]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/decnet/dn_nsp_out.c
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next
[mirror_ubuntu-bionic-kernel.git] / net / decnet / dn_nsp_out.c
CommitLineData
1da177e4
LT
1/*
2 * DECnet An implementation of the DECnet protocol suite for the LINUX
3 * operating system. DECnet is implemented using the BSD Socket
4 * interface as the means of communication with the user level.
5 *
6 * DECnet Network Services Protocol (Output)
7 *
8 * Author: Eduardo Marcelo Serrat <emserrat@geocities.com>
9 *
10 * Changes:
11 *
12 * Steve Whitehouse: Split into dn_nsp_in.c and dn_nsp_out.c from
13 * original dn_nsp.c.
14 * Steve Whitehouse: Updated to work with my new routing architecture.
15 * Steve Whitehouse: Added changes from Eduardo Serrat's patches.
16 * Steve Whitehouse: Now conninits have the "return" bit set.
17 * Steve Whitehouse: Fixes to check alloc'd skbs are non NULL!
18 * Moved output state machine into one function
19 * Steve Whitehouse: New output state machine
20 * Paul Koning: Connect Confirm message fix.
21 * Eduardo Serrat: Fix to stop dn_nsp_do_disc() sending malformed packets.
22 * Steve Whitehouse: dn_nsp_output() and friends needed a spring clean
23 * Steve Whitehouse: Moved dn_nsp_send() in here from route.h
24 */
25
26/******************************************************************************
27 (c) 1995-1998 E.M. Serrat emserrat@geocities.com
429eb0fa 28
1da177e4
LT
29 This program is free software; you can redistribute it and/or modify
30 it under the terms of the GNU General Public License as published by
31 the Free Software Foundation; either version 2 of the License, or
32 any later version.
33
34 This program is distributed in the hope that it will be useful,
35 but WITHOUT ANY WARRANTY; without even the implied warranty of
36 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
37 GNU General Public License for more details.
38*******************************************************************************/
39
40#include <linux/errno.h>
41#include <linux/types.h>
42#include <linux/socket.h>
43#include <linux/in.h>
44#include <linux/kernel.h>
1da177e4
LT
45#include <linux/timer.h>
46#include <linux/string.h>
47#include <linux/sockios.h>
48#include <linux/net.h>
49#include <linux/netdevice.h>
50#include <linux/inet.h>
51#include <linux/route.h>
5a0e3ad6 52#include <linux/slab.h>
1da177e4 53#include <net/sock.h>
1da177e4
LT
54#include <linux/fcntl.h>
55#include <linux/mm.h>
429eb0fa 56#include <linux/termios.h>
1da177e4
LT
57#include <linux/interrupt.h>
58#include <linux/proc_fs.h>
59#include <linux/stat.h>
60#include <linux/init.h>
61#include <linux/poll.h>
62#include <linux/if_packet.h>
63#include <net/neighbour.h>
64#include <net/dst.h>
65#include <net/flow.h>
66#include <net/dn.h>
67#include <net/dn_nsp.h>
68#include <net/dn_dev.h>
69#include <net/dn_route.h>
70
71
72static int nsp_backoff[NSP_MAXRXTSHIFT + 1] = { 1, 2, 4, 8, 16, 32, 64, 64, 64, 64, 64, 64, 64 };
73
74static void dn_nsp_send(struct sk_buff *skb)
75{
76 struct sock *sk = skb->sk;
77 struct dn_scp *scp = DN_SK(sk);
78 struct dst_entry *dst;
bef55aeb 79 struct flowidn fld;
1da177e4 80
badff6d0 81 skb_reset_transport_header(skb);
1da177e4
LT
82 scp->stamp = jiffies;
83
84 dst = sk_dst_check(sk, 0);
85 if (dst) {
86try_again:
adf30907 87 skb_dst_set(skb, dst);
13206b6b 88 dst_output(&init_net, skb->sk, skb);
1da177e4
LT
89 return;
90 }
91
bef55aeb
DM
92 memset(&fld, 0, sizeof(fld));
93 fld.flowidn_oif = sk->sk_bound_dev_if;
94 fld.saddr = dn_saddr2dn(&scp->addr);
95 fld.daddr = dn_saddr2dn(&scp->peer);
96 dn_sk_ports_copy(&fld, scp);
97 fld.flowidn_proto = DNPROTO_NSP;
98 if (dn_route_output_sock(&sk->sk_dst_cache, &fld, sk, 0) == 0) {
1da177e4
LT
99 dst = sk_dst_get(sk);
100 sk->sk_route_caps = dst->dev->features;
101 goto try_again;
102 }
103
104 sk->sk_err = EHOSTUNREACH;
105 if (!sock_flag(sk, SOCK_DEAD))
106 sk->sk_state_change(sk);
107}
108
109
110/*
111 * If sk == NULL, then we assume that we are supposed to be making
112 * a routing layer skb. If sk != NULL, then we are supposed to be
113 * creating an skb for the NSP layer.
