1 /*
2 * IrNET protocol module : Synchronous PPP over an IrDA socket.
3 *
4 * Jean II - HPL `00 - <jt@hpl.hp.com>
5 *
6 * This file implement the PPP interface and /dev/irnet character device.
7 * The PPP interface hook to the ppp_generic module, handle all our
8 * relationship to the PPP code in the kernel (and by extension to pppd),
9 * and exchange PPP frames with this module (send/receive).
10 * The /dev/irnet device is used primarily for 2 functions :
11 * 1) as a stub for pppd (the ppp daemon), so that we can appropriately
12 * generate PPP sessions (we pretend we are a tty).
13 * 2) as a control channel (write commands, read events)
14 */
15
16 #include "irnet_ppp.h" /* Private header */
17 /* Please put other headers in irnet.h - Thanks */
18
19 /************************* CONTROL CHANNEL *************************/
20 /*
21 * When a pppd instance is not active on /dev/irnet, it acts as a control
22 * channel.
23 * Writting allow to set up the IrDA destination of the IrNET channel,
24 * and any application may be read events happening in IrNET...
25 */
26
27 /*------------------------------------------------------------------*/
28 /*
29 * Write is used to send a command to configure a IrNET channel
30 * before it is open by pppd. The syntax is : "command argument"
31 * Currently there is only two defined commands :
32 * o name : set the requested IrDA nickname of the IrNET peer.
33 * o addr : set the requested IrDA address of the IrNET peer.
34 * Note : the code is crude, but effective...
35 */
36 static inline ssize_t
irnet_ctrl_write(irnet_socket * ap,const char * buf,size_t count)37 irnet_ctrl_write(irnet_socket * ap,
38 const char * buf,
39 size_t count)
40 {
41 char command[IRNET_MAX_COMMAND];
42 char * start; /* Current command beeing processed */
43 char * next; /* Next command to process */
44 int length; /* Length of current command */
45
46 DENTER(CTRL_TRACE, "(ap=0x%X, count=%d)\n", (unsigned int) ap, count);
47
48 /* Check for overflow... */
49 DABORT(count >= IRNET_MAX_COMMAND, -ENOMEM,
50 CTRL_ERROR, "Too much data !!!\n");
51
52 /* Get the data in the driver */
53 if(copy_from_user(command, buf, count))
54 {
55 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
56 return -EFAULT;
57 }
58
59 /* Safe terminate the string */
60 command[count] = '\0';
61 DEBUG(CTRL_INFO, "Command line received is ``%s'' (%d).\n",
62 command, count);
63
64 /* Check every commands in the command line */
65 next = command;
66 while(next != NULL)
67 {
68 /* Look at the next command */
69 start = next;
70
71 /* Scrap whitespaces before the command */
72 while(isspace(*start))
73 start++;
74
75 /* ',' is our command separator */
76 next = strchr(start, ',');
77 if(next)
78 {
79 *next = '\0'; /* Terminate command */
80 length = next - start; /* Length */
81 next++; /* Skip the '\0' */
82 }
83 else
84 length = strlen(start);
85
86 DEBUG(CTRL_INFO, "Found command ``%s'' (%d).\n", start, length);
87
88 /* Check if we recognised one of the known command
89 * We can't use "switch" with strings, so hack with "continue" */
90
91 /* First command : name -> Requested IrDA nickname */
92 if(!strncmp(start, "name", 4))
93 {
94 /* Copy the name only if is included and not "any" */
95 if((length > 5) && (strcmp(start + 5, "any")))
96 {
97 /* Strip out trailing whitespaces */
98 while(isspace(start[length - 1]))
99 length--;
100
101 /* Copy the name for later reuse */
102 memcpy(ap->rname, start + 5, length - 5);
103 ap->rname[length - 5] = '\0';
104 }
105 else
106 ap->rname[0] = '\0';
107 DEBUG(CTRL_INFO, "Got rname = ``%s''\n", ap->rname);
108
109 /* Restart the loop */
110 continue;
111 }
112
113 /* Second command : addr, daddr -> Requested IrDA destination address
114 * Also process : saddr -> Requested IrDA source address */
115 if((!strncmp(start, "addr", 4)) ||
116 (!strncmp(start, "daddr", 5)) ||
117 (!strncmp(start, "saddr", 5)))
118 {
119 __u32 addr = DEV_ADDR_ANY;
120
121 /* Copy the address only if is included and not "any" */
122 if((length > 5) && (strcmp(start + 5, "any")))
123 {
124 char * begp = start + 5;
125 char * endp;
126
127 /* Scrap whitespaces before the command */
128 while(isspace(*begp))
129 begp++;
130
131 /* Convert argument to a number (last arg is the base) */
132 addr = simple_strtoul(begp, &endp, 16);
133 /* Has it worked ? (endp should be start + length) */
134 DABORT(endp <= (start + 5), -EINVAL,
135 CTRL_ERROR, "Invalid address.\n");
136 }
137 /* Which type of address ? */
138 if(start[0] == 's')
139 {
140 /* Save it */
141 ap->rsaddr = addr;
142 DEBUG(CTRL_INFO, "Got rsaddr = %08x\n", ap->rsaddr);
143 }
144 else
145 {
146 /* Save it */
147 ap->rdaddr = addr;
148 DEBUG(CTRL_INFO, "Got rdaddr = %08x\n", ap->rdaddr);
149 }
150
151 /* Restart the loop */
152 continue;
153 }
154
155 /* Other possible command : connect N (number of retries) */
156
157 /* No command matched -> Failed... */
158 DABORT(1, -EINVAL, CTRL_ERROR, "Not a recognised IrNET command.\n");
159 }
160
161 /* Success : we have parsed all commands successfully */
162 return(count);
163 }
164
165 #ifdef INITIAL_DISCOVERY
166 /*------------------------------------------------------------------*/
167 /*
168 * Function irnet_read_discovery_log (self)
169 *
170 * Read the content on the discovery log
171 *
172 * This function dump the current content of the discovery log
173 * at the startup of the event channel.
