| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* | 
 | 2 |  * INET		An implementation of the TCP/IP protocol suite for the LINUX | 
 | 3 |  *		operating system.  INET is implemented using the  BSD Socket | 
 | 4 |  *		interface as the means of communication with the user level. | 
 | 5 |  * | 
 | 6 |  *		PACKET - implements raw packet sockets. | 
 | 7 |  * | 
 | 8 |  * Version:	$Id: af_packet.c,v 1.61 2002/02/08 03:57:19 davem Exp $ | 
 | 9 |  * | 
| Jesper Juhl | 02c30a8 | 2005-05-05 16:16:16 -0700 | [diff] [blame] | 10 |  * Authors:	Ross Biro | 
| Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 11 |  *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG> | 
 | 12 |  *		Alan Cox, <gw4pts@gw4pts.ampr.org> | 
 | 13 |  * | 
 | 14 |  * Fixes:	 | 
 | 15 |  *		Alan Cox	:	verify_area() now used correctly | 
 | 16 |  *		Alan Cox	:	new skbuff lists, look ma no backlogs! | 
 | 17 |  *		Alan Cox	:	tidied skbuff lists. | 
 | 18 |  *		Alan Cox	:	Now uses generic datagram routines I | 
 | 19 |  *					added. Also fixed the peek/read crash | 
 | 20 |  *					from all old Linux datagram code. | 
 | 21 |  *		Alan Cox	:	Uses the improved datagram code. | 
 | 22 |  *		Alan Cox	:	Added NULL's for socket options. | 
 | 23 |  *		Alan Cox	:	Re-commented the code. | 
 | 24 |  *		Alan Cox	:	Use new kernel side addressing | 
 | 25 |  *		Rob Janssen	:	Correct MTU usage. | 
 | 26 |  *		Dave Platt	:	Counter leaks caused by incorrect | 
 | 27 |  *					interrupt locking and some slightly | 
 | 28 |  *					dubious gcc output. Can you read | 
 | 29 |  *					compiler: it said _VOLATILE_ | 
 | 30 |  *	Richard Kooijman	:	Timestamp fixes. | 
 | 31 |  *		Alan Cox	:	New buffers. Use sk->mac.raw. | 
 | 32 |  *		Alan Cox	:	sendmsg/recvmsg support. | 
 | 33 |  *		Alan Cox	:	Protocol setting support | 
 | 34 |  *	Alexey Kuznetsov	:	Untied from IPv4 stack. | 
 | 35 |  *	Cyrus Durgin		:	Fixed kerneld for kmod. | 
 | 36 |  *	Michal Ostrowski        :       Module initialization cleanup. | 
 | 37 |  *         Ulises Alonso        :       Frame number limit removal and  | 
 | 38 |  *                                      packet_set_ring memory leak. | 
 | 39 |  * | 
 | 40 |  *		This program is free software; you can redistribute it and/or | 
 | 41 |  *		modify it under the terms of the GNU General Public License | 
 | 42 |  *		as published by the Free Software Foundation; either version | 
 | 43 |  *		2 of the License, or (at your option) any later version. | 
 | 44 |  * | 
 | 45 |  */ | 
 | 46 |   | 
 | 47 | #include <linux/config.h> | 
 | 48 | #include <linux/types.h> | 
 | 49 | #include <linux/sched.h> | 
 | 50 | #include <linux/mm.h> | 
 | 51 | #include <linux/fcntl.h> | 
 | 52 | #include <linux/socket.h> | 
 | 53 | #include <linux/in.h> | 
 | 54 | #include <linux/inet.h> | 
 | 55 | #include <linux/netdevice.h> | 
 | 56 | #include <linux/if_packet.h> | 
 | 57 | #include <linux/wireless.h> | 
 | 58 | #include <linux/kmod.h> | 
 | 59 | #include <net/ip.h> | 
 | 60 | #include <net/protocol.h> | 
 | 61 | #include <linux/skbuff.h> | 
 | 62 | #include <net/sock.h> | 
 | 63 | #include <linux/errno.h> | 
 | 64 | #include <linux/timer.h> | 
 | 65 | #include <asm/system.h> | 
 | 66 | #include <asm/uaccess.h> | 
 | 67 | #include <asm/ioctls.h> | 
 | 68 | #include <asm/page.h> | 
 | 69 | #include <asm/io.h> | 
 | 70 | #include <linux/proc_fs.h> | 
 | 71 | #include <linux/seq_file.h> | 
 | 72 | #include <linux/poll.h> | 
 | 73 | #include <linux/module.h> | 
 | 74 | #include <linux/init.h> | 
 | 75 |  | 
 | 76 | #ifdef CONFIG_INET | 
 | 77 | #include <net/inet_common.h> | 
 | 78 | #endif | 
 | 79 |  | 
 | 80 | #define CONFIG_SOCK_PACKET	1 | 
 | 81 |  | 
 | 82 | /* | 
 | 83 |    Proposed replacement for SIOC{ADD,DEL}MULTI and | 
 | 84 |    IFF_PROMISC, IFF_ALLMULTI flags. | 
 | 85 |  | 
 | 86 |    It is more expensive, but I believe, | 
 | 87 |    it is really correct solution: reentereble, safe and fault tolerant. | 
 | 88 |  | 
 | 89 |    IFF_PROMISC/IFF_ALLMULTI/SIOC{ADD/DEL}MULTI are faked by keeping | 
 | 90 |    reference count and global flag, so that real status is | 
 | 91 |    (gflag|(count != 0)), so that we can use obsolete faulty interface | 
 | 92 |    not harming clever users. | 
 | 93 |  */ | 
 | 94 | #define CONFIG_PACKET_MULTICAST	1 | 
 | 95 |  | 
 | 96 | /* | 
 | 97 |    Assumptions: | 
 | 98 |    - if device has no dev->hard_header routine, it adds and removes ll header | 
 | 99 |      inside itself. In this case ll header is invisible outside of device, | 
 | 100 |      but higher levels still should reserve dev->hard_header_len. | 
 | 101 |      Some devices are enough clever to reallocate skb, when header | 
 | 102 |      will not fit to reserved space (tunnel), another ones are silly | 
 | 103 |      (PPP). | 
 | 104 |    - packet socket receives packets with pulled ll header, | 
 | 105 |      so that SOCK_RAW should push it back. | 
 | 106 |  | 
 | 107 | On receive: | 
 | 108 | ----------- | 
 | 109 |  | 
 | 110 | Incoming, dev->hard_header!=NULL | 
 | 111 |    mac.raw -> ll header | 
 | 112 |    data    -> data | 
 | 113 |  | 
 | 114 | Outgoing, dev->hard_header!=NULL | 
 | 115 |    mac.raw -> ll header | 
 | 116 |    data    -> ll header | 
 | 117 |  | 
 | 118 | Incoming, dev->hard_header==NULL | 
 | 119 |    mac.raw -> UNKNOWN position. It is very likely, that it points to ll header. | 
 | 120 |               PPP makes it, that is wrong, because introduce assymetry | 
 | 121 | 	      between rx and tx paths. | 
 | 122 |    data    -> data | 
 | 123 |  | 
 | 124 | Outgoing, dev->hard_header==NULL | 
 | 125 |    mac.raw -> data. ll header is still not built! | 
 | 126 |    data    -> data | 
 | 127 |  | 
 | 128 | Resume | 
 | 129 |   If dev->hard_header==NULL we are unlikely to restore sensible ll header. | 
 | 130 |  | 
 | 131 |  | 
 | 132 | On transmit: | 
 | 133 | ------------ | 
 | 134 |  | 
 | 135 | dev->hard_header != NULL | 
 | 136 |    mac.raw -> ll header | 
 | 137 |    data    -> ll header | 
 | 138 |  | 
 | 139 | dev->hard_header == NULL (ll header is added by device, we cannot control it) | 
 | 140 |    mac.raw -> data | 
 | 141 |    data -> data | 
 | 142 |  | 
 | 143 |    We should set nh.raw on output to correct posistion, | 
 | 144 |    packet classifier depends on it. | 
 | 145 |  */ | 
 | 146 |  | 
 | 147 | /* List of all packet sockets. */ | 
 | 148 | static HLIST_HEAD(packet_sklist); | 
 | 149 | static DEFINE_RWLOCK(packet_sklist_lock); | 
 | 150 |  | 
 | 151 | static atomic_t packet_socks_nr; | 
 | 152 |  | 
 | 153 |  | 
 | 154 | /* Private packet socket structures. */ | 
 | 155 |  | 
 | 156 | #ifdef CONFIG_PACKET_MULTICAST | 
 | 157 | struct packet_mclist | 
 | 158 | { | 
 | 159 | 	struct packet_mclist	*next; | 
 | 160 | 	int			ifindex; | 
 | 161 | 	int			count; | 
 | 162 | 	unsigned short		type; | 
 | 163 | 	unsigned short		alen; | 
 | 164 | 	unsigned char		addr[8]; | 
 | 165 | }; | 
 | 166 | #endif | 
 | 167 | #ifdef CONFIG_PACKET_MMAP | 
 | 168 | static int packet_set_ring(struct sock *sk, struct tpacket_req *req, int closing); | 
 | 169 | #endif | 
 | 170 |  | 
 | 171 | static void packet_flush_mclist(struct sock *sk); | 
 | 172 |  | 
 | 173 | struct packet_sock { | 
 | 174 | 	/* struct sock has to be the first member of packet_sock */ | 
 | 175 | 	struct sock		sk; | 
 | 176 | 	struct tpacket_stats	stats; | 
 | 177 | #ifdef CONFIG_PACKET_MMAP | 
 | 178 | 	char *			*pg_vec; | 
 | 179 | 	unsigned int		head; | 
 | 180 | 	unsigned int            frames_per_block; | 
 | 181 | 	unsigned int		frame_size; | 
 | 182 | 	unsigned int		frame_max; | 
 | 183 | 	int			copy_thresh; | 
 | 184 | #endif | 
 | 185 | 	struct packet_type	prot_hook; | 
 | 186 | 	spinlock_t		bind_lock; | 
 | 187 | 	char			running;	/* prot_hook is attached*/ | 
 | 188 | 	int			ifindex;	/* bound device		*/ | 
 | 189 | 	unsigned short		num; | 
 | 190 | #ifdef CONFIG_PACKET_MULTICAST | 
 | 191 | 	struct packet_mclist	*mclist; | 
 | 192 | #endif | 
 | 193 | #ifdef CONFIG_PACKET_MMAP | 
 | 194 | 	atomic_t		mapped; | 
 | 195 | 	unsigned int            pg_vec_order; | 
 | 196 | 	unsigned int		pg_vec_pages; | 
 | 197 | 	unsigned int		pg_vec_len; | 
 | 198 | #endif | 
 | 199 | }; | 
 | 200 |  | 
 | 201 | #ifdef CONFIG_PACKET_MMAP | 
 | 202 |  | 
