Merge git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/driver-core-2.6
[linux/fpc-iii.git] / net / irda / irnet / irnet_ppp.c
blob68cbcb19cbd8a084dc0121997c2701f970c99aa1
1 /*
2 * IrNET protocol module : Synchronous PPP over an IrDA socket.
4 * Jean II - HPL `00 - <jt@hpl.hp.com>
6 * This file implement the PPP interface and /dev/irnet character device.
7 * The PPP interface hook to the ppp_generic module, handle all our
8 * relationship to the PPP code in the kernel (and by extension to pppd),
9 * and exchange PPP frames with this module (send/receive).
10 * The /dev/irnet device is used primarily for 2 functions :
11 * 1) as a stub for pppd (the ppp daemon), so that we can appropriately
12 * generate PPP sessions (we pretend we are a tty).
13 * 2) as a control channel (write commands, read events)
16 #include <linux/smp_lock.h>
17 #include "irnet_ppp.h" /* Private header */
18 /* Please put other headers in irnet.h - Thanks */
20 /* Generic PPP callbacks (to call us) */
21 static struct ppp_channel_ops irnet_ppp_ops = {
22 .start_xmit = ppp_irnet_send,
23 .ioctl = ppp_irnet_ioctl
26 /************************* CONTROL CHANNEL *************************/
28 * When a pppd instance is not active on /dev/irnet, it acts as a control
29 * channel.
30 * Writing allow to set up the IrDA destination of the IrNET channel,
31 * and any application may be read events happening in IrNET...
34 /*------------------------------------------------------------------*/
36 * Write is used to send a command to configure a IrNET channel
37 * before it is open by pppd. The syntax is : "command argument"
38 * Currently there is only two defined commands :
39 * o name : set the requested IrDA nickname of the IrNET peer.
40 * o addr : set the requested IrDA address of the IrNET peer.
41 * Note : the code is crude, but effective...
43 static inline ssize_t
44 irnet_ctrl_write(irnet_socket * ap,
45 const char __user *buf,
46 size_t count)
48 char command[IRNET_MAX_COMMAND];
49 char * start; /* Current command being processed */
50 char * next; /* Next command to process */
51 int length; /* Length of current command */
53 DENTER(CTRL_TRACE, "(ap=0x%p, count=%Zd)\n", ap, count);
55 /* Check for overflow... */
56 DABORT(count >= IRNET_MAX_COMMAND, -ENOMEM,
57 CTRL_ERROR, "Too much data !!!\n");
59 /* Get the data in the driver */
60 if(copy_from_user(command, buf, count))
62 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
63 return -EFAULT;
66 /* Safe terminate the string */
67 command[count] = '\0';
68 DEBUG(CTRL_INFO, "Command line received is ``%s'' (%Zd).\n",
69 command, count);
71 /* Check every commands in the command line */
72 next = command;
73 while(next != NULL)
75 /* Look at the next command */
76 start = next;
78 /* Scrap whitespaces before the command */
79 while(isspace(*start))
80 start++;
82 /* ',' is our command separator */
83 next = strchr(start, ',');
84 if(next)
86 *next = '\0'; /* Terminate command */
87 length = next - start; /* Length */
88 next++; /* Skip the '\0' */
90 else
91 length = strlen(start);
93 DEBUG(CTRL_INFO, "Found command ``%s'' (%d).\n", start, length);
95 /* Check if we recognised one of the known command
96 * We can't use "switch" with strings, so hack with "continue" */
98 /* First command : name -> Requested IrDA nickname */
99 if(!strncmp(start, "name", 4))
101 /* Copy the name only if is included and not "any" */
102 if((length > 5) && (strcmp(start + 5, "any")))
104 /* Strip out trailing whitespaces */
105 while(isspace(start[length - 1]))
106 length--;
108 /* Copy the name for later reuse */
109 memcpy(ap->rname, start + 5, length - 5);
110 ap->rname[length - 5] = '\0';
112 else
113 ap->rname[0] = '\0';
114 DEBUG(CTRL_INFO, "Got rname = ``%s''\n", ap->rname);
116 /* Restart the loop */
117 continue;
120 /* Second command : addr, daddr -> Requested IrDA destination address
121 * Also process : saddr -> Requested IrDA source address */
122 if((!strncmp(start, "addr", 4)) ||
123 (!strncmp(start, "daddr", 5)) ||
124 (!strncmp(start, "saddr", 5)))
126 __u32 addr = DEV_ADDR_ANY;
128 /* Copy the address only if is included and not "any" */
129 if((length > 5) && (strcmp(start + 5, "any")))
131 char * begp = start + 5;
132 char * endp;
134 /* Scrap whitespaces before the command */
135 while(isspace(*begp))
136 begp++;
138 /* Convert argument to a number (last arg is the base) */
139 addr = simple_strtoul(begp, &endp, 16);
140 /* Has it worked ? (endp should be start + length) */
141 DABORT(endp <= (start + 5), -EINVAL,
142 CTRL_ERROR, "Invalid address.\n");
144 /* Which type of address ? */
145 if(start[0] == 's')
147 /* Save it */
148 ap->rsaddr = addr;
149 DEBUG(CTRL_INFO, "Got rsaddr = %08x\n", ap->rsaddr);
151 else
153 /* Save it */
154 ap->rdaddr = addr;
155 DEBUG(CTRL_INFO, "Got rdaddr = %08x\n", ap->rdaddr);
158 /* Restart the loop */
159 continue;
162 /* Other possible command : connect N (number of retries) */
164 /* No command matched -> Failed... */
165 DABORT(1, -EINVAL, CTRL_ERROR, "Not a recognised IrNET command.\n");
168 /* Success : we have parsed all commands successfully */
169 return(count);
172 #ifdef INITIAL_DISCOVERY
173 /*------------------------------------------------------------------*/
175 * Function irnet_get_discovery_log (self)
177 * Query the content on the discovery log if not done
179 * This function query the current content of the discovery log
180 * at the startup of the event channel and save it in the internal struct.
