minix/servers/inet/generic/psip.c
2005-06-28 15:19:58 +00:00

818 lines
18 KiB
C

/*
generic/psip.c
Implementation of a pseudo IP device.
Created: Apr 22, 1993 by Philip Homburg
Copyright 1995 Philip Homburg
*/
#include "inet.h"
#include "assert.h"
#include "buf.h"
#include "event.h"
#include "type.h"
#include "ip_int.h"
#include "psip.h"
#include "sr.h"
THIS_FILE
typedef struct psip_port
{
int pp_flags;
int pp_ipdev;
int pp_opencnt;
struct psip_fd *pp_rd_head;
struct psip_fd *pp_rd_tail;
acc_t *pp_promisc_head;
acc_t *pp_promisc_tail;
} psip_port_t;
#define PPF_EMPTY 0
#define PPF_CONFIGURED 1
#define PPF_ENABLED 2
#define PPF_PROMISC 4
#define PSIP_FD_NR (1*IP_PORT_MAX)
typedef struct psip_fd
{
int pf_flags;
int pf_srfd;
psip_port_t *pf_port;
get_userdata_t pf_get_userdata;
put_userdata_t pf_put_userdata;
struct psip_fd *pf_rd_next;
size_t pf_rd_count;
nwio_psipopt_t pf_psipopt;
} psip_fd_t;
#define PFF_EMPTY 0
#define PFF_INUSE 1
#define PFF_READ_IP 2
#define PFF_PROMISC 4
#define PFF_NEXTHOP 8
PRIVATE psip_port_t *psip_port_table;
PRIVATE psip_fd_t psip_fd_table[PSIP_FD_NR];
FORWARD int psip_open ARGS(( int port, int srfd,
get_userdata_t get_userdata, put_userdata_t put_userdata,
put_pkt_t pkt_pkt, select_res_t select_res ));
FORWARD int psip_ioctl ARGS(( int fd, ioreq_t req ));
FORWARD int psip_read ARGS(( int fd, size_t count ));
FORWARD int psip_write ARGS(( int fd, size_t count ));
FORWARD int psip_select ARGS(( int port_nr, unsigned operations ));
FORWARD void psip_close ARGS(( int fd ));
FORWARD int psip_cancel ARGS(( int fd, int which_operation ));
FORWARD void promisc_restart_read ARGS(( psip_port_t *psip_port ));
FORWARD int psip_setopt ARGS(( psip_fd_t *psip_fd, nwio_psipopt_t *newoptp ));
FORWARD void psip_buffree ARGS(( int priority ));
FORWARD void check_promisc ARGS(( psip_port_t *psip_port ));
#ifdef BUF_CONSISTENCY_CHECK
FORWARD void psip_bufcheck ARGS(( void ));
#endif
FORWARD void reply_thr_put ARGS(( psip_fd_t *psip_fd, int reply,
int for_ioctl ));
FORWARD void reply_thr_get ARGS(( psip_fd_t *psip_fd, int reply,
int for_ioctl ));
PUBLIC void psip_prep()
{
psip_port_table= alloc(psip_conf_nr * sizeof(psip_port_table[0]));
}
PUBLIC void psip_init()
{
int i;
psip_port_t *psip_port;
psip_fd_t *psip_fd;
for (i=0, psip_port= psip_port_table; i<psip_conf_nr; i++, psip_port++)
psip_port->pp_flags= PPF_EMPTY;
for (i=0, psip_fd= psip_fd_table; i<PSIP_FD_NR; i++, psip_fd++)
psip_fd->pf_flags= PFF_EMPTY;
for (i=0, psip_port= psip_port_table; i<psip_conf_nr; i++, psip_port++)
{
psip_port->pp_flags |= PPF_CONFIGURED;
psip_port->pp_opencnt= 0;
psip_port->pp_rd_head= NULL;
psip_port->pp_promisc_head= NULL;
}
#ifndef BUF_CONSISTENCY_CHECK
bf_logon(psip_buffree);
#else
bf_logon(psip_buffree, psip_bufcheck);
#endif
}
PUBLIC int psip_enable(port_nr, ip_port_nr)
int port_nr;
int ip_port_nr;
{
psip_port_t *psip_port;
assert(port_nr >= 0);
if (port_nr >= psip_conf_nr)
return -1;
psip_port= &psip_port_table[port_nr];
if (!(psip_port->pp_flags &PPF_CONFIGURED))
return -1;
psip_port->pp_ipdev= ip_port_nr;
psip_port->pp_flags |= PPF_ENABLED;
sr_add_minor(if2minor(psip_conf[port_nr].pc_ifno, PSIP_DEV_OFF),
port_nr, psip_open, psip_close, psip_read,
psip_write, psip_ioctl, psip_cancel, psip_select);
return NW_OK;
}
PUBLIC int psip_send(port_nr, dest, pack)
int port_nr;
ipaddr_t dest;
acc_t *pack;
{
psip_port_t *psip_port;
psip_fd_t *psip_fd, *mark_fd;
int i, result, result1;
