tty: The big operations rework
[linux-2.6-block.git] / drivers / net / ppp_async.c
CommitLineData
1da177e4
LT
1/*
2 * PPP async serial channel driver for Linux.
3 *
4 * Copyright 1999 Paul Mackerras.
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 * This driver provides the encapsulation and framing for sending
12 * and receiving PPP frames over async serial lines. It relies on
13 * the generic PPP layer to give it frames to send and to process
14 * received frames. It implements the PPP line discipline.
15 *
16 * Part of the code in this driver was inspired by the old async-only
17 * PPP driver, written by Michael Callahan and Al Longyear, and
18 * subsequently hacked by Paul Mackerras.
19 */
20
21#include <linux/module.h>
22#include <linux/kernel.h>
23#include <linux/skbuff.h>
24#include <linux/tty.h>
25#include <linux/netdevice.h>
26#include <linux/poll.h>
27#include <linux/crc-ccitt.h>
28#include <linux/ppp_defs.h>
29#include <linux/if_ppp.h>
30#include <linux/ppp_channel.h>
31#include <linux/spinlock.h>
32#include <linux/init.h>
ff5688ae 33#include <linux/jiffies.h>
1da177e4 34#include <asm/uaccess.h>
6722e78c 35#include <asm/string.h>
1da177e4
LT
36
37#define PPP_VERSION "2.4.2"
38
39#define OBUFSIZE 256
40
41/* Structure for storing local state. */
42struct asyncppp {
43 struct tty_struct *tty;
44 unsigned int flags;
45 unsigned int state;
46 unsigned int rbits;
47 int mru;
48 spinlock_t xmit_lock;
49 spinlock_t recv_lock;
50 unsigned long xmit_flags;
51 u32 xaccm[8];
52 u32 raccm;
53 unsigned int bytes_sent;
54 unsigned int bytes_rcvd;
55
56 struct sk_buff *tpkt;
57 int tpkt_pos;
58 u16 tfcs;
59 unsigned char *optr;
60 unsigned char *olim;
61 unsigned long last_xmit;
62
63 struct sk_buff *rpkt;
64 int lcp_fcs;
65 struct sk_buff_head rqueue;
66
67 struct tasklet_struct tsk;
68
69 atomic_t refcnt;
70 struct semaphore dead_sem;
71 struct ppp_channel chan; /* interface to generic ppp layer */
72 unsigned char obuf[OBUFSIZE];
73};
74
75/* Bit numbers in xmit_flags */
76#define XMIT_WAKEUP 0
77#define XMIT_FULL 1
78#define XMIT_BUSY 2
79
80/* State bits */
81#define SC_TOSS 1
82#define SC_ESCAPE 2
83#define SC_PREV_ERROR 4
84
85/* Bits in rbits */
86#define SC_RCV_BITS (SC_RCV_B7_1|SC_RCV_B7_0|SC_RCV_ODDP|SC_RCV_EVNP)
87
88static int flag_time = HZ;
89module_param(flag_time, int, 0);
90MODULE_PARM_DESC(flag_time, "ppp_async: interval between flagged packets (in clock ticks)");
91MODULE_LICENSE("GPL");
92MODULE_ALIAS_LDISC(N_PPP);
93
94/*
95 * Prototypes.
96 */
97static int ppp_async_encode(struct asyncppp *ap);
98static int ppp_async_send(struct ppp_channel *chan, struct sk_buff *skb);
99static int ppp_async_push(struct asyncppp *ap);
100static void ppp_async_flush_output(struct asyncppp *ap);
101static void ppp_async_input(struct asyncppp *ap, const unsigned char *buf,
102 char *flags, int count);
103static int ppp_async_ioctl(struct ppp_channel *chan, unsigned int cmd,
104 unsigned long arg);
105static void ppp_async_process(unsigned long arg);
106
107static void async_lcp_peek(struct asyncppp *ap, unsigned char *data,
108 int len, int inbound);
109
110static struct ppp_channel_ops async_ops = {
111 ppp_async_send,
112 ppp_async_ioctl
113};
114
115/*
116 * Routines implementing the PPP line discipline.
117 */
118
119/*
120 * We have a potential race on dereferencing tty->disc_data,
121 * because the tty layer provides no locking at all - thus one
122 * cpu could be running ppp_asynctty_receive while another
123 * calls ppp_asynctty_close, which zeroes tty->disc_data and
124 * frees the memory that ppp_asynctty_receive is using. The best
125 * way to fix this is to use a rwlock in the tty struct, but for now
126 * we use a single global rwlock for all ttys in ppp line discipline.