114 *
115 * The eventual aim is for each socket to have a cached header size
116 * for its outgoing packets, and to set hdr from this when sk != NULL.
117 */
dd0fc66f 118struct sk_buff *dn_alloc_skb(struct sock *sk, int size, gfp_t pri)
1da177e4
LT
119{
120 struct sk_buff *skb;
121 int hdr = 64;
122
123 if ((skb = alloc_skb(size + hdr, pri)) == NULL)
124 return NULL;
125
b98999dc 126 skb->protocol = htons(ETH_P_DNA_RT);
1da177e4
LT
127 skb->pkt_type = PACKET_OUTGOING;
128
129 if (sk)
130 skb_set_owner_w(skb, sk);
131
132 skb_reserve(skb, hdr);
133
134 return skb;
135}
136
1da177e4
LT
137/*
138 * Calculate persist timer based upon the smoothed round
139 * trip time and the variance. Backoff according to the
140 * nsp_backoff[] array.
141 */
142unsigned long dn_nsp_persist(struct sock *sk)
143{
144 struct dn_scp *scp = DN_SK(sk);
145
146 unsigned long t = ((scp->nsp_srtt >> 2) + scp->nsp_rttvar) >> 1;
147
148 t *= nsp_backoff[scp->nsp_rxtshift];
149
150 if (t < HZ) t = HZ;
151 if (t > (600*HZ)) t = (600*HZ);
152
153 if (scp->nsp_rxtshift < NSP_MAXRXTSHIFT)
154 scp->nsp_rxtshift++;
155
156 /* printk(KERN_DEBUG "rxtshift %lu, t=%lu\n", scp->nsp_rxtshift, t); */
157
158 return t;
159}
160
161/*
162 * This is called each time we get an estimate for the rtt
163 * on the link.
164 */
165static void dn_nsp_rtt(struct sock *sk, long rtt)
166{
167 struct dn_scp *scp = DN_SK(sk);
168 long srtt = (long)scp->nsp_srtt;
169 long rttvar = (long)scp->nsp_rttvar;
170 long delta;
171
172 /*
173 * If the jiffies clock flips over in the middle of timestamp
174 * gathering this value might turn out negative, so we make sure
175 * that is it always positive here.
176 */
429eb0fa 177 if (rtt < 0)
1da177e4
LT
178 rtt = -rtt;
179 /*
180 * Add new rtt to smoothed average
181 */
182 delta = ((rtt << 3) - srtt);
183 srtt += (delta >> 3);
429eb0fa 184 if (srtt >= 1)
1da177e4
LT
185 scp->nsp_srtt = (unsigned long)srtt;
186 else
187 scp->nsp_srtt = 1;
188
189 /*
190 * Add new rtt varience to smoothed varience
191 */
192 delta >>= 1;
193 rttvar += ((((delta>0)?(delta):(-delta)) - rttvar) >> 2);
429eb0fa 194 if (rttvar >= 1)
1da177e4
LT
195 scp->nsp_rttvar = (unsigned long)rttvar;
196 else
197 scp->nsp_rttvar = 1;
198
199 /* printk(KERN_DEBUG "srtt=%lu rttvar=%lu\n", scp->nsp_srtt, scp->nsp_rttvar); */
200}
201
202/**
203 * dn_nsp_clone_and_send - Send a data packet by cloning it
204 * @skb: The packet to clone and transmit
205 * @gfp: memory allocation flag
206 *
207 * Clone a queued data or other data packet and transmit it.