 | 203 | static inline char *packet_lookup_frame(struct packet_sock *po, unsigned int position) | 
 | 204 | { | 
 | 205 | 	unsigned int pg_vec_pos, frame_offset; | 
 | 206 | 	char *frame; | 
 | 207 |  | 
 | 208 | 	pg_vec_pos = position / po->frames_per_block; | 
 | 209 | 	frame_offset = position % po->frames_per_block; | 
 | 210 |  | 
 | 211 | 	frame = po->pg_vec[pg_vec_pos] + (frame_offset * po->frame_size); | 
 | 212 | 	 | 
 | 213 | 	return frame; | 
 | 214 | } | 
 | 215 | #endif | 
 | 216 |  | 
 | 217 | static inline struct packet_sock *pkt_sk(struct sock *sk) | 
 | 218 | { | 
 | 219 | 	return (struct packet_sock *)sk; | 
 | 220 | } | 
 | 221 |  | 
 | 222 | static void packet_sock_destruct(struct sock *sk) | 
 | 223 | { | 
 | 224 | 	BUG_TRAP(!atomic_read(&sk->sk_rmem_alloc)); | 
 | 225 | 	BUG_TRAP(!atomic_read(&sk->sk_wmem_alloc)); | 
 | 226 |  | 
 | 227 | 	if (!sock_flag(sk, SOCK_DEAD)) { | 
 | 228 | 		printk("Attempt to release alive packet socket: %p\n", sk); | 
 | 229 | 		return; | 
 | 230 | 	} | 
 | 231 |  | 
 | 232 | 	atomic_dec(&packet_socks_nr); | 
 | 233 | #ifdef PACKET_REFCNT_DEBUG | 
 | 234 | 	printk(KERN_DEBUG "PACKET socket %p is free, %d are alive\n", sk, atomic_read(&packet_socks_nr)); | 
 | 235 | #endif | 
 | 236 | } | 
 | 237 |  | 
 | 238 |  | 
 | 239 | static struct proto_ops packet_ops; | 
 | 240 |  | 
 | 241 | #ifdef CONFIG_SOCK_PACKET | 
 | 242 | static struct proto_ops packet_ops_spkt; | 
 | 243 |  | 
 | 244 | static int packet_rcv_spkt(struct sk_buff *skb, struct net_device *dev,  struct packet_type *pt) | 
 | 245 | { | 
 | 246 | 	struct sock *sk; | 
 | 247 | 	struct sockaddr_pkt *spkt; | 
 | 248 |  | 
 | 249 | 	/* | 
 | 250 | 	 *	When we registered the protocol we saved the socket in the data | 
 | 251 | 	 *	field for just this event. | 
 | 252 | 	 */ | 
 | 253 |  | 
 | 254 | 	sk = pt->af_packet_priv; | 
 | 255 | 	 | 
 | 256 | 	/* | 
 | 257 | 	 *	Yank back the headers [hope the device set this | 
 | 258 | 	 *	right or kerboom...] | 
 | 259 | 	 * | 
 | 260 | 	 *	Incoming packets have ll header pulled, | 
 | 261 | 	 *	push it back. | 
 | 262 | 	 * | 
 | 263 | 	 *	For outgoing ones skb->data == skb->mac.raw | 
 | 264 | 	 *	so that this procedure is noop. | 
 | 265 | 	 */ | 
 | 266 |  | 
 | 267 | 	if (skb->pkt_type == PACKET_LOOPBACK) | 
 | 268 | 		goto out; | 
 | 269 |  | 
 | 270 | 	if ((skb = skb_share_check(skb, GFP_ATOMIC)) == NULL) | 
 | 271 | 		goto oom; | 
 | 272 |  | 
 | 273 | 	/* drop any routing info */ | 
 | 274 | 	dst_release(skb->dst); | 
 | 275 | 	skb->dst = NULL; | 
 | 276 |  | 
 | 277 | 	spkt = (struct sockaddr_pkt*)skb->cb; | 
 | 278 |  | 
 | 279 | 	skb_push(skb, skb->data-skb->mac.raw); | 
 | 280 |  | 
 | 281 | 	/* | 
 | 282 | 	 *	The SOCK_PACKET socket receives _all_ frames. | 
 | 283 | 	 */ | 
 | 284 |  | 
 | 285 | 	spkt->spkt_family = dev->type; | 
 | 286 | 	strlcpy(spkt->spkt_device, dev->name, sizeof(spkt->spkt_device)); | 
 | 287 | 	spkt->spkt_protocol = skb->protocol; | 
 | 288 |  | 
 | 289 | 	/* | 
 | 290 | 	 *	Charge the memory to the socket. This is done specifically | 
 | 291 | 	 *	to prevent sockets using all the memory up. | 
 | 292 | 	 */ | 
 | 293 |  | 
 | 294 | 	if (sock_queue_rcv_skb(sk,skb) == 0) | 
 | 295 | 		return 0; | 
 | 296 |  | 
 | 297 | out: | 
 | 298 | 	kfree_skb(skb); | 
 | 299 | oom: | 
 | 300 | 	return 0; | 
 | 301 | } | 
 | 302 |  | 
 | 303 |  | 
 | 304 | /* | 
 | 305 |  *	Output a raw packet to a device layer. This bypasses all the other | 
 | 306 |  *	protocol layers and you must therefore supply it with a complete frame | 
 | 307 |  */ | 
 | 308 |   | 
 | 309 | static int packet_sendmsg_spkt(struct kiocb *iocb, struct socket *sock, | 
 | 310 | 			       struct msghdr *msg, size_t len) | 
 | 311 | { | 
 | 312 | 	struct sock *sk = sock->sk; | 
 | 313 | 	struct sockaddr_pkt *saddr=(struct sockaddr_pkt *)msg->msg_name; | 
 | 314 | 	struct sk_buff *skb; | 
 | 315 | 	struct net_device *dev; | 
 | 316 | 	unsigned short proto=0; | 
 | 317 | 	int err; | 
 | 318 | 	 | 
 | 319 | 	/* | 
 | 320 | 	 *	Get and verify the address.  | 
 | 321 | 	 */ | 
 | 322 |  | 
 | 323 | 	if (saddr) | 
 | 324 | 	{ | 
 | 325 | 		if (msg->msg_namelen < sizeof(struct sockaddr)) | 
 | 326 | 			return(-EINVAL); | 
 | 327 | 		if (msg->msg_namelen==sizeof(struct sockaddr_pkt)) | 
 | 328 | 			proto=saddr->spkt_protocol; | 
 | 329 | 	} | 
 | 330 | 	else | 
 | 331 | 		return(-ENOTCONN);	/* SOCK_PACKET must be sent giving an address */ | 
 | 332 |  | 
 | 333 | 	/* | 
 | 334 | 	 *	Find the device first to size check it  | 
 | 335 | 	 */ | 
 | 336 |  | 
 | 337 | 	saddr->spkt_device[13] = 0; | 
 | 338 | 	dev = dev_get_by_name(saddr->spkt_device); | 
 | 339 | 	err = -ENODEV; | 
 | 340 | 	if (dev == NULL) | 
 | 341 | 		goto out_unlock; | 
 | 342 | 	 | 
 | 343 | 	/* | 
 | 344 | 	 *	You may not queue a frame bigger than the mtu. This is the lowest level | 
 | 345 | 	 *	raw protocol and you must do your own fragmentation at this level. | 
 | 346 | 	 */ | 
 | 347 | 	  | 
 | 348 | 	err = -EMSGSIZE; | 
 | 349 |  	if(len>dev->mtu+dev->hard_header_len) | 
 | 350 | 		goto out_unlock; | 
 | 351 |  | 
 | 352 | 	err = -ENOBUFS; | 
 | 353 | 	skb = sock_wmalloc(sk, len + LL_RESERVED_SPACE(dev), 0, GFP_KERNEL); | 
 | 354 |  | 
 | 355 | 	/* | 
 | 356 | 	 *	If the write buffer is full, then tough. At this level the user gets to | 
 | 357 | 	 *	deal with the problem - do your own algorithmic backoffs. That's far | 
 | 358 | 	 *	more flexible. | 
 | 359 | 	 */ | 
 | 360 | 	  | 
 | 361 | 	if (skb == NULL)  | 
 | 362 | 		goto out_unlock; | 
 | 363 |  | 
 | 364 | 	/* | 
 | 365 | 	 *	Fill it in  | 
 | 366 | 	 */ | 
 | 367 | 	  | 
 | 368 | 	/* FIXME: Save some space for broken drivers that write a | 
 | 369 | 	 * hard header at transmission time by themselves. PPP is the | 
 | 370 | 	 * notable one here. This should really be fixed at the driver level. | 
 | 371 | 	 */ | 
 | 372 | 	skb_reserve(skb, LL_RESERVED_SPACE(dev)); | 
 | 373 | 	skb->nh.raw = skb->data; | 
 | 374 |  | 
 | 375 | 	/* Try to align data part correctly */ | 
 | 376 | 	if (dev->hard_header) { | 
 | 377 | 		skb->data -= dev->hard_header_len; | 
 | 378 | 		skb->tail -= dev->hard_header_len; | 
 | 379 | 		if (len < dev->hard_header_len) | 
 | 380 | 			skb->nh.raw = skb->data; | 
 | 381 | 	} | 
 | 382 |  | 
 | 383 | 	/* Returns -EFAULT on error */ | 
 | 384 | 	err = memcpy_fromiovec(skb_put(skb,len), msg->msg_iov, len); | 
 | 385 | 	skb->protocol = proto; | 
 | 386 | 	skb->dev = dev; | 
 | 387 | 	skb->priority = sk->sk_priority; | 
 | 388 | 	if (err) | 
 | 389 | 		goto out_free; | 
 | 390 |  | 
 | 391 | 	err = -ENETDOWN; | 
 | 392 | 	if (!(dev->flags & IFF_UP)) | 
 | 393 | 		goto out_free; | 
 | 394 |  | 
 | 395 | 	/* | 
 | 396 | 	 *	Now send it | 
 | 397 | 	 */ | 
 | 398 |  | 
 | 399 | 	dev_queue_xmit(skb); | 
 | 400 | 	dev_put(dev); | 
 | 401 | 	return(len); | 
 | 402 |  | 
 | 403 | out_free: | 
 | 404 | 	kfree_skb(skb); | 
 | 405 | out_unlock: | 
 | 406 | 	if (dev) | 
 | 407 | 		dev_put(dev); | 
 | 408 | 	return err; | 
 | 409 | } | 
 | 410 | #endif | 
 | 411 |  | 
 | 412 | static inline unsigned run_filter(struct sk_buff *skb, struct sock *sk, unsigned res) | 
 | 413 | { | 
 | 414 | 	struct sk_filter *filter; | 
 | 415 |  | 
 | 416 | 	bh_lock_sock(sk); | 
 | 417 | 	filter = sk->sk_filter; | 
 | 418 | 	/* | 
 | 419 | 	 * Our caller already checked that filter != NULL but we need to | 
 | 420 | 	 * verify that under bh_lock_sock() to be safe | 
 | 421 | 	 */ | 
 | 422 | 	if (likely(filter != NULL)) | 
 | 423 | 		res = sk_run_filter(skb, filter->insns, filter->len); | 
 | 424 | 	bh_unlock_sock(sk); | 
 | 425 |  | 
 | 426 | 	return res; | 
 | 427 | } | 
 | 428 |  | 
 | 429 | /* | 
 | 430 |    This function makes lazy skb cloning in hope that most of packets | 
 | 431 |    are discarded by BPF. | 
 | 432 |  | 
 | 433 |    Note tricky part: we DO mangle shared skb! skb->data, skb->len | 
 | 434 |    and skb->cb are mangled. It works because (and until) packets | 
 | 435 |    falling here are owned by current CPU. Output packets are cloned | 
 | 436 |    by dev_queue_xmit_nit(), input packets are processed by net_bh | 
 | 437 |    sequencially, so that if we return skb to original state on exit, | 
 | 438 |    we will not harm anyone. | 
 | 439 |  */ | 
 | 440 |  | 
 | 441 | static int packet_rcv(struct sk_buff *skb, struct net_device *dev,  struct packet_type *pt) | 
