]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - net/irda/irnet/irnet_ppp.c
sched/headers: Prepare to move signal wakeup & sigpending methods from <linux/sched...
[mirror_ubuntu-artful-kernel.git] / net / irda / irnet / irnet_ppp.c
1 /*
2 * IrNET protocol module : Synchronous PPP over an IrDA socket.
3 *
4 * Jean II - HPL `00 - <jt@hpl.hp.com>
5 *
6 * This file implement the PPP interface and /dev/irnet character device.
7 * The PPP interface hook to the ppp_generic module, handle all our
8 * relationship to the PPP code in the kernel (and by extension to pppd),
9 * and exchange PPP frames with this module (send/receive).
10 * The /dev/irnet device is used primarily for 2 functions :
11 * 1) as a stub for pppd (the ppp daemon), so that we can appropriately
12 * generate PPP sessions (we pretend we are a tty).
13 * 2) as a control channel (write commands, read events)
14 */
15
16 #include <linux/sched/signal.h>
17 #include <linux/slab.h>
18
19 #include "irnet_ppp.h" /* Private header */
20 /* Please put other headers in irnet.h - Thanks */
21
22 /* Generic PPP callbacks (to call us) */
23 static const struct ppp_channel_ops irnet_ppp_ops = {
24 .start_xmit = ppp_irnet_send,
25 .ioctl = ppp_irnet_ioctl
26 };
27
28 /************************* CONTROL CHANNEL *************************/
29 /*
30 * When a pppd instance is not active on /dev/irnet, it acts as a control
31 * channel.
32 * Writing allow to set up the IrDA destination of the IrNET channel,
33 * and any application may be read events happening in IrNET...
34 */
35
36 /*------------------------------------------------------------------*/
37 /*
38 * Write is used to send a command to configure a IrNET channel
39 * before it is open by pppd. The syntax is : "command argument"
40 * Currently there is only two defined commands :
41 * o name : set the requested IrDA nickname of the IrNET peer.
42 * o addr : set the requested IrDA address of the IrNET peer.
43 * Note : the code is crude, but effective...
44 */
45 static inline ssize_t
46 irnet_ctrl_write(irnet_socket * ap,
47 const char __user *buf,
48 size_t count)
49 {
50 char command[IRNET_MAX_COMMAND];
51 char * start; /* Current command being processed */
52 char * next; /* Next command to process */
53 int length; /* Length of current command */
54
55 DENTER(CTRL_TRACE, "(ap=0x%p, count=%zd)\n", ap, count);
56
57 /* Check for overflow... */
58 DABORT(count >= IRNET_MAX_COMMAND, -ENOMEM,
59 CTRL_ERROR, "Too much data !!!\n");
60
61 /* Get the data in the driver */
62 if(copy_from_user(command, buf, count))
63 {
64 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
65 return -EFAULT;
66 }
67
68 /* Safe terminate the string */
69 command[count] = '\0';
70 DEBUG(CTRL_INFO, "Command line received is ``%s'' (%zd).\n",
71 command, count);
72
73 /* Check every commands in the command line */
74 next = command;
75 while(next != NULL)
76 {
77 /* Look at the next command */
78 start = next;
79
80 /* Scrap whitespaces before the command */
81 start = skip_spaces(start);
82
83 /* ',' is our command separator */
84 next = strchr(start, ',');
85 if(next)
86 {
87 *next = '\0'; /* Terminate command */
88 length = next - start; /* Length */
89 next++; /* Skip the '\0' */
90 }
91 else
92 length = strlen(start);
93
94 DEBUG(CTRL_INFO, "Found command ``%s'' (%d).\n", start, length);
95
96 /* Check if we recognised one of the known command
97 * We can't use "switch" with strings, so hack with "continue" */
98
99 /* First command : name -> Requested IrDA nickname */
100 if(!strncmp(start, "name", 4))
101 {
102 /* Copy the name only if is included and not "any" */
103 if((length > 5) && (strcmp(start + 5, "any")))
104 {
105 /* Strip out trailing whitespaces */
106 while(isspace(start[length - 1]))
107 length--;
108
109 DABORT(length < 5 || length > NICKNAME_MAX_LEN + 5,
110 -EINVAL, CTRL_ERROR, "Invalid nickname.\n");
111
112 /* Copy the name for later reuse */
113 memcpy(ap->rname, start + 5, length - 5);
114 ap->rname[length - 5] = '\0';
115 }
116 else
117 ap->rname[0] = '\0';
118 DEBUG(CTRL_INFO, "Got rname = ``%s''\n", ap->rname);
119
120 /* Restart the loop */
121 continue;
122 }
123
124 /* Second command : addr, daddr -> Requested IrDA destination address
125 * Also process : saddr -> Requested IrDA source address */
126 if((!strncmp(start, "addr", 4)) ||
127 (!strncmp(start, "daddr", 5)) ||
128 (!strncmp(start, "saddr", 5)))
129 {
130 __u32 addr = DEV_ADDR_ANY;
131
132 /* Copy the address only if is included and not "any" */
133 if((length > 5) && (strcmp(start + 5, "any")))
134 {
135 char * begp = start + 5;
136 char * endp;
137
138 /* Scrap whitespaces before the command */
139 begp = skip_spaces(begp);
140
141 /* Convert argument to a number (last arg is the base) */
142 addr = simple_strtoul(begp, &endp, 16);
143 /* Has it worked ? (endp should be start + length) */
144 DABORT(endp <= (start + 5), -EINVAL,
145 CTRL_ERROR, "Invalid address.\n");
146 }
147 /* Which type of address ? */
148 if(start[0] == 's')
149 {
150 /* Save it */
151 ap->rsaddr = addr;
152 DEBUG(CTRL_INFO, "Got rsaddr = %08x\n", ap->rsaddr);
153 }
154 else
155 {
156 /* Save it */
157 ap->rdaddr = addr;
158 DEBUG(CTRL_INFO, "Got rdaddr = %08x\n", ap->rdaddr);
159 }
160
161 /* Restart the loop */
162 continue;
163 }
164
165 /* Other possible command : connect N (number of retries) */
166
167 /* No command matched -> Failed... */
168 DABORT(1, -EINVAL, CTRL_ERROR, "Not a recognised IrNET command.\n");
169 }
170
171 /* Success : we have parsed all commands successfully */
172 return count;
173 }
174
175 #ifdef INITIAL_DISCOVERY
176 /*------------------------------------------------------------------*/
177 /*
178 * Function irnet_get_discovery_log (self)
179 *
180 * Query the content on the discovery log if not done
181 *
182 * This function query the current content of the discovery log
183 * at the startup of the event channel and save it in the internal struct.
