adb5933cbb
remove a test that has been obsoleted by the authentication failure counter - enter slow retry mode always, not only if we already transfered data successfully (the test was designed to disable retries when the initial authentication setting was not correct, the auth failure counter does this job better).
1193 lines
31 KiB
C
1193 lines
31 KiB
C
/* $NetBSD: if_pppoe.c,v 1.35 2002/09/01 18:06:59 martin Exp $ */
|
|
|
|
/*-
|
|
* Copyright (c) 2002 The NetBSD Foundation, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* This code is derived from software contributed to The NetBSD Foundation
|
|
* by Martin Husemann <martin@netbsd.org>.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the NetBSD
|
|
* Foundation, Inc. and its contributors.
|
|
* 4. Neither the name of The NetBSD Foundation nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__KERNEL_RCSID(0, "$NetBSD: if_pppoe.c,v 1.35 2002/09/01 18:06:59 martin Exp $");
|
|
|
|
#include "pppoe.h"
|
|
#include "bpfilter.h"
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/callout.h>
|
|
#include <sys/malloc.h>
|
|
#include <sys/mbuf.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/ioctl.h>
|
|
#include <net/if.h>
|
|
#include <net/if_types.h>
|
|
#include <net/if_ether.h>
|
|
#include <net/if_sppp.h>
|
|
#include <net/if_spppvar.h>
|
|
#include <net/if_pppoe.h>
|
|
|
|
#if NBPFILTER > 0
|
|
#include <net/bpf.h>
|
|
#endif
|
|
|
|
#include <machine/intr.h>
|
|
|
|
#undef PPPOE_DEBUG /* XXX - remove this or make it an option */
|
|
/* #define PPPOE_DEBUG 1 */
|
|
|
|
struct pppoehdr {
|
|
u_int8_t vertype;
|
|
u_int8_t code;
|
|
u_int16_t session;
|
|
u_int16_t plen;
|
|
} __attribute__((__packed__));
|
|
|
|
struct pppoetag {
|
|
u_int16_t tag;
|
|
u_int16_t len;
|
|
} __attribute__((__packed__));
|
|
|
|
#define PPPOE_HEADERLEN sizeof(struct pppoehdr)
|
|
#define PPPOE_VERTYPE 0x11 /* VER=1, TYPE = 1 */
|
|
|
|
#define PPPOE_TAG_EOL 0x0000 /* end of list */
|
|
#define PPPOE_TAG_SNAME 0x0101 /* service name */
|
|
#define PPPOE_TAG_ACNAME 0x0102 /* access concentrator name */
|
|
#define PPPOE_TAG_HUNIQUE 0x0103 /* host unique */
|
|
#define PPPOE_TAG_ACCOOKIE 0x0104 /* AC cookie */
|
|
#define PPPOE_TAG_VENDOR 0x0105 /* vendor specific */
|
|
#define PPPOE_TAG_RELAYSID 0x0110 /* relay session id */
|
|
#define PPPOE_TAG_SNAME_ERR 0x0201 /* service name error */
|
|
#define PPPOE_TAG_ACSYS_ERR 0x0202 /* AC system error */
|
|
#define PPPOE_TAG_GENERIC_ERR 0x0203 /* gerneric error */
|
|
|
|
#define PPPOE_CODE_PADI 0x09 /* Active Discovery Initiation */
|
|
#define PPPOE_CODE_PADO 0x07 /* Active Discovery Offer */
|
|
#define PPPOE_CODE_PADR 0x19 /* Active Discovery Request */
|
|
#define PPPOE_CODE_PADS 0x65 /* Active Discovery Session confirmation */
|
|
#define PPPOE_CODE_PADT 0xA7 /* Active Discovery Terminate */
|
|
|
|
/* two byte PPP protocol discriminator, then IP data */
|
|
#define PPPOE_MAXMTU (ETHERMTU-PPPOE_HEADERLEN-2)
|
|
|
|
/* Add a 16 bit unsigned value to a buffer pointed to by PTR */
|
|
#define PPPOE_ADD_16(PTR, VAL) \
|
|
*(PTR)++ = (VAL) / 256; \
|
|
*(PTR)++ = (VAL) % 256
|
|
|
|
/* Add a complete PPPoE header to the buffer pointed to by PTR */
|
|
#define PPPOE_ADD_HEADER(PTR, CODE, SESS, LEN) \
|
|
*(PTR)++ = PPPOE_VERTYPE; \
|
|
*(PTR)++ = (CODE); \
|
|
PPPOE_ADD_16(PTR, SESS); \
|
|
PPPOE_ADD_16(PTR, LEN)
|
|
|
|
#define PPPOE_DISC_TIMEOUT (hz*5) /* base for quick timeout calculation */
|
|
#define PPPOE_SLOW_RETRY (hz*60) /* persistent retry interval */
|
|
#define PPPOE_DISC_MAXPADI 4 /* retry PADI four times (quickly) */
|
|
#define PPPOE_DISC_MAXPADR 2 /* retry PADR twice */
|
|
|
|
struct pppoe_softc {
|
|
struct sppp sc_sppp; /* contains a struct ifnet as first element */
|
|
LIST_ENTRY(pppoe_softc) sc_list;
|
|
struct ifnet *sc_eth_if; /* ethernet interface we are using */
|
|
|
|
int sc_state; /* discovery phase or session connected */
|
|
struct ether_addr sc_dest; /* hardware address of concentrator */
|
|
u_int16_t sc_session; /* PPPoE session id */
|
|
|
|
char *sc_service_name; /* if != NULL: requested name of service */
|
|
char *sc_concentrator_name; /* if != NULL: requested concentrator id */
|
|
u_int8_t *sc_ac_cookie; /* content of AC cookie we must echo back */
|
|
size_t sc_ac_cookie_len; /* length of cookie data */
|
|
struct callout sc_timeout; /* timeout while not in session state */
|
|
int sc_padi_retried; /* number of PADI retries already done */
|
|
int sc_padr_retried; /* number of PADR retries already done */