208 *
209 * Returns: The number of times the packet has been sent previously
210 */
95c96174 211static inline unsigned int dn_nsp_clone_and_send(struct sk_buff *skb,
dd0fc66f 212 gfp_t gfp)
1da177e4
LT
213{
214 struct dn_skb_cb *cb = DN_SKB_CB(skb);
215 struct sk_buff *skb2;
216 int ret = 0;
217
218 if ((skb2 = skb_clone(skb, gfp)) != NULL) {
219 ret = cb->xmit_count;
220 cb->xmit_count++;
221 cb->stamp = jiffies;
222 skb2->sk = skb->sk;
223 dn_nsp_send(skb2);
224 }
225
226 return ret;
227}
228
229/**
230 * dn_nsp_output - Try and send something from socket queues
231 * @sk: The socket whose queues are to be investigated
1da177e4
LT
232 *
233 * Try and send the packet on the end of the data and other data queues.
234 * Other data gets priority over data, and if we retransmit a packet we
235 * reduce the window by dividing it in two.
236 *
237 */
238void dn_nsp_output(struct sock *sk)
239{
240 struct dn_scp *scp = DN_SK(sk);
241 struct sk_buff *skb;
95c96174 242 unsigned int reduce_win = 0;
1da177e4
LT
243
244 /*
245 * First we check for otherdata/linkservice messages
246 */
247 if ((skb = skb_peek(&scp->other_xmit_queue)) != NULL)
248 reduce_win = dn_nsp_clone_and_send(skb, GFP_ATOMIC);
249
250 /*
251 * If we may not send any data, we don't.
252 * If we are still trying to get some other data down the
253 * channel, we don't try and send any data.
254 */
255 if (reduce_win || (scp->flowrem_sw != DN_SEND))
256 goto recalc_window;
257
258 if ((skb = skb_peek(&scp->data_xmit_queue)) != NULL)
259 reduce_win = dn_nsp_clone_and_send(skb, GFP_ATOMIC);
260
261 /*
262 * If we've sent any frame more than once, we cut the
263 * send window size in half. There is always a minimum
264 * window size of one available.
265 */
266recalc_window:
267 if (reduce_win) {
268 scp->snd_window >>= 1;
269 if (scp->snd_window < NSP_MIN_WINDOW)
270 scp->snd_window = NSP_MIN_WINDOW;
271 }
272}
273
274int dn_nsp_xmit_timeout(struct sock *sk)
275{
276 struct dn_scp *scp = DN_SK(sk);
277
278 dn_nsp_output(sk);
279
b03efcfb
DM
280 if (!skb_queue_empty(&scp->data_xmit_queue) ||
281 !skb_queue_empty(&scp->other_xmit_queue))
1da177e4
LT
282 scp->persist = dn_nsp_persist(sk);
283
284 return 0;
285}
286
c4ea94ab 287static inline __le16 *dn_mk_common_header(struct dn_scp *scp, struct sk_buff *skb, unsigned char msgflag, int len)
1da177e4
LT
288{
289 unsigned char *ptr = skb_push(skb, len);
290
291 BUG_ON(len < 5);
292
293 *ptr++ = msgflag;
c4ea94ab 294 *((__le16 *)ptr) = scp->addrrem;
1da177e4 295 ptr += 2;
c4ea94ab 296 *((__le16 *)ptr) = scp->addrloc;
1da177e4 297 ptr += 2;
c4ea94ab 298 return (__le16 __force *)ptr;
1da177e4
LT
299}
300
c4ea94ab 301static __le16 *dn_mk_ack_header(struct sock *sk, struct sk_buff *skb, unsigned char msgflag, int hlen, int other)
1da177e4
LT
302{
303 struct dn_scp *scp = DN_SK(sk);
304 unsigned short acknum = scp->numdat_rcv & 0x0FFF;
305 unsigned short ackcrs = scp->numoth_rcv & 0x0FFF;
c4ea94ab 306 __le16 *ptr;
1da177e4
LT
307
308 BUG_ON(hlen < 9);
309
310 scp->ackxmt_dat = acknum;
311 scp->ackxmt_oth = ackcrs;
312 acknum |= 0x8000;