size_t buf_size, extrasize;
acc_t *hdr_pack, *acc;
psip_io_hdr_t *hdr;
assert(port_nr >= 0 && port_nr < psip_conf_nr);
psip_port= &psip_port_table[port_nr];
if (psip_port->pp_opencnt == 0)
{
bf_afree(pack);
return NW_OK;
}
for(;;)
{
mark_fd= psip_port->pp_rd_tail;
for(i= 0; i<PSIP_FD_NR; i++)
{
psip_fd= psip_port->pp_rd_head;
if (!psip_fd)
return NW_SUSPEND;
psip_port->pp_rd_head= psip_fd->pf_rd_next;
if (!(psip_fd->pf_flags & PFF_PROMISC))
break;
psip_fd->pf_rd_next= NULL;
if (psip_port->pp_rd_head == NULL)
psip_port->pp_rd_head= psip_fd;
else
psip_port->pp_rd_tail->pf_rd_next= psip_fd;
psip_port->pp_rd_tail= psip_fd;
if (psip_fd == mark_fd)
return NW_SUSPEND;
}
if (i == PSIP_FD_NR)
ip_panic(( "psip_send: loop" ));
assert(psip_fd->pf_flags & PFF_READ_IP);
psip_fd->pf_flags &= ~PFF_READ_IP;
if (psip_fd->pf_flags & PFF_NEXTHOP)
extrasize= sizeof(dest);
else
extrasize= 0;
buf_size= bf_bufsize(pack);
if (buf_size+extrasize <= psip_fd->pf_rd_count)
{
if (psip_port->pp_flags & PPF_PROMISC)
{
/* Deal with promiscuous mode. */
hdr_pack= bf_memreq(sizeof(*hdr));
hdr= (psip_io_hdr_t *)ptr2acc_data(hdr_pack);
memset(hdr, '\0', sizeof(*hdr));
hdr->pih_flags |= PF_LOC2REM;
hdr->pih_nexthop= dest;
pack->acc_linkC++;
hdr_pack->acc_next= pack;
hdr_pack->acc_ext_link= NULL;
if (psip_port->pp_promisc_head)
{
/* Append at the end. */
psip_port->pp_promisc_tail->
acc_ext_link= hdr_pack;
psip_port->pp_promisc_tail= hdr_pack;
}
else
{
/* First packet. */
psip_port->pp_promisc_head= hdr_pack;
psip_port->pp_promisc_tail= hdr_pack;
if (psip_port->pp_rd_head)
promisc_restart_read(psip_port);
}
}
if (extrasize)
{
/* Prepend nexthop address */
acc= bf_memreq(sizeof(dest));
*(ipaddr_t *)(ptr2acc_data(acc))= dest;
acc->acc_next= pack;
pack= acc; acc= NULL;
buf_size += extrasize;
}
result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
(size_t)0, pack, FALSE);
if (result == NW_OK)
result= buf_size;
}
else
result= EPACKSIZE;
result1= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
(size_t)result, NULL, FALSE);
assert(result1 == NW_OK);
if (result == EPACKSIZE)
continue;
return NW_OK;
}
return NW_SUSPEND;
}
PRIVATE int psip_open(port, srfd, get_userdata, put_userdata, put_pkt,
select_res)
int port;
int srfd;
get_userdata_t get_userdata;
put_userdata_t put_userdata;
put_pkt_t put_pkt;
select_res_t select_res;
{
psip_port_t *psip_port;
psip_fd_t *psip_fd;
int i;
assert(port >= 0 && port < psip_conf_nr);
psip_port= &psip_port_table[port];
if (!(psip_port->pp_flags & PPF_ENABLED))
return ENXIO;
for (i= 0, psip_fd= psip_fd_table; i<PSIP_FD_NR; i++, psip_fd++)
{
if (psip_fd->pf_flags & PFF_INUSE)
continue;
break;
}
if (i == PSIP_FD_NR)
return ENFILE;
psip_fd->pf_flags |= PFF_INUSE;
psip_fd->pf_srfd= srfd;
psip_fd->pf_port= psip_port;
psip_fd->pf_get_userdata= get_userdata;
psip_fd->pf_put_userdata= put_userdata;
psip_port->pp_opencnt++;
return i;
}
PRIVATE int psip_ioctl(fd, req)
int fd;
ioreq_t req;
{
int result;
psip_fd_t *psip_fd;
acc_t *data;
nwio_ipconf_t *ipconfp;
nwio_psipopt_t *psip_opt, *newoptp;
assert(fd >= 0 && fd < PSIP_FD_NR);
psip_fd= &psip_fd_table[fd];
switch(req)
{
case NWIOSIPCONF:
data= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, 0,
sizeof(*ipconfp), TRUE);
if (!data)
{
result= EFAULT;
break;
}
data= bf_packIffLess(data, sizeof(*ipconfp));
assert (data->acc_length == sizeof(*ipconfp));
ipconfp= (nwio_ipconf_t *)ptr2acc_data(data);
result= ip_setconf(psip_fd->pf_port->pp_ipdev, ipconfp);