 | 442 | { | 
 | 443 | 	struct sock *sk; | 
 | 444 | 	struct sockaddr_ll *sll; | 
 | 445 | 	struct packet_sock *po; | 
 | 446 | 	u8 * skb_head = skb->data; | 
 | 447 | 	int skb_len = skb->len; | 
 | 448 | 	unsigned snaplen; | 
 | 449 |  | 
 | 450 | 	if (skb->pkt_type == PACKET_LOOPBACK) | 
 | 451 | 		goto drop; | 
 | 452 |  | 
 | 453 | 	sk = pt->af_packet_priv; | 
 | 454 | 	po = pkt_sk(sk); | 
 | 455 |  | 
 | 456 | 	skb->dev = dev; | 
 | 457 |  | 
 | 458 | 	if (dev->hard_header) { | 
 | 459 | 		/* The device has an explicit notion of ll header, | 
 | 460 | 		   exported to higher levels. | 
 | 461 |  | 
 | 462 | 		   Otherwise, the device hides datails of it frame | 
 | 463 | 		   structure, so that corresponding packet head | 
 | 464 | 		   never delivered to user. | 
 | 465 | 		 */ | 
 | 466 | 		if (sk->sk_type != SOCK_DGRAM) | 
 | 467 | 			skb_push(skb, skb->data - skb->mac.raw); | 
 | 468 | 		else if (skb->pkt_type == PACKET_OUTGOING) { | 
 | 469 | 			/* Special case: outgoing packets have ll header at head */ | 
 | 470 | 			skb_pull(skb, skb->nh.raw - skb->data); | 
 | 471 | 		} | 
 | 472 | 	} | 
 | 473 |  | 
 | 474 | 	snaplen = skb->len; | 
 | 475 |  | 
 | 476 | 	if (sk->sk_filter) { | 
 | 477 | 		unsigned res = run_filter(skb, sk, snaplen); | 
 | 478 | 		if (res == 0) | 
 | 479 | 			goto drop_n_restore; | 
 | 480 | 		if (snaplen > res) | 
 | 481 | 			snaplen = res; | 
 | 482 | 	} | 
 | 483 |  | 
 | 484 | 	if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >= | 
 | 485 | 	    (unsigned)sk->sk_rcvbuf) | 
 | 486 | 		goto drop_n_acct; | 
 | 487 |  | 
 | 488 | 	if (skb_shared(skb)) { | 
 | 489 | 		struct sk_buff *nskb = skb_clone(skb, GFP_ATOMIC); | 
 | 490 | 		if (nskb == NULL) | 
 | 491 | 			goto drop_n_acct; | 
 | 492 |  | 
 | 493 | 		if (skb_head != skb->data) { | 
 | 494 | 			skb->data = skb_head; | 
 | 495 | 			skb->len = skb_len; | 
 | 496 | 		} | 
 | 497 | 		kfree_skb(skb); | 
 | 498 | 		skb = nskb; | 
 | 499 | 	} | 
 | 500 |  | 
 | 501 | 	sll = (struct sockaddr_ll*)skb->cb; | 
 | 502 | 	sll->sll_family = AF_PACKET; | 
 | 503 | 	sll->sll_hatype = dev->type; | 
 | 504 | 	sll->sll_protocol = skb->protocol; | 
 | 505 | 	sll->sll_pkttype = skb->pkt_type; | 
 | 506 | 	sll->sll_ifindex = dev->ifindex; | 
 | 507 | 	sll->sll_halen = 0; | 
 | 508 |  | 
 | 509 | 	if (dev->hard_header_parse) | 
 | 510 | 		sll->sll_halen = dev->hard_header_parse(skb, sll->sll_addr); | 
 | 511 |  | 
 | 512 | 	if (pskb_trim(skb, snaplen)) | 
 | 513 | 		goto drop_n_acct; | 
 | 514 |  | 
 | 515 | 	skb_set_owner_r(skb, sk); | 
 | 516 | 	skb->dev = NULL; | 
 | 517 | 	dst_release(skb->dst); | 
 | 518 | 	skb->dst = NULL; | 
 | 519 |  | 
 | 520 | 	spin_lock(&sk->sk_receive_queue.lock); | 
 | 521 | 	po->stats.tp_packets++; | 
 | 522 | 	__skb_queue_tail(&sk->sk_receive_queue, skb); | 
 | 523 | 	spin_unlock(&sk->sk_receive_queue.lock); | 
 | 524 | 	sk->sk_data_ready(sk, skb->len); | 
 | 525 | 	return 0; | 
 | 526 |  | 
 | 527 | drop_n_acct: | 
 | 528 | 	spin_lock(&sk->sk_receive_queue.lock); | 
 | 529 | 	po->stats.tp_drops++; | 
 | 530 | 	spin_unlock(&sk->sk_receive_queue.lock); | 
 | 531 |  | 
 | 532 | drop_n_restore: | 
 | 533 | 	if (skb_head != skb->data && skb_shared(skb)) { | 
 | 534 | 		skb->data = skb_head; | 
 | 535 | 		skb->len = skb_len; | 
 | 536 | 	} | 
 | 537 | drop: | 
 | 538 | 	kfree_skb(skb); | 
 | 539 | 	return 0; | 
 | 540 | } | 
 | 541 |  | 
 | 542 | #ifdef CONFIG_PACKET_MMAP | 
 | 543 | static int tpacket_rcv(struct sk_buff *skb, struct net_device *dev,  struct packet_type *pt) | 
 | 544 | { | 
 | 545 | 	struct sock *sk; | 
 | 546 | 	struct packet_sock *po; | 
 | 547 | 	struct sockaddr_ll *sll; | 
 | 548 | 	struct tpacket_hdr *h; | 
 | 549 | 	u8 * skb_head = skb->data; | 
 | 550 | 	int skb_len = skb->len; | 
 | 551 | 	unsigned snaplen; | 
 | 552 | 	unsigned long status = TP_STATUS_LOSING|TP_STATUS_USER; | 
 | 553 | 	unsigned short macoff, netoff; | 
 | 554 | 	struct sk_buff *copy_skb = NULL; | 
 | 555 |  | 
 | 556 | 	if (skb->pkt_type == PACKET_LOOPBACK) | 
 | 557 | 		goto drop; | 
 | 558 |  | 
 | 559 | 	sk = pt->af_packet_priv; | 
 | 560 | 	po = pkt_sk(sk); | 
 | 561 |  | 
 | 562 | 	if (dev->hard_header) { | 
 | 563 | 		if (sk->sk_type != SOCK_DGRAM) | 
 | 564 | 			skb_push(skb, skb->data - skb->mac.raw); | 
 | 565 | 		else if (skb->pkt_type == PACKET_OUTGOING) { | 
 | 566 | 			/* Special case: outgoing packets have ll header at head */ | 
 | 567 | 			skb_pull(skb, skb->nh.raw - skb->data); | 
 | 568 | 			if (skb->ip_summed == CHECKSUM_HW) | 
 | 569 | 				status |= TP_STATUS_CSUMNOTREADY; | 
 | 570 | 		} | 
 | 571 | 	} | 
 | 572 |  | 
 | 573 | 	snaplen = skb->len; | 
 | 574 |  | 
 | 575 | 	if (sk->sk_filter) { | 
 | 576 | 		unsigned res = run_filter(skb, sk, snaplen); | 
 | 577 | 		if (res == 0) | 
 | 578 | 			goto drop_n_restore; | 
 | 579 | 		if (snaplen > res) | 
 | 580 | 			snaplen = res; | 
 | 581 | 	} | 
 | 582 |  | 
 | 583 | 	if (sk->sk_type == SOCK_DGRAM) { | 
 | 584 | 		macoff = netoff = TPACKET_ALIGN(TPACKET_HDRLEN) + 16; | 
 | 585 | 	} else { | 
 | 586 | 		unsigned maclen = skb->nh.raw - skb->data; | 
 | 587 | 		netoff = TPACKET_ALIGN(TPACKET_HDRLEN + (maclen < 16 ? 16 : maclen)); | 
 | 588 | 		macoff = netoff - maclen; | 
 | 589 | 	} | 
 | 590 |  | 
 | 591 | 	if (macoff + snaplen > po->frame_size) { | 
 | 592 | 		if (po->copy_thresh && | 
 | 593 | 		    atomic_read(&sk->sk_rmem_alloc) + skb->truesize < | 
 | 594 | 		    (unsigned)sk->sk_rcvbuf) { | 
 | 595 | 			if (skb_shared(skb)) { | 
 | 596 | 				copy_skb = skb_clone(skb, GFP_ATOMIC); | 
 | 597 | 			} else { | 
 | 598 | 				copy_skb = skb_get(skb); | 
 | 599 | 				skb_head = skb->data; | 
 | 600 | 			} | 
 | 601 | 			if (copy_skb) | 
 | 602 | 				skb_set_owner_r(copy_skb, sk); | 
 | 603 | 		} | 
 | 604 | 		snaplen = po->frame_size - macoff; | 
 | 605 | 		if ((int)snaplen < 0) | 
 | 606 | 			snaplen = 0; | 
 | 607 | 	} | 
 | 608 | 	if (snaplen > skb->len-skb->data_len) | 
 | 609 | 		snaplen = skb->len-skb->data_len; | 
 | 610 |  | 
 | 611 | 	spin_lock(&sk->sk_receive_queue.lock); | 
 | 612 | 	h = (struct tpacket_hdr *)packet_lookup_frame(po, po->head); | 
 | 613 | 	 | 
 | 614 | 	if (h->tp_status) | 
 | 615 | 		goto ring_is_full; | 
 | 616 | 	po->head = po->head != po->frame_max ? po->head+1 : 0; | 
 | 617 | 	po->stats.tp_packets++; | 
 | 618 | 	if (copy_skb) { | 
 | 619 | 		status |= TP_STATUS_COPY; | 
 | 620 | 		__skb_queue_tail(&sk->sk_receive_queue, copy_skb); | 
 | 621 | 	} | 
 | 622 | 	if (!po->stats.tp_drops) | 
 | 623 | 		status &= ~TP_STATUS_LOSING; | 
 | 624 | 	spin_unlock(&sk->sk_receive_queue.lock); | 
 | 625 |  | 
 | 626 | 	memcpy((u8*)h + macoff, skb->data, snaplen); | 
 | 627 |  | 
 | 628 | 	h->tp_len = skb->len; | 
 | 629 | 	h->tp_snaplen = snaplen; | 
 | 630 | 	h->tp_mac = macoff; | 
 | 631 | 	h->tp_net = netoff; | 
 | 632 | 	if (skb->stamp.tv_sec == 0) {  | 
 | 633 | 		do_gettimeofday(&skb->stamp); | 
 | 634 | 		sock_enable_timestamp(sk); | 
 | 635 | 	} | 
 | 636 | 	h->tp_sec = skb->stamp.tv_sec; | 
 | 637 | 	h->tp_usec = skb->stamp.tv_usec; | 
 | 638 |  | 
 | 639 | 	sll = (struct sockaddr_ll*)((u8*)h + TPACKET_ALIGN(sizeof(*h))); | 
 | 640 | 	sll->sll_halen = 0; | 
 | 641 | 	if (dev->hard_header_parse) | 
 | 642 | 		sll->sll_halen = dev->hard_header_parse(skb, sll->sll_addr); | 
 | 643 | 	sll->sll_family = AF_PACKET; | 
 | 644 | 	sll->sll_hatype = dev->type; | 
 | 645 | 	sll->sll_protocol = skb->protocol; | 
 | 646 | 	sll->sll_pkttype = skb->pkt_type; | 
 | 647 | 	sll->sll_ifindex = dev->ifindex; | 
 | 648 |  | 
 | 649 | 	h->tp_status = status; | 
 | 650 | 	mb(); | 
 | 651 |  | 
 | 652 | 	{ | 
 | 653 | 		struct page *p_start, *p_end; | 
 | 654 | 		u8 *h_end = (u8 *)h + macoff + snaplen - 1; | 
 | 655 |  | 
 | 656 | 		p_start = virt_to_page(h); | 
 | 657 | 		p_end = virt_to_page(h_end); | 
 | 658 | 		while (p_start <= p_end) { | 
 | 659 | 			flush_dcache_page(p_start); | 
 | 660 | 			p_start++; | 
 | 661 | 		} | 
 | 662 | 	} | 
 | 663 |  | 
 | 664 | 	sk->sk_data_ready(sk, 0); | 
 | 665 |  | 
 | 666 | drop_n_restore: | 
 | 667 | 	if (skb_head != skb->data && skb_shared(skb)) { | 
 | 668 | 		skb->data = skb_head; | 
 | 669 | 		skb->len = skb_len; | 
 | 670 | 	} | 
 | 671 | drop: | 
 | 672 |         kfree_skb(skb); | 