182 static void
183 irnet_get_discovery_log(irnet_socket * ap)
185 __u16 mask = irlmp_service_to_hint(S_LAN);
187 /* Ask IrLMP for the current discovery log */
188 ap->discoveries = irlmp_get_discoveries(&ap->disco_number, mask,
189 DISCOVERY_DEFAULT_SLOTS);
191 /* Check if the we got some results */
192 if(ap->discoveries == NULL)
193 ap->disco_number = -1;
195 DEBUG(CTRL_INFO, "Got the log (0x%p), size is %d\n",
196 ap->discoveries, ap->disco_number);
199 /*------------------------------------------------------------------*/
201 * Function irnet_read_discovery_log (self, event)
203 * Read the content on the discovery log
205 * This function dump the current content of the discovery log
206 * at the startup of the event channel.
207 * Return 1 if wrote an event on the control channel...
209 * State of the ap->disco_XXX variables :
210 * Socket creation : discoveries = NULL ; disco_index = 0 ; disco_number = 0
211 * While reading : discoveries = ptr ; disco_index = X ; disco_number = Y
212 * After reading : discoveries = NULL ; disco_index = Y ; disco_number = -1
214 static inline int
215 irnet_read_discovery_log(irnet_socket * ap,
216 char * event)
218 int done_event = 0;
220 DENTER(CTRL_TRACE, "(ap=0x%p, event=0x%p)\n",
221 ap, event);
223 /* Test if we have some work to do or we have already finished */
224 if(ap->disco_number == -1)
226 DEBUG(CTRL_INFO, "Already done\n");
227 return 0;
230 /* Test if it's the first time and therefore we need to get the log */
231 if(ap->discoveries == NULL)
232 irnet_get_discovery_log(ap);
234 /* Check if we have more item to dump */
235 if(ap->disco_index < ap->disco_number)
237 /* Write an event */
238 sprintf(event, "Found %08x (%s) behind %08x {hints %02X-%02X}\n",
239 ap->discoveries[ap->disco_index].daddr,
240 ap->discoveries[ap->disco_index].info,
241 ap->discoveries[ap->disco_index].saddr,
242 ap->discoveries[ap->disco_index].hints[0],
243 ap->discoveries[ap->disco_index].hints[1]);
244 DEBUG(CTRL_INFO, "Writing discovery %d : %s\n",
245 ap->disco_index, ap->discoveries[ap->disco_index].info);
247 /* We have an event */
248 done_event = 1;
249 /* Next discovery */
250 ap->disco_index++;
253 /* Check if we have done the last item */
254 if(ap->disco_index >= ap->disco_number)
256 /* No more items : remove the log and signal termination */
257 DEBUG(CTRL_INFO, "Cleaning up log (0x%p)\n",
258 ap->discoveries);
259 if(ap->discoveries != NULL)
261 /* Cleanup our copy of the discovery log */
262 kfree(ap->discoveries);
263 ap->discoveries = NULL;
265 ap->disco_number = -1;
268 return done_event;
270 #endif /* INITIAL_DISCOVERY */
272 /*------------------------------------------------------------------*/
274 * Read is used to get IrNET events
276 static inline ssize_t
277 irnet_ctrl_read(irnet_socket * ap,
278 struct file * file,
279 char __user * buf,
280 size_t count)
282 DECLARE_WAITQUEUE(wait, current);
283 char event[64]; /* Max event is 61 char */
284 ssize_t ret = 0;
286 DENTER(CTRL_TRACE, "(ap=0x%p, count=%Zd)\n", ap, count);
288 /* Check if we can write an event out in one go */
289 DABORT(count < sizeof(event), -EOVERFLOW, CTRL_ERROR, "Buffer to small.\n");
291 #ifdef INITIAL_DISCOVERY
292 /* Check if we have read the log */
293 if(irnet_read_discovery_log(ap, event))
295 /* We have an event !!! Copy it to the user */
296 if(copy_to_user(buf, event, strlen(event)))
298 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
299 return -EFAULT;
302 DEXIT(CTRL_TRACE, "\n");
303 return(strlen(event));
305 #endif /* INITIAL_DISCOVERY */
307 /* Put ourselves on the wait queue to be woken up */