184 */
185 static void
186 irnet_get_discovery_log(irnet_socket * ap)
187 {
188 __u16 mask = irlmp_service_to_hint(S_LAN);
189
190 /* Ask IrLMP for the current discovery log */
191 ap->discoveries = irlmp_get_discoveries(&ap->disco_number, mask,
192 DISCOVERY_DEFAULT_SLOTS);
193
194 /* Check if the we got some results */
195 if(ap->discoveries == NULL)
196 ap->disco_number = -1;
197
198 DEBUG(CTRL_INFO, "Got the log (0x%p), size is %d\n",
199 ap->discoveries, ap->disco_number);
200 }
201
202 /*------------------------------------------------------------------*/
203 /*
204 * Function irnet_read_discovery_log (self, event)
205 *
206 * Read the content on the discovery log
207 *
208 * This function dump the current content of the discovery log
209 * at the startup of the event channel.
210 * Return 1 if wrote an event on the control channel...
211 *
212 * State of the ap->disco_XXX variables :
213 * Socket creation : discoveries = NULL ; disco_index = 0 ; disco_number = 0
214 * While reading : discoveries = ptr ; disco_index = X ; disco_number = Y
215 * After reading : discoveries = NULL ; disco_index = Y ; disco_number = -1
216 */
217 static inline int
218 irnet_read_discovery_log(irnet_socket *ap, char *event, int buf_size)
219 {
220 int done_event = 0;
221
222 DENTER(CTRL_TRACE, "(ap=0x%p, event=0x%p)\n",
223 ap, event);
224
225 /* Test if we have some work to do or we have already finished */
226 if(ap->disco_number == -1)
227 {
228 DEBUG(CTRL_INFO, "Already done\n");
229 return 0;
230 }
231
232 /* Test if it's the first time and therefore we need to get the log */
233 if(ap->discoveries == NULL)
234 irnet_get_discovery_log(ap);
235
236 /* Check if we have more item to dump */
237 if(ap->disco_index < ap->disco_number)
238 {
239 /* Write an event */
240 snprintf(event, buf_size,
241 "Found %08x (%s) behind %08x {hints %02X-%02X}\n",
242 ap->discoveries[ap->disco_index].daddr,
243 ap->discoveries[ap->disco_index].info,
244 ap->discoveries[ap->disco_index].saddr,
245 ap->discoveries[ap->disco_index].hints[0],
246 ap->discoveries[ap->disco_index].hints[1]);
247 DEBUG(CTRL_INFO, "Writing discovery %d : %s\n",
248 ap->disco_index, ap->discoveries[ap->disco_index].info);
249
250 /* We have an event */
251 done_event = 1;
252 /* Next discovery */
253 ap->disco_index++;
254 }
255
256 /* Check if we have done the last item */
257 if(ap->disco_index >= ap->disco_number)
258 {
259 /* No more items : remove the log and signal termination */
260 DEBUG(CTRL_INFO, "Cleaning up log (0x%p)\n",
261 ap->discoveries);
262 if(ap->discoveries != NULL)
263 {
264 /* Cleanup our copy of the discovery log */
265 kfree(ap->discoveries);
266 ap->discoveries = NULL;
267 }
268 ap->disco_number = -1;
269 }
270
271 return done_event;
272 }
273 #endif /* INITIAL_DISCOVERY */
274
275 /*------------------------------------------------------------------*/
276 /*
277 * Read is used to get IrNET events
278 */
279 static inline ssize_t
280 irnet_ctrl_read(irnet_socket * ap,
281 struct file * file,
282 char __user * buf,
283 size_t count)
284 {
285 DECLARE_WAITQUEUE(wait, current);
286 char event[75];
287 ssize_t ret = 0;
288
289 DENTER(CTRL_TRACE, "(ap=0x%p, count=%zd)\n", ap, count);
290
291 #ifdef INITIAL_DISCOVERY
292 /* Check if we have read the log */
293 if (irnet_read_discovery_log(ap, event, sizeof(event)))
294 {
295 count = min(strlen(event), count);
296 if (copy_to_user(buf, event, count))
297 {
298 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
299 return -EFAULT;
300 }
301
302 DEXIT(CTRL_TRACE, "\n");
303 return count;
304 }
305 #endif /* INITIAL_DISCOVERY */
306
307 /* Put ourselves on the wait queue to be woken up */
308 add_wait_queue(&irnet_events.rwait, &wait);
309 set_current_state(TASK_INTERRUPTIBLE);