 | 673 | 	return 0; | 
 | 674 |  | 
 | 675 | ring_is_full: | 
 | 676 | 	po->stats.tp_drops++; | 
 | 677 | 	spin_unlock(&sk->sk_receive_queue.lock); | 
 | 678 |  | 
 | 679 | 	sk->sk_data_ready(sk, 0); | 
 | 680 | 	if (copy_skb) | 
 | 681 | 		kfree_skb(copy_skb); | 
 | 682 | 	goto drop_n_restore; | 
 | 683 | } | 
 | 684 |  | 
 | 685 | #endif | 
 | 686 |  | 
 | 687 |  | 
 | 688 | static int packet_sendmsg(struct kiocb *iocb, struct socket *sock, | 
 | 689 | 			  struct msghdr *msg, size_t len) | 
 | 690 | { | 
 | 691 | 	struct sock *sk = sock->sk; | 
 | 692 | 	struct sockaddr_ll *saddr=(struct sockaddr_ll *)msg->msg_name; | 
 | 693 | 	struct sk_buff *skb; | 
 | 694 | 	struct net_device *dev; | 
 | 695 | 	unsigned short proto; | 
 | 696 | 	unsigned char *addr; | 
 | 697 | 	int ifindex, err, reserve = 0; | 
 | 698 |  | 
 | 699 | 	/* | 
 | 700 | 	 *	Get and verify the address.  | 
 | 701 | 	 */ | 
 | 702 | 	  | 
 | 703 | 	if (saddr == NULL) { | 
 | 704 | 		struct packet_sock *po = pkt_sk(sk); | 
 | 705 |  | 
 | 706 | 		ifindex	= po->ifindex; | 
 | 707 | 		proto	= po->num; | 
 | 708 | 		addr	= NULL; | 
 | 709 | 	} else { | 
 | 710 | 		err = -EINVAL; | 
 | 711 | 		if (msg->msg_namelen < sizeof(struct sockaddr_ll)) | 
 | 712 | 			goto out; | 
 | 713 | 		ifindex	= saddr->sll_ifindex; | 
 | 714 | 		proto	= saddr->sll_protocol; | 
 | 715 | 		addr	= saddr->sll_addr; | 
 | 716 | 	} | 
 | 717 |  | 
 | 718 |  | 
 | 719 | 	dev = dev_get_by_index(ifindex); | 
 | 720 | 	err = -ENXIO; | 
 | 721 | 	if (dev == NULL) | 
 | 722 | 		goto out_unlock; | 
 | 723 | 	if (sock->type == SOCK_RAW) | 
 | 724 | 		reserve = dev->hard_header_len; | 
 | 725 |  | 
 | 726 | 	err = -EMSGSIZE; | 
 | 727 | 	if (len > dev->mtu+reserve) | 
 | 728 | 		goto out_unlock; | 
 | 729 |  | 
 | 730 | 	skb = sock_alloc_send_skb(sk, len + LL_RESERVED_SPACE(dev), | 
 | 731 | 				msg->msg_flags & MSG_DONTWAIT, &err); | 
 | 732 | 	if (skb==NULL) | 
 | 733 | 		goto out_unlock; | 
 | 734 |  | 
 | 735 | 	skb_reserve(skb, LL_RESERVED_SPACE(dev)); | 
 | 736 | 	skb->nh.raw = skb->data; | 
 | 737 |  | 
 | 738 | 	if (dev->hard_header) { | 
 | 739 | 		int res; | 
 | 740 | 		err = -EINVAL; | 
 | 741 | 		res = dev->hard_header(skb, dev, ntohs(proto), addr, NULL, len); | 
 | 742 | 		if (sock->type != SOCK_DGRAM) { | 
 | 743 | 			skb->tail = skb->data; | 
 | 744 | 			skb->len = 0; | 
 | 745 | 		} else if (res < 0) | 
 | 746 | 			goto out_free; | 
 | 747 | 	} | 
 | 748 |  | 
 | 749 | 	/* Returns -EFAULT on error */ | 
 | 750 | 	err = memcpy_fromiovec(skb_put(skb,len), msg->msg_iov, len); | 
 | 751 | 	if (err) | 
 | 752 | 		goto out_free; | 
 | 753 |  | 
 | 754 | 	skb->protocol = proto; | 
 | 755 | 	skb->dev = dev; | 
 | 756 | 	skb->priority = sk->sk_priority; | 
 | 757 |  | 
 | 758 | 	err = -ENETDOWN; | 
 | 759 | 	if (!(dev->flags & IFF_UP)) | 
 | 760 | 		goto out_free; | 
 | 761 |  | 
 | 762 | 	/* | 
 | 763 | 	 *	Now send it | 
 | 764 | 	 */ | 
 | 765 |  | 
 | 766 | 	err = dev_queue_xmit(skb); | 
 | 767 | 	if (err > 0 && (err = net_xmit_errno(err)) != 0) | 
 | 768 | 		goto out_unlock; | 
 | 769 |  | 
 | 770 | 	dev_put(dev); | 
 | 771 |  | 
 | 772 | 	return(len); | 
 | 773 |  | 
 | 774 | out_free: | 
 | 775 | 	kfree_skb(skb); | 
 | 776 | out_unlock: | 
 | 777 | 	if (dev) | 
 | 778 | 		dev_put(dev); | 
 | 779 | out: | 
 | 780 | 	return err; | 
 | 781 | } | 
 | 782 |  | 
 | 783 | /* | 
 | 784 |  *	Close a PACKET socket. This is fairly simple. We immediately go | 
 | 785 |  *	to 'closed' state and remove our protocol entry in the device list. | 
 | 786 |  */ | 
 | 787 |  | 
 | 788 | static int packet_release(struct socket *sock) | 
 | 789 | { | 
 | 790 | 	struct sock *sk = sock->sk; | 
 | 791 | 	struct packet_sock *po; | 
 | 792 |  | 
 | 793 | 	if (!sk) | 
 | 794 | 		return 0; | 
 | 795 |  | 
 | 796 | 	po = pkt_sk(sk); | 
 | 797 |  | 
 | 798 | 	write_lock_bh(&packet_sklist_lock); | 
 | 799 | 	sk_del_node_init(sk); | 
 | 800 | 	write_unlock_bh(&packet_sklist_lock); | 
 | 801 |  | 
 | 802 | 	/* | 
 | 803 | 	 *	Unhook packet receive handler. | 
 | 804 | 	 */ | 
 | 805 |  | 
 | 806 | 	if (po->running) { | 
 | 807 | 		/* | 
 | 808 | 		 *	Remove the protocol hook | 
 | 809 | 		 */ | 
 | 810 | 		dev_remove_pack(&po->prot_hook); | 
 | 811 | 		po->running = 0; | 
 | 812 | 		po->num = 0; | 
 | 813 | 		__sock_put(sk); | 
 | 814 | 	} | 
 | 815 |  | 
 | 816 | #ifdef CONFIG_PACKET_MULTICAST | 
 | 817 | 	packet_flush_mclist(sk); | 
 | 818 | #endif | 
 | 819 |  | 
 | 820 | #ifdef CONFIG_PACKET_MMAP | 
 | 821 | 	if (po->pg_vec) { | 
 | 822 | 		struct tpacket_req req; | 
 | 823 | 		memset(&req, 0, sizeof(req)); | 
 | 824 | 		packet_set_ring(sk, &req, 1); | 
 | 825 | 	} | 
 | 826 | #endif | 
 | 827 |  | 
 | 828 | 	/* | 
 | 829 | 	 *	Now the socket is dead. No more input will appear. | 
 | 830 | 	 */ | 
 | 831 |  | 
 | 832 | 	sock_orphan(sk); | 
 | 833 | 	sock->sk = NULL; | 
 | 834 |  | 
 | 835 | 	/* Purge queues */ | 
 | 836 |  | 
 | 837 | 	skb_queue_purge(&sk->sk_receive_queue); | 
 | 838 |  | 
 | 839 | 	sock_put(sk); | 
 | 840 | 	return 0; | 
 | 841 | } | 
 | 842 |  | 
 | 843 | /* | 
 | 844 |  *	Attach a packet hook. | 
 | 845 |  */ | 
 | 846 |  | 
 | 847 | static int packet_do_bind(struct sock *sk, struct net_device *dev, int protocol) | 
 | 848 | { | 
 | 849 | 	struct packet_sock *po = pkt_sk(sk); | 
 | 850 | 	/* | 
 | 851 | 	 *	Detach an existing hook if present. | 
 | 852 | 	 */ | 
 | 853 |  | 
 | 854 | 	lock_sock(sk); | 
 | 855 |  | 
 | 856 | 	spin_lock(&po->bind_lock); | 
 | 857 | 	if (po->running) { | 
 | 858 | 		__sock_put(sk); | 
 | 859 | 		po->running = 0; | 
 | 860 | 		po->num = 0; | 
 | 861 | 		spin_unlock(&po->bind_lock); | 
 | 862 | 		dev_remove_pack(&po->prot_hook); | 
 | 863 | 		spin_lock(&po->bind_lock); | 
 | 864 | 	} | 
 | 865 |  | 
 | 866 | 	po->num = protocol; | 
 | 867 | 	po->prot_hook.type = protocol; | 
 | 868 | 	po->prot_hook.dev = dev; | 
 | 869 |  | 
 | 870 | 	po->ifindex = dev ? dev->ifindex : 0; | 
 | 871 |  | 
 | 872 | 	if (protocol == 0) | 
 | 873 | 		goto out_unlock; | 
 | 874 |  | 
 | 875 | 	if (dev) { | 
 | 876 | 		if (dev->flags&IFF_UP) { | 
 | 877 | 			dev_add_pack(&po->prot_hook); | 
 | 878 | 			sock_hold(sk); | 
 | 879 | 			po->running = 1; | 
 | 880 | 		} else { | 
 | 881 | 			sk->sk_err = ENETDOWN; | 
 | 882 | 			if (!sock_flag(sk, SOCK_DEAD)) | 
 | 883 | 				sk->sk_error_report(sk); | 
 | 884 | 		} | 
 | 885 | 	} else { | 
 | 886 | 		dev_add_pack(&po->prot_hook); | 
 | 887 | 		sock_hold(sk); | 
 | 888 | 		po->running = 1; | 
 | 889 | 	} | 
 | 890 |  | 
 | 891 | out_unlock: | 
 | 892 | 	spin_unlock(&po->bind_lock); | 
 | 893 | 	release_sock(sk); | 
 | 894 | 	return 0; | 
 | 895 | } | 
 | 896 |  | 
 | 897 | /* | 
 | 898 |  *	Bind a packet socket to a device | 
 | 899 |  */ | 
 | 900 |  | 
 | 901 | #ifdef CONFIG_SOCK_PACKET | 
 | 902 |  | 
 | 903 | static int packet_bind_spkt(struct socket *sock, struct sockaddr *uaddr, int addr_len) | 
 | 904 | { | 
 | 905 | 	struct sock *sk=sock->sk; | 
 | 906 | 	char name[15]; | 
 | 907 | 	struct net_device *dev; | 
 | 908 | 	int err = -ENODEV; | 
 | 909 | 	 | 
 | 910 | 	/* | 
 | 911 | 	 *	Check legality | 
 | 912 | 	 */ | 
 | 913 | 	  | 
 | 914 | 	if(addr_len!=sizeof(struct sockaddr)) | 
 | 915 | 		return -EINVAL; | 
 | 916 | 	strlcpy(name,uaddr->sa_data,sizeof(name)); | 
 | 917 |  | 
 | 918 | 	dev = dev_get_by_name(name); | 
 | 919 | 	if (dev) { | 
 | 920 | 		err = packet_do_bind(sk, dev, pkt_sk(sk)->num); | 
 | 921 | 		dev_put(dev); | 
 | 922 | 	} | 
 | 923 | 	return err; | 
 | 924 | } | 
 | 925 | #endif | 
 | 926 |  | 
 | 927 | static int packet_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) | 
 | 928 | { | 
 | 929 | 	struct sockaddr_ll *sll = (struct sockaddr_ll*)uaddr; | 
 | 930 | 	struct sock *sk=sock->sk; | 
 | 931 | 	struct net_device *dev = NULL; | 
 | 932 | 	int err; | 
 | 933 |  | 
 | 934 |  | 
 | 935 | 	/* | 
 | 936 | 	 *	Check legality | 
 | 937 | 	 */ | 
 | 938 | 	  | 
 | 939 | 	if (addr_len < sizeof(struct sockaddr_ll)) | 
 | 940 | 		return -EINVAL; | 
 | 941 | 	if (sll->sll_family != AF_PACKET) | 
 | 942 | 		return -EINVAL; | 
 | 943 |  | 
 | 944 | 	if (sll->sll_ifindex) { | 
 | 945 | 		err = -ENODEV; | 
 | 946 | 		dev = dev_get_by_index(sll->sll_ifindex); | 
 | 947 | 		if (dev == NULL) | 
 | 948 | 			goto out; | 
 | 949 | 	} | 