174 * Return 1 if written on the control channel...
175 *
176 * State of the ap->disco_XXX variables :
177 * at socket creation : disco_index = 0 ; disco_number = 0
178 * while reading : disco_index = X ; disco_number = Y
179 * After reading : disco_index = Y ; disco_number = -1
180 */
181 static inline int
irnet_read_discovery_log(irnet_socket * ap,char * event)182 irnet_read_discovery_log(irnet_socket * ap,
183 char * event)
184 {
185 int done_event = 0;
186
187 DENTER(CTRL_TRACE, "(ap=0x%X, event=0x%X)\n",
188 (unsigned int) ap, (unsigned int) event);
189
190 /* Test if we have some work to do or we have already finished */
191 if(ap->disco_number == -1)
192 {
193 DEBUG(CTRL_INFO, "Already done\n");
194 return 0;
195 }
196
197 /* Test if it's the first time and therefore we need to get the log */
198 if(ap->disco_index == 0)
199 {
200 __u16 mask = irlmp_service_to_hint(S_LAN);
201
202 /* Ask IrLMP for the current discovery log */
203 ap->discoveries = irlmp_get_discoveries(&ap->disco_number, mask,
204 DISCOVERY_DEFAULT_SLOTS);
205 /* Check if the we got some results */
206 if(ap->discoveries == NULL)
207 ap->disco_number = -1;
208 DEBUG(CTRL_INFO, "Got the log (0x%X), size is %d\n",
209 (unsigned int) ap->discoveries, ap->disco_number);
210 }
211
212 /* Check if we have more item to dump */
213 if(ap->disco_index < ap->disco_number)
214 {
215 /* Write an event */
216 sprintf(event, "Found %08x (%s) behind %08x\n",
217 ap->discoveries[ap->disco_index].daddr,
218 ap->discoveries[ap->disco_index].info,
219 ap->discoveries[ap->disco_index].saddr);
220 DEBUG(CTRL_INFO, "Writing discovery %d : %s\n",
221 ap->disco_index, ap->discoveries[ap->disco_index].info);
222
223 /* We have an event */
224 done_event = 1;
225 /* Next discovery */
226 ap->disco_index++;
227 }
228
229 /* Check if we have done the last item */
230 if(ap->disco_index >= ap->disco_number)
231 {
232 /* No more items : remove the log and signal termination */
233 DEBUG(CTRL_INFO, "Cleaning up log (0x%X)\n",
234 (unsigned int) ap->discoveries);
235 if(ap->discoveries != NULL)
236 {
237 /* Cleanup our copy of the discovery log */
238 kfree(ap->discoveries);
239 ap->discoveries = NULL;
240 }
241 ap->disco_number = -1;
242 }
243
244 return done_event;
245 }
246 #endif /* INITIAL_DISCOVERY */
247
248 /*------------------------------------------------------------------*/
249 /*
250 * Read is used to get IrNET events
251 */
252 static inline ssize_t
irnet_ctrl_read(irnet_socket * ap,struct file * file,char * buf,size_t count)253 irnet_ctrl_read(irnet_socket * ap,
254 struct file * file,
255 char * buf,
256 size_t count)
257 {
258 DECLARE_WAITQUEUE(wait, current);
259 char event[64]; /* Max event is 61 char */
260 ssize_t ret = 0;
261
262 DENTER(CTRL_TRACE, "(ap=0x%X, count=%d)\n", (unsigned int) ap, count);
263
264 /* Check if we can write an event out in one go */
265 DABORT(count < sizeof(event), -EOVERFLOW, CTRL_ERROR, "Buffer to small.\n");
266
267 #ifdef INITIAL_DISCOVERY
268 /* Check if we have read the log */
269 if(irnet_read_discovery_log(ap, event))
270 {
271 /* We have an event !!! Copy it to the user */
272 if(copy_to_user(buf, event, strlen(event)))
273 {
274 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
275 return -EFAULT;
276 }
277
278 DEXIT(CTRL_TRACE, "\n");
279 return(strlen(event));
280 }
281 #endif /* INITIAL_DISCOVERY */
282
283 /* Put ourselves on the wait queue to be woken up */
284 add_wait_queue(&irnet_events.rwait, &wait);
285 current->state = TASK_INTERRUPTIBLE;
286 for(;;)
287 {
288 /* If there is unread events */
289 ret = 0;
290 if(ap->event_index != irnet_events.index)
291 break;
292 ret = -EAGAIN;
293 if(file->f_flags & O_NONBLOCK)
294 break;
295 ret = -ERESTARTSYS;
296 if(signal_pending(current))
297 break;
298 /* Yield and wait to be woken up */
299 schedule();
300 }
301 current->state = TASK_RUNNING;
