[BRIDGE]: generate kobject remove event
[deliverable/linux.git] / net / atm / signaling.c
CommitLineData
1da177e4
LT
1/* net/atm/signaling.c - ATM signaling */
2
3/* Written 1995-2000 by Werner Almesberger, EPFL LRC/ICA */
4
5
6#include <linux/errno.h> /* error codes */
7#include <linux/kernel.h> /* printk */
8#include <linux/skbuff.h>
9#include <linux/wait.h>
10#include <linux/sched.h> /* jiffies and HZ */
11#include <linux/atm.h> /* ATM stuff */
12#include <linux/atmsap.h>
13#include <linux/atmsvc.h>
14#include <linux/atmdev.h>
15#include <linux/bitops.h>
16
17#include "resources.h"
18#include "signaling.h"
19
20
21#undef WAIT_FOR_DEMON /* #define this if system calls on SVC sockets
22 should block until the demon runs.
23 Danger: may cause nasty hangs if the demon
24 crashes. */
25
26#if 0
27#define DPRINTK(format,args...) printk(KERN_DEBUG format,##args)
28#else
29#define DPRINTK(format,args...)
30#endif
31
32
33struct atm_vcc *sigd = NULL;
34#ifdef WAIT_FOR_DEMON
35static DECLARE_WAIT_QUEUE_HEAD(sigd_sleep);
36#endif
37
38
39static void sigd_put_skb(struct sk_buff *skb)
40{
41#ifdef WAIT_FOR_DEMON
42 static unsigned long silence;
43 DECLARE_WAITQUEUE(wait,current);
44
45 add_wait_queue(&sigd_sleep,&wait);
46 while (!sigd) {
47 set_current_state(TASK_UNINTERRUPTIBLE);
48 if (time_after(jiffies, silence) || silence == 0) {
49 printk(KERN_INFO "atmsvc: waiting for signaling demon "
50 "...\n");
51 silence = (jiffies+30*HZ)|1;
52 }
53 schedule();
54 }
55 current->state = TASK_RUNNING;
56 remove_wait_queue(&sigd_sleep,&wait);
57#else
58 if (!sigd) {
bf3883c1
DJ
59 if (net_ratelimit())
60 printk(KERN_WARNING "atmsvc: no signaling demon\n");
1da177e4
LT
61 kfree_skb(skb);
62 return;
63 }
64#endif
65 atm_force_charge(sigd,skb->truesize);
66 skb_queue_tail(&sk_atm(sigd)->sk_receive_queue,skb);
67 sk_atm(sigd)->sk_data_ready(sk_atm(sigd), skb->len);
68}
69
70
71static void modify_qos(struct atm_vcc *vcc,struct atmsvc_msg *msg)
72{
73 struct sk_buff *skb;
74
75 if (test_bit(ATM_VF_RELEASED,&vcc->flags) ||
76 !test_bit(ATM_VF_READY,&vcc->flags))
77 return;
78 msg->type = as_error;
79 if (!vcc->dev->ops->change_qos) msg->reply = -EOPNOTSUPP;
80 else {
81 /* should lock VCC */
82 msg->reply = vcc->dev->ops->change_qos(vcc,&msg->qos,
83 msg->reply);
84 if (!msg->reply) msg->type = as_okay;
85 }
86 /*
87 * Should probably just turn around the old skb. But the, the buffer
88 * space accounting needs to follow the change too. Maybe later.