313 ackcrs |= 0x8000;
314
315 /* If this is an "other data/ack" message, swap acknum and ackcrs */
3a7943ba
GS
316 if (other)
317 swap(acknum, ackcrs);
1da177e4
LT
318
319 /* Set "cross subchannel" bit in ackcrs */
320 ackcrs |= 0x2000;
321
e3192690 322 ptr = dn_mk_common_header(scp, skb, msgflag, hlen);
1da177e4 323
c4106aa8
HH
324 *ptr++ = cpu_to_le16(acknum);
325 *ptr++ = cpu_to_le16(ackcrs);
1da177e4
LT
326
327 return ptr;
328}
329
c4ea94ab 330static __le16 *dn_nsp_mk_data_header(struct sock *sk, struct sk_buff *skb, int oth)
1da177e4
LT
331{
332 struct dn_scp *scp = DN_SK(sk);
333 struct dn_skb_cb *cb = DN_SKB_CB(skb);
c4ea94ab 334 __le16 *ptr = dn_mk_ack_header(sk, skb, cb->nsp_flags, 11, oth);
1da177e4
LT
335
336 if (unlikely(oth)) {
337 cb->segnum = scp->numoth;
338 seq_add(&scp->numoth, 1);
339 } else {
340 cb->segnum = scp->numdat;
341 seq_add(&scp->numdat, 1);
342 }
c4106aa8 343 *(ptr++) = cpu_to_le16(cb->segnum);
1da177e4
LT
344
345 return ptr;
346}
347
f4a19a56 348void dn_nsp_queue_xmit(struct sock *sk, struct sk_buff *skb,
dd0fc66f 349 gfp_t gfp, int oth)
1da177e4
LT
350{
351 struct dn_scp *scp = DN_SK(sk);
352 struct dn_skb_cb *cb = DN_SKB_CB(skb);
353 unsigned long t = ((scp->nsp_srtt >> 2) + scp->nsp_rttvar) >> 1;
354
355 cb->xmit_count = 0;
356 dn_nsp_mk_data_header(sk, skb, oth);
357
358 /*
359 * Slow start: If we have been idle for more than
360 * one RTT, then reset window to min size.
361 */
362 if ((jiffies - scp->stamp) > t)
363 scp->snd_window = NSP_MIN_WINDOW;
364
365 if (oth)
366 skb_queue_tail(&scp->other_xmit_queue, skb);
367 else
368 skb_queue_tail(&scp->data_xmit_queue, skb);
369
370 if (scp->flowrem_sw != DN_SEND)
371 return;
372
373 dn_nsp_clone_and_send(skb, gfp);
374}
375
376
377int dn_nsp_check_xmit_queue(struct sock *sk, struct sk_buff *skb, struct sk_buff_head *q, unsigned short acknum)
378{
379 struct dn_skb_cb *cb = DN_SKB_CB(skb);
380 struct dn_scp *scp = DN_SK(sk);
bec571ec 381 struct sk_buff *skb2, *n, *ack = NULL;
1da177e4
LT
382 int wakeup = 0;
383 int try_retrans = 0;
384 unsigned long reftime = cb->stamp;
385 unsigned long pkttime;
386 unsigned short xmit_count;
387 unsigned short segnum;
388
bec571ec 389 skb_queue_walk_safe(q, skb2, n) {
1da177e4
LT
390 struct dn_skb_cb *cb2 = DN_SKB_CB(skb2);
391
392 if (dn_before_or_equal(cb2->segnum, acknum))
393 ack = skb2;
394
395 /* printk(KERN_DEBUG "ack: %s %04x %04x\n", ack ? "ACK" : "SKIP", (int)cb2->segnum, (int)acknum); */
396
1da177e4
LT
397 if (ack == NULL)
398 continue;
399
400 /* printk(KERN_DEBUG "check_xmit_queue: %04x, %d\n", acknum, cb2->xmit_count); */
401
402 /* Does _last_ packet acked have xmit_count > 1 */
403 try_retrans = 0;
404 /* Remember to wake up the sending process */
405 wakeup = 1;
406 /* Keep various statistics */
407 pkttime = cb2->stamp;
408 xmit_count = cb2->xmit_count;
409 segnum = cb2->segnum;
410 /* Remove and drop ack'ed packet */
8728b834 411 skb_unlink(ack, q);
1da177e4
LT
412 kfree_skb(ack);
413 ack = NULL;
414
415 /*
416 * We don't expect to see acknowledgements for packets we
417 * haven't sent yet.