310 for(;;)
311 {
312 /* If there is unread events */
313 ret = 0;
314 if(ap->event_index != irnet_events.index)
315 break;
316 ret = -EAGAIN;
317 if(file->f_flags & O_NONBLOCK)
318 break;
319 ret = -ERESTARTSYS;
320 if(signal_pending(current))
321 break;
322 /* Yield and wait to be woken up */
323 schedule();
324 }
325 __set_current_state(TASK_RUNNING);
326 remove_wait_queue(&irnet_events.rwait, &wait);
327
328 /* Did we got it ? */
329 if(ret != 0)
330 {
331 /* No, return the error code */
332 DEXIT(CTRL_TRACE, " - ret %zd\n", ret);
333 return ret;
334 }
335
336 /* Which event is it ? */
337 switch(irnet_events.log[ap->event_index].event)
338 {
339 case IRNET_DISCOVER:
340 snprintf(event, sizeof(event),
341 "Discovered %08x (%s) behind %08x {hints %02X-%02X}\n",
342 irnet_events.log[ap->event_index].daddr,
343 irnet_events.log[ap->event_index].name,
344 irnet_events.log[ap->event_index].saddr,
345 irnet_events.log[ap->event_index].hints.byte[0],
346 irnet_events.log[ap->event_index].hints.byte[1]);
347 break;
348 case IRNET_EXPIRE:
349 snprintf(event, sizeof(event),
350 "Expired %08x (%s) behind %08x {hints %02X-%02X}\n",
351 irnet_events.log[ap->event_index].daddr,
352 irnet_events.log[ap->event_index].name,
353 irnet_events.log[ap->event_index].saddr,
354 irnet_events.log[ap->event_index].hints.byte[0],
355 irnet_events.log[ap->event_index].hints.byte[1]);
356 break;
357 case IRNET_CONNECT_TO:
358 snprintf(event, sizeof(event), "Connected to %08x (%s) on ppp%d\n",
359 irnet_events.log[ap->event_index].daddr,
360 irnet_events.log[ap->event_index].name,
361 irnet_events.log[ap->event_index].unit);
362 break;
363 case IRNET_CONNECT_FROM:
364 snprintf(event, sizeof(event), "Connection from %08x (%s) on ppp%d\n",
365 irnet_events.log[ap->event_index].daddr,
366 irnet_events.log[ap->event_index].name,
367 irnet_events.log[ap->event_index].unit);
368 break;
369 case IRNET_REQUEST_FROM:
370 snprintf(event, sizeof(event), "Request from %08x (%s) behind %08x\n",
371 irnet_events.log[ap->event_index].daddr,
372 irnet_events.log[ap->event_index].name,
373 irnet_events.log[ap->event_index].saddr);
374 break;
375 case IRNET_NOANSWER_FROM:
376 snprintf(event, sizeof(event), "No-answer from %08x (%s) on ppp%d\n",
377 irnet_events.log[ap->event_index].daddr,
378 irnet_events.log[ap->event_index].name,
379 irnet_events.log[ap->event_index].unit);
380 break;
381 case IRNET_BLOCKED_LINK:
382 snprintf(event, sizeof(event), "Blocked link with %08x (%s) on ppp%d\n",
383 irnet_events.log[ap->event_index].daddr,
384 irnet_events.log[ap->event_index].name,
385 irnet_events.log[ap->event_index].unit);
386 break;
387 case IRNET_DISCONNECT_FROM:
388 snprintf(event, sizeof(event), "Disconnection from %08x (%s) on ppp%d\n",
389 irnet_events.log[ap->event_index].daddr,
390 irnet_events.log[ap->event_index].name,
391 irnet_events.log[ap->event_index].unit);
392 break;
393 case IRNET_DISCONNECT_TO:
394 snprintf(event, sizeof(event), "Disconnected to %08x (%s)\n",
395 irnet_events.log[ap->event_index].daddr,
396 irnet_events.log[ap->event_index].name);
397 break;
398 default:
399 snprintf(event, sizeof(event), "Bug\n");
400 }
401 /* Increment our event index */
402 ap->event_index = (ap->event_index + 1) % IRNET_MAX_EVENTS;
403
404 DEBUG(CTRL_INFO, "Event is :%s", event);
405
406 count = min(strlen(event), count);
407 if (copy_to_user(buf, event, count))
408 {
409 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
410 return -EFAULT;
411 }
412
413 DEXIT(CTRL_TRACE, "\n");
414 return count;
415 }
416
417 /*------------------------------------------------------------------*/
418 /*
419 * Poll : called when someone do a select on /dev/irnet.
420 * Just check if there are new events...