127 *
6aa20a22
JG
128 * FIXME: this is no longer true. The _close path for the ldisc is
129 * now guaranteed to be sane.
1da177e4
LT
130 */
131static DEFINE_RWLOCK(disc_data_lock);
132
133static struct asyncppp *ap_get(struct tty_struct *tty)
134{
135 struct asyncppp *ap;
136
137 read_lock(&disc_data_lock);
138 ap = tty->disc_data;
139 if (ap != NULL)
140 atomic_inc(&ap->refcnt);
141 read_unlock(&disc_data_lock);
142 return ap;
143}
144
145static void ap_put(struct asyncppp *ap)
146{
147 if (atomic_dec_and_test(&ap->refcnt))
148 up(&ap->dead_sem);
149}
150
151/*
152 * Called when a tty is put into PPP line discipline. Called in process
153 * context.
154 */
155static int
156ppp_asynctty_open(struct tty_struct *tty)
157{
158 struct asyncppp *ap;
159 int err;
160
f34d7a5b
AC
161 if (tty->ops->write == NULL)
162 return -EOPNOTSUPP;
163
1da177e4 164 err = -ENOMEM;
dd00cc48 165 ap = kzalloc(sizeof(*ap), GFP_KERNEL);
cd228d54 166 if (!ap)
1da177e4
LT
167 goto out;
168
169 /* initialize the asyncppp structure */
1da177e4
LT
170 ap->tty = tty;
171 ap->mru = PPP_MRU;
172 spin_lock_init(&ap->xmit_lock);
173 spin_lock_init(&ap->recv_lock);
174 ap->xaccm[0] = ~0U;
175 ap->xaccm[3] = 0x60000000U;
176 ap->raccm = ~0U;
177 ap->optr = ap->obuf;
178 ap->olim = ap->obuf;
179 ap->lcp_fcs = -1;
180
181 skb_queue_head_init(&ap->rqueue);
182 tasklet_init(&ap->tsk, ppp_async_process, (unsigned long) ap);
183
184 atomic_set(&ap->refcnt, 1);
185 init_MUTEX_LOCKED(&ap->dead_sem);
186
187 ap->chan.private = ap;
188 ap->chan.ops = &async_ops;
189 ap->chan.mtu = PPP_MRU;
190 err = ppp_register_channel(&ap->chan);
191 if (err)
192 goto out_free;
193
194 tty->disc_data = ap;
33f0f88f 195 tty->receive_room = 65536;
1da177e4
LT
196 return 0;
197
198 out_free:
199 kfree(ap);
200 out:
201 return err;
202}
203
204/*
205 * Called when the tty is put into another line discipline
206 * or it hangs up. We have to wait for any cpu currently
207 * executing in any of the other ppp_asynctty_* routines to
208 * finish before we can call ppp_unregister_channel and free
209 * the asyncppp struct. This routine must be called from
210 * process context, not interrupt or softirq context.
211 */
212static void
213ppp_asynctty_close(struct tty_struct *tty)
214{
215 struct asyncppp *ap;
216
217 write_lock_irq(&disc_data_lock);
218 ap = tty->disc_data;
219 tty->disc_data = NULL;
220 write_unlock_irq(&disc_data_lock);
cd228d54 221 if (!ap)
1da177e4
LT
222 return;
223
224 /*
225 * We have now ensured that nobody can start using ap from now
226 * on, but we have to wait for all existing users to finish.
227 * Note that ppp_unregister_channel ensures that no calls to
228 * our channel ops (i.e. ppp_async_send/ioctl) are in progress
229 * by the time it returns.
230 */
231 if (!atomic_dec_and_test(&ap->refcnt))
232 down(&ap->dead_sem);
233 tasklet_kill(&ap->tsk);
234
235 ppp_unregister_channel(&ap->chan);
cd228d54 236 if (ap->rpkt)
1da177e4
LT
237 kfree_skb(ap->rpkt);
238 skb_queue_purge(&ap->rqueue);
cd228d54 239 if (ap->tpkt)
1da177e4
LT
240 kfree_skb(ap->tpkt);
241 kfree(ap);
242}
243
244/*
245 * Called on tty hangup in process context.
246 *
247 * Wait for I/O to driver to complete and unregister PPP channel.
248 * This is already done by the close routine, so just call that.
249 */
250static int ppp_asynctty_hangup(struct tty_struct *tty)
251{
252 ppp_asynctty_close(tty);
253 return 0;
254}
255
256/*
257 * Read does nothing - no data is ever available this way.