89 */
90 while (!(skb = alloc_skb(sizeof(struct atmsvc_msg),GFP_KERNEL)))
91 schedule();
92 *(struct atmsvc_msg *) skb_put(skb,sizeof(struct atmsvc_msg)) = *msg;
93 sigd_put_skb(skb);
94}
95
96
97static int sigd_send(struct atm_vcc *vcc,struct sk_buff *skb)
98{
99 struct atmsvc_msg *msg;
100 struct atm_vcc *session_vcc;
101 struct sock *sk;
102
103 msg = (struct atmsvc_msg *) skb->data;
104 atomic_sub(skb->truesize, &sk_atm(vcc)->sk_wmem_alloc);
105 DPRINTK("sigd_send %d (0x%lx)\n",(int) msg->type,
106 (unsigned long) msg->vcc);
107 vcc = *(struct atm_vcc **) &msg->vcc;
108 sk = sk_atm(vcc);
109
110 switch (msg->type) {
111 case as_okay:
112 sk->sk_err = -msg->reply;
113 clear_bit(ATM_VF_WAITING, &vcc->flags);
114 if (!*vcc->local.sas_addr.prv &&
115 !*vcc->local.sas_addr.pub) {
116 vcc->local.sas_family = AF_ATMSVC;
117 memcpy(vcc->local.sas_addr.prv,
118 msg->local.sas_addr.prv,ATM_ESA_LEN);
119 memcpy(vcc->local.sas_addr.pub,
120 msg->local.sas_addr.pub,ATM_E164_LEN+1);
121 }
122 session_vcc = vcc->session ? vcc->session : vcc;
123 if (session_vcc->vpi || session_vcc->vci) break;
124 session_vcc->itf = msg->pvc.sap_addr.itf;
125 session_vcc->vpi = msg->pvc.sap_addr.vpi;
126 session_vcc->vci = msg->pvc.sap_addr.vci;
127 if (session_vcc->vpi || session_vcc->vci)
128 session_vcc->qos = msg->qos;
129 break;
130 case as_error:
131 clear_bit(ATM_VF_REGIS,&vcc->flags);
132 clear_bit(ATM_VF_READY,&vcc->flags);
133 sk->sk_err = -msg->reply;
134 clear_bit(ATM_VF_WAITING, &vcc->flags);
135 break;
136 case as_indicate:
137 vcc = *(struct atm_vcc **) &msg->listen_vcc;
208a6dfb 138 sk = sk_atm(vcc);
1da177e4
LT
139 DPRINTK("as_indicate!!!\n");
140 lock_sock(sk);
141 if (sk_acceptq_is_full(sk)) {
142 sigd_enq(NULL,as_reject,vcc,NULL,NULL);
143 dev_kfree_skb(skb);
144 goto as_indicate_complete;
145 }
146 sk->sk_ack_backlog++;
147 skb_queue_tail(&sk->sk_receive_queue, skb);
148 DPRINTK("waking sk->sk_sleep 0x%p\n", sk->sk_sleep);
149 sk->sk_state_change(sk);
150as_indicate_complete:
151 release_sock(sk);
152 return 0;
153 case as_close:
154 set_bit(ATM_VF_RELEASED,&vcc->flags);
155 vcc_release_async(vcc, msg->reply);
156 goto out;
157 case as_modify:
158 modify_qos(vcc,msg);
159 break;
160 case as_addparty:
161 case as_dropparty:
162 sk->sk_err_soft = msg->reply; /* < 0 failure, otherwise ep_ref */
163 clear_bit(ATM_VF_WAITING, &vcc->flags);
164 break;
165 default:
166 printk(KERN_ALERT "sigd_send: bad message type %d\n",
167 (int) msg->type);
168 return -EINVAL;
169 }
170 sk->sk_state_change(sk);
171out:
172 dev_kfree_skb(skb);
173 return 0;
174}
175
176
177void sigd_enq2(struct atm_vcc *vcc,enum atmsvc_msg_type type,
178 struct atm_vcc *listen_vcc,const struct sockaddr_atmpvc *pvc,
179 const struct sockaddr_atmsvc *svc,const struct atm_qos *qos,int reply)
180{