|
|
};
|
|
|
|
/* incoming traffic will be queued here */
|
|
struct ifqueue ppoediscinq = { NULL };
|
|
struct ifqueue ppoeinq = { NULL };
|
|
|
|
#ifdef __HAVE_GENERIC_SOFT_INTERRUPTS
|
|
void * pppoe_softintr = NULL;
|
|
static void pppoe_softintr_handler(void *);
|
|
#else
|
|
struct callout pppoe_softintr = CALLOUT_INITIALIZER;
|
|
void pppoe_softintr_handler(void *);
|
|
#endif
|
|
|
|
extern int sppp_ioctl(struct ifnet *, unsigned long, void *);
|
|
|
|
/* input routines */
|
|
static void pppoe_input(void);
|
|
static void pppoe_disc_input(struct mbuf *);
|
|
static void pppoe_dispatch_disc_pkt(struct mbuf *, int);
|
|
static void pppoe_data_input(struct mbuf *);
|
|
|
|
/* management routines */
|
|
void pppoeattach(int);
|
|
static int pppoe_connect(struct pppoe_softc *);
|
|
static int pppoe_disconnect(struct pppoe_softc *);
|
|
static void pppoe_abort_connect(struct pppoe_softc *);
|
|
static int pppoe_ioctl(struct ifnet *, unsigned long, caddr_t);
|
|
static void pppoe_tls(struct sppp *);
|
|
static void pppoe_tlf(struct sppp *);
|
|
static void pppoe_start(struct ifnet *);
|
|
|
|
/* internal timeout handling */
|
|
static void pppoe_timeout(void *);
|
|
|
|
/* sending actual protocol controll packets */
|
|
static int pppoe_send_padi(struct pppoe_softc *);
|
|
static int pppoe_send_padr(struct pppoe_softc *);
|
|
static int pppoe_send_padt(struct pppoe_softc *);
|
|
|
|
/* raw output */
|
|
static int pppoe_output(struct pppoe_softc *, struct mbuf *);
|
|
|
|
/* internal helper functions */
|
|
static struct pppoe_softc * pppoe_find_softc_by_session(u_int, struct ifnet *);
|
|
static struct pppoe_softc * pppoe_find_softc_by_hunique(u_int8_t *, size_t, struct ifnet *);
|
|
static struct mbuf *pppoe_get_mbuf(size_t len);
|
|
|
|
LIST_HEAD(pppoe_softc_head, pppoe_softc) pppoe_softc_list;
|
|
|
|
int pppoe_clone_create __P((struct if_clone *, int));
|
|
void pppoe_clone_destroy __P((struct ifnet *));
|
|
|
|
struct if_clone pppoe_cloner =
|
|
IF_CLONE_INITIALIZER("pppoe", pppoe_clone_create, pppoe_clone_destroy);
|
|
|
|
/* ARGSUSED */
|
|
void
|
|
pppoeattach(count)
|
|
int count;
|
|
{
|
|
LIST_INIT(&pppoe_softc_list);
|
|
if_clone_attach(&pppoe_cloner);
|
|
|
|
ppoediscinq.ifq_maxlen = IFQ_MAXLEN;
|
|
ppoeinq.ifq_maxlen = IFQ_MAXLEN;
|
|
|
|
#ifdef __HAVE_GENERIC_SOFT_INTERRUPTS
|
|
pppoe_softintr = softintr_establish(IPL_SOFTNET, pppoe_softintr_handler, NULL);
|
|
#endif
|
|
}
|
|
|
|
int
|
|
pppoe_clone_create(ifc, unit)
|
|
struct if_clone *ifc;
|
|
int unit;
|
|
{
|
|
struct pppoe_softc *sc;
|
|
|
|
sc = malloc(sizeof(struct pppoe_softc), M_DEVBUF, M_WAITOK);
|
|
memset(sc, 0, sizeof(struct pppoe_softc));
|
|
|
|
sprintf(sc->sc_sppp.pp_if.if_xname, "pppoe%d", unit);
|
|
sc->sc_sppp.pp_if.if_softc = sc;
|
|
sc->sc_sppp.pp_if.if_mtu = PPPOE_MAXMTU;
|
|
sc->sc_sppp.pp_if.if_flags = IFF_SIMPLEX|IFF_POINTOPOINT|IFF_MULTICAST;
|
|
sc->sc_sppp.pp_if.if_type = IFT_PPP;
|
|
sc->sc_sppp.pp_if.if_hdrlen = sizeof(struct ether_header) + PPPOE_HEADERLEN;
|
|
sc->sc_sppp.pp_if.if_dlt = DLT_PPP_ETHER;
|
|
sc->sc_sppp.pp_flags |= PP_KEEPALIVE | /* use LCP keepalive */
|
|
PP_NOFRAMING; /* no serial encapsulation */
|
|
sc->sc_sppp.pp_if.if_ioctl = pppoe_ioctl;
|
|
IFQ_SET_MAXLEN(&sc->sc_sppp.pp_if.if_snd, IFQ_MAXLEN);
|
|
IFQ_SET_READY(&sc->sc_sppp.pp_if.if_snd);
|
|
|
|
/* changed to real address later */
|
|
memcpy(&sc->sc_dest, etherbroadcastaddr, sizeof(sc->sc_dest));
|
|
|
|
callout_init(&sc->sc_timeout);
|
|
|
|
sc->sc_sppp.pp_if.if_start = pppoe_start;
|
|
sc->sc_sppp.pp_tls = pppoe_tls;
|
|
sc->sc_sppp.pp_tlf = pppoe_tlf;
|
|
sc->sc_sppp.pp_framebytes = PPPOE_HEADERLEN; /* framing added to ppp packets */
|
|
|
|
if_attach(&sc->sc_sppp.pp_if);
|
|
sppp_attach(&sc->sc_sppp.pp_if);
|
|
|
|
#if NBPFILTER > 0
|
|
bpfattach(&sc->sc_sppp.pp_if, DLT_PPP_ETHER, 0);
|
|
#endif
|
|
LIST_INSERT_HEAD(&pppoe_softc_list, sc, sc_list);
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
pppoe_clone_destroy(ifp)
|
|
struct ifnet *ifp;
|
|
{
|
|
struct pppoe_softc * sc = ifp->if_softc;
|
|
|
|
LIST_REMOVE(sc, sc_list);
|
|
#if NBPFILTER > 0
|
|
bpfdetach(ifp);
|
|
#endif
|
|
sppp_detach(&sc->sc_sppp.pp_if);
|
|
if_detach(ifp);
|
|
if (sc->sc_concentrator_name)
|
|
free(sc->sc_concentrator_name, M_DEVBUF);
|
|
if (sc->sc_service_name)
|
|
free(sc->sc_service_name, M_DEVBUF);
|
|
if (sc->sc_ac_cookie)
|
|
free(sc->sc_ac_cookie, M_DEVBUF);
|
|
free(sc, M_DEVBUF);
|
|
}
|
|
|
|
/*
|
|
* Find the interface handling the specified session.