258 * Pppd reads and writes packets via /dev/ppp instead.
259 */
260static ssize_t
261ppp_asynctty_read(struct tty_struct *tty, struct file *file,
262 unsigned char __user *buf, size_t count)
263{
264 return -EAGAIN;
265}
266
267/*
268 * Write on the tty does nothing, the packets all come in
269 * from the ppp generic stuff.
270 */
271static ssize_t
272ppp_asynctty_write(struct tty_struct *tty, struct file *file,
273 const unsigned char *buf, size_t count)
274{
275 return -EAGAIN;
276}
277
278/*
279 * Called in process context only. May be re-entered by multiple
280 * ioctl calling threads.
281 */
6aa20a22 282
1da177e4
LT
283static int
284ppp_asynctty_ioctl(struct tty_struct *tty, struct file *file,
285 unsigned int cmd, unsigned long arg)
286{
287 struct asyncppp *ap = ap_get(tty);
288 int err, val;
289 int __user *p = (int __user *)arg;
290
cd228d54 291 if (!ap)
1da177e4
LT
292 return -ENXIO;
293 err = -EFAULT;
294 switch (cmd) {
295 case PPPIOCGCHAN:
296 err = -ENXIO;
cd228d54 297 if (!ap)
1da177e4
LT
298 break;
299 err = -EFAULT;
300 if (put_user(ppp_channel_index(&ap->chan), p))
301 break;
302 err = 0;
303 break;
304
305 case PPPIOCGUNIT:
306 err = -ENXIO;
cd228d54 307 if (!ap)
1da177e4
LT
308 break;
309 err = -EFAULT;
310 if (put_user(ppp_unit_number(&ap->chan), p))
311 break;
312 err = 0;
313 break;
314
1da177e4
LT
315 case TCFLSH:
316 /* flush our buffers and the serial port's buffer */
317 if (arg == TCIOFLUSH || arg == TCOFLUSH)
318 ppp_async_flush_output(ap);
d0127539 319 err = tty_perform_flush(tty, arg);
1da177e4
LT
320 break;
321
322 case FIONREAD:
323 val = 0;
324 if (put_user(val, p))
325 break;
326 err = 0;
327 break;
328
329 default:
d0127539
AC
330 /* Try the various mode ioctls */
331 err = tty_mode_ioctl(tty, file, cmd, arg);
1da177e4
LT
332 }
333
334 ap_put(ap);
335 return err;
336}
337
338/* No kernel lock - fine */
339static unsigned int
340ppp_asynctty_poll(struct tty_struct *tty, struct file *file, poll_table *wait)
341{
342 return 0;
343}
344
1da177e4
LT
345/*
346 * This can now be called from hard interrupt level as well
347 * as soft interrupt level or mainline.
348 */
349static void
350ppp_asynctty_receive(struct tty_struct *tty, const unsigned char *buf,
351 char *cflags, int count)
352{
353 struct asyncppp *ap = ap_get(tty);
354 unsigned long flags;
355
cd228d54 356 if (!ap)
1da177e4
LT
357 return;
358 spin_lock_irqsave(&ap->recv_lock, flags);
359 ppp_async_input(ap, buf, cflags, count);
360 spin_unlock_irqrestore(&ap->recv_lock, flags);
b03efcfb 361 if (!skb_queue_empty(&ap->rqueue))
1da177e4
LT
362 tasklet_schedule(&ap->tsk);
363 ap_put(ap);
364 if (test_and_clear_bit(TTY_THROTTLED, &tty->flags)
f34d7a5b
AC
365 && tty->ops->unthrottle)
366 tty->ops->unthrottle(tty);
1da177e4
LT
367}
368
369static void
370ppp_asynctty_wakeup(struct tty_struct *tty)
371{
372 struct asyncppp *ap = ap_get(tty);
373
374 clear_bit(TTY_DO_WRITE_WAKEUP, &tty->flags);
cd228d54 375 if (!ap)
1da177e4
LT
376 return;
377 set_bit(XMIT_WAKEUP, &ap->xmit_flags);
378 tasklet_schedule(&ap->tsk);
379 ap_put(ap);
380}
381
382
383static struct tty_ldisc ppp_ldisc = {
384 .owner = THIS_MODULE,
385 .magic = TTY_LDISC_MAGIC,
386 .name = "ppp",
387 .open = ppp_asynctty_open,
388 .close = ppp_asynctty_close,
389 .hangup = ppp_asynctty_hangup,
390 .read = ppp_asynctty_read,
391 .write = ppp_asynctty_write,
392 .ioctl = ppp_asynctty_ioctl,
393 .poll = ppp_asynctty_poll,
1da177e4
LT
394 .receive_buf = ppp_asynctty_receive,
395 .write_wakeup = ppp_asynctty_wakeup,
396};
397
398static int __init
399ppp_async_init(void)
400{
401 int err;
402
403 err = tty_register_ldisc(N_PPP, &ppp_ldisc);
404 if (err != 0)
405 printk(KERN_ERR "PPP_async: error %d registering line disc.\n",
406 err);
407 return err;
408}
409
410/*
411 * The following routines provide the PPP channel interface.