 | 950 | 	err = packet_do_bind(sk, dev, sll->sll_protocol ? : pkt_sk(sk)->num); | 
 | 951 | 	if (dev) | 
 | 952 | 		dev_put(dev); | 
 | 953 |  | 
 | 954 | out: | 
 | 955 | 	return err; | 
 | 956 | } | 
 | 957 |  | 
 | 958 | static struct proto packet_proto = { | 
 | 959 | 	.name	  = "PACKET", | 
 | 960 | 	.owner	  = THIS_MODULE, | 
 | 961 | 	.obj_size = sizeof(struct packet_sock), | 
 | 962 | }; | 
 | 963 |  | 
 | 964 | /* | 
 | 965 |  *	Create a packet of type SOCK_PACKET.  | 
 | 966 |  */ | 
 | 967 |  | 
 | 968 | static int packet_create(struct socket *sock, int protocol) | 
 | 969 | { | 
 | 970 | 	struct sock *sk; | 
 | 971 | 	struct packet_sock *po; | 
 | 972 | 	int err; | 
 | 973 |  | 
 | 974 | 	if (!capable(CAP_NET_RAW)) | 
 | 975 | 		return -EPERM; | 
 | 976 | 	if (sock->type != SOCK_DGRAM && sock->type != SOCK_RAW | 
 | 977 | #ifdef CONFIG_SOCK_PACKET | 
 | 978 | 	    && sock->type != SOCK_PACKET | 
 | 979 | #endif | 
 | 980 | 	    ) | 
 | 981 | 		return -ESOCKTNOSUPPORT; | 
 | 982 |  | 
 | 983 | 	sock->state = SS_UNCONNECTED; | 
 | 984 |  | 
 | 985 | 	err = -ENOBUFS; | 
 | 986 | 	sk = sk_alloc(PF_PACKET, GFP_KERNEL, &packet_proto, 1); | 
 | 987 | 	if (sk == NULL) | 
 | 988 | 		goto out; | 
 | 989 |  | 
 | 990 | 	sock->ops = &packet_ops; | 
 | 991 | #ifdef CONFIG_SOCK_PACKET | 
 | 992 | 	if (sock->type == SOCK_PACKET) | 
 | 993 | 		sock->ops = &packet_ops_spkt; | 
 | 994 | #endif | 
 | 995 | 	sock_init_data(sock, sk); | 
 | 996 |  | 
 | 997 | 	po = pkt_sk(sk); | 
 | 998 | 	sk->sk_family = PF_PACKET; | 
 | 999 | 	po->num = protocol; | 
 | 1000 |  | 
 | 1001 | 	sk->sk_destruct = packet_sock_destruct; | 
 | 1002 | 	atomic_inc(&packet_socks_nr); | 
 | 1003 |  | 
 | 1004 | 	/* | 
 | 1005 | 	 *	Attach a protocol block | 
 | 1006 | 	 */ | 
 | 1007 |  | 
 | 1008 | 	spin_lock_init(&po->bind_lock); | 
 | 1009 | 	po->prot_hook.func = packet_rcv; | 
 | 1010 | #ifdef CONFIG_SOCK_PACKET | 
 | 1011 | 	if (sock->type == SOCK_PACKET) | 
 | 1012 | 		po->prot_hook.func = packet_rcv_spkt; | 
 | 1013 | #endif | 
 | 1014 | 	po->prot_hook.af_packet_priv = sk; | 
 | 1015 |  | 
 | 1016 | 	if (protocol) { | 
 | 1017 | 		po->prot_hook.type = protocol; | 
 | 1018 | 		dev_add_pack(&po->prot_hook); | 
 | 1019 | 		sock_hold(sk); | 
 | 1020 | 		po->running = 1; | 
 | 1021 | 	} | 
 | 1022 |  | 
 | 1023 | 	write_lock_bh(&packet_sklist_lock); | 
 | 1024 | 	sk_add_node(sk, &packet_sklist); | 
 | 1025 | 	write_unlock_bh(&packet_sklist_lock); | 
 | 1026 | 	return(0); | 
 | 1027 | out: | 
 | 1028 | 	return err; | 
 | 1029 | } | 
 | 1030 |  | 
 | 1031 | /* | 
 | 1032 |  *	Pull a packet from our receive queue and hand it to the user. | 
 | 1033 |  *	If necessary we block. | 
 | 1034 |  */ | 
 | 1035 |  | 
 | 1036 | static int packet_recvmsg(struct kiocb *iocb, struct socket *sock, | 
 | 1037 | 			  struct msghdr *msg, size_t len, int flags) | 
 | 1038 | { | 
 | 1039 | 	struct sock *sk = sock->sk; | 
 | 1040 | 	struct sk_buff *skb; | 
 | 1041 | 	int copied, err; | 
 | 1042 |  | 
 | 1043 | 	err = -EINVAL; | 
 | 1044 | 	if (flags & ~(MSG_PEEK|MSG_DONTWAIT|MSG_TRUNC|MSG_CMSG_COMPAT)) | 
 | 1045 | 		goto out; | 
 | 1046 |  | 
 | 1047 | #if 0 | 
 | 1048 | 	/* What error should we return now? EUNATTACH? */ | 
 | 1049 | 	if (pkt_sk(sk)->ifindex < 0) | 
 | 1050 | 		return -ENODEV; | 
 | 1051 | #endif | 
 | 1052 |  | 
 | 1053 | 	/* | 
 | 1054 | 	 *	If the address length field is there to be filled in, we fill | 
 | 1055 | 	 *	it in now. | 
 | 1056 | 	 */ | 
 | 1057 |  | 
 | 1058 | 	if (sock->type == SOCK_PACKET) | 
 | 1059 | 		msg->msg_namelen = sizeof(struct sockaddr_pkt); | 
 | 1060 | 	else | 
 | 1061 | 		msg->msg_namelen = sizeof(struct sockaddr_ll); | 
 | 1062 |  | 
 | 1063 | 	/* | 
 | 1064 | 	 *	Call the generic datagram receiver. This handles all sorts | 
 | 1065 | 	 *	of horrible races and re-entrancy so we can forget about it | 
 | 1066 | 	 *	in the protocol layers. | 
 | 1067 | 	 * | 
 | 1068 | 	 *	Now it will return ENETDOWN, if device have just gone down, | 
 | 1069 | 	 *	but then it will block. | 
 | 1070 | 	 */ | 
 | 1071 |  | 
 | 1072 | 	skb=skb_recv_datagram(sk,flags,flags&MSG_DONTWAIT,&err); | 
 | 1073 |  | 
 | 1074 | 	/* | 
 | 1075 | 	 *	An error occurred so return it. Because skb_recv_datagram()  | 
 | 1076 | 	 *	handles the blocking we don't see and worry about blocking | 
 | 1077 | 	 *	retries. | 
 | 1078 | 	 */ | 
 | 1079 |  | 
 | 1080 | 	if(skb==NULL) | 
 | 1081 | 		goto out; | 
 | 1082 |  | 
 | 1083 | 	/* | 
 | 1084 | 	 *	You lose any data beyond the buffer you gave. If it worries a | 
 | 1085 | 	 *	user program they can ask the device for its MTU anyway. | 
 | 1086 | 	 */ | 
 | 1087 |  | 
 | 1088 | 	copied = skb->len; | 
 | 1089 | 	if (copied > len) | 
 | 1090 | 	{ | 
 | 1091 | 		copied=len; | 
 | 1092 | 		msg->msg_flags|=MSG_TRUNC; | 
 | 1093 | 	} | 
 | 1094 |  | 
 | 1095 | 	err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied); | 
 | 1096 | 	if (err) | 
 | 1097 | 		goto out_free; | 
 | 1098 |  | 
 | 1099 | 	sock_recv_timestamp(msg, sk, skb); | 
 | 1100 |  | 
 | 1101 | 	if (msg->msg_name) | 
 | 1102 | 		memcpy(msg->msg_name, skb->cb, msg->msg_namelen); | 
 | 1103 |  | 
 | 1104 | 	/* | 
 | 1105 | 	 *	Free or return the buffer as appropriate. Again this | 
 | 1106 | 	 *	hides all the races and re-entrancy issues from us. | 
 | 1107 | 	 */ | 
 | 1108 | 	err = (flags&MSG_TRUNC) ? skb->len : copied; | 
 | 1109 |  | 
 | 1110 | out_free: | 
 | 1111 | 	skb_free_datagram(sk, skb); | 
 | 1112 | out: | 
 | 1113 | 	return err; | 
 | 1114 | } | 
 | 1115 |  | 
 | 1116 | #ifdef CONFIG_SOCK_PACKET | 
 | 1117 | static int packet_getname_spkt(struct socket *sock, struct sockaddr *uaddr, | 
 | 1118 | 			       int *uaddr_len, int peer) | 
 | 1119 | { | 
 | 1120 | 	struct net_device *dev; | 
 | 1121 | 	struct sock *sk	= sock->sk; | 
 | 1122 |  | 
 | 1123 | 	if (peer) | 
 | 1124 | 		return -EOPNOTSUPP; | 
 | 1125 |  | 
 | 1126 | 	uaddr->sa_family = AF_PACKET; | 
 | 1127 | 	dev = dev_get_by_index(pkt_sk(sk)->ifindex); | 
 | 1128 | 	if (dev) { | 
 | 1129 | 		strlcpy(uaddr->sa_data, dev->name, 15); | 
 | 1130 | 		dev_put(dev); | 
 | 1131 | 	} else | 
 | 1132 | 		memset(uaddr->sa_data, 0, 14); | 
 | 1133 | 	*uaddr_len = sizeof(*uaddr); | 
 | 1134 |  | 
 | 1135 | 	return 0; | 
 | 1136 | } | 
 | 1137 | #endif | 
 | 1138 |  | 
 | 1139 | static int packet_getname(struct socket *sock, struct sockaddr *uaddr, | 
 | 1140 | 			  int *uaddr_len, int peer) | 
 | 1141 | { | 
 | 1142 | 	struct net_device *dev; | 
 | 1143 | 	struct sock *sk = sock->sk; | 
 | 1144 | 	struct packet_sock *po = pkt_sk(sk); | 
 | 1145 | 	struct sockaddr_ll *sll = (struct sockaddr_ll*)uaddr; | 
 | 1146 |  | 
 | 1147 | 	if (peer) | 
 | 1148 | 		return -EOPNOTSUPP; | 
 | 1149 |  | 
 | 1150 | 	sll->sll_family = AF_PACKET; | 
 | 1151 | 	sll->sll_ifindex = po->ifindex; | 
 | 1152 | 	sll->sll_protocol = po->num; | 
 | 1153 | 	dev = dev_get_by_index(po->ifindex); | 
 | 1154 | 	if (dev) { | 
 | 1155 | 		sll->sll_hatype = dev->type; | 
 | 1156 | 		sll->sll_halen = dev->addr_len; | 
 | 1157 | 		memcpy(sll->sll_addr, dev->dev_addr, dev->addr_len); | 
 | 1158 | 		dev_put(dev); | 
 | 1159 | 	} else { | 
 | 1160 | 		sll->sll_hatype = 0;	/* Bad: we have no ARPHRD_UNSPEC */ | 
 | 1161 | 		sll->sll_halen = 0; | 
 | 1162 | 	} | 
 | 1163 | 	*uaddr_len = sizeof(*sll); | 
 | 1164 |  | 
 | 1165 | 	return 0; | 
 | 1166 | } | 
 | 1167 |  | 
 | 1168 | #ifdef CONFIG_PACKET_MULTICAST | 
 | 1169 | static void packet_dev_mc(struct net_device *dev, struct packet_mclist *i, int what) | 
 | 1170 | { | 
 | 1171 | 	switch (i->type) { | 
 | 1172 | 	case PACKET_MR_MULTICAST: | 
 | 1173 | 		if (what > 0) | 
 | 1174 | 			dev_mc_add(dev, i->addr, i->alen, 0); | 
 | 1175 | 		else | 
 | 1176 | 			dev_mc_delete(dev, i->addr, i->alen, 0); | 
 | 1177 | 		break; | 
 | 1178 | 	case PACKET_MR_PROMISC: | 
 | 1179 | 		dev_set_promiscuity(dev, what); | 
 | 1180 | 		break; | 
 | 1181 | 	case PACKET_MR_ALLMULTI: | 
 | 1182 | 		dev_set_allmulti(dev, what); | 
 | 1183 | 		break; | 
 | 1184 | 	default:; | 
 | 1185 | 	} | 
 | 1186 | } | 
 | 1187 |  | 
 | 1188 | static void packet_dev_mclist(struct net_device *dev, struct packet_mclist *i, int what) | 
 | 1189 | { | 
 | 1190 | 	for ( ; i; i=i->next) { | 
 | 1191 | 		if (i->ifindex == dev->ifindex) | 
 | 1192 | 			packet_dev_mc(dev, i, what); | 