308 add_wait_queue(&irnet_events.rwait, &wait);
309 current->state = TASK_INTERRUPTIBLE;
310 for(;;)
312 /* If there is unread events */
313 ret = 0;
314 if(ap->event_index != irnet_events.index)
315 break;
316 ret = -EAGAIN;
317 if(file->f_flags & O_NONBLOCK)
318 break;
319 ret = -ERESTARTSYS;
320 if(signal_pending(current))
321 break;
322 /* Yield and wait to be woken up */
323 schedule();
325 current->state = TASK_RUNNING;
326 remove_wait_queue(&irnet_events.rwait, &wait);
328 /* Did we got it ? */
329 if(ret != 0)
331 /* No, return the error code */
332 DEXIT(CTRL_TRACE, " - ret %Zd\n", ret);
333 return ret;
336 /* Which event is it ? */
337 switch(irnet_events.log[ap->event_index].event)
339 case IRNET_DISCOVER:
340 sprintf(event, "Discovered %08x (%s) behind %08x {hints %02X-%02X}\n",
341 irnet_events.log[ap->event_index].daddr,
342 irnet_events.log[ap->event_index].name,
343 irnet_events.log[ap->event_index].saddr,
344 irnet_events.log[ap->event_index].hints.byte[0],
345 irnet_events.log[ap->event_index].hints.byte[1]);
346 break;
347 case IRNET_EXPIRE:
348 sprintf(event, "Expired %08x (%s) behind %08x {hints %02X-%02X}\n",
349 irnet_events.log[ap->event_index].daddr,
350 irnet_events.log[ap->event_index].name,
351 irnet_events.log[ap->event_index].saddr,
352 irnet_events.log[ap->event_index].hints.byte[0],
353 irnet_events.log[ap->event_index].hints.byte[1]);
354 break;
355 case IRNET_CONNECT_TO:
356 sprintf(event, "Connected to %08x (%s) on ppp%d\n",
357 irnet_events.log[ap->event_index].daddr,
358 irnet_events.log[ap->event_index].name,
359 irnet_events.log[ap->event_index].unit);
360 break;
361 case IRNET_CONNECT_FROM:
362 sprintf(event, "Connection from %08x (%s) on ppp%d\n",
363 irnet_events.log[ap->event_index].daddr,
364 irnet_events.log[ap->event_index].name,
365 irnet_events.log[ap->event_index].unit);
366 break;
367 case IRNET_REQUEST_FROM:
368 sprintf(event, "Request from %08x (%s) behind %08x\n",
369 irnet_events.log[ap->event_index].daddr,
370 irnet_events.log[ap->event_index].name,
371 irnet_events.log[ap->event_index].saddr);
372 break;
373 case IRNET_NOANSWER_FROM:
374 sprintf(event, "No-answer from %08x (%s) on ppp%d\n",
375 irnet_events.log[ap->event_index].daddr,
376 irnet_events.log[ap->event_index].name,
377 irnet_events.log[ap->event_index].unit);
378 break;
379 case IRNET_BLOCKED_LINK:
380 sprintf(event, "Blocked link with %08x (%s) on ppp%d\n",
381 irnet_events.log[ap->event_index].daddr,
382 irnet_events.log[ap->event_index].name,
383 irnet_events.log[ap->event_index].unit);
384 break;
385 case IRNET_DISCONNECT_FROM:
386 sprintf(event, "Disconnection from %08x (%s) on ppp%d\n",
387 irnet_events.log[ap->event_index].daddr,
388 irnet_events.log[ap->event_index].name,
389 irnet_events.log[ap->event_index].unit);
390 break;
391 case IRNET_DISCONNECT_TO:
392 sprintf(event, "Disconnected to %08x (%s)\n",
393 irnet_events.log[ap->event_index].daddr,
394 irnet_events.log[ap->event_index].name);
395 break;
396 default:
397 sprintf(event, "Bug\n");
399 /* Increment our event index */
400 ap->event_index = (ap->event_index + 1) % IRNET_MAX_EVENTS;
402 DEBUG(CTRL_INFO, "Event is :%s", event);
404 /* Copy it to the user */
405 if(copy_to_user(buf, event, strlen(event)))
407 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
408 return -EFAULT;
411 DEXIT(CTRL_TRACE, "\n");
412 return(strlen(event));
415 /*------------------------------------------------------------------*/
417 * Poll : called when someone do a select on /dev/irnet.
418 * Just check if there are new events...