302 remove_wait_queue(&irnet_events.rwait, &wait);
303
304 /* Did we got it ? */
305 if(ret != 0)
306 {
307 /* No, return the error code */
308 DEXIT(CTRL_TRACE, " - ret %d\n", ret);
309 return ret;
310 }
311
312 /* Which event is it ? */
313 switch(irnet_events.log[ap->event_index].event)
314 {
315 case IRNET_DISCOVER:
316 sprintf(event, "Discovered %08x (%s) behind %08x\n",
317 irnet_events.log[ap->event_index].daddr,
318 irnet_events.log[ap->event_index].name,
319 irnet_events.log[ap->event_index].saddr);
320 break;
321 case IRNET_EXPIRE:
322 sprintf(event, "Expired %08x (%s) behind %08x\n",
323 irnet_events.log[ap->event_index].daddr,
324 irnet_events.log[ap->event_index].name,
325 irnet_events.log[ap->event_index].saddr);
326 break;
327 case IRNET_CONNECT_TO:
328 sprintf(event, "Connected to %08x (%s) on ppp%d\n",
329 irnet_events.log[ap->event_index].daddr,
330 irnet_events.log[ap->event_index].name,
331 irnet_events.log[ap->event_index].unit);
332 break;
333 case IRNET_CONNECT_FROM:
334 sprintf(event, "Connection from %08x (%s) on ppp%d\n",
335 irnet_events.log[ap->event_index].daddr,
336 irnet_events.log[ap->event_index].name,
337 irnet_events.log[ap->event_index].unit);
338 break;
339 case IRNET_REQUEST_FROM:
340 sprintf(event, "Request from %08x (%s) behind %08x\n",
341 irnet_events.log[ap->event_index].daddr,
342 irnet_events.log[ap->event_index].name,
343 irnet_events.log[ap->event_index].saddr);
344 break;
345 case IRNET_NOANSWER_FROM:
346 sprintf(event, "No-answer from %08x (%s) on ppp%d\n",
347 irnet_events.log[ap->event_index].daddr,
348 irnet_events.log[ap->event_index].name,
349 irnet_events.log[ap->event_index].unit);
350 break;
351 case IRNET_BLOCKED_LINK:
352 sprintf(event, "Blocked link with %08x (%s) on ppp%d\n",
353 irnet_events.log[ap->event_index].daddr,
354 irnet_events.log[ap->event_index].name,
355 irnet_events.log[ap->event_index].unit);
356 break;
357 case IRNET_DISCONNECT_FROM:
358 sprintf(event, "Disconnection from %08x (%s) on ppp%d\n",
359 irnet_events.log[ap->event_index].daddr,
360 irnet_events.log[ap->event_index].name,
361 irnet_events.log[ap->event_index].unit);
362 break;
363 case IRNET_DISCONNECT_TO:
364 sprintf(event, "Disconnected to %08x (%s)\n",
365 irnet_events.log[ap->event_index].daddr,
366 irnet_events.log[ap->event_index].name);
367 break;
368 default:
369 sprintf(event, "Bug\n");
370 }
371 /* Increment our event index */
372 ap->event_index = (ap->event_index + 1) % IRNET_MAX_EVENTS;
373
374 DEBUG(CTRL_INFO, "Event is :%s", event);
375
376 /* Copy it to the user */
377 if(copy_to_user(buf, event, strlen(event)))
378 {
379 DERROR(CTRL_ERROR, "Invalid user space pointer.\n");
380 return -EFAULT;
381 }
382
383 DEXIT(CTRL_TRACE, "\n");
384 return(strlen(event));
385 }
386
387 /*------------------------------------------------------------------*/
388 /*
389 * Poll : called when someone do a select on /dev/irnet.
390 * Just check if there are new events...
391 */
392 static inline unsigned int
irnet_ctrl_poll(irnet_socket * ap,struct file * file,poll_table * wait)393 irnet_ctrl_poll(irnet_socket * ap,
394 struct file * file,
395 poll_table * wait)
396 {
397 unsigned int mask;
398
399 DENTER(CTRL_TRACE, "(ap=0x%X)\n", (unsigned int) ap);
400
401 poll_wait(file, &irnet_events.rwait, wait);
402 mask = POLLOUT | POLLWRNORM;
403 /* If there is unread events */
404 if(ap->event_index != irnet_events.index)
405 mask |= POLLIN | POLLRDNORM;
406 #ifdef INITIAL_DISCOVERY
407 if(ap->disco_number != -1)
408 mask |= POLLIN | POLLRDNORM;
409 #endif /* INITIAL_DISCOVERY */
410
411 DEXIT(CTRL_TRACE, " - mask=0x%X\n", mask);
412 return mask;
413 }
414
415
416 /*********************** FILESYSTEM CALLBACKS ***********************/
417 /*
418 * Implement the usual open, read, write functions that will be called
419 * by the file system when some action is performed on /dev/irnet.