|
|
* Note: O(number of sessions open), this is a client-side only, mean
|
|
* and lean implementation, so number of open sessions typically should
|
|
* be 1.
|
|
*/
|
|
static struct pppoe_softc *
|
|
pppoe_find_softc_by_session(u_int session, struct ifnet *rcvif)
|
|
{
|
|
struct pppoe_softc *sc;
|
|
|
|
if (session == 0)
|
|
return NULL;
|
|
|
|
LIST_FOREACH(sc, &pppoe_softc_list, sc_list) {
|
|
if (sc->sc_state == PPPOE_STATE_SESSION
|
|
&& sc->sc_session == session) {
|
|
if (sc->sc_eth_if == rcvif)
|
|
return sc;
|
|
else
|
|
return NULL;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* Check host unique token passed and return appropriate softc pointer,
|
|
* or NULL if token is bogus. */
|
|
static struct pppoe_softc *
|
|
pppoe_find_softc_by_hunique(u_int8_t *token, size_t len, struct ifnet *rcvif)
|
|
{
|
|
struct pppoe_softc *sc, *t;
|
|
|
|
if (LIST_EMPTY(&pppoe_softc_list))
|
|
return NULL;
|
|
|
|
if (len != sizeof sc)
|
|
return NULL;
|
|
memcpy(&t, token, len);
|
|
|
|
LIST_FOREACH(sc, &pppoe_softc_list, sc_list)
|
|
if (sc == t) break;
|
|
|
|
if (sc != t) {
|
|
#ifdef PPPOE_DEBUG
|
|
printf("pppoe: alien host unique tag, no session found\n");
|
|
#endif
|
|
return NULL;
|
|
}
|
|
|
|
/* should be safe to access *sc now */
|
|
if (sc->sc_state < PPPOE_STATE_PADI_SENT || sc->sc_state >= PPPOE_STATE_SESSION) {
|
|
printf("%s: host unique tag found, but it belongs to a connection in state %d\n",
|
|
sc->sc_sppp.pp_if.if_xname, sc->sc_state);
|
|
return NULL;
|
|
}
|
|
if (sc->sc_eth_if != rcvif) {
|
|
printf("%s: wrong interface, not accepting host unique\n",
|
|
sc->sc_sppp.pp_if.if_xname);
|
|
return NULL;
|
|
}
|
|
return sc;
|
|
}
|
|
|
|
#ifdef __HAVE_GENERIC_SOFT_INTERRUPTS
|
|
static void pppoe_softintr_handler(void *dummy)
|
|
{
|
|
/* called at splsoftnet() */
|
|
pppoe_input();
|
|
}
|
|
#else
|
|
void pppoe_softintr_handler(void *dummy)
|
|
{
|
|
int s = splnet();
|
|
pppoe_input();
|
|
callout_deactivate(&pppoe_softintr);
|
|
splx(s);
|
|
}
|
|
#endif
|
|
|
|
/* called at appropriate protection level */
|
|
static void
|
|
pppoe_input()
|
|
{
|
|
struct mbuf *m;
|
|
int s, disc_done, data_done;
|
|
|
|
do {
|
|
disc_done = 0;
|
|
data_done = 0;
|
|
for (;;) {
|
|
s = splnet();
|
|
IF_DEQUEUE(&ppoediscinq, m);
|
|
splx(s);
|
|
if (m == NULL) break;
|
|
disc_done = 1;
|
|
pppoe_disc_input(m);
|
|
}
|
|
|
|
for (;;) {
|
|
s = splnet();
|
|
IF_DEQUEUE(&ppoeinq, m);
|
|
splx(s);
|
|
if (m == NULL) break;
|
|
data_done = 1;
|
|
pppoe_data_input(m);
|
|
}
|
|
} while (disc_done || data_done);
|
|
}
|
|
|
|
/* analyze and handle a single received packet while not in session state */
|
|
static void pppoe_dispatch_disc_pkt(struct mbuf *m, int off)
|
|
{
|
|
u_int16_t tag, len;
|
|
u_int16_t session, plen;
|
|
struct pppoe_softc *sc;
|
|
const char *err_msg = NULL;
|
|
u_int8_t *ac_cookie;
|
|
size_t ac_cookie_len;
|
|
struct pppoehdr *ph;
|
|
struct pppoetag *pt;
|
|
struct mbuf *n;
|
|
int noff;
|
|
struct ether_header *eh;
|
|
|
|
if (m->m_len < sizeof(*eh)) {
|
|
m = m_pullup(m, sizeof(*eh));
|
|
if (!m)
|
|
goto done;
|
|
}
|
|
eh = mtod(m, struct ether_header *);
|
|
off += sizeof(*eh);
|
|
|
|
ac_cookie = NULL;
|
|
ac_cookie_len = 0;
|
|
session = 0;
|
|
if (m->m_pkthdr.len - off <= PPPOE_HEADERLEN) {
|
|
printf("pppoe: packet too short: %d\n", m->m_pkthdr.len);
|
|
goto done;
|
|
}
|
|
|
|
n = m_pulldown(m, off, sizeof(*ph), &noff);
|
|
if (!n) {
|
|
printf("pppoe: could not get PPPoE header\n");
|
|
m = NULL;
|
|
goto done;
|
|
}
|
|
ph = (struct pppoehdr *)(mtod(n, caddr_t) + noff);
|
|
if (ph->vertype != PPPOE_VERTYPE) {
|
|
printf("pppoe: unknown version/type packet: 0x%x\n",
|
|
ph->vertype);
|
|
goto done;
|
|
}
|
|
session = ntohs(ph->session);
|
|
plen = ntohs(ph->plen);
|
|
off += sizeof(*ph);
|
|
|
|
if (plen + off > m->m_pkthdr.len) {
|
|
printf("pppoe: packet content does not fit: data available = %d, packet size = %u\n",
|
|
m->m_pkthdr.len - off, plen);
|
|
goto done;
|
|
}
|
|
