesberger, EPFL LRC/ICA */
  5/* And on ppp_async.c; Copyright 1999 Paul Mackerras */
  6/* And help from Jens Axboe */
  7
  8/*
  9 *  This program is free software; you can redistribute it and/or
 10 *  modify it under the terms of the GNU General Public License
 11 *  as published by the Free Software Foundation; either version
 12 *  2 of the License, or (at your option) any later version.
 13 *
 14 * This driver provides the encapsulation and framing for sending
 15 * and receiving PPP frames in ATM AAL5 PDUs.
 16 */
 17
 18/*
 19 * One shortcoming of this driver is that it does not comply with
 20 * section 8 of RFC2364 - we are supposed to detect a change
 21 * in encapsulation and immediately abort the connection (in order
 22 * to avoid a black-hole being created if our peer loses state
 23 * and changes encapsulation unilaterally.  However, since the
 24 * ppp_generic layer actually does the decapsulation, we need
 25 * a way of notifying it when we _think_ there might be a problem)
 26 * There's two cases:
 27 *   1.	LLC-encapsulation was missing when it was enabled.  In
 28 *	this case, we should tell the upper layer "tear down
 29 *	this session if this skb looks ok to you"
 30 *   2.	LLC-encapsulation was present when it was disabled.  Then
 31 *	we need to tell the upper layer "this packet may be
 32 *	ok, but if its in error tear down the session"
 33 * These hooks are not yet available in ppp_generic
 34 */
 35
 36#define pr_fmt(fmt) KBUILD_MODNAME ":%s: " fmt, __func__
 37
 38#include <linux/module.h>
 39#include <linux/init.h>
 40#include <linux/interrupt.h>
 41#include <linux/skbuff.h>
 42#include <linux/slab.h>
 43#include <linux/atm.h>
 44#include <linux/atmdev.h>
 45#include <linux/capability.h>
 46#include <linux/ppp_defs.h>
 47#include <linux/ppp-ioctl.h>
 48#include <linux/ppp_channel.h>
 49#include <linux/atmppp.h>
 50
 51#include "common.h"
 52
 53enum pppoatm_encaps {
 54	e_autodetect = PPPOATM_ENCAPS_AUTODETECT,
 55	e_vc = PPPOATM_ENCAPS_VC,
 56	e_llc = PPPOATM_ENCAPS_LLC,
 57};
 58
 59struct pppoatm_vcc {
 60	struct atm_vcc	*atmvcc;	/* VCC descriptor */
 61	void (*old_push)(struct atm_vcc *, struct sk_buff *);
 62	void (*old_pop)(struct atm_vcc *, struct sk_buff *);
 
 
 63					/* keep old push/pop for detaching */
 64	enum pppoatm_encaps encaps;
 65	atomic_t inflight;
 66	unsigned long blocked;
 67	int flags;			/* SC_COMP_PROT - compress protocol */
 68	struct ppp_channel chan;	/* interface to generic ppp layer */
 69	struct tasklet_struct wakeup_tasklet;
 70};
 71
 72/*
 73 * We want to allow two packets in the queue. The one that's currently in
 74 * flight, and *one* queued up ready for the ATM device to send immediately
 75 * from its TX done IRQ. We want to be able to use atomic_inc_not_zero(), so
 76 * inflight == -2 represents an empty queue, -1 one packet, and zero means
 77 * there are two packets in the queue.
 78 */
 79#define NONE_INFLIGHT -2
 80
 81#define BLOCKED 0
 82
 83/*
 84 * Header used for LLC Encapsulated PPP (4 bytes) followed by the LCP protocol
 85 * ID (0xC021) used in autodetection
 86 */
 87static const unsigned char pppllc[6] = { 0xFE, 0xFE, 0x03, 0xCF, 0xC0, 0x21 };
 88#define LLC_LEN		(4)
 89
 90static inline struct pppoatm_vcc *atmvcc_to_pvcc(const struct atm_vcc *atmvcc)
 91{
 92	return (struct pppoatm_vcc *) (atmvcc->user_back);
 93}
 94
 95static inline struct pppoatm_vcc *chan_to_pvcc(const struct ppp_channel *chan)
 96{
 97	return (struct pppoatm_vcc *) (chan->private);
 98}
 99
100/*
101 * We can't do this directly from our _pop handler, since the ppp code
102 * doesn't want to be called in interrupt context, so we do it from
103 * a tasklet
104 */
105static void pppoatm_wakeup_sender(unsigned long arg)
106{
107	ppp_output_wakeup((struct ppp_channel *) arg);
 