412 */
413static int
414ppp_async_ioctl(struct ppp_channel *chan, unsigned int cmd, unsigned long arg)
415{
416 struct asyncppp *ap = chan->private;
417 void __user *argp = (void __user *)arg;
418 int __user *p = argp;
419 int err, val;
420 u32 accm[8];
421
422 err = -EFAULT;
423 switch (cmd) {
424 case PPPIOCGFLAGS:
425 val = ap->flags | ap->rbits;
426 if (put_user(val, p))
427 break;
428 err = 0;
429 break;
430 case PPPIOCSFLAGS:
431 if (get_user(val, p))
432 break;
433 ap->flags = val & ~SC_RCV_BITS;
434 spin_lock_irq(&ap->recv_lock);
435 ap->rbits = val & SC_RCV_BITS;
436 spin_unlock_irq(&ap->recv_lock);
437 err = 0;
438 break;
439
440 case PPPIOCGASYNCMAP:
441 if (put_user(ap->xaccm[0], (u32 __user *)argp))
442 break;
443 err = 0;
444 break;
445 case PPPIOCSASYNCMAP:
446 if (get_user(ap->xaccm[0], (u32 __user *)argp))
447 break;
448 err = 0;
449 break;
450
451 case PPPIOCGRASYNCMAP:
452 if (put_user(ap->raccm, (u32 __user *)argp))
453 break;
454 err = 0;
455 break;
456 case PPPIOCSRASYNCMAP:
457 if (get_user(ap->raccm, (u32 __user *)argp))
458 break;
459 err = 0;
460 break;
461
462 case PPPIOCGXASYNCMAP:
463 if (copy_to_user(argp, ap->xaccm, sizeof(ap->xaccm)))
464 break;
465 err = 0;
466 break;
467 case PPPIOCSXASYNCMAP:
468 if (copy_from_user(accm, argp, sizeof(accm)))
469 break;
470 accm[2] &= ~0x40000000U; /* can't escape 0x5e */
471 accm[3] |= 0x60000000U; /* must escape 0x7d, 0x7e */
472 memcpy(ap->xaccm, accm, sizeof(ap->xaccm));
473 err = 0;
474 break;
475
476 case PPPIOCGMRU:
477 if (put_user(ap->mru, p))
478 break;
479 err = 0;
480 break;
481 case PPPIOCSMRU:
482 if (get_user(val, p))
483 break;
484 if (val < PPP_MRU)
485 val = PPP_MRU;
486 ap->mru = val;
487 err = 0;
488 break;
489
490 default:
491 err = -ENOTTY;
492 }
493
494 return err;
495}
496
497/*
498 * This is called at softirq level to deliver received packets
499 * to the ppp_generic code, and to tell the ppp_generic code
500 * if we can accept more output now.
501 */
502static void ppp_async_process(unsigned long arg)
503{
504 struct asyncppp *ap = (struct asyncppp *) arg;
505 struct sk_buff *skb;
506
507 /* process received packets */
508 while ((skb = skb_dequeue(&ap->rqueue)) != NULL) {
509 if (skb->cb[0])
510 ppp_input_error(&ap->chan, 0);
511 ppp_input(&ap->chan, skb);
512 }
513
514 /* try to push more stuff out */
515 if (test_bit(XMIT_WAKEUP, &ap->xmit_flags) && ppp_async_push(ap))
516 ppp_output_wakeup(&ap->chan);
517}
518
519/*
520 * Procedures for encapsulation and framing.
521 */
522
523/*
524 * Procedure to encode the data for async serial transmission.
525 * Does octet stuffing (escaping), puts the address/control bytes
526 * on if A/C compression is disabled, and does protocol compression.
527 * Assumes ap->tpkt != 0 on entry.
528 * Returns 1 if we finished the current frame, 0 otherwise.