420 * Most of those actions will in fact be performed by "pppd" or
421 * the control channel, we just act as a redirector...
422 */
423
424 /*------------------------------------------------------------------*/
425 /*
426 * Open : when somebody open /dev/irnet
427 * We basically create a new instance of irnet and initialise it.
428 */
429 static int
dev_irnet_open(struct inode * inode,struct file * file)430 dev_irnet_open(struct inode * inode,
431 struct file * file)
432 {
433 struct irnet_socket * ap;
434 int err;
435
436 DENTER(FS_TRACE, "(file=0x%X)\n", (unsigned int) file);
437
438 #ifdef SECURE_DEVIRNET
439 /* This could (should?) be enforced by the permissions on /dev/irnet. */
440 if(!capable(CAP_NET_ADMIN))
441 return -EPERM;
442 #endif /* SECURE_DEVIRNET */
443
444 /* Allocate a private structure for this IrNET instance */
445 ap = kmalloc(sizeof(*ap), GFP_KERNEL);
446 DABORT(ap == NULL, -ENOMEM, FS_ERROR, "Can't allocate struct irnet...\n");
447
448 MOD_INC_USE_COUNT;
449
450 /* initialize the irnet structure */
451 memset(ap, 0, sizeof(*ap));
452 ap->file = file;
453
454 /* PPP channel setup */
455 ap->ppp_open = 0;
456 ap->chan.private = ap;
457 ap->chan.ops = &irnet_ppp_ops;
458 ap->chan.mtu = (2048 - TTP_MAX_HEADER - 2 - PPP_HDRLEN);
459 ap->chan.hdrlen = 2 + TTP_MAX_HEADER; /* for A/C + Max IrDA hdr */
460 /* PPP parameters */
461 ap->mru = (2048 - TTP_MAX_HEADER - 2 - PPP_HDRLEN);
462 ap->xaccm[0] = ~0U;
463 ap->xaccm[3] = 0x60000000U;
464 ap->raccm = ~0U;
465
466 /* Setup the IrDA part... */
467 err = irda_irnet_create(ap);
468 if(err)
469 {
470 DERROR(FS_ERROR, "Can't setup IrDA link...\n");
471 kfree(ap);
472 MOD_DEC_USE_COUNT;
473 return err;
474 }
475
476 /* For the control channel */
477 ap->event_index = irnet_events.index; /* Cancel all past events */
478
479 /* Put our stuff where we will be able to find it later */
480 file->private_data = ap;
481
482 DEXIT(FS_TRACE, " - ap=0x%X\n", (unsigned int) ap);
483 return 0;
484 }
485
486
487 /*------------------------------------------------------------------*/
488 /*
489 * Close : when somebody close /dev/irnet
490 * Destroy the instance of /dev/irnet
491 */
492 static int
dev_irnet_close(struct inode * inode,struct file * file)493 dev_irnet_close(struct inode * inode,
494 struct file * file)
495 {
496 irnet_socket * ap = (struct irnet_socket *) file->private_data;
497
498 DENTER(FS_TRACE, "(file=0x%X, ap=0x%X)\n",
499 (unsigned int) file, (unsigned int) ap);
500 DABORT(ap == NULL, 0, FS_ERROR, "ap is NULL !!!\n");
501
502 /* Detach ourselves */
503 file->private_data = NULL;
504
505 /* Close IrDA stuff */
506 irda_irnet_destroy(ap);
507
508 /* Disconnect from the generic PPP layer if not already done */
509 if(ap->ppp_open)
510 {
511 DERROR(FS_ERROR, "Channel still registered - deregistering !\n");
512 ppp_unregister_channel(&ap->chan);
513 ap->ppp_open = 0;
514 }
515
516 kfree(ap);
517 MOD_DEC_USE_COUNT;
518
519 DEXIT(FS_TRACE, "\n");
520 return 0;
521 }
522
523 /*------------------------------------------------------------------*/
524 /*
525 * Write does nothing.
526 * (we receive packet from ppp_generic through ppp_irnet_send())
527 */
528 static ssize_t
dev_irnet_write(struct file * file,const char * buf,size_t count,loff_t * ppos)529 dev_irnet_write(struct file * file,
530 const char * buf,
531 size_t count,
532 loff_t * ppos)
533 {
534 irnet_socket * ap = (struct irnet_socket *) file->private_data;
535
536 DPASS(FS_TRACE, "(file=0x%X, ap=0x%X, count=%d)\n",
537 (unsigned int) file, (unsigned int) ap, count);
538 DABORT(ap == NULL, -ENXIO, FS_ERROR, "ap is NULL !!!\n");
539
540 /* If we are connected to ppp_generic, let it handle the job */
541 if(ap->ppp_open)
542 return -EAGAIN;
543 else
544 return irnet_ctrl_write(ap, buf, count);
545 }
546
547 /*------------------------------------------------------------------*/
548 /*
549 * Read doesn't do much either.