 | 1193 | 	} | 
 | 1194 | } | 
 | 1195 |  | 
 | 1196 | static int packet_mc_add(struct sock *sk, struct packet_mreq *mreq) | 
 | 1197 | { | 
 | 1198 | 	struct packet_sock *po = pkt_sk(sk); | 
 | 1199 | 	struct packet_mclist *ml, *i; | 
 | 1200 | 	struct net_device *dev; | 
 | 1201 | 	int err; | 
 | 1202 |  | 
 | 1203 | 	rtnl_lock(); | 
 | 1204 |  | 
 | 1205 | 	err = -ENODEV; | 
 | 1206 | 	dev = __dev_get_by_index(mreq->mr_ifindex); | 
 | 1207 | 	if (!dev) | 
 | 1208 | 		goto done; | 
 | 1209 |  | 
 | 1210 | 	err = -EINVAL; | 
 | 1211 | 	if (mreq->mr_alen > dev->addr_len) | 
 | 1212 | 		goto done; | 
 | 1213 |  | 
 | 1214 | 	err = -ENOBUFS; | 
 | 1215 | 	i = (struct packet_mclist *)kmalloc(sizeof(*i), GFP_KERNEL); | 
 | 1216 | 	if (i == NULL) | 
 | 1217 | 		goto done; | 
 | 1218 |  | 
 | 1219 | 	err = 0; | 
 | 1220 | 	for (ml = po->mclist; ml; ml = ml->next) { | 
 | 1221 | 		if (ml->ifindex == mreq->mr_ifindex && | 
 | 1222 | 		    ml->type == mreq->mr_type && | 
 | 1223 | 		    ml->alen == mreq->mr_alen && | 
 | 1224 | 		    memcmp(ml->addr, mreq->mr_address, ml->alen) == 0) { | 
 | 1225 | 			ml->count++; | 
 | 1226 | 			/* Free the new element ... */ | 
 | 1227 | 			kfree(i); | 
 | 1228 | 			goto done; | 
 | 1229 | 		} | 
 | 1230 | 	} | 
 | 1231 |  | 
 | 1232 | 	i->type = mreq->mr_type; | 
 | 1233 | 	i->ifindex = mreq->mr_ifindex; | 
 | 1234 | 	i->alen = mreq->mr_alen; | 
 | 1235 | 	memcpy(i->addr, mreq->mr_address, i->alen); | 
 | 1236 | 	i->count = 1; | 
 | 1237 | 	i->next = po->mclist; | 
 | 1238 | 	po->mclist = i; | 
 | 1239 | 	packet_dev_mc(dev, i, +1); | 
 | 1240 |  | 
 | 1241 | done: | 
 | 1242 | 	rtnl_unlock(); | 
 | 1243 | 	return err; | 
 | 1244 | } | 
 | 1245 |  | 
 | 1246 | static int packet_mc_drop(struct sock *sk, struct packet_mreq *mreq) | 
 | 1247 | { | 
 | 1248 | 	struct packet_mclist *ml, **mlp; | 
 | 1249 |  | 
 | 1250 | 	rtnl_lock(); | 
 | 1251 |  | 
 | 1252 | 	for (mlp = &pkt_sk(sk)->mclist; (ml = *mlp) != NULL; mlp = &ml->next) { | 
 | 1253 | 		if (ml->ifindex == mreq->mr_ifindex && | 
 | 1254 | 		    ml->type == mreq->mr_type && | 
 | 1255 | 		    ml->alen == mreq->mr_alen && | 
 | 1256 | 		    memcmp(ml->addr, mreq->mr_address, ml->alen) == 0) { | 
 | 1257 | 			if (--ml->count == 0) { | 
 | 1258 | 				struct net_device *dev; | 
 | 1259 | 				*mlp = ml->next; | 
 | 1260 | 				dev = dev_get_by_index(ml->ifindex); | 
 | 1261 | 				if (dev) { | 
 | 1262 | 					packet_dev_mc(dev, ml, -1); | 
 | 1263 | 					dev_put(dev); | 
 | 1264 | 				} | 
 | 1265 | 				kfree(ml); | 
 | 1266 | 			} | 
 | 1267 | 			rtnl_unlock(); | 
 | 1268 | 			return 0; | 
 | 1269 | 		} | 
 | 1270 | 	} | 
 | 1271 | 	rtnl_unlock(); | 
 | 1272 | 	return -EADDRNOTAVAIL; | 
 | 1273 | } | 
 | 1274 |  | 
 | 1275 | static void packet_flush_mclist(struct sock *sk) | 
 | 1276 | { | 
 | 1277 | 	struct packet_sock *po = pkt_sk(sk); | 
 | 1278 | 	struct packet_mclist *ml; | 
 | 1279 |  | 
 | 1280 | 	if (!po->mclist) | 
 | 1281 | 		return; | 
 | 1282 |  | 
 | 1283 | 	rtnl_lock(); | 
 | 1284 | 	while ((ml = po->mclist) != NULL) { | 
 | 1285 | 		struct net_device *dev; | 
 | 1286 |  | 
 | 1287 | 		po->mclist = ml->next; | 
 | 1288 | 		if ((dev = dev_get_by_index(ml->ifindex)) != NULL) { | 
 | 1289 | 			packet_dev_mc(dev, ml, -1); | 
 | 1290 | 			dev_put(dev); | 
 | 1291 | 		} | 
 | 1292 | 		kfree(ml); | 
 | 1293 | 	} | 
 | 1294 | 	rtnl_unlock(); | 
 | 1295 | } | 
 | 1296 | #endif | 
 | 1297 |  | 
 | 1298 | static int | 
 | 1299 | packet_setsockopt(struct socket *sock, int level, int optname, char __user *optval, int optlen) | 
 | 1300 | { | 
 | 1301 | 	struct sock *sk = sock->sk; | 
 | 1302 | 	int ret; | 
 | 1303 |  | 
 | 1304 | 	if (level != SOL_PACKET) | 
 | 1305 | 		return -ENOPROTOOPT; | 
 | 1306 |  | 
 | 1307 | 	switch(optname)	{ | 
 | 1308 | #ifdef CONFIG_PACKET_MULTICAST | 
 | 1309 | 	case PACKET_ADD_MEMBERSHIP:	 | 
 | 1310 | 	case PACKET_DROP_MEMBERSHIP: | 
 | 1311 | 	{ | 
 | 1312 | 		struct packet_mreq mreq; | 
 | 1313 | 		if (optlen<sizeof(mreq)) | 
 | 1314 | 			return -EINVAL; | 
 | 1315 | 		if (copy_from_user(&mreq,optval,sizeof(mreq))) | 
 | 1316 | 			return -EFAULT; | 
 | 1317 | 		if (optname == PACKET_ADD_MEMBERSHIP) | 
 | 1318 | 			ret = packet_mc_add(sk, &mreq); | 
 | 1319 | 		else | 
 | 1320 | 			ret = packet_mc_drop(sk, &mreq); | 
 | 1321 | 		return ret; | 
 | 1322 | 	} | 
 | 1323 | #endif | 
 | 1324 | #ifdef CONFIG_PACKET_MMAP | 
 | 1325 | 	case PACKET_RX_RING: | 
 | 1326 | 	{ | 
 | 1327 | 		struct tpacket_req req; | 
 | 1328 |  | 
 | 1329 | 		if (optlen<sizeof(req)) | 
 | 1330 | 			return -EINVAL; | 
 | 1331 | 		if (copy_from_user(&req,optval,sizeof(req))) | 
 | 1332 | 			return -EFAULT; | 
 | 1333 | 		return packet_set_ring(sk, &req, 0); | 
 | 1334 | 	} | 
 | 1335 | 	case PACKET_COPY_THRESH: | 
 | 1336 | 	{ | 
 | 1337 | 		int val; | 
 | 1338 |  | 
 | 1339 | 		if (optlen!=sizeof(val)) | 
 | 1340 | 			return -EINVAL; | 
 | 1341 | 		if (copy_from_user(&val,optval,sizeof(val))) | 
 | 1342 | 			return -EFAULT; | 
 | 1343 |  | 
 | 1344 | 		pkt_sk(sk)->copy_thresh = val; | 
 | 1345 | 		return 0; | 
 | 1346 | 	} | 
 | 1347 | #endif | 
 | 1348 | 	default: | 
 | 1349 | 		return -ENOPROTOOPT; | 
 | 1350 | 	} | 
 | 1351 | } | 
 | 1352 |  | 
 | 1353 | static int packet_getsockopt(struct socket *sock, int level, int optname, | 
 | 1354 | 			     char __user *optval, int __user *optlen) | 
 | 1355 | { | 
 | 1356 | 	int len; | 
 | 1357 | 	struct sock *sk = sock->sk; | 
 | 1358 | 	struct packet_sock *po = pkt_sk(sk); | 
 | 1359 |  | 
 | 1360 | 	if (level != SOL_PACKET) | 
 | 1361 | 		return -ENOPROTOOPT; | 
 | 1362 |  | 
 | 1363 |   	if (get_user(len,optlen)) | 
 | 1364 |   		return -EFAULT; | 
 | 1365 |  | 
 | 1366 | 	if (len < 0) | 
 | 1367 | 		return -EINVAL; | 
 | 1368 | 		 | 
 | 1369 | 	switch(optname)	{ | 
 | 1370 | 	case PACKET_STATISTICS: | 
 | 1371 | 	{ | 
 | 1372 | 		struct tpacket_stats st; | 
 | 1373 |  | 
 | 1374 | 		if (len > sizeof(struct tpacket_stats)) | 
 | 1375 | 			len = sizeof(struct tpacket_stats); | 
 | 1376 | 		spin_lock_bh(&sk->sk_receive_queue.lock); | 
 | 1377 | 		st = po->stats; | 
 | 1378 | 		memset(&po->stats, 0, sizeof(st)); | 
 | 1379 | 		spin_unlock_bh(&sk->sk_receive_queue.lock); | 
 | 1380 | 		st.tp_packets += st.tp_drops; | 
 | 1381 |  | 
 | 1382 | 		if (copy_to_user(optval, &st, len)) | 
 | 1383 | 			return -EFAULT; | 
 | 1384 | 		break; | 
 | 1385 | 	} | 
 | 1386 | 	default: | 
 | 1387 | 		return -ENOPROTOOPT; | 
 | 1388 | 	} | 
 | 1389 |  | 
 | 1390 |   	if (put_user(len, optlen)) | 
 | 1391 |   		return -EFAULT; | 
 | 1392 |   	return 0; | 
 | 1393 | } | 
 | 1394 |  | 
 | 1395 |  | 
 | 1396 | static int packet_notifier(struct notifier_block *this, unsigned long msg, void *data) | 
 | 1397 | { | 
 | 1398 | 	struct sock *sk; | 
 | 1399 | 	struct hlist_node *node; | 
 | 1400 | 	struct net_device *dev = (struct net_device*)data; | 
 | 1401 |  | 
 | 1402 | 	read_lock(&packet_sklist_lock); | 
 | 1403 | 	sk_for_each(sk, node, &packet_sklist) { | 
 | 1404 | 		struct packet_sock *po = pkt_sk(sk); | 
 | 1405 |  | 
 | 1406 | 		switch (msg) { | 
 | 1407 | 		case NETDEV_UNREGISTER: | 
 | 1408 | #ifdef CONFIG_PACKET_MULTICAST | 
 | 1409 | 			if (po->mclist) | 
 | 1410 | 				packet_dev_mclist(dev, po->mclist, -1); | 
 | 1411 | 			// fallthrough | 
 | 1412 | #endif | 
 | 1413 | 		case NETDEV_DOWN: | 
 | 1414 | 			if (dev->ifindex == po->ifindex) { | 
 | 1415 | 				spin_lock(&po->bind_lock); | 
 | 1416 | 				if (po->running) { | 
 | 1417 | 					__dev_remove_pack(&po->prot_hook); | 
 | 1418 | 					__sock_put(sk); | 
 | 1419 | 					po->running = 0; | 
 | 1420 | 					sk->sk_err = ENETDOWN; | 
 | 1421 | 					if (!sock_flag(sk, SOCK_DEAD)) | 
 | 1422 | 						sk->sk_error_report(sk); | 
 | 1423 | 				} | 
 | 1424 | 				if (msg == NETDEV_UNREGISTER) { | 
 | 1425 | 					po->ifindex = -1; | 
 | 1426 | 					po->prot_hook.dev = NULL; | 
 | 1427 | 				} | 
 | 1428 | 				spin_unlock(&po->bind_lock); | 
 | 1429 | 			} | 
 | 1430 | 			break; | 
 | 1431 | 		case NETDEV_UP: | 
 | 1432 | 			spin_lock(&po->bind_lock); | 
 | 1433 | 			if (dev->ifindex == po->ifindex && po->num && | 
 | 1434 | 			    !po->running) { | 
 | 1435 | 				dev_add_pack(&po->prot_hook); | 
 | 1436 | 				sock_hold(sk); | 
 | 1437 | 				po->running = 1; | 
 | 1438 | 			} | 