529 */
530
531#define PUT_BYTE(ap, buf, c, islcp) do { \
532 if ((islcp && c < 0x20) || (ap->xaccm[c >> 5] & (1 << (c & 0x1f)))) {\
533 *buf++ = PPP_ESCAPE; \
534 *buf++ = c ^ 0x20; \
535 } else \
536 *buf++ = c; \
537} while (0)
538
539static int
540ppp_async_encode(struct asyncppp *ap)
541{
542 int fcs, i, count, c, proto;
543 unsigned char *buf, *buflim;
544 unsigned char *data;
545 int islcp;
546
547 buf = ap->obuf;
548 ap->olim = buf;
549 ap->optr = buf;
550 i = ap->tpkt_pos;
551 data = ap->tpkt->data;
552 count = ap->tpkt->len;
553 fcs = ap->tfcs;
554 proto = (data[0] << 8) + data[1];
555
556 /*
557 * LCP packets with code values between 1 (configure-reqest)
558 * and 7 (code-reject) must be sent as though no options
559 * had been negotiated.
560 */
561 islcp = proto == PPP_LCP && 1 <= data[2] && data[2] <= 7;
562
563 if (i == 0) {
564 if (islcp)
565 async_lcp_peek(ap, data, count, 0);
566
567 /*
568 * Start of a new packet - insert the leading FLAG
569 * character if necessary.
570 */
571 if (islcp || flag_time == 0
ff5688ae 572 || time_after_eq(jiffies, ap->last_xmit + flag_time))
1da177e4
LT
573 *buf++ = PPP_FLAG;
574 ap->last_xmit = jiffies;
575 fcs = PPP_INITFCS;
576
577 /*
578 * Put in the address/control bytes if necessary
579 */
580 if ((ap->flags & SC_COMP_AC) == 0 || islcp) {
581 PUT_BYTE(ap, buf, 0xff, islcp);
582 fcs = PPP_FCS(fcs, 0xff);
583 PUT_BYTE(ap, buf, 0x03, islcp);
584 fcs = PPP_FCS(fcs, 0x03);
585 }
586 }
587
588 /*
589 * Once we put in the last byte, we need to put in the FCS
590 * and closing flag, so make sure there is at least 7 bytes
591 * of free space in the output buffer.
592 */
593 buflim = ap->obuf + OBUFSIZE - 6;
594 while (i < count && buf < buflim) {
595 c = data[i++];
596 if (i == 1 && c == 0 && (ap->flags & SC_COMP_PROT))
597 continue; /* compress protocol field */
598 fcs = PPP_FCS(fcs, c);
599 PUT_BYTE(ap, buf, c, islcp);
600 }
601
602 if (i < count) {
603 /*
604 * Remember where we are up to in this packet.
605 */
606 ap->olim = buf;
607 ap->tpkt_pos = i;
608 ap->tfcs = fcs;
609 return 0;
610 }
611
612 /*
613 * We have finished the packet. Add the FCS and flag.
614 */
615 fcs = ~fcs;
616 c = fcs & 0xff;
617 PUT_BYTE(ap, buf, c, islcp);
618 c = (fcs >> 8) & 0xff;
619 PUT_BYTE(ap, buf, c, islcp);
620 *buf++ = PPP_FLAG;
621 ap->olim = buf;
622
623 kfree_skb(ap->tpkt);
624 ap->tpkt = NULL;
625 return 1;
626}
627
628/*
629 * Transmit-side routines.
630 */
631
632/*
633 * Send a packet to the peer over an async tty line.
634 * Returns 1 iff the packet was accepted.
635 * If the packet was not accepted, we will call ppp_output_wakeup
636 * at some later time.
637 */
638static int
639ppp_async_send(struct ppp_channel *chan, struct sk_buff *skb)
640{
641 struct asyncppp *ap = chan->private;
642
643 ppp_async_push(ap);
644
645 if (test_and_set_bit(XMIT_FULL, &ap->xmit_flags))
646 return 0; /* already full */
647 ap->tpkt = skb;
648 ap->tpkt_pos = 0;
649
650 ppp_async_push(ap);
651 return 1;
652}
653
654/*
655 * Push as much data as possible out to the tty.
656 */
657static int
658ppp_async_push(struct asyncppp *ap)
659{
660 int avail, sent, done = 0;
661 struct tty_struct *tty = ap->tty;
662 int tty_stuffed = 0;
663
664 /*
665 * We can get called recursively here if the tty write
666 * function calls our wakeup function. This can happen
667 * for example on a pty with both the master and slave
668 * set to PPP line discipline.