550 * (pppd poll us, but ultimately reads through /dev/ppp)
551 */
552 static ssize_t
dev_irnet_read(struct file * file,char * buf,size_t count,loff_t * ppos)553 dev_irnet_read(struct file * file,
554 char * buf,
555 size_t count,
556 loff_t * ppos)
557 {
558 irnet_socket * ap = (struct irnet_socket *) file->private_data;
559
560 DPASS(FS_TRACE, "(file=0x%X, ap=0x%X, count=%d)\n",
561 (unsigned int) file, (unsigned int) ap, count);
562 DABORT(ap == NULL, -ENXIO, FS_ERROR, "ap is NULL !!!\n");
563
564 /* If we are connected to ppp_generic, let it handle the job */
565 if(ap->ppp_open)
566 return -EAGAIN;
567 else
568 return irnet_ctrl_read(ap, file, buf, count);
569 }
570
571 /*------------------------------------------------------------------*/
572 /*
573 * Poll : called when someone do a select on /dev/irnet
574 */
575 static unsigned int
dev_irnet_poll(struct file * file,poll_table * wait)576 dev_irnet_poll(struct file * file,
577 poll_table * wait)
578 {
579 irnet_socket * ap = (struct irnet_socket *) file->private_data;
580 unsigned int mask;
581
582 DENTER(FS_TRACE, "(file=0x%X, ap=0x%X)\n",
583 (unsigned int) file, (unsigned int) ap);
584
585 mask = POLLOUT | POLLWRNORM;
586 DABORT(ap == NULL, mask, FS_ERROR, "ap is NULL !!!\n");
587
588 /* If we are connected to ppp_generic, let it handle the job */
589 if(!ap->ppp_open)
590 mask |= irnet_ctrl_poll(ap, file, wait);
591
592 DEXIT(FS_TRACE, " - mask=0x%X\n", mask);
593 return(mask);
594 }
595
596 /*------------------------------------------------------------------*/
597 /*
598 * IOCtl : Called when someone does some ioctls on /dev/irnet
599 * This is the way pppd configure us and control us while the PPP
600 * instance is active.
601 */
602 static int
dev_irnet_ioctl(struct inode * inode,struct file * file,unsigned int cmd,unsigned long arg)603 dev_irnet_ioctl(struct inode * inode,
604 struct file * file,
605 unsigned int cmd,
606 unsigned long arg)
607 {
608 irnet_socket * ap = (struct irnet_socket *) file->private_data;
609 int err;
610 int val;
611
612 DENTER(FS_TRACE, "(file=0x%X, ap=0x%X, cmd=0x%X)\n",
613 (unsigned int) file, (unsigned int) ap, cmd);
614
615 /* Basic checks... */
616 DASSERT(ap != NULL, -ENXIO, PPP_ERROR, "ap is NULL...\n");
617 #ifdef SECURE_DEVIRNET
618 if(!capable(CAP_NET_ADMIN))
619 return -EPERM;
620 #endif /* SECURE_DEVIRNET */
621
622 err = -EFAULT;
623 switch(cmd)
624 {
625 /* Set discipline (should be N_SYNC_PPP or N_TTY) */
626 case TIOCSETD:
627 if(get_user(val, (int *) arg))
628 break;
629 if((val == N_SYNC_PPP) || (val == N_PPP))
630 {
631 DEBUG(FS_INFO, "Entering PPP discipline.\n");
632 /* PPP channel setup (ap->chan in configued in dev_irnet_open())*/
633 err = ppp_register_channel(&ap->chan);
634 if(err == 0)
635 {
636 /* Our ppp side is active */
637 ap->ppp_open = 1;
638
639 DEBUG(FS_INFO, "Trying to establish a connection.\n");
640 /* Setup the IrDA link now - may fail... */
641 irda_irnet_connect(ap);
642 }
643 else
644 DERROR(FS_ERROR, "Can't setup PPP channel...\n");
645 }
646 else
647 {
648 /* In theory, should be N_TTY */
649 DEBUG(FS_INFO, "Exiting PPP discipline.\n");
650 /* Disconnect from the generic PPP layer */
651 if(ap->ppp_open)
652 ppp_unregister_channel(&ap->chan);
653 else
654 DERROR(FS_ERROR, "Channel not registered !\n");
655 ap->ppp_open = 0;
656 err = 0;
657 }
658 break;
659
660 /* Query PPP channel and unit number */
661 case PPPIOCGCHAN:
662 if(!ap->ppp_open)
663 break;
664 if(put_user(ppp_channel_index(&ap->chan), (int *) arg))
665 break;
666 DEBUG(FS_INFO, "Query channel.\n");
667 err = 0;
668 break;
669 case PPPIOCGUNIT:
670 if(!ap->ppp_open)
671 break;
672 if(put_user(ppp_unit_number(&ap->chan), (int *) arg))
673 break;
674 DEBUG(FS_INFO, "Query unit number.\n");
675 err = 0;
676 break;
677
678 /* All these ioctls can be passed both directly and from ppp_generic,
679 * so we just deal with them in one place...