 | 1439 | 			spin_unlock(&po->bind_lock); | 
 | 1440 | 			break; | 
 | 1441 | 		} | 
 | 1442 | 	} | 
 | 1443 | 	read_unlock(&packet_sklist_lock); | 
 | 1444 | 	return NOTIFY_DONE; | 
 | 1445 | } | 
 | 1446 |  | 
 | 1447 |  | 
 | 1448 | static int packet_ioctl(struct socket *sock, unsigned int cmd, | 
 | 1449 | 			unsigned long arg) | 
 | 1450 | { | 
 | 1451 | 	struct sock *sk = sock->sk; | 
 | 1452 |  | 
 | 1453 | 	switch(cmd) { | 
 | 1454 | 		case SIOCOUTQ: | 
 | 1455 | 		{ | 
 | 1456 | 			int amount = atomic_read(&sk->sk_wmem_alloc); | 
 | 1457 | 			return put_user(amount, (int __user *)arg); | 
 | 1458 | 		} | 
 | 1459 | 		case SIOCINQ: | 
 | 1460 | 		{ | 
 | 1461 | 			struct sk_buff *skb; | 
 | 1462 | 			int amount = 0; | 
 | 1463 |  | 
 | 1464 | 			spin_lock_bh(&sk->sk_receive_queue.lock); | 
 | 1465 | 			skb = skb_peek(&sk->sk_receive_queue); | 
 | 1466 | 			if (skb) | 
 | 1467 | 				amount = skb->len; | 
 | 1468 | 			spin_unlock_bh(&sk->sk_receive_queue.lock); | 
 | 1469 | 			return put_user(amount, (int __user *)arg); | 
 | 1470 | 		} | 
 | 1471 | 		case SIOCGSTAMP: | 
 | 1472 | 			return sock_get_timestamp(sk, (struct timeval __user *)arg); | 
 | 1473 | 			 | 
 | 1474 | #ifdef CONFIG_INET | 
 | 1475 | 		case SIOCADDRT: | 
 | 1476 | 		case SIOCDELRT: | 
 | 1477 | 		case SIOCDARP: | 
 | 1478 | 		case SIOCGARP: | 
 | 1479 | 		case SIOCSARP: | 
 | 1480 | 		case SIOCGIFADDR: | 
 | 1481 | 		case SIOCSIFADDR: | 
 | 1482 | 		case SIOCGIFBRDADDR: | 
 | 1483 | 		case SIOCSIFBRDADDR: | 
 | 1484 | 		case SIOCGIFNETMASK: | 
 | 1485 | 		case SIOCSIFNETMASK: | 
 | 1486 | 		case SIOCGIFDSTADDR: | 
 | 1487 | 		case SIOCSIFDSTADDR: | 
 | 1488 | 		case SIOCSIFFLAGS: | 
 | 1489 | 			return inet_dgram_ops.ioctl(sock, cmd, arg); | 
 | 1490 | #endif | 
 | 1491 |  | 
 | 1492 | 		default: | 
 | 1493 | 			return dev_ioctl(cmd, (void __user *)arg); | 
 | 1494 | 	} | 
 | 1495 | 	return 0; | 
 | 1496 | } | 
 | 1497 |  | 
 | 1498 | #ifndef CONFIG_PACKET_MMAP | 
 | 1499 | #define packet_mmap sock_no_mmap | 
 | 1500 | #define packet_poll datagram_poll | 
 | 1501 | #else | 
 | 1502 |  | 
 | 1503 | static unsigned int packet_poll(struct file * file, struct socket *sock, | 
 | 1504 | 				poll_table *wait) | 
 | 1505 | { | 
 | 1506 | 	struct sock *sk = sock->sk; | 
 | 1507 | 	struct packet_sock *po = pkt_sk(sk); | 
 | 1508 | 	unsigned int mask = datagram_poll(file, sock, wait); | 
 | 1509 |  | 
 | 1510 | 	spin_lock_bh(&sk->sk_receive_queue.lock); | 
 | 1511 | 	if (po->pg_vec) { | 
 | 1512 | 		unsigned last = po->head ? po->head-1 : po->frame_max; | 
 | 1513 | 		struct tpacket_hdr *h; | 
 | 1514 |  | 
 | 1515 | 		h = (struct tpacket_hdr *)packet_lookup_frame(po, last); | 
 | 1516 |  | 
 | 1517 | 		if (h->tp_status) | 
 | 1518 | 			mask |= POLLIN | POLLRDNORM; | 
 | 1519 | 	} | 
 | 1520 | 	spin_unlock_bh(&sk->sk_receive_queue.lock); | 
 | 1521 | 	return mask; | 
 | 1522 | } | 
 | 1523 |  | 
 | 1524 |  | 
 | 1525 | /* Dirty? Well, I still did not learn better way to account | 
 | 1526 |  * for user mmaps. | 
 | 1527 |  */ | 
 | 1528 |  | 
 | 1529 | static void packet_mm_open(struct vm_area_struct *vma) | 
 | 1530 | { | 
 | 1531 | 	struct file *file = vma->vm_file; | 
 | 1532 | 	struct inode *inode = file->f_dentry->d_inode; | 
 | 1533 | 	struct socket * sock = SOCKET_I(inode); | 
 | 1534 | 	struct sock *sk = sock->sk; | 
 | 1535 | 	 | 
 | 1536 | 	if (sk) | 
 | 1537 | 		atomic_inc(&pkt_sk(sk)->mapped); | 
 | 1538 | } | 
 | 1539 |  | 
 | 1540 | static void packet_mm_close(struct vm_area_struct *vma) | 
 | 1541 | { | 
 | 1542 | 	struct file *file = vma->vm_file; | 
 | 1543 | 	struct inode *inode = file->f_dentry->d_inode; | 
 | 1544 | 	struct socket * sock = SOCKET_I(inode); | 
 | 1545 | 	struct sock *sk = sock->sk; | 
 | 1546 | 	 | 
 | 1547 | 	if (sk) | 
 | 1548 | 		atomic_dec(&pkt_sk(sk)->mapped); | 
 | 1549 | } | 
 | 1550 |  | 
 | 1551 | static struct vm_operations_struct packet_mmap_ops = { | 
 | 1552 | 	.open =	packet_mm_open, | 
 | 1553 | 	.close =packet_mm_close, | 
 | 1554 | }; | 
 | 1555 |  | 
 | 1556 | static inline struct page *pg_vec_endpage(char *one_pg_vec, unsigned int order) | 
 | 1557 | { | 
 | 1558 | 	return virt_to_page(one_pg_vec + (PAGE_SIZE << order) - 1); | 
 | 1559 | } | 
 | 1560 |  | 
 | 1561 | static void free_pg_vec(char **pg_vec, unsigned order, unsigned len) | 
 | 1562 | { | 
 | 1563 | 	int i; | 
 | 1564 |  | 
 | 1565 | 	for (i=0; i<len; i++) { | 
 | 1566 | 		if (pg_vec[i]) { | 
 | 1567 | 			struct page *page, *pend; | 
 | 1568 |  | 
 | 1569 | 			pend = pg_vec_endpage(pg_vec[i], order); | 
 | 1570 | 			for (page = virt_to_page(pg_vec[i]); page <= pend; page++) | 
 | 1571 | 				ClearPageReserved(page); | 
 | 1572 | 			free_pages((unsigned long)pg_vec[i], order); | 
 | 1573 | 		} | 
 | 1574 | 	} | 
 | 1575 | 	kfree(pg_vec); | 
 | 1576 | } | 
 | 1577 |  | 
 | 1578 |  | 
 | 1579 | static int packet_set_ring(struct sock *sk, struct tpacket_req *req, int closing) | 
 | 1580 | { | 
 | 1581 | 	char **pg_vec = NULL; | 
 | 1582 | 	struct packet_sock *po = pkt_sk(sk); | 
 | 1583 | 	int was_running, num, order = 0; | 
 | 1584 | 	int err = 0; | 
 | 1585 | 	 | 
 | 1586 | 	if (req->tp_block_nr) { | 
 | 1587 | 		int i, l; | 
 | 1588 |  | 
 | 1589 | 		/* Sanity tests and some calculations */ | 
 | 1590 |  | 
 | 1591 | 		if (po->pg_vec) | 
 | 1592 | 			return -EBUSY; | 
 | 1593 |  | 
 | 1594 | 		if ((int)req->tp_block_size <= 0) | 
 | 1595 | 			return -EINVAL; | 
 | 1596 | 		if (req->tp_block_size&(PAGE_SIZE-1)) | 
 | 1597 | 			return -EINVAL; | 
 | 1598 | 		if (req->tp_frame_size < TPACKET_HDRLEN) | 
 | 1599 | 			return -EINVAL; | 
 | 1600 | 		if (req->tp_frame_size&(TPACKET_ALIGNMENT-1)) | 
 | 1601 | 			return -EINVAL; | 
 | 1602 |  | 
 | 1603 | 		po->frames_per_block = req->tp_block_size/req->tp_frame_size; | 
 | 1604 | 		if (po->frames_per_block <= 0) | 
 | 1605 | 			return -EINVAL; | 
 | 1606 | 		if (po->frames_per_block*req->tp_block_nr != req->tp_frame_nr) | 
 | 1607 | 			return -EINVAL; | 
 | 1608 | 		/* OK! */ | 
 | 1609 |  | 
 | 1610 | 		/* Allocate page vector */ | 
 | 1611 | 		while ((PAGE_SIZE<<order) < req->tp_block_size) | 
 | 1612 | 			order++; | 
 | 1613 |  | 
 | 1614 | 		err = -ENOMEM; | 
 | 1615 |  | 
 | 1616 | 		pg_vec = kmalloc(req->tp_block_nr*sizeof(char *), GFP_KERNEL); | 
 | 1617 | 		if (pg_vec == NULL) | 
 | 1618 | 			goto out; | 
 | 1619 | 		memset(pg_vec, 0, req->tp_block_nr*sizeof(char **)); | 
 | 1620 |  | 
 | 1621 | 		for (i=0; i<req->tp_block_nr; i++) { | 
 | 1622 | 			struct page *page, *pend; | 
 | 1623 | 			pg_vec[i] = (char *)__get_free_pages(GFP_KERNEL, order); | 
 | 1624 | 			if (!pg_vec[i]) | 
 | 1625 | 				goto out_free_pgvec; | 
 | 1626 |  | 
 | 1627 | 			pend = pg_vec_endpage(pg_vec[i], order); | 
 | 1628 | 			for (page = virt_to_page(pg_vec[i]); page <= pend; page++) | 
 | 1629 | 				SetPageReserved(page); | 
 | 1630 | 		} | 
 | 1631 | 		/* Page vector is allocated */ | 
 | 1632 |  | 
 | 1633 | 		l = 0; | 
 | 1634 | 		for (i=0; i<req->tp_block_nr; i++) { | 
 | 1635 | 			char *ptr = pg_vec[i]; | 
 | 1636 | 			struct tpacket_hdr *header; | 
 | 1637 | 			int k; | 
 | 1638 |  | 
 | 1639 | 			for (k=0; k<po->frames_per_block; k++) { | 
 | 1640 | 				 | 
 | 1641 | 				header = (struct tpacket_hdr*)ptr; | 
 | 1642 | 				header->tp_status = TP_STATUS_KERNEL; | 
 | 1643 | 				ptr += req->tp_frame_size; | 
 | 1644 | 			} | 
 | 1645 | 		} | 
 | 1646 | 		/* Done */ | 
 | 1647 | 	} else { | 
 | 1648 | 		if (req->tp_frame_nr) | 
 | 1649 | 			return -EINVAL; | 
 | 1650 | 	} | 
 | 1651 |  | 
 | 1652 | 	lock_sock(sk); | 
 | 1653 |  | 
 | 1654 | 	/* Detach socket from network */ | 
 | 1655 | 	spin_lock(&po->bind_lock); | 
 | 1656 | 	was_running = po->running; | 
 | 1657 | 	num = po->num; | 
 | 1658 | 	if (was_running) { | 
 | 1659 | 		__dev_remove_pack(&po->prot_hook); | 
 | 1660 | 		po->num = 0; | 
 | 1661 | 		po->running = 0; | 
 | 1662 | 		__sock_put(sk); | 
 | 1663 | 	} | 
 | 1664 | 	spin_unlock(&po->bind_lock); | 
 | 1665 | 		 | 
 | 1666 | 	synchronize_net(); | 
 | 1667 |  | 
 | 1668 | 	err = -EBUSY; | 
 | 1669 | 	if (closing || atomic_read(&po->mapped) == 0) { | 
 | 1670 | 		err = 0; | 
 | 1671 | #define XC(a, b) ({ __typeof__ ((a)) __t; __t = (a); (a) = (b); __t; }) | 
 | 1672 |  | 
 | 1673 | 		spin_lock_bh(&sk->sk_receive_queue.lock); | 