669 * We use the XMIT_BUSY bit to detect this and get out,
670 * leaving the XMIT_WAKEUP bit set to tell the other
671 * instance that it may now be able to write more now.
672 */
673 if (test_and_set_bit(XMIT_BUSY, &ap->xmit_flags))
674 return 0;
675 spin_lock_bh(&ap->xmit_lock);
676 for (;;) {
677 if (test_and_clear_bit(XMIT_WAKEUP, &ap->xmit_flags))
678 tty_stuffed = 0;
679 if (!tty_stuffed && ap->optr < ap->olim) {
680 avail = ap->olim - ap->optr;
681 set_bit(TTY_DO_WRITE_WAKEUP, &tty->flags);
f34d7a5b 682 sent = tty->ops->write(tty, ap->optr, avail);
1da177e4
LT
683 if (sent < 0)
684 goto flush; /* error, e.g. loss of CD */
685 ap->optr += sent;
686 if (sent < avail)
687 tty_stuffed = 1;
688 continue;
689 }
cd228d54 690 if (ap->optr >= ap->olim && ap->tpkt) {
1da177e4
LT
691 if (ppp_async_encode(ap)) {
692 /* finished processing ap->tpkt */
693 clear_bit(XMIT_FULL, &ap->xmit_flags);
694 done = 1;
695 }
696 continue;
697 }
698 /*
699 * We haven't made any progress this time around.
700 * Clear XMIT_BUSY to let other callers in, but
701 * after doing so we have to check if anyone set
702 * XMIT_WAKEUP since we last checked it. If they
703 * did, we should try again to set XMIT_BUSY and go
704 * around again in case XMIT_BUSY was still set when
705 * the other caller tried.
706 */
707 clear_bit(XMIT_BUSY, &ap->xmit_flags);
708 /* any more work to do? if not, exit the loop */
709 if (!(test_bit(XMIT_WAKEUP, &ap->xmit_flags)
cd228d54 710 || (!tty_stuffed && ap->tpkt)))
1da177e4
LT
711 break;
712 /* more work to do, see if we can do it now */
713 if (test_and_set_bit(XMIT_BUSY, &ap->xmit_flags))
714 break;
715 }
716 spin_unlock_bh(&ap->xmit_lock);
717 return done;
718
719flush:
720 clear_bit(XMIT_BUSY, &ap->xmit_flags);
cd228d54 721 if (ap->tpkt) {
1da177e4
LT
722 kfree_skb(ap->tpkt);
723 ap->tpkt = NULL;
724 clear_bit(XMIT_FULL, &ap->xmit_flags);
725 done = 1;
726 }
727 ap->optr = ap->olim;
728 spin_unlock_bh(&ap->xmit_lock);
729 return done;
730}
731
732/*
733 * Flush output from our internal buffers.
734 * Called for the TCFLSH ioctl. Can be entered in parallel
735 * but this is covered by the xmit_lock.
736 */
737static void
738ppp_async_flush_output(struct asyncppp *ap)
739{
740 int done = 0;
741
742 spin_lock_bh(&ap->xmit_lock);
743 ap->optr = ap->olim;
744 if (ap->tpkt != NULL) {
745 kfree_skb(ap->tpkt);
746 ap->tpkt = NULL;
747 clear_bit(XMIT_FULL, &ap->xmit_flags);
748 done = 1;
749 }
750 spin_unlock_bh(&ap->xmit_lock);
751 if (done)
752 ppp_output_wakeup(&ap->chan);
753}
754
755/*
756 * Receive-side routines.