420 static inline unsigned int
421 irnet_ctrl_poll(irnet_socket * ap,
422 struct file * file,
423 poll_table * wait)
425 unsigned int mask;
427 DENTER(CTRL_TRACE, "(ap=0x%p)\n", ap);
429 poll_wait(file, &irnet_events.rwait, wait);
430 mask = POLLOUT | POLLWRNORM;
431 /* If there is unread events */
432 if(ap->event_index != irnet_events.index)
433 mask |= POLLIN | POLLRDNORM;
434 #ifdef INITIAL_DISCOVERY
435 if(ap->disco_number != -1)
437 /* Test if it's the first time and therefore we need to get the log */
438 if(ap->discoveries == NULL)
439 irnet_get_discovery_log(ap);
440 /* Recheck */
441 if(ap->disco_number != -1)
442 mask |= POLLIN | POLLRDNORM;
444 #endif /* INITIAL_DISCOVERY */
446 DEXIT(CTRL_TRACE, " - mask=0x%X\n", mask);
447 return mask;
451 /*********************** FILESYSTEM CALLBACKS ***********************/
453 * Implement the usual open, read, write functions that will be called
454 * by the file system when some action is performed on /dev/irnet.
455 * Most of those actions will in fact be performed by "pppd" or
456 * the control channel, we just act as a redirector...
459 /*------------------------------------------------------------------*/
461 * Open : when somebody open /dev/irnet
462 * We basically create a new instance of irnet and initialise it.
464 static int
465 dev_irnet_open(struct inode * inode,
466 struct file * file)
468 struct irnet_socket * ap;
469 int err;
471 DENTER(FS_TRACE, "(file=0x%p)\n", file);
473 #ifdef SECURE_DEVIRNET
474 /* This could (should?) be enforced by the permissions on /dev/irnet. */
475 if(!capable(CAP_NET_ADMIN))
476 return -EPERM;
477 #endif /* SECURE_DEVIRNET */
479 /* Allocate a private structure for this IrNET instance */
480 ap = kzalloc(sizeof(*ap), GFP_KERNEL);
481 DABORT(ap == NULL, -ENOMEM, FS_ERROR, "Can't allocate struct irnet...\n");
483 lock_kernel();
484 /* initialize the irnet structure */
485 ap->file = file;
487 /* PPP channel setup */
488 ap->ppp_open = 0;
489 ap->chan.private = ap;
490 ap->chan.ops = &irnet_ppp_ops;
491 ap->chan.mtu = (2048 - TTP_MAX_HEADER - 2 - PPP_HDRLEN);
492 ap->chan.hdrlen = 2 + TTP_MAX_HEADER; /* for A/C + Max IrDA hdr */
493 /* PPP parameters */
494 ap->mru = (2048 - TTP_MAX_HEADER - 2 - PPP_HDRLEN);
495 ap->xaccm[0] = ~0U;
496 ap->xaccm[3] = 0x60000000U;
497 ap->raccm = ~0U;
499 /* Setup the IrDA part... */
500 err = irda_irnet_create(ap);
501 if(err)
503 DERROR(FS_ERROR, "Can't setup IrDA link...\n");
504 kfree(ap);
505 unlock_kernel();
506 return err;
509 /* For the control channel */
510 ap->event_index = irnet_events.index; /* Cancel all past events */
512 /* Put our stuff where we will be able to find it later */
513 file->private_data = ap;
515 DEXIT(FS_TRACE, " - ap=0x%p\n", ap);
516 unlock_kernel();
517 return 0;
521 /*------------------------------------------------------------------*/
523 * Close : when somebody close /dev/irnet
524 * Destroy the instance of /dev/irnet
526 static int
527 dev_irnet_close(struct inode * inode,
528 struct file * file)
530 irnet_socket * ap = (struct irnet_socket *) file->private_data;
532 DENTER(FS_TRACE, "(file=0x%p, ap=0x%p)\n",
533 file, ap);
534 DABORT(ap == NULL, 0, FS_ERROR, "ap is NULL !!!\n");
536 /* Detach ourselves */
537 file->private_data = NULL;
539 /* Close IrDA stuff */
540 irda_irnet_destroy(ap);
542 /* Disconnect from the generic PPP layer if not already done */
543 if(ap->ppp_open)
545 DERROR(FS_ERROR, "Channel still registered - deregistering !\n");
546 ap->ppp_open = 0;
547 ppp_unregister_channel(&ap->chan);
550 kfree(ap);
552 DEXIT(FS_TRACE, "\n");
553 return 0;
556 /*------------------------------------------------------------------*/
558 * Write does nothing.
559 * (we receive packet from ppp_generic through ppp_irnet_send())
561 static ssize_t
562 dev_irnet_write(struct file * file,
563 const char __user *buf,
564 size_t count,
565 loff_t * ppos)
567 irnet_socket * ap = (struct irnet_socket *) file->private_data;
569 DPASS(FS_TRACE, "(file=0x%p, ap=0x%p, count=%Zd)\n",
570 file, ap, count);
571 DABORT(ap == NULL, -ENXIO, FS_ERROR, "ap is NULL !!!\n");
573 /* If we are connected to ppp_generic, let it handle the job */
574 if(ap->ppp_open)
575 return -EAGAIN;
576 else
577 return irnet_ctrl_write(ap, buf, count);
580 /*------------------------------------------------------------------*/
582 * Read doesn't do much either.