418 */
419 WARN_ON(xmit_count == 0);
420
421 /*
422 * If the packet has only been sent once, we can use it
423 * to calculate the RTT and also open the window a little
424 * further.
425 */
426 if (xmit_count == 1) {
429eb0fa 427 if (dn_equal(segnum, acknum))
1da177e4
LT
428 dn_nsp_rtt(sk, (long)(pkttime - reftime));
429
430 if (scp->snd_window < scp->max_window)
431 scp->snd_window++;
432 }
433
434 /*
435 * Packet has been sent more than once. If this is the last
436 * packet to be acknowledged then we want to send the next
437 * packet in the send queue again (assumes the remote host does
438 * go-back-N error control).
439 */
440 if (xmit_count > 1)
441 try_retrans = 1;
442 }
443
444 if (try_retrans)
445 dn_nsp_output(sk);
446
447 return wakeup;
448}
449
450void dn_nsp_send_data_ack(struct sock *sk)
451{
452 struct sk_buff *skb = NULL;
453
454 if ((skb = dn_alloc_skb(sk, 9, GFP_ATOMIC)) == NULL)
455 return;
456
457 skb_reserve(skb, 9);
458 dn_mk_ack_header(sk, skb, 0x04, 9, 0);
459 dn_nsp_send(skb);
460}
461
462void dn_nsp_send_oth_ack(struct sock *sk)
463{
464 struct sk_buff *skb = NULL;
465
466 if ((skb = dn_alloc_skb(sk, 9, GFP_ATOMIC)) == NULL)
467 return;
468
469 skb_reserve(skb, 9);
470 dn_mk_ack_header(sk, skb, 0x14, 9, 1);
471 dn_nsp_send(skb);
472}
473
474
475void dn_send_conn_ack (struct sock *sk)
476{
477 struct dn_scp *scp = DN_SK(sk);
478 struct sk_buff *skb = NULL;
429eb0fa 479 struct nsp_conn_ack_msg *msg;
1da177e4
LT
480
481 if ((skb = dn_alloc_skb(sk, 3, sk->sk_allocation)) == NULL)
482 return;
483
4df864c1 484 msg = skb_put(skb, 3);
429eb0fa 485 msg->msgflg = 0x24;
1da177e4
LT
486 msg->dstaddr = scp->addrrem;
487
429eb0fa 488 dn_nsp_send(skb);
1da177e4
LT
489}
490
1da177e4
LT
491static int dn_nsp_retrans_conn_conf(struct sock *sk)
492{
493 struct dn_scp *scp = DN_SK(sk);
494
495 if (scp->state == DN_CC)
496 dn_send_conn_conf(sk, GFP_ATOMIC);
497
498 return 0;
499}
500
dd0fc66f 501void dn_send_conn_conf(struct sock *sk, gfp_t gfp)
1da177e4
LT
502{
503 struct dn_scp *scp = DN_SK(sk);
504 struct sk_buff *skb = NULL;
429eb0fa 505 struct nsp_conn_init_msg *msg;
c4106aa8 506 __u8 len = (__u8)le16_to_cpu(scp->conndata_out.opt_optl);
1da177e4 507
375d9d71 508 if ((skb = dn_alloc_skb(sk, 50 + len, gfp)) == NULL)
1da177e4
LT
509 return;
510
4df864c1 511 msg = skb_put(skb, sizeof(*msg));
429eb0fa 512 msg->msgflg = 0x28;
1da177e4 513 msg->dstaddr = scp->addrrem;
429eb0fa
YH
514 msg->srcaddr = scp->addrloc;
515 msg->services = scp->services_loc;
516 msg->info = scp->info_loc;
c4106aa8 517 msg->segsize = cpu_to_le16(scp->segsize_loc);
1da177e4 518
634fef61 519 skb_put_u8(skb, len);
1da177e4 520
429eb0fa 521 if (len > 0)
59ae1d12 522 skb_put_data(skb, scp->conndata_out.opt_data, len);