m_adj(m, off + plen - m->m_pkthdr.len); /* ignore trailing garbage */
|
|
tag = 0;
|
|
len = 0;
|
|
sc = NULL;
|
|
while (off + sizeof(*pt) <= m->m_pkthdr.len) {
|
|
n = m_pulldown(m, off, sizeof(*pt), &noff);
|
|
if (!n) {
|
|
printf("%s: parse error\n",
|
|
sc ? sc->sc_sppp.pp_if.if_xname : "pppoe");
|
|
m = NULL;
|
|
goto done;
|
|
}
|
|
pt = (struct pppoetag *)(mtod(n, caddr_t) + noff);
|
|
tag = ntohs(pt->tag);
|
|
len = ntohs(pt->len);
|
|
if (off + len > m->m_pkthdr.len) {
|
|
printf("pppoe: tag 0x%x len 0x%x is too long\n",
|
|
tag, len);
|
|
goto done;
|
|
}
|
|
switch (tag) {
|
|
case PPPOE_TAG_EOL:
|
|
goto breakbreak;
|
|
case PPPOE_TAG_SNAME:
|
|
break; /* ignored */
|
|
case PPPOE_TAG_ACNAME:
|
|
break; /* ignored */
|
|
case PPPOE_TAG_HUNIQUE:
|
|
if (sc != NULL)
|
|
break;
|
|
n = m_pulldown(m, off + sizeof(*pt), len, &noff);
|
|
if (!n) {
|
|
err_msg = "TAG HUNIQUE ERROR";
|
|
m = NULL;
|
|
goto done;
|
|
}
|
|
sc = pppoe_find_softc_by_hunique(mtod(n, caddr_t) + noff,
|
|
len, m->m_pkthdr.rcvif);
|
|
break;
|
|
case PPPOE_TAG_ACCOOKIE:
|
|
if (ac_cookie == NULL) {
|
|
n = m_pulldown(m, off + sizeof(*pt), len,
|
|
&noff);
|
|
if (!n) {
|
|
err_msg = "TAG ACCOOKIE ERROR";
|
|
m = NULL;
|
|
break;
|
|
}
|
|
ac_cookie = mtod(n, caddr_t) + noff;
|
|
ac_cookie_len = len;
|
|
}
|
|
break;
|
|
case PPPOE_TAG_SNAME_ERR:
|
|
err_msg = "SERVICE NAME ERROR";
|
|
break;
|
|
case PPPOE_TAG_ACSYS_ERR:
|
|
err_msg = "AC SYSTEM ERROR";
|
|
break;
|
|
case PPPOE_TAG_GENERIC_ERR:
|
|
err_msg = "GENERIC ERROR";
|
|
break;
|
|
}
|
|
if (err_msg) {
|
|
printf("%s: %s\n",
|
|
sc ? sc->sc_sppp.pp_if.if_xname : "pppoe",
|
|
err_msg);
|
|
goto done;
|
|
}
|
|
off += sizeof(*pt) + len;
|
|
}
|
|
breakbreak:;
|
|
switch (ph->code) {
|
|
case PPPOE_CODE_PADI:
|
|
case PPPOE_CODE_PADR:
|
|
/* ignore, we are no access concentrator */
|
|
goto done;
|
|
case PPPOE_CODE_PADO:
|
|
if (sc == NULL) {
|
|
/* be quiet if there is not a single pppoe instance */
|
|
if (!LIST_EMPTY(&pppoe_softc_list))
|
|
printf("pppoe: received PADO but could not find request for it\n");
|
|
goto done;
|
|
}
|
|
if (sc->sc_state != PPPOE_STATE_PADI_SENT) {
|
|
printf("%s: received unexpected PADO\n",
|
|
sc->sc_sppp.pp_if.if_xname);
|
|
goto done;
|
|
}
|
|
if (ac_cookie) {
|
|
if (sc->sc_ac_cookie)
|
|
free(sc->sc_ac_cookie, M_DEVBUF);
|
|
sc->sc_ac_cookie = malloc(ac_cookie_len, M_DEVBUF,
|
|
M_DONTWAIT);
|
|
if (sc->sc_ac_cookie == NULL)
|
|
goto done;
|
|
sc->sc_ac_cookie_len = ac_cookie_len;
|
|
memcpy(sc->sc_ac_cookie, ac_cookie, ac_cookie_len);
|
|
}
|
|
memcpy(&sc->sc_dest, eh->ether_shost, sizeof sc->sc_dest);
|
|
callout_stop(&sc->sc_timeout);
|
|
sc->sc_padr_retried = 0;
|
|
sc->sc_state = PPPOE_STATE_PADR_SENT;
|
|
if (pppoe_send_padr(sc) == 0)
|
|
callout_reset(&sc->sc_timeout,
|
|
PPPOE_DISC_TIMEOUT * (1 + sc->sc_padr_retried),
|
|
pppoe_timeout, sc);
|
|
else
|
|
pppoe_abort_connect(sc);
|
|
break;
|
|
case PPPOE_CODE_PADS:
|
|
if (sc == NULL)
|
|
goto done;
|
|
sc->sc_session = session;
|
|
callout_stop(&sc->sc_timeout);
|
|
if (sc->sc_sppp.pp_if.if_flags & IFF_DEBUG)
|
|
printf("%s: session 0x%x connected\n",
|
|
sc->sc_sppp.pp_if.if_xname, session);
|
|
sc->sc_state = PPPOE_STATE_SESSION;
|
|
sc->sc_sppp.pp_up(&sc->sc_sppp); /* notify upper layers */
|
|
break;
|
|
case PPPOE_CODE_PADT:
|
|
if (sc == NULL)
|
|
goto done;
|
|
/* stop timer (we might be about to transmit a PADT ourself) */
|
|
callout_stop(&sc->sc_timeout);
|
|
if (sc->sc_sppp.pp_if.if_flags & IFF_DEBUG)
|
|
printf("%s: session 0x%x terminated, received PADT\n",
|
|
sc->sc_sppp.pp_if.if_xname, session);
|
|
/* clean up softc */
|
|
sc->sc_state = PPPOE_STATE_INITIAL;
|
|
memcpy(&sc->sc_dest, etherbroadcastaddr, sizeof(sc->sc_dest));
|
|
if (sc->sc_ac_cookie) {
|
|
free(sc->sc_ac_cookie, M_DEVBUF);
|
|
sc->sc_ac_cookie = NULL;
|
|
}
|
|
sc->sc_ac_cookie_len = 0;
|
|
sc->sc_session = 0;
|
|
/* signal upper layer */
|
|
sc->sc_sppp.pp_down(&sc->sc_sppp);
|
|
break;
|
|
default:
|
|