 
108}
109
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
110/*
111 * This gets called every time the ATM card has finished sending our
112 * skb.  The ->old_pop will take care up normal atm flow control,
113 * but we also need to wake up the device if we blocked it
114 */
115static void pppoatm_pop(struct atm_vcc *atmvcc, struct sk_buff *skb)
116{
117	struct pppoatm_vcc *pvcc = atmvcc_to_pvcc(atmvcc);
118
119	pvcc->old_pop(atmvcc, skb);
120	atomic_dec(&pvcc->inflight);
121
122	/*
123	 * We always used to run the wakeup tasklet unconditionally here, for
124	 * fear of race conditions where we clear the BLOCKED flag just as we
125	 * refuse another packet in pppoatm_send(). This was quite inefficient.
126	 *
127	 * In fact it's OK. The PPP core will only ever call pppoatm_send()
128	 * while holding the channel->downl lock. And ppp_output_wakeup() as
129	 * called by the tasklet will *also* grab that lock. So even if another
130	 * CPU is in pppoatm_send() right now, the tasklet isn't going to race
131	 * with it. The wakeup *will* happen after the other CPU is safely out
132	 * of pppoatm_send() again.
133	 *
134	 * So if the CPU in pppoatm_send() has already set the BLOCKED bit and
135	 * it about to return, that's fine. We trigger a wakeup which will
136	 * happen later. And if the CPU in pppoatm_send() *hasn't* set the
137	 * BLOCKED bit yet, that's fine too because of the double check in
138	 * pppoatm_may_send() which is commented there.
139	 */
140	if (test_and_clear_bit(BLOCKED, &pvcc->blocked))
141		tasklet_schedule(&pvcc->wakeup_tasklet);
142}
143
144/*
145 * Unbind from PPP - currently we only do this when closing the socket,
146 * but we could put this into an ioctl if need be
147 */
148static void pppoatm_unassign_vcc(struct atm_vcc *atmvcc)
149{
150	struct pppoatm_vcc *pvcc;
151	pvcc = atmvcc_to_pvcc(atmvcc);
152	atmvcc->push = pvcc->old_push;
153	atmvcc->pop = pvcc->old_pop;
 
154	tasklet_kill(&pvcc->wakeup_tasklet);
155	ppp_unregister_channel(&pvcc->chan);
156	atmvcc->user_back = NULL;
157	kfree(pvcc);
158	/* Gee, I hope we have the big kernel lock here... */
159	module_put(THIS_MODULE);
160}
161
162/* Called when an AAL5 PDU comes in */
163static void pppoatm_push(struct atm_vcc *atmvcc, struct sk_buff *skb)
164{
165	struct pppoatm_vcc *pvcc = atmvcc_to_pvcc(atmvcc);
166	pr_debug("\n");
167	if (skb == NULL) {			/* VCC was closed */
 
 
168		pr_debug("removing ATMPPP VCC %p\n", pvcc);
 
169		pppoatm_unassign_vcc(atmvcc);
170		atmvcc->push(atmvcc, NULL);	/* Pass along bad news */
 