757 */
758
759/* see how many ordinary chars there are at the start of buf */
760static inline int
761scan_ordinary(struct asyncppp *ap, const unsigned char *buf, int count)
762{
763 int i, c;
764
765 for (i = 0; i < count; ++i) {
766 c = buf[i];
767 if (c == PPP_ESCAPE || c == PPP_FLAG
768 || (c < 0x20 && (ap->raccm & (1 << c)) != 0))
769 break;
770 }
771 return i;
772}
773
774/* called when a flag is seen - do end-of-packet processing */
775static void
776process_input_packet(struct asyncppp *ap)
777{
778 struct sk_buff *skb;
779 unsigned char *p;
780 unsigned int len, fcs, proto;
781
782 skb = ap->rpkt;
783 if (ap->state & (SC_TOSS | SC_ESCAPE))
784 goto err;
785
786 if (skb == NULL)
787 return; /* 0-length packet */
788
789 /* check the FCS */
790 p = skb->data;
791 len = skb->len;
792 if (len < 3)
793 goto err; /* too short */
794 fcs = PPP_INITFCS;
795 for (; len > 0; --len)
796 fcs = PPP_FCS(fcs, *p++);
797 if (fcs != PPP_GOODFCS)
798 goto err; /* bad FCS */
799 skb_trim(skb, skb->len - 2);
800
801 /* check for address/control and protocol compression */
802 p = skb->data;
7c5050e3 803 if (p[0] == PPP_ALLSTATIONS) {
1da177e4 804 /* chop off address/control */
7c5050e3 805 if (p[1] != PPP_UI || skb->len < 3)
1da177e4
LT
806 goto err;
807 p = skb_pull(skb, 2);
808 }
809 proto = p[0];
810 if (proto & 1) {
811 /* protocol is compressed */
812 skb_push(skb, 1)[0] = 0;
813 } else {
814 if (skb->len < 2)
815 goto err;
816 proto = (proto << 8) + p[1];
817 if (proto == PPP_LCP)
818 async_lcp_peek(ap, p, skb->len, 1);
819 }
820
821 /* queue the frame to be processed */
822 skb->cb[0] = ap->state;
823 skb_queue_tail(&ap->rqueue, skb);
824 ap->rpkt = NULL;
825 ap->state = 0;
826 return;
827
828 err:
829 /* frame had an error, remember that, reset SC_TOSS & SC_ESCAPE */
830 ap->state = SC_PREV_ERROR;
6722e78c
PDM
831 if (skb) {
832 /* make skb appear as freshly allocated */
1da177e4 833 skb_trim(skb, 0);
6722e78c
PDM
834 skb_reserve(skb, - skb_headroom(skb));
835 }
1da177e4
LT
836}
837
838/* Called when the tty driver has data for us. Runs parallel with the
839 other ldisc functions but will not be re-entered */
840
841static void
842ppp_async_input(struct asyncppp *ap, const unsigned char *buf,
843 char *flags, int count)
844{
845 struct sk_buff *skb;
846 int c, i, j, n, s, f;
847 unsigned char *sp;
848
849 /* update bits used for 8-bit cleanness detection */
850 if (~ap->rbits & SC_RCV_BITS) {
851 s = 0;
852 for (i = 0; i < count; ++i) {
853 c = buf[i];
cd228d54 854 if (flags && flags[i] != 0)
1da177e4
LT
855 continue;
856 s |= (c & 0x80)? SC_RCV_B7_1: SC_RCV_B7_0;
857 c = ((c >> 4) ^ c) & 0xf;
858 s |= (0x6996 & (1 << c))? SC_RCV_ODDP: SC_RCV_EVNP;
859 }
860 ap->rbits |= s;
861 }
862
863 while (count > 0) {
864 /* scan through and see how many chars we can do in bulk */
865 if ((ap->state & SC_ESCAPE) && buf[0] == PPP_ESCAPE)
866 n = 1;
867 else
868 n = scan_ordinary(ap, buf, count);
869
870 f = 0;
cd228d54 871 if (flags && (ap->state & SC_TOSS) == 0) {
1da177e4
LT
872 /* check the flags to see if any char had an error */
873 for (j = 0; j < n; ++j)
874 if ((f = flags[j]) != 0)
875 break;
876 }
877 if (f != 0) {
878 /* start tossing */
879 ap->state |= SC_TOSS;
880
881 } else if (n > 0 && (ap->state & SC_TOSS) == 0) {
882 /* stuff the chars in the skb */
883 skb = ap->rpkt;
cd228d54 884 if (!skb) {
1da177e4 885 skb = dev_alloc_skb(ap->mru + PPP_HDRLEN + 2);
cd228d54 886 if (!skb)
1da177e4 887 goto nomem;
6722e78c
PDM
888 ap->rpkt = skb;
889 }
890 if (skb->len == 0) {
891 /* Try to get the payload 4-byte aligned.
892 * This should match the
893 * PPP_ALLSTATIONS/PPP_UI/compressed tests in
894 * process_input_packet, but we do not have
895 * enough chars here to test buf[1] and buf[2].