printf("%s: unknown code (0x%04x) session = 0x%04x\n",
|
|
sc? sc->sc_sppp.pp_if.if_xname : "pppoe",
|
|
ph->code, session);
|
|
break;
|
|
}
|
|
|
|
done:
|
|
m_freem(m);
|
|
return;
|
|
}
|
|
|
|
static void
|
|
pppoe_disc_input(struct mbuf *m)
|
|
{
|
|
|
|
/* avoid error messages if there is not a single pppoe instance */
|
|
if (!LIST_EMPTY(&pppoe_softc_list)) {
|
|
KASSERT(m->m_flags & M_PKTHDR);
|
|
pppoe_dispatch_disc_pkt(m, 0);
|
|
} else
|
|
m_freem(m);
|
|
}
|
|
|
|
static void
|
|
pppoe_data_input(struct mbuf *m)
|
|
{
|
|
u_int16_t session, plen;
|
|
struct pppoe_softc *sc;
|
|
struct pppoehdr *ph;
|
|
#ifdef PPPOE_TERM_UNKNOWN_SESSIONS
|
|
u_int8_t shost[ETHER_ADDR_LEN];
|
|
#endif
|
|
|
|
KASSERT(m->m_flags & M_PKTHDR);
|
|
|
|
#ifdef PPPOE_TERM_UNKNOWN_SESSIONS
|
|
memcpy(shost, mtod(m, struct ether_header*)->ether_shost, ETHER_ADDR_LEN);
|
|
#endif
|
|
m_adj(m, sizeof(struct ether_header));
|
|
if (m->m_pkthdr.len <= PPPOE_HEADERLEN) {
|
|
printf("pppoe (data): dropping too short packet: %d bytes\n",
|
|
m->m_pkthdr.len);
|
|
goto drop;
|
|
}
|
|
|
|
if (m->m_len < sizeof(*ph)) {
|
|
m = m_pullup(m, sizeof(*ph));
|
|
if (!m) {
|
|
printf("pppoe: could not get PPPoE header\n");
|
|
return;
|
|
}
|
|
}
|
|
ph = mtod(m, struct pppoehdr *);
|
|
|
|
if (ph->vertype != PPPOE_VERTYPE) {
|
|
printf("pppoe (data): unknown version/type packet: 0x%x\n",
|
|
ph->vertype);
|
|
goto drop;
|
|
}
|
|
if (ph->code != 0)
|
|
goto drop;
|
|
|
|
session = ntohs(ph->session);
|
|
sc = pppoe_find_softc_by_session(session, m->m_pkthdr.rcvif);
|
|
if (sc == NULL) {
|
|
#ifdef PPPOE_TERM_UNKNOWN_SESSIONS
|
|
struct mbuf *m0;
|
|
struct sockaddr dst;
|
|
struct ether_header *eh;
|
|
u_int8_t *p;
|
|
|
|
printf("pppoe: input for unknown session 0x%x, sending PADT\n",
|
|
session);
|
|
|
|
m0 = pppoe_get_mbuf(PPPOE_HEADERLEN);
|
|
if (!m0)
|
|
goto drop;
|
|
p = mtod(m0, u_int8_t *);
|
|
PPPOE_ADD_HEADER(p, PPPOE_CODE_PADT, session, 0);
|
|
|
|
memset(&dst, 0, sizeof dst);
|
|
dst.sa_family = AF_UNSPEC;
|
|
eh = (struct ether_header*)&dst.sa_data;
|
|
eh->ether_type = htons(ETHERTYPE_PPPOE);
|
|
memcpy(&eh->ether_dhost, shost, ETHER_ADDR_LEN);
|
|
|
|
m0->m_flags &= ~(M_BCAST|M_MCAST);
|
|
m->m_pkthdr.rcvif->if_output(m->m_pkthdr.rcvif, m0, &dst, NULL);
|
|
#endif
|
|
goto drop;
|
|
}
|
|
|
|
plen = ntohs(ph->plen);
|
|
|
|
#if NBPFILTER > 0
|
|
if(sc->sc_sppp.pp_if.if_bpf)
|
|
bpf_mtap(sc->sc_sppp.pp_if.if_bpf, m);
|
|
#endif
|
|
|
|
m_adj(m, PPPOE_HEADERLEN);
|
|
|
|
#ifdef PPPOE_DEBUG
|
|
{
|
|
struct mbuf *p;
|
|
|
|
printf("%s: pkthdr.len=%d, pppoe.len=%d",
|
|
sc->sc_sppp.pp_if.if_xname,
|
|
m->m_pkthdr.len, plen);
|
|
p = m;
|
|
while (p) {
|
|
printf(" l=%d", p->m_len);
|
|
p = p->m_next;
|
|
}
|
|
printf("\n");
|
|
}
|
|
#endif
|
|
|
|
if (m->m_pkthdr.len < plen)
|
|
goto drop;
|
|
|
|
/* fix incoming interface pointer (not the raw ethernet interface anymore) */
|
|
m->m_pkthdr.rcvif = &sc->sc_sppp.pp_if;
|
|
|
|
/* pass packet up and account for it */
|
|
sc->sc_sppp.pp_if.if_ipackets++;
|
|
sppp_input(&sc->sc_sppp.pp_if, m);
|
|
return;
|
|
|
|
drop:
|
|
m_freem(m);
|
|
}
|
|
|
|
static int
|
|
pppoe_output(struct pppoe_softc *sc, struct mbuf *m)
|
|
{
|
|
struct sockaddr dst;
|
|
struct ether_header *eh;
|
|
u_int16_t etype;
|
|
|
|
if (sc->sc_eth_if == NULL)
|
|
return EIO;
|
|
|
|
memset(&dst, 0, sizeof dst);
|
|
dst.sa_family = AF_UNSPEC;
|
|
eh = (struct ether_header*)&dst.sa_data;
|
|
etype = sc->sc_state == PPPOE_STATE_SESSION ? ETHERTYPE_PPPOE : ETHERTYPE_PPPOEDISC;
|
|
eh->ether_type = htons(etype);
|
|
memcpy(&eh->ether_dhost, &sc->sc_dest, sizeof sc->sc_dest);
|
|
|
|
#ifdef PPPOE_DEBUG
|
|
printf("%s (%x) state=%d, session=0x%x output -> %s, len=%d\n",
|
|
sc->sc_sppp.pp_if.if_xname, etype,
|
|
sc->sc_state, sc->sc_session,
|
|
ether_sprintf((const unsigned char *)&sc->sc_dest), m->m_pkthdr.len);
|
|
#endif
|
|
|
|
m->m_flags &= ~(M_BCAST|M_MCAST);
|
|
sc->sc_sppp.pp_if.if_opackets++;
|
|