171		return;
172	}
173	atm_return(atmvcc, skb->truesize);
174	switch (pvcc->encaps) {
175	case e_llc:
176		if (skb->len < LLC_LEN ||
177		    memcmp(skb->data, pppllc, LLC_LEN))
178			goto error;
179		skb_pull(skb, LLC_LEN);
180		break;
181	case e_autodetect:
182		if (pvcc->chan.ppp == NULL) {	/* Not bound yet! */
183			kfree_skb(skb);
184			return;
185		}
186		if (skb->len >= sizeof(pppllc) &&
187		    !memcmp(skb->data, pppllc, sizeof(pppllc))) {
188			pvcc->encaps = e_llc;
189			skb_pull(skb, LLC_LEN);
190			break;
191		}
192		if (skb->len >= (sizeof(pppllc) - LLC_LEN) &&
193		    !memcmp(skb->data, &pppllc[LLC_LEN],
194		    sizeof(pppllc) - LLC_LEN)) {
195			pvcc->encaps = e_vc;
196			pvcc->chan.mtu += LLC_LEN;
197			break;
198		}
199		pr_debug("Couldn't autodetect yet (skb: %02X %02X %02X %02X %02X %02X)\n",
200			 skb->data[0], skb->data[1], skb->data[2],
201			 skb->data[3], skb->data[4], skb->data[5]);
202		goto error;
203	case e_vc:
204		break;
205	}
206	ppp_input(&pvcc->chan, skb);
207	return;
208
209error:
210	kfree_skb(skb);
211	ppp_input_error(&pvcc->chan, 0);
212}
213
214static inline int pppoatm_may_send(struct pppoatm_vcc *pvcc, int size)
215{
216	/*
217	 * It's not clear that we need to bother with using atm_may_send()
218	 * to check we don't exceed sk->sk_sndbuf. If userspace sets a
219	 * value of sk_sndbuf which is lower than the MTU, we're going to
220	 * block for ever. But the code always did that before we introduced
221	 * the packet count limit, so...
222	 */
223	if (atm_may_send(pvcc->atmvcc, size) &&
224	    atomic_inc_not_zero_hint(&pvcc->inflight, NONE_INFLIGHT))
225		return 1;
226
227	/*
228	 * We use test_and_set_bit() rather than set_bit() here because
229	 * we need to ensure there's a memory barrier after it. The bit
230	 * *must* be set before we do the atomic_inc() on pvcc->inflight.
231	 * There's no smp_mb__after_set_bit(), so it's this or abuse
232	 * smp_mb__after_clear_bit().
233	 */
234	test_and_set_bit(BLOCKED, &pvcc->blocked);
235
236	/*
237	 * We may have raced with pppoatm_pop(). If it ran for the
238	 * last packet in the queue, *just* before we set the BLOCKED
239	 * bit, then it might never run again and the channel could
240	 * remain permanently blocked. Cope with that race by checking
241	 * *again*. If it did run in that window, we'll have space on
242	 * the queue now and can return success. It's harmless to leave
243	 * the BLOCKED flag set, since it's only used as a trigger to
244	 * run the wakeup tasklet. Another wakeup will never hurt.
245	 * If pppoatm_pop() is running but hasn't got as far as making
246	 * space on the queue yet, then it hasn't checked the BLOCKED
247	 * flag yet either, so we're safe in that case too. It'll issue
248	 * an "immediate" wakeup... where "immediate" actually involves
249	 * taking the PPP channel's ->downl lock, which is held by the
250	 * code path that calls pppoatm_send(), and is thus going to
251	 * wait for us to finish.
252	 */
253	if (atm_may_send(pvcc->atmvcc, size) &&
254	    atomic_inc_not_zero(&pvcc->inflight))
255		return 1;
256
257	return 0;
258}
259/*
260 * Called by the ppp_generic.c to send a packet - returns true if packet
261 * was accepted.  If we return false, then it's our job to call
262 * ppp_output_wakeup(chan) when we're feeling more up to it.
263 * Note that in the ENOMEM case (as opposed to the !atm_may_send case)
264 * we should really drop the packet, but the generic layer doesn't
265 * support this yet.  We just return 'DROP_PACKET' which we actually define
266 * as success, just to be clear what we're really doing.
267 */
268#define DROP_PACKET 1
269static int pppoatm_send(struct ppp_channel *chan, struct sk_buff *skb)
270{
271	struct pppoatm_vcc *pvcc = chan_to_pvcc(chan);
 