429eb0fa 523
1da177e4
LT
524
525 dn_nsp_send(skb);
526
527 scp->persist = dn_nsp_persist(sk);
528 scp->persist_fxn = dn_nsp_retrans_conn_conf;
529}
530
531
429eb0fa 532static __inline__ void dn_nsp_do_disc(struct sock *sk, unsigned char msgflg,
dd0fc66f 533 unsigned short reason, gfp_t gfp,
f4a19a56 534 struct dst_entry *dst,
c4ea94ab 535 int ddl, unsigned char *dd, __le16 rem, __le16 loc)
1da177e4
LT
536{
537 struct sk_buff *skb = NULL;
538 int size = 7 + ddl + ((msgflg == NSP_DISCINIT) ? 1 : 0);
539 unsigned char *msg;
540
541 if ((dst == NULL) || (rem == 0)) {
e87cc472
JP
542 net_dbg_ratelimited("DECnet: dn_nsp_do_disc: BUG! Please report this to SteveW@ACM.org rem=%u dst=%p\n",
543 le16_to_cpu(rem), dst);
1da177e4
LT
544 return;
545 }
546
547 if ((skb = dn_alloc_skb(sk, size, gfp)) == NULL)
548 return;
549
550 msg = skb_put(skb, size);
551 *msg++ = msgflg;
c4ea94ab 552 *(__le16 *)msg = rem;
1da177e4 553 msg += 2;
c4ea94ab 554 *(__le16 *)msg = loc;
1da177e4 555 msg += 2;
c4106aa8 556 *(__le16 *)msg = cpu_to_le16(reason);
1da177e4
LT
557 msg += 2;
558 if (msgflg == NSP_DISCINIT)
559 *msg++ = ddl;
560
561 if (ddl) {
562 memcpy(msg, dd, ddl);
563 }
564
565 /*
566 * This doesn't go via the dn_nsp_send() function since we need
567 * to be able to send disc packets out which have no socket
568 * associations.
569 */
adf30907 570 skb_dst_set(skb, dst_clone(dst));
13206b6b 571 dst_output(&init_net, skb->sk, skb);
1da177e4
LT
572}
573
574
429eb0fa 575void dn_nsp_send_disc(struct sock *sk, unsigned char msgflg,
dd0fc66f 576 unsigned short reason, gfp_t gfp)
1da177e4
LT
577{
578 struct dn_scp *scp = DN_SK(sk);
579 int ddl = 0;
580
581 if (msgflg == NSP_DISCINIT)
c4106aa8 582 ddl = le16_to_cpu(scp->discdata_out.opt_optl);
1da177e4
LT
583
584 if (reason == 0)
c4106aa8 585 reason = le16_to_cpu(scp->discdata_out.opt_status);
1da177e4 586
cec771d6 587 dn_nsp_do_disc(sk, msgflg, reason, gfp, __sk_dst_get(sk), ddl,
1da177e4
LT
588 scp->discdata_out.opt_data, scp->addrrem, scp->addrloc);
589}
590
591
429eb0fa 592void dn_nsp_return_disc(struct sk_buff *skb, unsigned char msgflg,
1da177e4
LT
593 unsigned short reason)
594{
595 struct dn_skb_cb *cb = DN_SKB_CB(skb);
596 int ddl = 0;
dd0fc66f 597 gfp_t gfp = GFP_ATOMIC;
1da177e4 598
adf30907 599 dn_nsp_do_disc(NULL, msgflg, reason, gfp, skb_dst(skb), ddl,
1da177e4
LT
600 NULL, cb->src_port, cb->dst_port);
601}
602
603
604void dn_nsp_send_link(struct sock *sk, unsigned char lsflags, char fcval)
605{
606 struct dn_scp *scp = DN_SK(sk);
607 struct sk_buff *skb;
608 unsigned char *ptr;
dd0fc66f 609 gfp_t gfp = GFP_ATOMIC;
1da177e4
LT
610
611 if ((skb = dn_alloc_skb(sk, DN_MAX_NSP_DATA_HEADER + 2, gfp)) == NULL)
612 return;
613
614 skb_reserve(skb, DN_MAX_NSP_DATA_HEADER);