583 * (pppd poll us, but ultimately reads through /dev/ppp)
585 static ssize_t
586 dev_irnet_read(struct file * file,
587 char __user * buf,
588 size_t count,
589 loff_t * ppos)
591 irnet_socket * ap = (struct irnet_socket *) file->private_data;
593 DPASS(FS_TRACE, "(file=0x%p, ap=0x%p, count=%Zd)\n",
594 file, ap, count);
595 DABORT(ap == NULL, -ENXIO, FS_ERROR, "ap is NULL !!!\n");
597 /* If we are connected to ppp_generic, let it handle the job */
598 if(ap->ppp_open)
599 return -EAGAIN;
600 else
601 return irnet_ctrl_read(ap, file, buf, count);
604 /*------------------------------------------------------------------*/
606 * Poll : called when someone do a select on /dev/irnet
608 static unsigned int
609 dev_irnet_poll(struct file * file,
610 poll_table * wait)
612 irnet_socket * ap = (struct irnet_socket *) file->private_data;
613 unsigned int mask;
615 DENTER(FS_TRACE, "(file=0x%p, ap=0x%p)\n",
616 file, ap);
618 mask = POLLOUT | POLLWRNORM;
619 DABORT(ap == NULL, mask, FS_ERROR, "ap is NULL !!!\n");
621 /* If we are connected to ppp_generic, let it handle the job */
622 if(!ap->ppp_open)
623 mask |= irnet_ctrl_poll(ap, file, wait);
625 DEXIT(FS_TRACE, " - mask=0x%X\n", mask);
626 return(mask);
629 /*------------------------------------------------------------------*/
631 * IOCtl : Called when someone does some ioctls on /dev/irnet
632 * This is the way pppd configure us and control us while the PPP
633 * instance is active.
635 static long
636 dev_irnet_ioctl(
637 struct file * file,
638 unsigned int cmd,
639 unsigned long arg)
641 irnet_socket * ap = (struct irnet_socket *) file->private_data;
642 int err;
643 int val;
644 void __user *argp = (void __user *)arg;
646 DENTER(FS_TRACE, "(file=0x%p, ap=0x%p, cmd=0x%X)\n",
647 file, ap, cmd);
649 /* Basic checks... */
650 DASSERT(ap != NULL, -ENXIO, PPP_ERROR, "ap is NULL...\n");
651 #ifdef SECURE_DEVIRNET
652 if(!capable(CAP_NET_ADMIN))
653 return -EPERM;
654 #endif /* SECURE_DEVIRNET */
656 err = -EFAULT;
657 switch(cmd)
659 /* Set discipline (should be N_SYNC_PPP or N_TTY) */
660 case TIOCSETD:
661 if(get_user(val, (int __user *)argp))
662 break;
663 if((val == N_SYNC_PPP) || (val == N_PPP))
665 DEBUG(FS_INFO, "Entering PPP discipline.\n");
666 /* PPP channel setup (ap->chan in configued in dev_irnet_open())*/
667 lock_kernel();
668 err = ppp_register_channel(&ap->chan);
669 if(err == 0)
671 /* Our ppp side is active */
672 ap->ppp_open = 1;
674 DEBUG(FS_INFO, "Trying to establish a connection.\n");
675 /* Setup the IrDA link now - may fail... */
676 irda_irnet_connect(ap);
678 else
679 DERROR(FS_ERROR, "Can't setup PPP channel...\n");
680 unlock_kernel();
682 else
684 /* In theory, should be N_TTY */
685 DEBUG(FS_INFO, "Exiting PPP discipline.\n");
686 /* Disconnect from the generic PPP layer */
687 lock_kernel();
688 if(ap->ppp_open)
690 ap->ppp_open = 0;
691 ppp_unregister_channel(&ap->chan);
693 else
694 DERROR(FS_ERROR, "Channel not registered !\n");
695 err = 0;
696 unlock_kernel();
698 break;
700 /* Query PPP channel and unit number */
701 case PPPIOCGCHAN:
702 if(ap->ppp_open && !put_user(ppp_channel_index(&ap->chan),
703 (int __user *)argp))
704 err = 0;
705 break;
706 case PPPIOCGUNIT:
707 lock_kernel();
708 if(ap->ppp_open && !put_user(ppp_unit_number(&ap->chan),
709 (int __user *)argp))
710 err = 0;
711 break;
713 /* All these ioctls can be passed both directly and from ppp_generic,
714 * so we just deal with them in one place...