421 */
422 static inline unsigned int
423 irnet_ctrl_poll(irnet_socket * ap,
424 struct file * file,
425 poll_table * wait)
426 {
427 unsigned int mask;
428
429 DENTER(CTRL_TRACE, "(ap=0x%p)\n", ap);
430
431 poll_wait(file, &irnet_events.rwait, wait);
432 mask = POLLOUT | POLLWRNORM;
433 /* If there is unread events */
434 if(ap->event_index != irnet_events.index)
435 mask |= POLLIN | POLLRDNORM;
436 #ifdef INITIAL_DISCOVERY
437 if(ap->disco_number != -1)
438 {
439 /* Test if it's the first time and therefore we need to get the log */
440 if(ap->discoveries == NULL)
441 irnet_get_discovery_log(ap);
442 /* Recheck */
443 if(ap->disco_number != -1)
444 mask |= POLLIN | POLLRDNORM;
445 }
446 #endif /* INITIAL_DISCOVERY */
447
448 DEXIT(CTRL_TRACE, " - mask=0x%X\n", mask);
449 return mask;
450 }
451
452
453 /*********************** FILESYSTEM CALLBACKS ***********************/
454 /*
455 * Implement the usual open, read, write functions that will be called
456 * by the file system when some action is performed on /dev/irnet.
457 * Most of those actions will in fact be performed by "pppd" or
458 * the control channel, we just act as a redirector...
459 */
460
461 /*------------------------------------------------------------------*/
462 /*
463 * Open : when somebody open /dev/irnet
464 * We basically create a new instance of irnet and initialise it.
465 */
466 static int
467 dev_irnet_open(struct inode * inode,
468 struct file * file)
469 {
470 struct irnet_socket * ap;
471 int err;
472
473 DENTER(FS_TRACE, "(file=0x%p)\n", file);
474
475 #ifdef SECURE_DEVIRNET
476 /* This could (should?) be enforced by the permissions on /dev/irnet. */
477 if(!capable(CAP_NET_ADMIN))
478 return -EPERM;
479 #endif /* SECURE_DEVIRNET */
480
481 /* Allocate a private structure for this IrNET instance */
482 ap = kzalloc(sizeof(*ap), GFP_KERNEL);
483 DABORT(ap == NULL, -ENOMEM, FS_ERROR, "Can't allocate struct irnet...\n");
484
485 /* initialize the irnet structure */
486 ap->file = file;
487
488 /* PPP channel setup */
489 ap->ppp_open = 0;
490 ap->chan.private = ap;
491 ap->chan.ops = &irnet_ppp_ops;
492 ap->chan.mtu = (2048 - TTP_MAX_HEADER - 2 - PPP_HDRLEN);
493 ap->chan.hdrlen = 2 + TTP_MAX_HEADER; /* for A/C + Max IrDA hdr */
494 /* PPP parameters */
495 ap->mru = (2048 - TTP_MAX_HEADER - 2 - PPP_HDRLEN);
496 ap->xaccm[0] = ~0U;
497 ap->xaccm[3] = 0x60000000U;
498 ap->raccm = ~0U;
499
500 /* Setup the IrDA part... */
501 err = irda_irnet_create(ap);
502 if(err)
503 {
504 DERROR(FS_ERROR, "Can't setup IrDA link...\n");
505 kfree(ap);
506
507 return err;
508 }
509
510 /* For the control channel */
511 ap->event_index = irnet_events.index; /* Cancel all past events */
512
513 mutex_init(&ap->lock);
514
515 /* Put our stuff where we will be able to find it later */
516 file->private_data = ap;
517
518 DEXIT(FS_TRACE, " - ap=0x%p\n", ap);
519
520 return 0;
521 }
522
523
524 /*------------------------------------------------------------------*/
525 /*
526 * Close : when somebody close /dev/irnet
527 * Destroy the instance of /dev/irnet
528 */
529 static int
530 dev_irnet_close(struct inode * inode,
531 struct file * file)
532 {
533 irnet_socket * ap = file->private_data;
534
535 DENTER(FS_TRACE, "(file=0x%p, ap=0x%p)\n",
536 file, ap);
537 DABORT(ap == NULL, 0, FS_ERROR, "ap is NULL !!!\n");
538
539 /* Detach ourselves */
540 file->private_data = NULL;
541
542 /* Close IrDA stuff */
543 irda_irnet_destroy(ap);
544
545 /* Disconnect from the generic PPP layer if not already done */
546 if(ap->ppp_open)
547 {
548 DERROR(FS_ERROR, "Channel still registered - deregistering !\n");
549 ap->ppp_open = 0;
550 ppp_unregister_channel(&ap->chan);
551 }
552
553 kfree(ap);
554
555 DEXIT(FS_TRACE, "\n");
556 return 0;
557 }
558
559 /*------------------------------------------------------------------*/
560 /*
561 * Write does nothing.
562 * (we receive packet from ppp_generic through ppp_irnet_send())
563 */
564 static ssize_t
565 dev_irnet_write(struct file * file,
566 const char __user *buf,
567 size_t count,
568 loff_t * ppos)
569 {
570 irnet_socket * ap = file->private_data;
571
572 DPASS(FS_TRACE, "(file=0x%p, ap=0x%p, count=%zd)\n",
573 file, ap, count);
574 DABORT(ap == NULL, -ENXIO, FS_ERROR, "ap is NULL !!!\n");
575
576 /* If we are connected to ppp_generic, let it handle the job */
577 if(ap->ppp_open)
578 return -EAGAIN;
579 else
580 return irnet_ctrl_write(ap, buf, count);
581 }
582
583 /*------------------------------------------------------------------*/
584 /*
585 * Read doesn't do much either.