return sc->sc_eth_if->if_output(sc->sc_eth_if, m, &dst, NULL);
|
|
}
|
|
|
|
static int
|
|
pppoe_ioctl(struct ifnet *ifp, unsigned long cmd, caddr_t data)
|
|
{
|
|
struct proc *p = curproc; /* XXX */
|
|
struct pppoe_softc *sc = (struct pppoe_softc*)ifp;
|
|
int error = 0;
|
|
|
|
switch (cmd) {
|
|
case PPPOESETPARMS:
|
|
{
|
|
struct pppoediscparms *parms = (struct pppoediscparms*)data;
|
|
if ((error = suser(p->p_ucred, &p->p_acflag)) != 0)
|
|
return error;
|
|
if (parms->eth_ifname[0] != 0) {
|
|
sc->sc_eth_if = ifunit(parms->eth_ifname);
|
|
if (sc->sc_eth_if == NULL)
|
|
return ENXIO;
|
|
}
|
|
if (parms->ac_name) {
|
|
size_t s;
|
|
char * p = malloc(parms->ac_name_len + 1, M_DEVBUF, M_WAITOK);
|
|
copyinstr(parms->ac_name, p, parms->ac_name_len, &s);
|
|
if (sc->sc_concentrator_name)
|
|
free(sc->sc_concentrator_name, M_DEVBUF);
|
|
sc->sc_concentrator_name = p;
|
|
}
|
|
if (parms->service_name) {
|
|
size_t s;
|
|
char * p = malloc(parms->service_name_len + 1, M_DEVBUF, M_WAITOK);
|
|
copyinstr(parms->service_name, p, parms->service_name_len, &s);
|
|
if (sc->sc_service_name)
|
|
free(sc->sc_service_name, M_DEVBUF);
|
|
sc->sc_service_name = p;
|
|
}
|
|
return 0;
|
|
}
|
|
break;
|
|
case PPPOEGETPARMS:
|
|
{
|
|
struct pppoediscparms *parms = (struct pppoediscparms*)data;
|
|
memset(parms, 0, sizeof *parms);
|
|
if (sc->sc_eth_if)
|
|
strncpy(parms->ifname, sc->sc_eth_if->if_xname, IFNAMSIZ);
|
|
return 0;
|
|
}
|
|
break;
|
|
case PPPOEGETSESSION:
|
|
{
|
|
struct pppoeconnectionstate *state = (struct pppoeconnectionstate*)data;
|
|
state->state = sc->sc_state;
|
|
state->session_id = sc->sc_session;
|
|
state->padi_retry_no = sc->sc_padi_retried;
|
|
state->padr_retry_no = sc->sc_padr_retried;
|
|
return 0;
|
|
}
|
|
break;
|
|
case SIOCSIFFLAGS:
|
|
{
|
|
struct ifreq *ifr = (struct ifreq*) data;
|
|
/*
|
|
* Prevent running re-establishment timers overriding
|
|
* administrators choice.
|
|
*/
|
|
if ((ifr->ifr_flags & IFF_UP) == 0
|
|
&& sc->sc_state >= PPPOE_STATE_PADI_SENT
|
|
&& sc->sc_state < PPPOE_STATE_SESSION) {
|
|
callout_stop(&sc->sc_timeout);
|
|
sc->sc_state = PPPOE_STATE_INITIAL;
|
|
sc->sc_padi_retried = 0;
|
|
sc->sc_padr_retried = 0;
|
|
memcpy(&sc->sc_dest, etherbroadcastaddr,
|
|
sizeof(sc->sc_dest));
|
|
}
|
|
return sppp_ioctl(ifp, cmd, data);
|
|
}
|
|
case SIOCSIFMTU:
|
|
{
|
|
struct ifreq *ifr = (struct ifreq*) data;
|
|
|
|
if (ifr->ifr_mtu > PPPOE_MAXMTU)
|
|
return EINVAL;
|
|
return sppp_ioctl(ifp, cmd, data);
|
|
}
|
|
default:
|
|
return sppp_ioctl(ifp, cmd, data);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Allocate a mbuf/cluster with space to store the given data length
|
|
* of payload, leaving space for prepending an ethernet header
|
|
* in front.
|
|
*/
|
|
static struct mbuf *
|
|
pppoe_get_mbuf(size_t len)
|
|
{
|
|
struct mbuf *m;
|
|
|
|
MGETHDR(m, M_DONTWAIT, MT_DATA);
|
|
if (m == NULL)
|
|
return NULL;
|
|
if (len + sizeof(struct ether_header) > MHLEN) {
|
|
MCLGET(m, M_DONTWAIT);
|
|
if ((m->m_flags & M_EXT) == 0) {
|
|
struct mbuf *n;
|
|
MFREE(m, n);
|
|
return 0;
|
|
}
|
|
}
|
|
m->m_data += sizeof(struct ether_header);
|
|
m->m_len = len;
|
|
m->m_pkthdr.len = len;
|
|
m->m_pkthdr.rcvif = NULL;
|
|
|
|
return m;
|
|
}
|
|
|
|
static int
|
|
pppoe_send_padi(struct pppoe_softc *sc)
|
|
{
|
|
struct mbuf *m0;
|
|
int len, l1, l2;
|
|
u_int8_t *p;
|
|
|
|
if (sc->sc_state >PPPOE_STATE_PADI_SENT)
|
|
panic("pppoe_send_padi in state %d", sc->sc_state);
|
|
|
|
/* calculate length of frame (excluding ethernet header + pppoe header) */
|
|
len = 2 + 2 + 2 + 2 + sizeof sc; /* service name tag is required, host unique is send too */
|
|
if (sc->sc_service_name != NULL) {
|
|
l1 = strlen(sc->sc_service_name);
|
|
len += l1;
|
|
}
|
|
if (sc->sc_concentrator_name != NULL) {
|
|
l2 = strlen(sc->sc_concentrator_name);
|
|
len += 2 + 2 + l2;
|
|
}
|
|
|
|
/* allocate a buffer */
|
|
m0 = pppoe_get_mbuf(len + PPPOE_HEADERLEN); /* header len + payload len */
|
|
if (!m0)
|
|
return ENOBUFS;
|