896 */
1da177e4
LT
897 if (buf[0] != PPP_ALLSTATIONS)
898 skb_reserve(skb, 2 + (buf[0] & 1));
1da177e4
LT
899 }
900 if (n > skb_tailroom(skb)) {
901 /* packet overflowed MRU */
902 ap->state |= SC_TOSS;
903 } else {
904 sp = skb_put(skb, n);
905 memcpy(sp, buf, n);
906 if (ap->state & SC_ESCAPE) {
907 sp[0] ^= 0x20;
908 ap->state &= ~SC_ESCAPE;
909 }
910 }
911 }
912
913 if (n >= count)
914 break;
915
916 c = buf[n];
917 if (flags != NULL && flags[n] != 0) {
918 ap->state |= SC_TOSS;
919 } else if (c == PPP_FLAG) {
920 process_input_packet(ap);
921 } else if (c == PPP_ESCAPE) {
922 ap->state |= SC_ESCAPE;
923 } else if (I_IXON(ap->tty)) {
924 if (c == START_CHAR(ap->tty))
925 start_tty(ap->tty);
926 else if (c == STOP_CHAR(ap->tty))
927 stop_tty(ap->tty);
928 }
929 /* otherwise it's a char in the recv ACCM */
930 ++n;
931
932 buf += n;
cd228d54 933 if (flags)
1da177e4
LT
934 flags += n;
935 count -= n;
936 }
937 return;
938
939 nomem:
940 printk(KERN_ERR "PPPasync: no memory (input pkt)\n");
941 ap->state |= SC_TOSS;
942}
943
944/*
945 * We look at LCP frames going past so that we can notice
946 * and react to the LCP configure-ack from the peer.
947 * In the situation where the peer has been sent a configure-ack
948 * already, LCP is up once it has sent its configure-ack
949 * so the immediately following packet can be sent with the
950 * configured LCP options. This allows us to process the following
951 * packet correctly without pppd needing to respond quickly.
952 *
953 * We only respond to the received configure-ack if we have just
954 * sent a configure-request, and the configure-ack contains the
955 * same data (this is checked using a 16-bit crc of the data).
956 */
957#define CONFREQ 1 /* LCP code field values */
958#define CONFACK 2
959#define LCP_MRU 1 /* LCP option numbers */
960#define LCP_ASYNCMAP 2
961
962static void async_lcp_peek(struct asyncppp *ap, unsigned char *data,
963 int len, int inbound)
964{
965 int dlen, fcs, i, code;
966 u32 val;
967
968 data += 2; /* skip protocol bytes */
969 len -= 2;
970 if (len < 4) /* 4 = code, ID, length */
971 return;
972 code = data[0];
973 if (code != CONFACK && code != CONFREQ)
974 return;
975 dlen = (data[2] << 8) + data[3];
976 if (len < dlen)
977 return; /* packet got truncated or length is bogus */
978
979 if (code == (inbound? CONFACK: CONFREQ)) {
980 /*
981 * sent confreq or received confack:
982 * calculate the crc of the data from the ID field on.
983 */
984 fcs = PPP_INITFCS;
985 for (i = 1; i < dlen; ++i)
986 fcs = PPP_FCS(fcs, data[i]);
987
988 if (!inbound) {
989 /* outbound confreq - remember the crc for later */
990 ap->lcp_fcs = fcs;
991 return;
992 }
993
994 /* received confack, check the crc */
995 fcs ^= ap->lcp_fcs;
996 ap->lcp_fcs = -1;
997 if (fcs != 0)
998 return;
999 } else if (inbound)
1000 return; /* not interested in received confreq */
1001
1002 /* process the options in the confack */
1003 data += 4;
1004 dlen -= 4;
1005 /* data[0] is code, data[1] is length */
1006 while (dlen >= 2 && dlen >= data[1] && data[1] >= 2) {
1007 switch (data[0]) {
1008 case LCP_MRU:
1009 val = (data[2] << 8) + data[3];
1010 if (inbound)
1011 ap->mru = val;
1012 else
1013 ap->chan.mtu = val;
1014 break;
1015 case LCP_ASYNCMAP:
1016 val = (data[2] << 24) + (data[3] << 16)
1017 + (data[4] << 8) + data[5];
1018 if (inbound)
1019 ap->raccm = val;
1020 else
1021 ap->xaccm[0] = val;
1022 break;
1023 }
1024 dlen -= data[1];
1025 data += data[1];
1026 }
1027}
1028
1029static void __exit ppp_async_cleanup(void)
1030{
64ccd715 1031 if (tty_unregister_ldisc(N_PPP) != 0)
1da177e4
LT
1032 printk(KERN_ERR "failed to unregister PPP line discipline\n");
1033}
1034
1035module_init(ppp_async_init);
1036module_exit(ppp_async_cleanup);