680 */
681 case PPPIOCGFLAGS:
682 case PPPIOCSFLAGS:
683 case PPPIOCGASYNCMAP:
684 case PPPIOCSASYNCMAP:
685 case PPPIOCGRASYNCMAP:
686 case PPPIOCSRASYNCMAP:
687 case PPPIOCGXASYNCMAP:
688 case PPPIOCSXASYNCMAP:
689 case PPPIOCGMRU:
690 case PPPIOCSMRU:
691 DEBUG(FS_INFO, "Standard PPP ioctl.\n");
692 if(!capable(CAP_NET_ADMIN))
693 err = -EPERM;
694 else
695 err = ppp_irnet_ioctl(&ap->chan, cmd, arg);
696 break;
697
698 /* TTY IOCTLs : Pretend that we are a tty, to keep pppd happy */
699 /* Get termios */
700 case TCGETS:
701 DEBUG(FS_INFO, "Get termios.\n");
702 if(kernel_termios_to_user_termios((struct termios *)arg, &ap->termios))
703 break;
704 err = 0;
705 break;
706 /* Set termios */
707 case TCSETSF:
708 DEBUG(FS_INFO, "Set termios.\n");
709 if(user_termios_to_kernel_termios(&ap->termios, (struct termios *) arg))
710 break;
711 err = 0;
712 break;
713
714 /* Set DTR/RTS */
715 case TIOCMBIS:
716 case TIOCMBIC:
717 /* Set exclusive/non-exclusive mode */
718 case TIOCEXCL:
719 case TIOCNXCL:
720 DEBUG(FS_INFO, "TTY compatibility.\n");
721 err = 0;
722 break;
723
724 case TCGETA:
725 DEBUG(FS_INFO, "TCGETA\n");
726 break;
727
728 case TCFLSH:
729 DEBUG(FS_INFO, "TCFLSH\n");
730 /* Note : this will flush buffers in PPP, so it *must* be done
731 * We should also worry that we don't accept junk here and that
732 * we get rid of our own buffers */
733 #ifdef FLUSH_TO_PPP
734 ppp_output_wakeup(&ap->chan);
735 #endif /* FLUSH_TO_PPP */
736 err = 0;
737 break;
738
739 case FIONREAD:
740 DEBUG(FS_INFO, "FIONREAD\n");
741 val = 0;
742 if(put_user(val, (int *) arg))
743 break;
744 err = 0;
745 break;
746
747 default:
748 DERROR(FS_ERROR, "Unsupported ioctl (0x%X)\n", cmd);
749 err = -ENOIOCTLCMD;
750 }
751
752 DEXIT(FS_TRACE, " - err = 0x%X\n", err);
753 return err;
754 }
755
756 /************************** PPP CALLBACKS **************************/
757 /*
758 * This are the functions that the generic PPP driver in the kernel
759 * will call to communicate to us.
760 */
761
762 /*------------------------------------------------------------------*/
763 /*
764 * Prepare the ppp frame for transmission over the IrDA socket.
765 * We make sure that the header space is enough, and we change ppp header
766 * according to flags passed by pppd.
767 * This is not a callback, but just a helper function used in ppp_irnet_send()
768 */
769 static inline struct sk_buff *
irnet_prepare_skb(irnet_socket * ap,struct sk_buff * skb)770 irnet_prepare_skb(irnet_socket * ap,
771 struct sk_buff * skb)
772 {
773 unsigned char * data;
774 int proto; /* PPP protocol */
775 int islcp; /* Protocol == LCP */
776 int needaddr; /* Need PPP address */
777
778 DENTER(PPP_TRACE, "(ap=0x%X, skb=0x%X)\n",
779 (unsigned int) ap, (unsigned int) skb);
780
781 /* Extract PPP protocol from the frame */
782 data = skb->data;
783 proto = (data[0] << 8) + data[1];
784
785 /* LCP packets with codes between 1 (configure-request)
786 * and 7 (code-reject) must be sent as though no options
787 * have been negotiated. */
788 islcp = (proto == PPP_LCP) && (1 <= data[2]) && (data[2] <= 7);
789
790 /* compress protocol field if option enabled */
791 if((data[0] == 0) && (ap->flags & SC_COMP_PROT) && (!islcp))
792 skb_pull(skb,1);
793
794 /* Check if we need address/control fields */
795 needaddr = 2*((ap->flags & SC_COMP_AC) == 0 || islcp);
796
797 /* Is the skb headroom large enough to contain all IrDA-headers? */
798 if((skb_headroom(skb) < (ap->max_header_size + needaddr)) ||
799 (skb_shared(skb)))
800 {
801 struct sk_buff * new_skb;
802
803 DEBUG(PPP_INFO, "Reallocating skb\n");
804
805 /* Create a new skb */
806 new_skb = skb_realloc_headroom(skb, ap->max_header_size + needaddr);
807
808 /* We have to free the original skb anyway */
809 dev_kfree_skb(skb);
810
811 /* Did the realloc succeed ? */
812 DABORT(new_skb == NULL, NULL, PPP_ERROR, "Could not realloc skb\n");
813
814 /* Use the new skb instead */
815 skb = new_skb;
816 }
817
818 /* prepend address/control fields if necessary */
819 if(needaddr)
820 {
821 skb_push(skb, 2);
822 skb->data[0] = PPP_ALLSTATIONS;
823 skb->data[1] = PPP_UI;
824 }
825
826 DEXIT(PPP_TRACE, "\n");
827
828 return skb;
829 }
830
831 /*------------------------------------------------------------------*/
832 /*
833 * Send a packet to the peer over the IrTTP connection.