|
|
|
/* fill in pkt */
|
|
p = mtod(m0, u_int8_t *);
|
|
PPPOE_ADD_HEADER(p, PPPOE_CODE_PADI, 0, len);
|
|
PPPOE_ADD_16(p, PPPOE_TAG_SNAME);
|
|
if (sc->sc_service_name != NULL) {
|
|
PPPOE_ADD_16(p, l1);
|
|
memcpy(p, sc->sc_service_name, l1);
|
|
p += l1;
|
|
} else {
|
|
PPPOE_ADD_16(p, 0);
|
|
}
|
|
if (sc->sc_concentrator_name != NULL) {
|
|
PPPOE_ADD_16(p, PPPOE_TAG_ACNAME);
|
|
PPPOE_ADD_16(p, l2);
|
|
memcpy(p, sc->sc_concentrator_name, l2);
|
|
p += l2;
|
|
}
|
|
PPPOE_ADD_16(p, PPPOE_TAG_HUNIQUE);
|
|
PPPOE_ADD_16(p, sizeof(sc));
|
|
memcpy(p, &sc, sizeof sc);
|
|
|
|
#ifdef PPPOE_DEBUG
|
|
p += sizeof sc;
|
|
if (p - mtod(m0, u_int8_t *) != len + PPPOE_HEADERLEN)
|
|
panic("pppoe_send_padi: garbled output len, should be %ld, is %ld",
|
|
(long)(len + PPPOE_HEADERLEN), (long)(p - mtod(m0, u_int8_t *)));
|
|
#endif
|
|
|
|
/* send pkt */
|
|
return pppoe_output(sc, m0);
|
|
}
|
|
|
|
static void
|
|
pppoe_timeout(void *arg)
|
|
{
|
|
int x, retry_wait;
|
|
struct pppoe_softc *sc = (struct pppoe_softc*)arg;
|
|
|
|
#ifdef PPPOE_DEBUG
|
|
printf("%s: timeout\n", sc->sc_sppp.pp_if.if_xname);
|
|
#endif
|
|
|
|
switch (sc->sc_state) {
|
|
case PPPOE_STATE_PADI_SENT:
|
|
/*
|
|
* We have two basic ways of retrying:
|
|
* - Quick retry mode: try a few times in short sequence
|
|
* - Slow retry mode: we already had a connection successfully
|
|
* established and will try infinitely (without user
|
|
* intervention)
|
|
* We only enter slow retry mode if IFF_LINK1 (aka autodial)
|
|
* is not set.
|
|
*/
|
|
|
|
/* initialize for quick retry mode */
|
|
retry_wait = PPPOE_DISC_TIMEOUT * (1 + sc->sc_padi_retried);
|
|
|
|
x = splnet();
|
|
sc->sc_padi_retried++;
|
|
if (sc->sc_padi_retried >= PPPOE_DISC_MAXPADI) {
|
|
if ((sc->sc_sppp.pp_if.if_flags & IFF_LINK1) == 0) {
|
|
/* slow retry mode */
|
|
retry_wait = PPPOE_SLOW_RETRY;
|
|
} else {
|
|
pppoe_abort_connect(sc);
|
|
splx(x);
|
|
return;
|
|
}
|
|
}
|
|
if (pppoe_send_padi(sc) == 0)
|
|
callout_reset(&sc->sc_timeout, retry_wait,
|
|
pppoe_timeout, sc);
|
|
else
|
|
pppoe_abort_connect(sc);
|
|
splx(x);
|
|
break;
|
|
|
|
case PPPOE_STATE_PADR_SENT:
|
|
x = splnet();
|
|
sc->sc_padr_retried++;
|
|
if (sc->sc_padr_retried >= PPPOE_DISC_MAXPADR) {
|
|
memcpy(&sc->sc_dest, etherbroadcastaddr,
|
|
sizeof(sc->sc_dest));
|
|
sc->sc_state = PPPOE_STATE_PADI_SENT;
|
|
sc->sc_padr_retried = 0;
|
|
if (pppoe_send_padi(sc) == 0)
|
|
callout_reset(&sc->sc_timeout,
|
|
PPPOE_DISC_TIMEOUT * (1 + sc->sc_padi_retried),
|
|
pppoe_timeout, sc);
|
|
else
|
|
pppoe_abort_connect(sc);
|
|
splx(x);
|
|
return;
|
|
}
|
|
if (pppoe_send_padr(sc) == 0)
|
|
callout_reset(&sc->sc_timeout,
|
|
PPPOE_DISC_TIMEOUT * (1 + sc->sc_padr_retried),
|
|
pppoe_timeout, sc);
|
|
else
|
|
pppoe_abort_connect(sc);
|
|
splx(x);
|
|
break;
|
|
case PPPOE_STATE_CLOSING:
|
|
pppoe_disconnect(sc);
|
|
break;
|
|
default:
|
|
return; /* all done, work in peace */
|
|
}
|
|
}
|
|
|
|
/* Start a connection (i.e. initiate discovery phase) */
|
|
static int
|
|
pppoe_connect(struct pppoe_softc *sc)
|
|
{
|
|
int x, err;
|
|
|
|
if (sc->sc_state != PPPOE_STATE_INITIAL)
|
|
return EBUSY;
|
|
|
|
x = splnet();
|
|
sc->sc_state = PPPOE_STATE_PADI_SENT;
|
|
sc->sc_padr_retried = 0;
|
|
err = pppoe_send_padi(sc);
|
|
if (err == 0)
|
|
callout_reset(&sc->sc_timeout, PPPOE_DISC_TIMEOUT,
|
|
pppoe_timeout, sc);
|
|
else
|
|
pppoe_abort_connect(sc);
|
|
splx(x);
|
|
return err;
|
|
}
|
|
|
|
/* disconnect */
|
|
static int
|
|
pppoe_disconnect(struct pppoe_softc *sc)
|
|
{
|
|
int err, x;
|
|
|
|
x = splnet();
|
|
|
|
if (sc->sc_state < PPPOE_STATE_SESSION)
|
|
err = EBUSY;
|
|
else {
|
|
if (sc->sc_sppp.pp_if.if_flags & IFF_DEBUG)
|
|
printf("%s: disconnecting\n",
|
|
sc->sc_sppp.pp_if.if_xname);
|
|
err = pppoe_send_padt(sc);
|
|
}
|
|
|
|
/* cleanup softc */
|
|
sc->sc_state = PPPOE_STATE_INITIAL;
|
|
memcpy(&sc->sc_dest, etherbroadcastaddr, sizeof(sc->sc_dest));
|
|
if (sc->sc_ac_cookie) {
|
|
free(sc->sc_ac_cookie, M_DEVBUF);