586 * (pppd poll us, but ultimately reads through /dev/ppp)
587 */
588 static ssize_t
589 dev_irnet_read(struct file * file,
590 char __user * buf,
591 size_t count,
592 loff_t * ppos)
593 {
594 irnet_socket * ap = file->private_data;
595
596 DPASS(FS_TRACE, "(file=0x%p, ap=0x%p, count=%zd)\n",
597 file, ap, count);
598 DABORT(ap == NULL, -ENXIO, FS_ERROR, "ap is NULL !!!\n");
599
600 /* If we are connected to ppp_generic, let it handle the job */
601 if(ap->ppp_open)
602 return -EAGAIN;
603 else
604 return irnet_ctrl_read(ap, file, buf, count);
605 }
606
607 /*------------------------------------------------------------------*/
608 /*
609 * Poll : called when someone do a select on /dev/irnet
610 */
611 static unsigned int
612 dev_irnet_poll(struct file * file,
613 poll_table * wait)
614 {
615 irnet_socket * ap = file->private_data;
616 unsigned int mask;
617
618 DENTER(FS_TRACE, "(file=0x%p, ap=0x%p)\n",
619 file, ap);
620
621 mask = POLLOUT | POLLWRNORM;
622 DABORT(ap == NULL, mask, FS_ERROR, "ap is NULL !!!\n");
623
624 /* If we are connected to ppp_generic, let it handle the job */
625 if(!ap->ppp_open)
626 mask |= irnet_ctrl_poll(ap, file, wait);
627
628 DEXIT(FS_TRACE, " - mask=0x%X\n", mask);
629 return mask;
630 }
631
632 /*------------------------------------------------------------------*/
633 /*
634 * IOCtl : Called when someone does some ioctls on /dev/irnet
635 * This is the way pppd configure us and control us while the PPP
636 * instance is active.
637 */
638 static long
639 dev_irnet_ioctl(
640 struct file * file,
641 unsigned int cmd,
642 unsigned long arg)
643 {
644 irnet_socket * ap = file->private_data;
645 int err;
646 int val;
647 void __user *argp = (void __user *)arg;
648
649 DENTER(FS_TRACE, "(file=0x%p, ap=0x%p, cmd=0x%X)\n",
650 file, ap, cmd);
651
652 /* Basic checks... */
653 DASSERT(ap != NULL, -ENXIO, PPP_ERROR, "ap is NULL...\n");
654 #ifdef SECURE_DEVIRNET
655 if(!capable(CAP_NET_ADMIN))
656 return -EPERM;
657 #endif /* SECURE_DEVIRNET */
658
659 err = -EFAULT;
660 switch(cmd)
661 {
662 /* Set discipline (should be N_SYNC_PPP or N_TTY) */
663 case TIOCSETD:
664 if(get_user(val, (int __user *)argp))
665 break;
666 if((val == N_SYNC_PPP) || (val == N_PPP))
667 {
668 DEBUG(FS_INFO, "Entering PPP discipline.\n");
669 /* PPP channel setup (ap->chan in configured in dev_irnet_open())*/
670 if (mutex_lock_interruptible(&ap->lock))
671 return -EINTR;
672
673 err = ppp_register_channel(&ap->chan);
674 if(err == 0)
675 {
676 /* Our ppp side is active */
677 ap->ppp_open = 1;
678
679 DEBUG(FS_INFO, "Trying to establish a connection.\n");
680 /* Setup the IrDA link now - may fail... */
681 irda_irnet_connect(ap);
682 }
683 else
684 DERROR(FS_ERROR, "Can't setup PPP channel...\n");
685
686 mutex_unlock(&ap->lock);
687 }
688 else
689 {
690 /* In theory, should be N_TTY */
691 DEBUG(FS_INFO, "Exiting PPP discipline.\n");
692 /* Disconnect from the generic PPP layer */
693 if (mutex_lock_interruptible(&ap->lock))
694 return -EINTR;
695
696 if(ap->ppp_open)
697 {
698 ap->ppp_open = 0;
699 ppp_unregister_channel(&ap->chan);
700 }
701 else
702 DERROR(FS_ERROR, "Channel not registered !\n");
703 err = 0;
704
705 mutex_unlock(&ap->lock);
706 }
707 break;
708
709 /* Query PPP channel and unit number */
710 case PPPIOCGCHAN:
711 if (mutex_lock_interruptible(&ap->lock))
712 return -EINTR;
713
714 if(ap->ppp_open && !put_user(ppp_channel_index(&ap->chan),
715 (int __user *)argp))
716 err = 0;
717
718 mutex_unlock(&ap->lock);
719 break;
720 case PPPIOCGUNIT:
721 if (mutex_lock_interruptible(&ap->lock))
722 return -EINTR;
723
724 if(ap->ppp_open && !put_user(ppp_unit_number(&ap->chan),
725 (int __user *)argp))
726 err = 0;
727
728 mutex_unlock(&ap->lock);
729 break;
730
731 /* All these ioctls can be passed both directly and from ppp_generic,
732 * so we just deal with them in one place...