181 struct sk_buff *skb;
182 struct atmsvc_msg *msg;
183 static unsigned session = 0;
184
185 DPRINTK("sigd_enq %d (0x%p)\n",(int) type,vcc);
186 while (!(skb = alloc_skb(sizeof(struct atmsvc_msg),GFP_KERNEL)))
187 schedule();
188 msg = (struct atmsvc_msg *) skb_put(skb,sizeof(struct atmsvc_msg));
189 memset(msg,0,sizeof(*msg));
190 msg->type = type;
191 *(struct atm_vcc **) &msg->vcc = vcc;
192 *(struct atm_vcc **) &msg->listen_vcc = listen_vcc;
193 msg->reply = reply;
194 if (qos) msg->qos = *qos;
195 if (vcc) msg->sap = vcc->sap;
196 if (svc) msg->svc = *svc;
197 if (vcc) msg->local = vcc->local;
198 if (pvc) msg->pvc = *pvc;
199 if (vcc) {
200 if (type == as_connect && test_bit(ATM_VF_SESSION, &vcc->flags))
201 msg->session = ++session;
202 /* every new pmp connect gets the next session number */
203 }
204 sigd_put_skb(skb);
205 if (vcc) set_bit(ATM_VF_REGIS,&vcc->flags);
206}
207
208
209void sigd_enq(struct atm_vcc *vcc,enum atmsvc_msg_type type,
210 struct atm_vcc *listen_vcc,const struct sockaddr_atmpvc *pvc,
211 const struct sockaddr_atmsvc *svc)
212{
213 sigd_enq2(vcc,type,listen_vcc,pvc,svc,vcc ? &vcc->qos : NULL,0);
214 /* other ISP applications may use "reply" */
215}
216
217
218static void purge_vcc(struct atm_vcc *vcc)
219{
220 if (sk_atm(vcc)->sk_family == PF_ATMSVC &&
9301e320
CW
221 !test_bit(ATM_VF_META, &vcc->flags)) {
222 set_bit(ATM_VF_RELEASED, &vcc->flags);
223 clear_bit(ATM_VF_REGIS, &vcc->flags);
1da177e4
LT
224 vcc_release_async(vcc, -EUNATCH);
225 }
226}
227
228
229static void sigd_close(struct atm_vcc *vcc)
230{
231 struct hlist_node *node;
232 struct sock *s;
233 int i;
234
235 DPRINTK("sigd_close\n");
236 sigd = NULL;
237 if (skb_peek(&sk_atm(vcc)->sk_receive_queue))
238 printk(KERN_ERR "sigd_close: closing with requests pending\n");
239 skb_queue_purge(&sk_atm(vcc)->sk_receive_queue);
240
241 read_lock(&vcc_sklist_lock);
242 for(i = 0; i < VCC_HTABLE_SIZE; ++i) {
243 struct hlist_head *head = &vcc_hash[i];
244
245 sk_for_each(s, node, head) {
246 struct atm_vcc *vcc = atm_sk(s);
247
9301e320 248 purge_vcc(vcc);
1da177e4
LT
249 }
250 }
251 read_unlock(&vcc_sklist_lock);
252}
253
254
255static struct atmdev_ops sigd_dev_ops = {
256 .close = sigd_close,
257 .send = sigd_send
258};
259
260
261static struct atm_dev sigd_dev = {
262 .ops = &sigd_dev_ops,
263 .type = "sig",
264 .number = 999,
265 .lock = SPIN_LOCK_UNLOCKED
266};
267
268
269int sigd_attach(struct atm_vcc *vcc)
270{
271 if (sigd) return -EADDRINUSE;
272 DPRINTK("sigd_attach\n");
273 sigd = vcc;
274 vcc->dev = &sigd_dev;
275 vcc_insert_socket(sk_atm(vcc));
276 set_bit(ATM_VF_META,&vcc->flags);
277 set_bit(ATM_VF_READY,&vcc->flags);
278#ifdef WAIT_FOR_DEMON
279 wake_up(&sigd_sleep);
280#endif
281 return 0;
282}
This page took 0.14509 seconds and 5 git commands to generate.