 | 1674 | 		pg_vec = XC(po->pg_vec, pg_vec); | 
 | 1675 | 		po->frame_max = req->tp_frame_nr-1; | 
 | 1676 | 		po->head = 0; | 
 | 1677 | 		po->frame_size = req->tp_frame_size; | 
 | 1678 | 		spin_unlock_bh(&sk->sk_receive_queue.lock); | 
 | 1679 |  | 
 | 1680 | 		order = XC(po->pg_vec_order, order); | 
 | 1681 | 		req->tp_block_nr = XC(po->pg_vec_len, req->tp_block_nr); | 
 | 1682 |  | 
 | 1683 | 		po->pg_vec_pages = req->tp_block_size/PAGE_SIZE; | 
 | 1684 | 		po->prot_hook.func = po->pg_vec ? tpacket_rcv : packet_rcv; | 
 | 1685 | 		skb_queue_purge(&sk->sk_receive_queue); | 
 | 1686 | #undef XC | 
 | 1687 | 		if (atomic_read(&po->mapped)) | 
 | 1688 | 			printk(KERN_DEBUG "packet_mmap: vma is busy: %d\n", atomic_read(&po->mapped)); | 
 | 1689 | 	} | 
 | 1690 |  | 
 | 1691 | 	spin_lock(&po->bind_lock); | 
 | 1692 | 	if (was_running && !po->running) { | 
 | 1693 | 		sock_hold(sk); | 
 | 1694 | 		po->running = 1; | 
 | 1695 | 		po->num = num; | 
 | 1696 | 		dev_add_pack(&po->prot_hook); | 
 | 1697 | 	} | 
 | 1698 | 	spin_unlock(&po->bind_lock); | 
 | 1699 |  | 
 | 1700 | 	release_sock(sk); | 
 | 1701 |  | 
 | 1702 | out_free_pgvec: | 
 | 1703 | 	if (pg_vec) | 
 | 1704 | 		free_pg_vec(pg_vec, order, req->tp_block_nr); | 
 | 1705 | out: | 
 | 1706 | 	return err; | 
 | 1707 | } | 
 | 1708 |  | 
 | 1709 | static int packet_mmap(struct file *file, struct socket *sock, struct vm_area_struct *vma) | 
 | 1710 | { | 
 | 1711 | 	struct sock *sk = sock->sk; | 
 | 1712 | 	struct packet_sock *po = pkt_sk(sk); | 
 | 1713 | 	unsigned long size; | 
 | 1714 | 	unsigned long start; | 
 | 1715 | 	int err = -EINVAL; | 
 | 1716 | 	int i; | 
 | 1717 |  | 
 | 1718 | 	if (vma->vm_pgoff) | 
 | 1719 | 		return -EINVAL; | 
 | 1720 |  | 
 | 1721 | 	size = vma->vm_end - vma->vm_start; | 
 | 1722 |  | 
 | 1723 | 	lock_sock(sk); | 
 | 1724 | 	if (po->pg_vec == NULL) | 
 | 1725 | 		goto out; | 
 | 1726 | 	if (size != po->pg_vec_len*po->pg_vec_pages*PAGE_SIZE) | 
 | 1727 | 		goto out; | 
 | 1728 |  | 
 | 1729 | 	atomic_inc(&po->mapped); | 
 | 1730 | 	start = vma->vm_start; | 
 | 1731 | 	err = -EAGAIN; | 
 | 1732 | 	for (i=0; i<po->pg_vec_len; i++) { | 
 | 1733 | 		if (remap_pfn_range(vma, start, | 
 | 1734 | 				     __pa(po->pg_vec[i]) >> PAGE_SHIFT, | 
 | 1735 | 				     po->pg_vec_pages*PAGE_SIZE, | 
 | 1736 | 				     vma->vm_page_prot)) | 
 | 1737 | 			goto out; | 
 | 1738 | 		start += po->pg_vec_pages*PAGE_SIZE; | 
 | 1739 | 	} | 
 | 1740 | 	vma->vm_ops = &packet_mmap_ops; | 
 | 1741 | 	err = 0; | 
 | 1742 |  | 
 | 1743 | out: | 
 | 1744 | 	release_sock(sk); | 
 | 1745 | 	return err; | 
 | 1746 | } | 
 | 1747 | #endif | 
 | 1748 |  | 
 | 1749 |  | 
 | 1750 | #ifdef CONFIG_SOCK_PACKET | 
 | 1751 | static struct proto_ops packet_ops_spkt = { | 
 | 1752 | 	.family =	PF_PACKET, | 
 | 1753 | 	.owner =	THIS_MODULE, | 
 | 1754 | 	.release =	packet_release, | 
 | 1755 | 	.bind =		packet_bind_spkt, | 
 | 1756 | 	.connect =	sock_no_connect, | 
 | 1757 | 	.socketpair =	sock_no_socketpair, | 
 | 1758 | 	.accept =	sock_no_accept, | 
 | 1759 | 	.getname =	packet_getname_spkt, | 
 | 1760 | 	.poll =		datagram_poll, | 
 | 1761 | 	.ioctl =	packet_ioctl, | 
 | 1762 | 	.listen =	sock_no_listen, | 
 | 1763 | 	.shutdown =	sock_no_shutdown, | 
 | 1764 | 	.setsockopt =	sock_no_setsockopt, | 
 | 1765 | 	.getsockopt =	sock_no_getsockopt, | 
 | 1766 | 	.sendmsg =	packet_sendmsg_spkt, | 
 | 1767 | 	.recvmsg =	packet_recvmsg, | 
 | 1768 | 	.mmap =		sock_no_mmap, | 
 | 1769 | 	.sendpage =	sock_no_sendpage, | 
 | 1770 | }; | 
 | 1771 | #endif | 
 | 1772 |  | 
 | 1773 | static struct proto_ops packet_ops = { | 
 | 1774 | 	.family =	PF_PACKET, | 
 | 1775 | 	.owner =	THIS_MODULE, | 
 | 1776 | 	.release =	packet_release, | 
 | 1777 | 	.bind =		packet_bind, | 
 | 1778 | 	.connect =	sock_no_connect, | 
 | 1779 | 	.socketpair =	sock_no_socketpair, | 
 | 1780 | 	.accept =	sock_no_accept, | 
 | 1781 | 	.getname =	packet_getname,  | 
 | 1782 | 	.poll =		packet_poll, | 
 | 1783 | 	.ioctl =	packet_ioctl, | 
 | 1784 | 	.listen =	sock_no_listen, | 
 | 1785 | 	.shutdown =	sock_no_shutdown, | 
 | 1786 | 	.setsockopt =	packet_setsockopt, | 
 | 1787 | 	.getsockopt =	packet_getsockopt, | 
 | 1788 | 	.sendmsg =	packet_sendmsg, | 
 | 1789 | 	.recvmsg =	packet_recvmsg, | 
 | 1790 | 	.mmap =		packet_mmap, | 
 | 1791 | 	.sendpage =	sock_no_sendpage, | 
 | 1792 | }; | 
 | 1793 |  | 
 | 1794 | static struct net_proto_family packet_family_ops = { | 
 | 1795 | 	.family =	PF_PACKET, | 
 | 1796 | 	.create =	packet_create, | 
 | 1797 | 	.owner	=	THIS_MODULE, | 
 | 1798 | }; | 
 | 1799 |  | 
 | 1800 | static struct notifier_block packet_netdev_notifier = { | 
 | 1801 | 	.notifier_call =packet_notifier, | 
 | 1802 | }; | 
 | 1803 |  | 
 | 1804 | #ifdef CONFIG_PROC_FS | 
 | 1805 | static inline struct sock *packet_seq_idx(loff_t off) | 
 | 1806 | { | 
 | 1807 | 	struct sock *s; | 
 | 1808 | 	struct hlist_node *node; | 
 | 1809 |  | 
 | 1810 | 	sk_for_each(s, node, &packet_sklist) { | 
 | 1811 | 		if (!off--) | 
 | 1812 | 			return s; | 
 | 1813 | 	} | 
 | 1814 | 	return NULL; | 
 | 1815 | } | 
 | 1816 |  | 
 | 1817 | static void *packet_seq_start(struct seq_file *seq, loff_t *pos) | 
 | 1818 | { | 
 | 1819 | 	read_lock(&packet_sklist_lock); | 
 | 1820 | 	return *pos ? packet_seq_idx(*pos - 1) : SEQ_START_TOKEN; | 
 | 1821 | } | 
 | 1822 |  | 
 | 1823 | static void *packet_seq_next(struct seq_file *seq, void *v, loff_t *pos) | 
 | 1824 | { | 
 | 1825 | 	++*pos; | 
 | 1826 | 	return  (v == SEQ_START_TOKEN)  | 
 | 1827 | 		? sk_head(&packet_sklist)  | 
 | 1828 | 		: sk_next((struct sock*)v) ; | 
 | 1829 | } | 
 | 1830 |  | 
 | 1831 | static void packet_seq_stop(struct seq_file *seq, void *v) | 
 | 1832 | { | 
 | 1833 | 	read_unlock(&packet_sklist_lock);		 | 
 | 1834 | } | 
 | 1835 |  | 
 | 1836 | static int packet_seq_show(struct seq_file *seq, void *v)  | 
 | 1837 | { | 
 | 1838 | 	if (v == SEQ_START_TOKEN) | 
 | 1839 | 		seq_puts(seq, "sk       RefCnt Type Proto  Iface R Rmem   User   Inode\n"); | 
 | 1840 | 	else { | 
 | 1841 | 		struct sock *s = v; | 
 | 1842 | 		const struct packet_sock *po = pkt_sk(s); | 
 | 1843 |  | 
 | 1844 | 		seq_printf(seq, | 
 | 1845 | 			   "%p %-6d %-4d %04x   %-5d %1d %-6u %-6u %-6lu\n", | 
 | 1846 | 			   s, | 
 | 1847 | 			   atomic_read(&s->sk_refcnt), | 
 | 1848 | 			   s->sk_type, | 
 | 1849 | 			   ntohs(po->num), | 
 | 1850 | 			   po->ifindex, | 
 | 1851 | 			   po->running, | 
 | 1852 | 			   atomic_read(&s->sk_rmem_alloc), | 
 | 1853 | 			   sock_i_uid(s), | 
 | 1854 | 			   sock_i_ino(s) ); | 
 | 1855 | 	} | 
 | 1856 |  | 
 | 1857 | 	return 0; | 
 | 1858 | } | 
 | 1859 |  | 
 | 1860 | static struct seq_operations packet_seq_ops = { | 
 | 1861 | 	.start	= packet_seq_start, | 
 | 1862 | 	.next	= packet_seq_next, | 
 | 1863 | 	.stop	= packet_seq_stop, | 
 | 1864 | 	.show	= packet_seq_show, | 
 | 1865 | }; | 
 | 1866 |  | 
 | 1867 | static int packet_seq_open(struct inode *inode, struct file *file) | 
 | 1868 | { | 
 | 1869 | 	return seq_open(file, &packet_seq_ops); | 
 | 1870 | } | 
 | 1871 |  | 
 | 1872 | static struct file_operations packet_seq_fops = { | 
 | 1873 | 	.owner		= THIS_MODULE, | 
 | 1874 | 	.open		= packet_seq_open, | 
 | 1875 | 	.read		= seq_read, | 
 | 1876 | 	.llseek		= seq_lseek, | 
 | 1877 | 	.release	= seq_release, | 
 | 1878 | }; | 
 | 1879 |  | 
 | 1880 | #endif | 
 | 1881 |  | 
 | 1882 | static void __exit packet_exit(void) | 
 | 1883 | { | 
 | 1884 | 	proc_net_remove("packet"); | 
 | 1885 | 	unregister_netdevice_notifier(&packet_netdev_notifier); | 
 | 1886 | 	sock_unregister(PF_PACKET); | 
 | 1887 | 	proto_unregister(&packet_proto); | 
 | 1888 | } | 
 | 1889 |  | 
 | 1890 | static int __init packet_init(void) | 
 | 1891 | { | 
 | 1892 | 	int rc = proto_register(&packet_proto, 0); | 
 | 1893 |  | 
 | 1894 | 	if (rc != 0) | 
 | 1895 | 		goto out; | 
 | 1896 |  | 
 | 1897 | 	sock_register(&packet_family_ops); | 
 | 1898 | 	register_netdevice_notifier(&packet_netdev_notifier); | 
 | 1899 | 	proc_net_fops_create("packet", 0, &packet_seq_fops); | 
 | 1900 | out: | 
 | 1901 | 	return rc; | 
 | 1902 | } | 
 | 1903 |  | 
 | 1904 | module_init(packet_init); | 
 | 1905 | module_exit(packet_exit); | 
 | 1906 | MODULE_LICENSE("GPL"); | 
 | 1907 | MODULE_ALIAS_NETPROTO(PF_PACKET); |