|
|
sc->sc_ac_cookie = NULL;
|
|
}
|
|
sc->sc_ac_cookie_len = 0;
|
|
sc->sc_session = 0;
|
|
|
|
/* notify upper layer */
|
|
sc->sc_sppp.pp_down(&sc->sc_sppp);
|
|
|
|
splx(x);
|
|
|
|
return err;
|
|
}
|
|
|
|
/* Connection attempt aborted */
|
|
static void
|
|
pppoe_abort_connect(struct pppoe_softc *sc)
|
|
{
|
|
printf("%s: could not establish connection\n",
|
|
sc->sc_sppp.pp_if.if_xname);
|
|
sc->sc_state = PPPOE_STATE_INITIAL;
|
|
memcpy(&sc->sc_dest, etherbroadcastaddr, sizeof(sc->sc_dest));
|
|
|
|
/* notify upper layer */
|
|
sc->sc_sppp.pp_down(&sc->sc_sppp);
|
|
}
|
|
|
|
/* Send a PADR packet */
|
|
static int
|
|
pppoe_send_padr(struct pppoe_softc *sc)
|
|
{
|
|
struct mbuf *m0;
|
|
u_int8_t *p;
|
|
size_t len, l1;
|
|
|
|
if (sc->sc_state != PPPOE_STATE_PADR_SENT)
|
|
return EIO;
|
|
|
|
len = 2 + 2 + 2 + 2 + sizeof(sc); /* service name, host unique */
|
|
if (sc->sc_service_name != NULL) { /* service name tag maybe empty */
|
|
l1 = strlen(sc->sc_service_name);
|
|
len += l1;
|
|
}
|
|
if (sc->sc_ac_cookie_len > 0)
|
|
len += 2 + 2 + sc->sc_ac_cookie_len; /* AC cookie */
|
|
m0 = pppoe_get_mbuf(len + PPPOE_HEADERLEN);
|
|
if (!m0)
|
|
return ENOBUFS;
|
|
p = mtod(m0, u_int8_t *);
|
|
PPPOE_ADD_HEADER(p, PPPOE_CODE_PADR, 0, len);
|
|
PPPOE_ADD_16(p, PPPOE_TAG_SNAME);
|
|
if (sc->sc_service_name != NULL) {
|
|
PPPOE_ADD_16(p, l1);
|
|
memcpy(p, sc->sc_service_name, l1);
|
|
p += l1;
|
|
} else {
|
|
PPPOE_ADD_16(p, 0);
|
|
}
|
|
if (sc->sc_ac_cookie_len > 0) {
|
|
PPPOE_ADD_16(p, PPPOE_TAG_ACCOOKIE);
|
|
PPPOE_ADD_16(p, sc->sc_ac_cookie_len);
|
|
memcpy(p, sc->sc_ac_cookie, sc->sc_ac_cookie_len);
|
|
p += sc->sc_ac_cookie_len;
|
|
}
|
|
PPPOE_ADD_16(p, PPPOE_TAG_HUNIQUE);
|
|
PPPOE_ADD_16(p, sizeof(sc));
|
|
memcpy(p, &sc, sizeof sc);
|
|
|
|
#ifdef PPPOE_DEBUG
|
|
p += sizeof sc;
|
|
if (p - mtod(m0, u_int8_t *) != len + PPPOE_HEADERLEN)
|
|
panic("pppoe_send_padr: garbled output len, should be %ld, is %ld",
|
|
(long)(len + PPPOE_HEADERLEN), (long)(p - mtod(m0, u_int8_t *)));
|
|
#endif
|
|
|
|
return pppoe_output(sc, m0);
|
|
}
|
|
|
|
/* send a PADT packet */
|
|
static int
|
|
pppoe_send_padt(struct pppoe_softc *sc)
|
|
{
|
|
struct mbuf *m0;
|
|
u_int8_t *p;
|
|
|
|
if (sc->sc_state < PPPOE_STATE_SESSION)
|
|
return EIO;
|
|
|
|
#ifdef PPPOE_DEBUG
|
|
printf("%s: sending PADT\n", sc->sc_sppp.pp_if.if_xname);
|
|
#endif
|
|
m0 = pppoe_get_mbuf(PPPOE_HEADERLEN);
|
|
if (!m0)
|
|
return ENOBUFS;
|
|
p = mtod(m0, u_int8_t *);
|
|
PPPOE_ADD_HEADER(p, PPPOE_CODE_PADT, sc->sc_session, 0);
|
|
return pppoe_output(sc, m0);
|
|
}
|
|
|
|
static void
|
|
pppoe_tls(struct sppp *sp)
|
|
{
|
|
struct pppoe_softc *sc = (void *)sp;
|
|
if (sc->sc_state != PPPOE_STATE_INITIAL)
|
|
return;
|
|
pppoe_connect(sc);
|
|
}
|
|
|
|
static void
|
|
pppoe_tlf(struct sppp *sp)
|
|
{
|
|
struct pppoe_softc *sc = (void *)sp;
|
|
if (sc->sc_state < PPPOE_STATE_SESSION)
|
|
return;
|
|
/*
|
|
* Do not call pppoe_disconnect here, the upper layer state
|
|
* machine gets confused by this. We must return from this
|
|
* function and defer disconnecting to the timeout handler.
|
|
*/
|
|
sc->sc_state = PPPOE_STATE_CLOSING;
|
|
callout_reset(&sc->sc_timeout, hz/50, pppoe_timeout, sc);
|
|
}
|
|
|
|
static void
|
|
pppoe_start(struct ifnet *ifp)
|
|
{
|
|
struct pppoe_softc *sc = (void *)ifp;
|
|
struct mbuf *m;
|
|
u_int8_t *p;
|
|
size_t len;
|
|
|
|
if (sppp_isempty(ifp))
|
|
return;
|
|
|
|
/* are we ready to proccess data yet? */
|
|
if (sc->sc_state < PPPOE_STATE_SESSION) {
|
|
sppp_flush(&sc->sc_sppp.pp_if);
|
|
return;
|
|
}
|
|
|
|
while ((m = sppp_dequeue(ifp)) != NULL) {
|
|
len = m->m_pkthdr.len;
|
|
M_PREPEND(m, PPPOE_HEADERLEN, M_DONTWAIT);
|
|
if (m == NULL) {
|
|
m_free(m);
|
|
break;
|
|
}
|
|
p = mtod(m, u_int8_t *);
|
|
PPPOE_ADD_HEADER(p, 0, sc->sc_session, len);
|
|
|
|
#if NBPFILTER > 0
|
|
if(sc->sc_sppp.pp_if.if_bpf)
|
|
bpf_mtap(sc->sc_sppp.pp_if.if_bpf, m);
|
|
#endif
|
|
|
|
pppoe_output(sc, m);
|
|
}
|
|
}
|