 
 
272	ATM_SKB(skb)->vcc = pvcc->atmvcc;
273	pr_debug("(skb=0x%p, vcc=0x%p)\n", skb, pvcc->atmvcc);
274	if (skb->data[0] == '\0' && (pvcc->flags & SC_COMP_PROT))
275		(void) skb_pull(skb, 1);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
276	switch (pvcc->encaps) {		/* LLC encapsulation needed */
277	case e_llc:
278		if (skb_headroom(skb) < LLC_LEN) {
279			struct sk_buff *n;
280			n = skb_realloc_headroom(skb, LLC_LEN);
281			if (n != NULL &&
282			    !pppoatm_may_send(pvcc, n->truesize)) {
283				kfree_skb(n);
284				goto nospace;
285			}
286			kfree_skb(skb);
287			skb = n;
288			if (skb == NULL)
 
289				return DROP_PACKET;
 
290		} else if (!pppoatm_may_send(pvcc, skb->truesize))
291			goto nospace;
292		memcpy(skb_push(skb, LLC_LEN), pppllc, LLC_LEN);
293		break;
294	case e_vc:
295		if (!pppoatm_may_send(pvcc, skb->truesize))
296			goto nospace;
297		break;
298	case e_autodetect:
 
299		pr_debug("Trying to send without setting encaps!\n");
300		kfree_skb(skb);
301		return 1;
302	}
303
304	atomic_add(skb->truesize, &sk_atm(ATM_SKB(skb)->vcc)->sk_wmem_alloc);
305	ATM_SKB(skb)->atm_options = ATM_SKB(skb)->vcc->atm_options;
306	pr_debug("atm_skb(%p)->vcc(%p)->dev(%p)\n",
307		 skb, ATM_SKB(skb)->vcc, ATM_SKB(skb)->vcc->dev);
308	return ATM_SKB(skb)->vcc->send(ATM_SKB(skb)->vcc, skb)
309	    ? DROP_PACKET : 1;
 
 
310nospace:
 
311	/*
312	 * We don't have space to send this SKB now, but we might have
313	 * already applied SC_COMP_PROT compression, so may need to undo
314	 */
315	if ((pvcc->flags & SC_COMP_PROT) && skb_headroom(skb) > 0 &&
316	    skb->data[-1] == '\0')
317		(void) skb_push(skb, 1);
318	return 0;
319}
320
321/* This handles ioctls sent to the /dev/ppp interface */
322static int pppoatm_devppp_ioctl(struct ppp_channel *chan, unsigned int cmd,
323	unsigned long arg)
324{
325	switch (cmd) {
326	case PPPIOCGFLAGS:
327		return put_user(chan_to_pvcc(chan)->flags, (int __user *) arg)
328		    ? -EFAULT : 0;
329	case PPPIOCSFLAGS:
330		return get_user(chan_to_pvcc(chan)->flags, (int __user *) arg)
331		    ? -EFAULT : 0;
332	}
333	return -ENOTTY;
334}
335
336static const struct ppp_channel_ops pppoatm_ops = {
337	.start_xmit = pppoatm_send,
338	.ioctl = pppoatm_devppp_ioctl,
339};
340
341static int pppoatm_assign_vcc(struct atm_vcc *atmvcc, void __user *arg)
342{
343	struct atm_backend_ppp be;
344	struct pppoatm_vcc *pvcc;
345	int err;
346	/*
347	 * Each PPPoATM instance has its own tasklet - this is just a
348	 * prototypical one used to initialize them
349	 */
350	static const DECLARE_TASKLET(tasklet_proto, pppoatm_wakeup_sender, 0);
351	if (copy_from_user(&be, arg, sizeof be))
352		return -EFAULT;
353	if (be.encaps != PPPOATM_ENCAPS_AUTODETECT &&
354	    be.encaps != PPPOATM_ENCAPS_VC && be.encaps != PPPOATM_ENCAPS_LLC)
355		return -EINVAL;
356	pvcc = kzalloc(sizeof(*pvcc), GFP_KERNEL);
357	if (pvcc == NULL)
358		return -ENOMEM;
359	pvcc->atmvcc = atmvcc;
360
361	/* Maximum is zero, so that we can use atomic_inc_not_zero() */
362	atomic_set(&pvcc->inflight, NONE_INFLIGHT);
363	pvcc->old_push = atmvcc->push;
364	pvcc->old_pop = atmvcc->pop;
 