716 case PPPIOCGFLAGS:
717 case PPPIOCSFLAGS:
718 case PPPIOCGASYNCMAP:
719 case PPPIOCSASYNCMAP:
720 case PPPIOCGRASYNCMAP:
721 case PPPIOCSRASYNCMAP:
722 case PPPIOCGXASYNCMAP:
723 case PPPIOCSXASYNCMAP:
724 case PPPIOCGMRU:
725 case PPPIOCSMRU:
726 DEBUG(FS_INFO, "Standard PPP ioctl.\n");
727 if(!capable(CAP_NET_ADMIN))
728 err = -EPERM;
729 else {
730 lock_kernel();
731 err = ppp_irnet_ioctl(&ap->chan, cmd, arg);
732 unlock_kernel();
734 break;
736 /* TTY IOCTLs : Pretend that we are a tty, to keep pppd happy */
737 /* Get termios */
738 case TCGETS:
739 DEBUG(FS_INFO, "Get termios.\n");
740 lock_kernel();
741 #ifndef TCGETS2
742 if(!kernel_termios_to_user_termios((struct termios __user *)argp, &ap->termios))
743 err = 0;
744 #else
745 if(kernel_termios_to_user_termios_1((struct termios __user *)argp, &ap->termios))
746 err = 0;
747 #endif
748 unlock_kernel();
749 break;
750 /* Set termios */
751 case TCSETSF:
752 DEBUG(FS_INFO, "Set termios.\n");
753 lock_kernel();
754 #ifndef TCGETS2
755 if(!user_termios_to_kernel_termios(&ap->termios, (struct termios __user *)argp))
756 err = 0;
757 #else
758 if(!user_termios_to_kernel_termios_1(&ap->termios, (struct termios __user *)argp))
759 err = 0;
760 #endif
761 unlock_kernel();
762 break;
764 /* Set DTR/RTS */
765 case TIOCMBIS:
766 case TIOCMBIC:
767 /* Set exclusive/non-exclusive mode */
768 case TIOCEXCL:
769 case TIOCNXCL:
770 DEBUG(FS_INFO, "TTY compatibility.\n");
771 err = 0;
772 break;
774 case TCGETA:
775 DEBUG(FS_INFO, "TCGETA\n");
776 break;
778 case TCFLSH:
779 DEBUG(FS_INFO, "TCFLSH\n");
780 /* Note : this will flush buffers in PPP, so it *must* be done
781 * We should also worry that we don't accept junk here and that
782 * we get rid of our own buffers */
783 #ifdef FLUSH_TO_PPP
784 lock_kernel();
785 ppp_output_wakeup(&ap->chan);
786 unlock_kernel();
787 #endif /* FLUSH_TO_PPP */
788 err = 0;
789 break;
791 case FIONREAD:
792 DEBUG(FS_INFO, "FIONREAD\n");
793 val = 0;
794 if(put_user(val, (int __user *)argp))
795 break;
796 err = 0;
797 break;
799 default:
800 DERROR(FS_ERROR, "Unsupported ioctl (0x%X)\n", cmd);
801 err = -ENOTTY;
804 DEXIT(FS_TRACE, " - err = 0x%X\n", err);
805 return err;
808 /************************** PPP CALLBACKS **************************/
810 * This are the functions that the generic PPP driver in the kernel
811 * will call to communicate to us.
814 /*------------------------------------------------------------------*/
816 * Prepare the ppp frame for transmission over the IrDA socket.
817 * We make sure that the header space is enough, and we change ppp header
818 * according to flags passed by pppd.
819 * This is not a callback, but just a helper function used in ppp_irnet_send()
821 static inline struct sk_buff *
822 irnet_prepare_skb(irnet_socket * ap,
823 struct sk_buff * skb)
825 unsigned char * data;
826 int proto; /* PPP protocol */
827 int islcp; /* Protocol == LCP */
828 int needaddr; /* Need PPP address */
830 DENTER(PPP_TRACE, "(ap=0x%p, skb=0x%p)\n",
831 ap, skb);
833 /* Extract PPP protocol from the frame */
834 data = skb->data;
835 proto = (data[0] << 8) + data[1];
837 /* LCP packets with codes between 1 (configure-request)
838 * and 7 (code-reject) must be sent as though no options
839 * have been negotiated. */
840 islcp = (proto == PPP_LCP) && (1 <= data[2]) && (data[2] <= 7);
842 /* compress protocol field if option enabled */
843 if((data[0] == 0) && (ap->flags & SC_COMP_PROT) && (!islcp))
844 skb_pull(skb,1);
846 /* Check if we need address/control fields */
847 needaddr = 2*((ap->flags & SC_COMP_AC) == 0 || islcp);
849 /* Is the skb headroom large enough to contain all IrDA-headers? */
850 if((skb_headroom(skb) < (ap->max_header_size + needaddr)) ||
851 (skb_shared(skb)))
853 struct sk_buff * new_skb;
855 DEBUG(PPP_INFO, "Reallocating skb\n");
857 /* Create a new skb */
858 new_skb = skb_realloc_headroom(skb, ap->max_header_size + needaddr);
860 /* We have to free the original skb anyway */
861 dev_kfree_skb(skb);
863 /* Did the realloc succeed ? */
864 DABORT(new_skb == NULL, NULL, PPP_ERROR, "Could not realloc skb\n");
866 /* Use the new skb instead */
867 skb = new_skb;
870 /* prepend address/control fields if necessary */
871 if(needaddr)
873 skb_push(skb, 2);
874 skb->data[0] = PPP_ALLSTATIONS;
875 skb->data[1] = PPP_UI;
878 DEXIT(PPP_TRACE, "\n");
880 return skb;
883 /*------------------------------------------------------------------*/
885 * Send a packet to the peer over the IrTTP connection.