615 ptr = skb_put(skb, 2);
616 DN_SKB_CB(skb)->nsp_flags = 0x10;
617 *ptr++ = lsflags;
618 *ptr = fcval;
619
620 dn_nsp_queue_xmit(sk, skb, gfp, 1);
621
622 scp->persist = dn_nsp_persist(sk);
623 scp->persist_fxn = dn_nsp_xmit_timeout;
624}
625
626static int dn_nsp_retrans_conninit(struct sock *sk)
627{
628 struct dn_scp *scp = DN_SK(sk);
629
630 if (scp->state == DN_CI)
631 dn_nsp_send_conninit(sk, NSP_RCI);
632
633 return 0;
634}
635
636void dn_nsp_send_conninit(struct sock *sk, unsigned char msgflg)
637{
638 struct dn_scp *scp = DN_SK(sk);
639 struct nsp_conn_init_msg *msg;
640 unsigned char aux;
641 unsigned char menuver;
642 struct dn_skb_cb *cb;
643 unsigned char type = 1;
dd0fc66f 644 gfp_t allocation = (msgflg == NSP_CI) ? sk->sk_allocation : GFP_ATOMIC;
1da177e4
LT
645 struct sk_buff *skb = dn_alloc_skb(sk, 200, allocation);
646
647 if (!skb)
648 return;
649
650 cb = DN_SKB_CB(skb);
4df864c1 651 msg = skb_put(skb, sizeof(*msg));
1da177e4
LT
652
653 msg->msgflg = msgflg;
654 msg->dstaddr = 0x0000; /* Remote Node will assign it*/
655
656 msg->srcaddr = scp->addrloc;
657 msg->services = scp->services_loc; /* Requested flow control */
429eb0fa 658 msg->info = scp->info_loc; /* Version Number */
c4106aa8 659 msg->segsize = cpu_to_le16(scp->segsize_loc); /* Max segment size */
1da177e4
LT
660
661 if (scp->peer.sdn_objnum)
662 type = 0;
663
27a884dc
ACM
664 skb_put(skb, dn_sockaddr2username(&scp->peer,
665 skb_tail_pointer(skb), type));
666 skb_put(skb, dn_sockaddr2username(&scp->addr,
667 skb_tail_pointer(skb), 2));
1da177e4
LT
668
669 menuver = DN_MENUVER_ACC | DN_MENUVER_USR;
670 if (scp->peer.sdn_flags & SDF_PROXY)
671 menuver |= DN_MENUVER_PRX;
672 if (scp->peer.sdn_flags & SDF_UICPROXY)
673 menuver |= DN_MENUVER_UIC;
674
634fef61 675 skb_put_u8(skb, menuver); /* Menu Version */
429eb0fa 676
1da177e4 677 aux = scp->accessdata.acc_userl;
634fef61 678 skb_put_u8(skb, aux);
1da177e4 679 if (aux > 0)
59ae1d12 680 skb_put_data(skb, scp->accessdata.acc_user, aux);
1da177e4
LT
681
682 aux = scp->accessdata.acc_passl;
634fef61 683 skb_put_u8(skb, aux);
1da177e4 684 if (aux > 0)
59ae1d12 685 skb_put_data(skb, scp->accessdata.acc_pass, aux);
1da177e4
LT
686
687 aux = scp->accessdata.acc_accl;
634fef61 688 skb_put_u8(skb, aux);
1da177e4 689 if (aux > 0)
59ae1d12 690 skb_put_data(skb, scp->accessdata.acc_acc, aux);
1da177e4 691
c4106aa8 692 aux = (__u8)le16_to_cpu(scp->conndata_out.opt_optl);
634fef61 693 skb_put_u8(skb, aux);
1da177e4 694 if (aux > 0)
59ae1d12 695 skb_put_data(skb, scp->conndata_out.opt_data, aux);
1da177e4
LT
696
697 scp->persist = dn_nsp_persist(sk);
698 scp->persist_fxn = dn_nsp_retrans_conninit;
699
700 cb->rt_flags = DN_RT_F_RQR;
701
429eb0fa 702 dn_nsp_send(skb);
1da177e4
LT
703}
704