733 */
734 case PPPIOCGFLAGS:
735 case PPPIOCSFLAGS:
736 case PPPIOCGASYNCMAP:
737 case PPPIOCSASYNCMAP:
738 case PPPIOCGRASYNCMAP:
739 case PPPIOCSRASYNCMAP:
740 case PPPIOCGXASYNCMAP:
741 case PPPIOCSXASYNCMAP:
742 case PPPIOCGMRU:
743 case PPPIOCSMRU:
744 DEBUG(FS_INFO, "Standard PPP ioctl.\n");
745 if(!capable(CAP_NET_ADMIN))
746 err = -EPERM;
747 else {
748 if (mutex_lock_interruptible(&ap->lock))
749 return -EINTR;
750
751 err = ppp_irnet_ioctl(&ap->chan, cmd, arg);
752
753 mutex_unlock(&ap->lock);
754 }
755 break;
756
757 /* TTY IOCTLs : Pretend that we are a tty, to keep pppd happy */
758 /* Get termios */
759 case TCGETS:
760 DEBUG(FS_INFO, "Get termios.\n");
761 if (mutex_lock_interruptible(&ap->lock))
762 return -EINTR;
763
764 #ifndef TCGETS2
765 if(!kernel_termios_to_user_termios((struct termios __user *)argp, &ap->termios))
766 err = 0;
767 #else
768 if(kernel_termios_to_user_termios_1((struct termios __user *)argp, &ap->termios))
769 err = 0;
770 #endif
771
772 mutex_unlock(&ap->lock);
773 break;
774 /* Set termios */
775 case TCSETSF:
776 DEBUG(FS_INFO, "Set termios.\n");
777 if (mutex_lock_interruptible(&ap->lock))
778 return -EINTR;
779
780 #ifndef TCGETS2
781 if(!user_termios_to_kernel_termios(&ap->termios, (struct termios __user *)argp))
782 err = 0;
783 #else
784 if(!user_termios_to_kernel_termios_1(&ap->termios, (struct termios __user *)argp))
785 err = 0;
786 #endif
787
788 mutex_unlock(&ap->lock);
789 break;
790
791 /* Set DTR/RTS */
792 case TIOCMBIS:
793 case TIOCMBIC:
794 /* Set exclusive/non-exclusive mode */
795 case TIOCEXCL:
796 case TIOCNXCL:
797 DEBUG(FS_INFO, "TTY compatibility.\n");
798 err = 0;
799 break;
800
801 case TCGETA:
802 DEBUG(FS_INFO, "TCGETA\n");
803 break;
804
805 case TCFLSH:
806 DEBUG(FS_INFO, "TCFLSH\n");
807 /* Note : this will flush buffers in PPP, so it *must* be done
808 * We should also worry that we don't accept junk here and that
809 * we get rid of our own buffers */
810 #ifdef FLUSH_TO_PPP
811 if (mutex_lock_interruptible(&ap->lock))
812 return -EINTR;
813 ppp_output_wakeup(&ap->chan);
814 mutex_unlock(&ap->lock);
815 #endif /* FLUSH_TO_PPP */
816 err = 0;
817 break;
818
819 case FIONREAD:
820 DEBUG(FS_INFO, "FIONREAD\n");
821 val = 0;
822 if(put_user(val, (int __user *)argp))
823 break;
824 err = 0;
825 break;
826
827 default:
828 DERROR(FS_ERROR, "Unsupported ioctl (0x%X)\n", cmd);
829 err = -ENOTTY;
830 }
831
832 DEXIT(FS_TRACE, " - err = 0x%X\n", err);
833 return err;
834 }
835
836 /************************** PPP CALLBACKS **************************/
837 /*
838 * This are the functions that the generic PPP driver in the kernel
839 * will call to communicate to us.
840 */
841
842 /*------------------------------------------------------------------*/
843 /*
844 * Prepare the ppp frame for transmission over the IrDA socket.
845 * We make sure that the header space is enough, and we change ppp header
846 * according to flags passed by pppd.
847 * This is not a callback, but just a helper function used in ppp_irnet_send()
848 */
849 static inline struct sk_buff *
850 irnet_prepare_skb(irnet_socket * ap,
851 struct sk_buff * skb)
852 {
853 unsigned char * data;
854 int proto; /* PPP protocol */
855 int islcp; /* Protocol == LCP */
856 int needaddr; /* Need PPP address */
857
858 DENTER(PPP_TRACE, "(ap=0x%p, skb=0x%p)\n",
859 ap, skb);
860
861 /* Extract PPP protocol from the frame */
862 data = skb->data;
863 proto = (data[0] << 8) + data[1];
864
865 /* LCP packets with codes between 1 (configure-request)
866 * and 7 (code-reject) must be sent as though no options
867 * have been negotiated. */
868 islcp = (proto == PPP_LCP) && (1 <= data[2]) && (data[2] <= 7);
869
870 /* compress protocol field if option enabled */
871 if((data[0] == 0) && (ap->flags & SC_COMP_PROT) && (!islcp))
872 skb_pull(skb,1);
873
874 /* Check if we need address/control fields */
875 needaddr = 2*((ap->flags & SC_COMP_AC) == 0 || islcp);
876
877 /* Is the skb headroom large enough to contain all IrDA-headers? */
878 if((skb_headroom(skb) < (ap->max_header_size + needaddr)) ||
879 (skb_shared(skb)))
880 {
881 struct sk_buff * new_skb;
882
883 DEBUG(PPP_INFO, "Reallocating skb\n");
884
885 /* Create a new skb */
886 new_skb = skb_realloc_headroom(skb, ap->max_header_size + needaddr);
887
888 /* We have to free the original skb anyway */
889 dev_kfree_skb(skb);
890
891 /* Did the realloc succeed ? */
892 DABORT(new_skb == NULL, NULL, PPP_ERROR, "Could not realloc skb\n");
893
894 /* Use the new skb instead */
895 skb = new_skb;
896 }
897
898 /* prepend address/control fields if necessary */
899 if(needaddr)
900 {
901 skb_push(skb, 2);
902 skb->data[0] = PPP_ALLSTATIONS;
903 skb->data[1] = PPP_UI;
904 }
905
906 DEXIT(PPP_TRACE, "\n");
907
908 return skb;
909 }
910
911 /*------------------------------------------------------------------*/
912 /*
913 * Send a packet to the peer over the IrTTP connection.