886 * Returns 1 iff the packet was accepted.
887 * Returns 0 iff packet was not consumed.
888 * If the packet was not accepted, we will call ppp_output_wakeup
889 * at some later time to reactivate flow control in ppp_generic.
891 static int
892 ppp_irnet_send(struct ppp_channel * chan,
893 struct sk_buff * skb)
895 irnet_socket * self = (struct irnet_socket *) chan->private;
896 int ret;
898 DENTER(PPP_TRACE, "(channel=0x%p, ap/self=0x%p)\n",
899 chan, self);
901 /* Check if things are somewhat valid... */
902 DASSERT(self != NULL, 0, PPP_ERROR, "Self is NULL !!!\n");
904 /* Check if we are connected */
905 if(!(test_bit(0, &self->ttp_open)))
907 #ifdef CONNECT_IN_SEND
908 /* Let's try to connect one more time... */
909 /* Note : we won't be connected after this call, but we should be
910 * ready for next packet... */
911 /* If we are already connecting, this will fail */
912 irda_irnet_connect(self);
913 #endif /* CONNECT_IN_SEND */
915 DEBUG(PPP_INFO, "IrTTP not ready ! (%ld-%ld)\n",
916 self->ttp_open, self->ttp_connect);
918 /* Note : we can either drop the packet or block the packet.
920 * Blocking the packet allow us a better connection time,
921 * because by calling ppp_output_wakeup() we can have
922 * ppp_generic resending the LCP request immediately to us,
923 * rather than waiting for one of pppd periodic transmission of
924 * LCP request.
926 * On the other hand, if we block all packet, all those periodic
927 * transmissions of pppd accumulate in ppp_generic, creating a
928 * backlog of LCP request. When we eventually connect later on,
929 * we have to transmit all this backlog before we can connect
930 * proper (if we don't timeout before).
932 * The current strategy is as follow :
933 * While we are attempting to connect, we block packets to get
934 * a better connection time.
935 * If we fail to connect, we drain the queue and start dropping packets
937 #ifdef BLOCK_WHEN_CONNECT
938 /* If we are attempting to connect */
939 if(test_bit(0, &self->ttp_connect))
941 /* Blocking packet, ppp_generic will retry later */
942 return 0;
944 #endif /* BLOCK_WHEN_CONNECT */
946 /* Dropping packet, pppd will retry later */
947 dev_kfree_skb(skb);
948 return 1;
951 /* Check if the queue can accept any packet, otherwise block */
952 if(self->tx_flow != FLOW_START)
953 DRETURN(0, PPP_INFO, "IrTTP queue full (%d skbs)...\n",
954 skb_queue_len(&self->tsap->tx_queue));
956 /* Prepare ppp frame for transmission */
957 skb = irnet_prepare_skb(self, skb);
958 DABORT(skb == NULL, 1, PPP_ERROR, "Prepare skb for Tx failed.\n");
960 /* Send the packet to IrTTP */
961 ret = irttp_data_request(self->tsap, skb);
962 if(ret < 0)
965 * > IrTTPs tx queue is full, so we just have to
966 * > drop the frame! You might think that we should
967 * > just return -1 and don't deallocate the frame,
968 * > but that is dangerous since it's possible that
969 * > we have replaced the original skb with a new
970 * > one with larger headroom, and that would really
971 * > confuse do_dev_queue_xmit() in dev.c! I have
972 * > tried :-) DB
973 * Correction : we verify the flow control above (self->tx_flow),
974 * so we come here only if IrTTP doesn't like the packet (empty,
975 * too large, IrTTP not connected). In those rare cases, it's ok
976 * to drop it, we don't want to see it here again...
977 * Jean II
979 DERROR(PPP_ERROR, "IrTTP doesn't like this packet !!! (0x%X)\n", ret);
980 /* irttp_data_request already free the packet */
983 DEXIT(PPP_TRACE, "\n");
984 return 1; /* Packet has been consumed */
987 /*------------------------------------------------------------------*/
989 * Take care of the ioctls that ppp_generic doesn't want to deal with...
990 * Note : we are also called from dev_irnet_ioctl().