 
365	pvcc->encaps = (enum pppoatm_encaps) be.encaps;
366	pvcc->chan.private = pvcc;
367	pvcc->chan.ops = &pppoatm_ops;
368	pvcc->chan.mtu = atmvcc->qos.txtp.max_sdu - PPP_HDRLEN -
369	    (be.encaps == e_vc ? 0 : LLC_LEN);
370	pvcc->wakeup_tasklet = tasklet_proto;
371	pvcc->wakeup_tasklet.data = (unsigned long) &pvcc->chan;
372	err = ppp_register_channel(&pvcc->chan);
373	if (err != 0) {
374		kfree(pvcc);
375		return err;
376	}
377	atmvcc->user_back = pvcc;
378	atmvcc->push = pppoatm_push;
379	atmvcc->pop = pppoatm_pop;
 
380	__module_get(THIS_MODULE);
 
381
382	/* re-process everything received between connection setup and
383	   backend setup */
384	vcc_process_recv_queue(atmvcc);
385	return 0;
386}
387
388/*
389 * This handles ioctls actually performed on our vcc - we must return
390 * -ENOIOCTLCMD for any unrecognized ioctl
391 */
392static int pppoatm_ioctl(struct socket *sock, unsigned int cmd,
393	unsigned long arg)
394{
395	struct atm_vcc *atmvcc = ATM_SD(sock);
396	void __user *argp = (void __user *)arg;
397
398	if (cmd != ATM_SETBACKEND && atmvcc->push != pppoatm_push)
399		return -ENOIOCTLCMD;
400	switch (cmd) {
401	case ATM_SETBACKEND: {
402		atm_backend_t b;
403		if (get_user(b, (atm_backend_t __user *) argp))
404			return -EFAULT;
405		if (b != ATM_BACKEND_PPP)
406			return -ENOIOCTLCMD;
407		if (!capable(CAP_NET_ADMIN))
408			return -EPERM;
 
 
409		return pppoatm_assign_vcc(atmvcc, argp);
410		}
411	case PPPIOCGCHAN:
412		return put_user(ppp_channel_index(&atmvcc_to_pvcc(atmvcc)->
413		    chan), (int __user *) argp) ? -EFAULT : 0;
414	case PPPIOCGUNIT:
415		return put_user(ppp_unit_number(&atmvcc_to_pvcc(atmvcc)->
416		    chan), (int __user *) argp) ? -EFAULT : 0;
417	}
418	return -ENOIOCTLCMD;
419}
420
421static struct atm_ioctl pppoatm_ioctl_ops = {
422	.owner	= THIS_MODULE,
423	.ioctl	= pppoatm_ioctl,
424};
425
426static int __init pppoatm_init(void)
427{
428	register_atm_ioctl(&pppoatm_ioctl_ops);
429	return 0;
430}
431
432static void __exit pppoatm_exit(void)
433{
434	deregister_atm_ioctl(&pppoatm_ioctl_ops);
435}
436
437module_init(pppoatm_init);
438module_exit(pppoatm_exit);
439
440MODULE_AUTHOR("Mitchell Blank Jr <mitch@sfgoth.com>");
441MODULE_DESCRIPTION("RFC2364 PPP over ATM/AAL5");
442MODULE_LICENSE("GPL");