914 * Returns 1 iff the packet was accepted.
915 * Returns 0 iff packet was not consumed.
916 * If the packet was not accepted, we will call ppp_output_wakeup
917 * at some later time to reactivate flow control in ppp_generic.
918 */
919 static int
920 ppp_irnet_send(struct ppp_channel * chan,
921 struct sk_buff * skb)
922 {
923 irnet_socket * self = (struct irnet_socket *) chan->private;
924 int ret;
925
926 DENTER(PPP_TRACE, "(channel=0x%p, ap/self=0x%p)\n",
927 chan, self);
928
929 /* Check if things are somewhat valid... */
930 DASSERT(self != NULL, 0, PPP_ERROR, "Self is NULL !!!\n");
931
932 /* Check if we are connected */
933 if(!(test_bit(0, &self->ttp_open)))
934 {
935 #ifdef CONNECT_IN_SEND
936 /* Let's try to connect one more time... */
937 /* Note : we won't be connected after this call, but we should be
938 * ready for next packet... */
939 /* If we are already connecting, this will fail */
940 irda_irnet_connect(self);
941 #endif /* CONNECT_IN_SEND */
942
943 DEBUG(PPP_INFO, "IrTTP not ready ! (%ld-%ld)\n",
944 self->ttp_open, self->ttp_connect);
945
946 /* Note : we can either drop the packet or block the packet.
947 *
948 * Blocking the packet allow us a better connection time,
949 * because by calling ppp_output_wakeup() we can have
950 * ppp_generic resending the LCP request immediately to us,
951 * rather than waiting for one of pppd periodic transmission of
952 * LCP request.
953 *
954 * On the other hand, if we block all packet, all those periodic
955 * transmissions of pppd accumulate in ppp_generic, creating a
956 * backlog of LCP request. When we eventually connect later on,
957 * we have to transmit all this backlog before we can connect
958 * proper (if we don't timeout before).
959 *
960 * The current strategy is as follow :
961 * While we are attempting to connect, we block packets to get
962 * a better connection time.
963 * If we fail to connect, we drain the queue and start dropping packets
964 */
965 #ifdef BLOCK_WHEN_CONNECT
966 /* If we are attempting to connect */
967 if(test_bit(0, &self->ttp_connect))
968 {
969 /* Blocking packet, ppp_generic will retry later */
970 return 0;
971 }
972 #endif /* BLOCK_WHEN_CONNECT */
973
974 /* Dropping packet, pppd will retry later */
975 dev_kfree_skb(skb);
976 return 1;
977 }
978
979 /* Check if the queue can accept any packet, otherwise block */
980 if(self->tx_flow != FLOW_START)
981 DRETURN(0, PPP_INFO, "IrTTP queue full (%d skbs)...\n",
982 skb_queue_len(&self->tsap->tx_queue));
983
984 /* Prepare ppp frame for transmission */
985 skb = irnet_prepare_skb(self, skb);
986 DABORT(skb == NULL, 1, PPP_ERROR, "Prepare skb for Tx failed.\n");
987
988 /* Send the packet to IrTTP */
989 ret = irttp_data_request(self->tsap, skb);
990 if(ret < 0)
991 {
992 /*
993 * > IrTTPs tx queue is full, so we just have to
994 * > drop the frame! You might think that we should
995 * > just return -1 and don't deallocate the frame,
996 * > but that is dangerous since it's possible that
997 * > we have replaced the original skb with a new
998 * > one with larger headroom, and that would really
999 * > confuse do_dev_queue_xmit() in dev.c! I have
1000 * > tried :-) DB
1001 * Correction : we verify the flow control above (self->tx_flow),
1002 * so we come here only if IrTTP doesn't like the packet (empty,
1003 * too large, IrTTP not connected). In those rare cases, it's ok
1004 * to drop it, we don't want to see it here again...
1005 * Jean II
1006 */
1007 DERROR(PPP_ERROR, "IrTTP doesn't like this packet !!! (0x%X)\n", ret);
1008 /* irttp_data_request already free the packet */
1009 }
1010
1011 DEXIT(PPP_TRACE, "\n");
1012 return 1; /* Packet has been consumed */
1013 }
1014
1015 /*------------------------------------------------------------------*/
1016 /*
1017 * Take care of the ioctls that ppp_generic doesn't want to deal with...
1018 * Note : we are also called from dev_irnet_ioctl().