834 * Returns 1 iff the packet was accepted.
835 * Returns 0 iff packet was not consumed.
836 * If the packet was not accepted, we will call ppp_output_wakeup
837 * at some later time to reactivate flow control in ppp_generic.
838 */
839 static int
ppp_irnet_send(struct ppp_channel * chan,struct sk_buff * skb)840 ppp_irnet_send(struct ppp_channel * chan,
841 struct sk_buff * skb)
842 {
843 irnet_socket * self = (struct irnet_socket *) chan->private;
844 int ret;
845
846 DENTER(PPP_TRACE, "(channel=0x%X, ap/self=0x%X)\n",
847 (unsigned int) chan, (unsigned int) self);
848
849 /* Check if things are somewhat valid... */
850 DASSERT(self != NULL, 0, PPP_ERROR, "Self is NULL !!!\n");
851
852 /* Check if we are connected */
853 if(!(test_bit(0, &self->ttp_open)))
854 {
855 #ifdef CONNECT_IN_SEND
856 /* Let's try to connect one more time... */
857 /* Note : we won't be connected after this call, but we should be
858 * ready for next packet... */
859 /* If we are already connecting, this will fail */
860 irda_irnet_connect(self);
861 #endif /* CONNECT_IN_SEND */
862
863 DEBUG(PPP_INFO, "IrTTP not ready ! (%d-%d)\n",
864 self->ttp_open, self->ttp_connect);
865
866 /* Note : we can either drop the packet or block the packet.
867 *
868 * Blocking the packet allow us a better connection time,
869 * because by calling ppp_output_wakeup() we can have
870 * ppp_generic resending the LCP request immediately to us,
871 * rather than waiting for one of pppd periodic transmission of
872 * LCP request.
873 *
874 * On the other hand, if we block all packet, all those periodic
875 * transmissions of pppd accumulate in ppp_generic, creating a
876 * backlog of LCP request. When we eventually connect later on,
877 * we have to transmit all this backlog before we can connect
878 * proper (if we don't timeout before).
879 *
880 * The current strategy is as follow :
881 * While we are attempting to connect, we block packets to get
882 * a better connection time.
883 * If we fail to connect, we drain the queue and start dropping packets
884 */
885 #ifdef BLOCK_WHEN_CONNECT
886 /* If we are attempting to connect */
887 if(test_bit(0, &self->ttp_connect))
888 {
889 /* Blocking packet, ppp_generic will retry later */
890 return 0;
891 }
892 #endif /* BLOCK_WHEN_CONNECT */
893
894 /* Dropping packet, pppd will retry later */
895 dev_kfree_skb(skb);
896 return 1;
897 }
898
899 /* Check if the queue can accept any packet, otherwise block */
900 if(self->tx_flow != FLOW_START)
901 DRETURN(0, PPP_INFO, "IrTTP queue full (%d skbs)...\n",
902 skb_queue_len(&self->tsap->tx_queue));
903
904 /* Prepare ppp frame for transmission */
905 skb = irnet_prepare_skb(self, skb);
906 DABORT(skb == NULL, 1, PPP_ERROR, "Prepare skb for Tx failed.\n");
907
908 /* Send the packet to IrTTP */
909 ret = irttp_data_request(self->tsap, skb);
910 if(ret < 0)
911 {
912 /*
913 * > IrTTPs tx queue is full, so we just have to
914 * > drop the frame! You might think that we should
915 * > just return -1 and don't deallocate the frame,
916 * > but that is dangerous since it's possible that
917 * > we have replaced the original skb with a new
918 * > one with larger headroom, and that would really
919 * > confuse do_dev_queue_xmit() in dev.c! I have
920 * > tried :-) DB
921 * Correction : we verify the flow control above (self->tx_flow),
922 * so we come here only if IrTTP doesn't like the packet (empty,
923 * too large, IrTTP not connected). In those rare cases, it's ok
924 * to drop it, we don't want to see it here again...
925 * Jean II
926 */
927 DERROR(PPP_ERROR, "IrTTP doesn't like this packet !!! (0x%X)\n", ret);
928 dev_kfree_skb(skb);
929 }
930
931 DEXIT(PPP_TRACE, "\n");
932 return 1; /* Packet has been consumed */
933 }
934
935 /*------------------------------------------------------------------*/
936 /*
937 * Take care of the ioctls that ppp_generic doesn't want to deal with...
938 * Note : we are also called from dev_irnet_ioctl().