992 static int
993 ppp_irnet_ioctl(struct ppp_channel * chan,
994 unsigned int cmd,
995 unsigned long arg)
997 irnet_socket * ap = (struct irnet_socket *) chan->private;
998 int err;
999 int val;
1000 u32 accm[8];
1001 void __user *argp = (void __user *)arg;
1003 DENTER(PPP_TRACE, "(channel=0x%p, ap=0x%p, cmd=0x%X)\n",
1004 chan, ap, cmd);
1006 /* Basic checks... */
1007 DASSERT(ap != NULL, -ENXIO, PPP_ERROR, "ap is NULL...\n");
1009 err = -EFAULT;
1010 switch(cmd)
1012 /* PPP flags */
1013 case PPPIOCGFLAGS:
1014 val = ap->flags | ap->rbits;
1015 if(put_user(val, (int __user *) argp))
1016 break;
1017 err = 0;
1018 break;
1019 case PPPIOCSFLAGS:
1020 if(get_user(val, (int __user *) argp))
1021 break;
1022 ap->flags = val & ~SC_RCV_BITS;
1023 ap->rbits = val & SC_RCV_BITS;
1024 err = 0;
1025 break;
1027 /* Async map stuff - all dummy to please pppd */
1028 case PPPIOCGASYNCMAP:
1029 if(put_user(ap->xaccm[0], (u32 __user *) argp))
1030 break;
1031 err = 0;
1032 break;
1033 case PPPIOCSASYNCMAP:
1034 if(get_user(ap->xaccm[0], (u32 __user *) argp))
1035 break;
1036 err = 0;
1037 break;
1038 case PPPIOCGRASYNCMAP:
1039 if(put_user(ap->raccm, (u32 __user *) argp))
1040 break;
1041 err = 0;
1042 break;
1043 case PPPIOCSRASYNCMAP:
1044 if(get_user(ap->raccm, (u32 __user *) argp))
1045 break;
1046 err = 0;
1047 break;
1048 case PPPIOCGXASYNCMAP:
1049 if(copy_to_user(argp, ap->xaccm, sizeof(ap->xaccm)))
1050 break;
1051 err = 0;
1052 break;
1053 case PPPIOCSXASYNCMAP:
1054 if(copy_from_user(accm, argp, sizeof(accm)))
1055 break;
1056 accm[2] &= ~0x40000000U; /* can't escape 0x5e */
1057 accm[3] |= 0x60000000U; /* must escape 0x7d, 0x7e */
1058 memcpy(ap->xaccm, accm, sizeof(ap->xaccm));
1059 err = 0;
1060 break;
1062 /* Max PPP frame size */
1063 case PPPIOCGMRU:
1064 if(put_user(ap->mru, (int __user *) argp))
1065 break;
1066 err = 0;
1067 break;
1068 case PPPIOCSMRU:
1069 if(get_user(val, (int __user *) argp))
1070 break;
1071 if(val < PPP_MRU)
1072 val = PPP_MRU;
1073 ap->mru = val;
1074 err = 0;
1075 break;
1077 default:
1078 DEBUG(PPP_INFO, "Unsupported ioctl (0x%X)\n", cmd);
1079 err = -ENOIOCTLCMD;
1082 DEXIT(PPP_TRACE, " - err = 0x%X\n", err);
1083 return err;
1086 /************************** INITIALISATION **************************/
1088 * Module initialisation and all that jazz...
1091 /*------------------------------------------------------------------*/
1093 * Hook our device callbacks in the filesystem, to connect our code
1094 * to /dev/irnet
1096 static inline int __init
1097 ppp_irnet_init(void)
1099 int err = 0;
1101 DENTER(MODULE_TRACE, "()\n");
1103 /* Allocate ourselves as a minor in the misc range */
1104 err = misc_register(&irnet_misc_device);
1106 DEXIT(MODULE_TRACE, "\n");
1107 return err;
1110 /*------------------------------------------------------------------*/
1112 * Cleanup at exit...
1114 static inline void __exit
1115 ppp_irnet_cleanup(void)
1117 DENTER(MODULE_TRACE, "()\n");
1119 /* De-allocate /dev/irnet minor in misc range */
1120 misc_deregister(&irnet_misc_device);
1122 DEXIT(MODULE_TRACE, "\n");
1125 /*------------------------------------------------------------------*/
1127 * Module main entry point
1129 static int __init
1130 irnet_init(void)
1132 int err;
1134 /* Initialise both parts... */
1135 err = irda_irnet_init();
1136 if(!err)
1137 err = ppp_irnet_init();
1138 return err;
1141 /*------------------------------------------------------------------*/
1143 * Module exit
1145 static void __exit
1146 irnet_cleanup(void)
1148 irda_irnet_cleanup();
1149 ppp_irnet_cleanup();
1152 /*------------------------------------------------------------------*/
1154 * Module magic
1156 module_init(irnet_init);
1157 module_exit(irnet_cleanup);
1158 MODULE_AUTHOR("Jean Tourrilhes <jt@hpl.hp.com>");
1159 MODULE_DESCRIPTION("IrNET : Synchronous PPP over IrDA");
1160 MODULE_LICENSE("GPL");
1161 MODULE_ALIAS_CHARDEV(10, 187);