1019 */
1020 static int
1021 ppp_irnet_ioctl(struct ppp_channel * chan,
1022 unsigned int cmd,
1023 unsigned long arg)
1024 {
1025 irnet_socket * ap = (struct irnet_socket *) chan->private;
1026 int err;
1027 int val;
1028 u32 accm[8];
1029 void __user *argp = (void __user *)arg;
1030
1031 DENTER(PPP_TRACE, "(channel=0x%p, ap=0x%p, cmd=0x%X)\n",
1032 chan, ap, cmd);
1033
1034 /* Basic checks... */
1035 DASSERT(ap != NULL, -ENXIO, PPP_ERROR, "ap is NULL...\n");
1036
1037 err = -EFAULT;
1038 switch(cmd)
1039 {
1040 /* PPP flags */
1041 case PPPIOCGFLAGS:
1042 val = ap->flags | ap->rbits;
1043 if(put_user(val, (int __user *) argp))
1044 break;
1045 err = 0;
1046 break;
1047 case PPPIOCSFLAGS:
1048 if(get_user(val, (int __user *) argp))
1049 break;
1050 ap->flags = val & ~SC_RCV_BITS;
1051 ap->rbits = val & SC_RCV_BITS;
1052 err = 0;
1053 break;
1054
1055 /* Async map stuff - all dummy to please pppd */
1056 case PPPIOCGASYNCMAP:
1057 if(put_user(ap->xaccm[0], (u32 __user *) argp))
1058 break;
1059 err = 0;
1060 break;
1061 case PPPIOCSASYNCMAP:
1062 if(get_user(ap->xaccm[0], (u32 __user *) argp))
1063 break;
1064 err = 0;
1065 break;
1066 case PPPIOCGRASYNCMAP:
1067 if(put_user(ap->raccm, (u32 __user *) argp))
1068 break;
1069 err = 0;
1070 break;
1071 case PPPIOCSRASYNCMAP:
1072 if(get_user(ap->raccm, (u32 __user *) argp))
1073 break;
1074 err = 0;
1075 break;
1076 case PPPIOCGXASYNCMAP:
1077 if(copy_to_user(argp, ap->xaccm, sizeof(ap->xaccm)))
1078 break;
1079 err = 0;
1080 break;
1081 case PPPIOCSXASYNCMAP:
1082 if(copy_from_user(accm, argp, sizeof(accm)))
1083 break;
1084 accm[2] &= ~0x40000000U; /* can't escape 0x5e */
1085 accm[3] |= 0x60000000U; /* must escape 0x7d, 0x7e */
1086 memcpy(ap->xaccm, accm, sizeof(ap->xaccm));
1087 err = 0;
1088 break;
1089
1090 /* Max PPP frame size */
1091 case PPPIOCGMRU:
1092 if(put_user(ap->mru, (int __user *) argp))
1093 break;
1094 err = 0;
1095 break;
1096 case PPPIOCSMRU:
1097 if(get_user(val, (int __user *) argp))
1098 break;
1099 if(val < PPP_MRU)
1100 val = PPP_MRU;
1101 ap->mru = val;
1102 err = 0;
1103 break;
1104
1105 default:
1106 DEBUG(PPP_INFO, "Unsupported ioctl (0x%X)\n", cmd);
1107 err = -ENOIOCTLCMD;
1108 }
1109
1110 DEXIT(PPP_TRACE, " - err = 0x%X\n", err);
1111 return err;
1112 }
1113
1114 /************************** INITIALISATION **************************/
1115 /*
1116 * Module initialisation and all that jazz...
1117 */
1118
1119 /*------------------------------------------------------------------*/
1120 /*
1121 * Hook our device callbacks in the filesystem, to connect our code
1122 * to /dev/irnet
1123 */
1124 static inline int __init
1125 ppp_irnet_init(void)
1126 {
1127 int err = 0;
1128
1129 DENTER(MODULE_TRACE, "()\n");
1130
1131 /* Allocate ourselves as a minor in the misc range */
1132 err = misc_register(&irnet_misc_device);
1133
1134 DEXIT(MODULE_TRACE, "\n");
1135 return err;
1136 }
1137
1138 /*------------------------------------------------------------------*/
1139 /*
1140 * Cleanup at exit...
1141 */
1142 static inline void __exit
1143 ppp_irnet_cleanup(void)
1144 {
1145 DENTER(MODULE_TRACE, "()\n");
1146
1147 /* De-allocate /dev/irnet minor in misc range */
1148 misc_deregister(&irnet_misc_device);
1149
1150 DEXIT(MODULE_TRACE, "\n");
1151 }
1152
1153 /*------------------------------------------------------------------*/
1154 /*
1155 * Module main entry point
1156 */
1157 static int __init
1158 irnet_init(void)
1159 {
1160 int err;
1161
1162 /* Initialise both parts... */
1163 err = irda_irnet_init();
1164 if(!err)
1165 err = ppp_irnet_init();
1166 return err;
1167 }
1168
1169 /*------------------------------------------------------------------*/
1170 /*
1171 * Module exit
1172 */
1173 static void __exit
1174 irnet_cleanup(void)
1175 {
1176 irda_irnet_cleanup();
1177 ppp_irnet_cleanup();
1178 }
1179
1180 /*------------------------------------------------------------------*/
1181 /*
1182 * Module magic
1183 */
1184 module_init(irnet_init);
1185 module_exit(irnet_cleanup);
1186 MODULE_AUTHOR("Jean Tourrilhes <jt@hpl.hp.com>");
1187 MODULE_DESCRIPTION("IrNET : Synchronous PPP over IrDA");
1188 MODULE_LICENSE("GPL");
1189 MODULE_ALIAS_CHARDEV(10, 187);