939 */
940 static int
ppp_irnet_ioctl(struct ppp_channel * chan,unsigned int cmd,unsigned long arg)941 ppp_irnet_ioctl(struct ppp_channel * chan,
942 unsigned int cmd,
943 unsigned long arg)
944 {
945 irnet_socket * ap = (struct irnet_socket *) chan->private;
946 int err;
947 int val;
948 u32 accm[8];
949
950 DENTER(PPP_TRACE, "(channel=0x%X, ap=0x%X, cmd=0x%X)\n",
951 (unsigned int) chan, (unsigned int) ap, cmd);
952
953 /* Basic checks... */
954 DASSERT(ap != NULL, -ENXIO, PPP_ERROR, "ap is NULL...\n");
955
956 err = -EFAULT;
957 switch(cmd)
958 {
959 /* PPP flags */
960 case PPPIOCGFLAGS:
961 val = ap->flags | ap->rbits;
962 if(put_user(val, (int *) arg))
963 break;
964 err = 0;
965 break;
966 case PPPIOCSFLAGS:
967 if(get_user(val, (int *) arg))
968 break;
969 ap->flags = val & ~SC_RCV_BITS;
970 ap->rbits = val & SC_RCV_BITS;
971 err = 0;
972 break;
973
974 /* Async map stuff - all dummy to please pppd */
975 case PPPIOCGASYNCMAP:
976 if(put_user(ap->xaccm[0], (u32 *) arg))
977 break;
978 err = 0;
979 break;
980 case PPPIOCSASYNCMAP:
981 if(get_user(ap->xaccm[0], (u32 *) arg))
982 break;
983 err = 0;
984 break;
985 case PPPIOCGRASYNCMAP:
986 if(put_user(ap->raccm, (u32 *) arg))
987 break;
988 err = 0;
989 break;
990 case PPPIOCSRASYNCMAP:
991 if(get_user(ap->raccm, (u32 *) arg))
992 break;
993 err = 0;
994 break;
995 case PPPIOCGXASYNCMAP:
996 if(copy_to_user((void *) arg, ap->xaccm, sizeof(ap->xaccm)))
997 break;
998 err = 0;
999 break;
1000 case PPPIOCSXASYNCMAP:
1001 if(copy_from_user(accm, (void *) arg, sizeof(accm)))
1002 break;
1003 accm[2] &= ~0x40000000U; /* can't escape 0x5e */
1004 accm[3] |= 0x60000000U; /* must escape 0x7d, 0x7e */
1005 memcpy(ap->xaccm, accm, sizeof(ap->xaccm));
1006 err = 0;
1007 break;
1008
1009 /* Max PPP frame size */
1010 case PPPIOCGMRU:
1011 if(put_user(ap->mru, (int *) arg))
1012 break;
1013 err = 0;
1014 break;
1015 case PPPIOCSMRU:
1016 if(get_user(val, (int *) arg))
1017 break;
1018 if(val < PPP_MRU)
1019 val = PPP_MRU;
1020 ap->mru = val;
1021 err = 0;
1022 break;
1023
1024 default:
1025 DEBUG(PPP_INFO, "Unsupported ioctl (0x%X)\n", cmd);
1026 err = -ENOIOCTLCMD;
1027 }
1028
1029 DEXIT(PPP_TRACE, " - err = 0x%X\n", err);
1030 return err;
1031 }
1032
1033 /************************** INITIALISATION **************************/
1034 /*
1035 * Module initialisation and all that jazz...
1036 */
1037
1038 /*------------------------------------------------------------------*/
1039 /*
1040 * Hook our device callbacks in the filesystem, to connect our code
1041 * to /dev/irnet
1042 */
1043 int
ppp_irnet_init(void)1044 ppp_irnet_init(void)
1045 {
1046 int err = 0;
1047
1048 DENTER(MODULE_TRACE, "()\n");
1049
1050 /* Allocate ourselves as a minor in the misc range */
1051 err = misc_register(&irnet_misc_device);
1052
1053 DEXIT(MODULE_TRACE, "\n");
1054 return err;
1055 }
1056
1057 /*------------------------------------------------------------------*/
1058 /*
1059 * Cleanup at exit...
1060 */
1061 void
ppp_irnet_cleanup(void)1062 ppp_irnet_cleanup(void)
1063 {
1064 DENTER(MODULE_TRACE, "()\n");
1065
1066 /* De-allocate /dev/irnet minor in misc range */
1067 misc_deregister(&irnet_misc_device);
1068
1069 DEXIT(MODULE_TRACE, "\n");
1070 }
1071
1072 #ifdef MODULE
1073 /*------------------------------------------------------------------*/
1074 /*
1075 * Module main entry point
1076 */
1077 int
init_module(void)1078 init_module(void)
1079 {
1080 int err;
1081
1082 /* Initialise both parts... */
1083 err = irda_irnet_init();
1084 if(!err)
1085 err = ppp_irnet_init();
1086 return err;
1087 }
1088
1089 /*------------------------------------------------------------------*/
1090 /*
1091 * Module exit
1092 */
1093 void
cleanup_module(void)1094 cleanup_module(void)
1095 {
1096 irda_irnet_cleanup();
1097 return ppp_irnet_cleanup();
1098 }
1099 #endif /* MODULE */
1100 MODULE_LICENSE("GPL");
1101