bf_afree(data);
reply_thr_get(psip_fd, result, TRUE);
break;
case NWIOSPSIPOPT:
data= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, 0,
sizeof(*psip_opt), TRUE);
if (!data)
{
result= EFAULT;
break;
}
data= bf_packIffLess(data, sizeof(*psip_opt));
assert (data->acc_length == sizeof(*psip_opt));
newoptp= (nwio_psipopt_t *)ptr2acc_data(data);
result= psip_setopt(psip_fd, newoptp);
bf_afree(data);
if (result == NW_OK)
{
if (psip_fd->pf_psipopt.nwpo_flags & NWPO_EN_PROMISC)
{
psip_fd->pf_flags |= PFF_PROMISC;
psip_fd->pf_port->pp_flags |= PPF_PROMISC;
}
else
{
psip_fd->pf_flags &= ~PFF_PROMISC;
check_promisc(psip_fd->pf_port);
}
if (psip_fd->pf_psipopt.nwpo_flags & NWPO_EN_NEXTHOP)
{
psip_fd->pf_flags |= PFF_NEXTHOP;
}
else
{
psip_fd->pf_flags &= ~PFF_NEXTHOP;
}
}
reply_thr_get(psip_fd, result, TRUE);
break;
case NWIOGPSIPOPT:
data= bf_memreq(sizeof(*psip_opt));
psip_opt= (nwio_psipopt_t *)ptr2acc_data(data);
*psip_opt= psip_fd->pf_psipopt;
result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd, 0,
data, TRUE);
if (result == NW_OK)
reply_thr_put(psip_fd, NW_OK, TRUE);
break;
default:
reply_thr_put(psip_fd, ENOTTY, TRUE);
break;
}
return NW_OK;
}
PRIVATE int psip_read(fd, count)
int fd;
size_t count;
{
psip_port_t *psip_port;
psip_fd_t *psip_fd;
acc_t *pack;
size_t buf_size;
int result, result1;
assert(fd >= 0 && fd < PSIP_FD_NR);
psip_fd= &psip_fd_table[fd];
psip_port= psip_fd->pf_port;
if ((psip_fd->pf_flags & PFF_PROMISC) && psip_port->pp_promisc_head)
{
/* Deliver a queued packet. */
pack= psip_port->pp_promisc_head;
buf_size= bf_bufsize(pack);
if (buf_size <= count)
{
psip_port->pp_promisc_head= pack->acc_ext_link;
result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
(size_t)0, pack, FALSE);
if (result == NW_OK)
result= buf_size;
}
else
result= EPACKSIZE;
result1= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
(size_t)result, NULL, FALSE);
assert(result1 == NW_OK);
return NW_OK;
}
psip_fd->pf_rd_count= count;
if (psip_port->pp_rd_head == NULL)
psip_port->pp_rd_head= psip_fd;
else
psip_port->pp_rd_tail->pf_rd_next= psip_fd;
psip_fd->pf_rd_next= NULL;
psip_port->pp_rd_tail= psip_fd;
psip_fd->pf_flags |= PFF_READ_IP;
if (!(psip_fd->pf_flags & PFF_PROMISC))
ipps_get(psip_port->pp_ipdev);
if (psip_fd->pf_flags & PFF_READ_IP)
return NW_SUSPEND;
return NW_OK;
}
PRIVATE int psip_write(fd, count)
int fd;
size_t count;
{
psip_port_t *psip_port;
psip_fd_t *psip_fd;
acc_t *pack, *hdr_pack;
psip_io_hdr_t *hdr;
size_t pack_len;
ipaddr_t nexthop;
assert(fd >= 0 && fd < PSIP_FD_NR);
psip_fd= &psip_fd_table[fd];
psip_port= psip_fd->pf_port;
pack= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, (size_t)0,
count, FALSE);
if (pack == NULL)
{
pack= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd,
(size_t)EFAULT, (size_t)0, FALSE);
assert(pack == NULL);
return NW_OK;
}
if (psip_fd->pf_flags & PFF_NEXTHOP)
{
pack_len= bf_bufsize(pack);
if (pack_len <= sizeof(nexthop))
{
/* Something strange */
bf_afree(pack); pack= NULL;
pack= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd,
(size_t)EPACKSIZE, (size_t)0, FALSE);
assert(pack == NULL);
return NW_OK;
}
pack= bf_packIffLess(pack, sizeof(nexthop));
nexthop= *(ipaddr_t *)ptr2acc_data(pack);
pack= bf_delhead(pack, sizeof(nexthop));
/* Map multicast to broadcast */
if ((nexthop & HTONL(0xE0000000)) == HTONL(0xE0000000))
nexthop= HTONL(0xffffffff);
}
else
{
/* Assume point to point */
nexthop= HTONL(0x00000000);
}
if (psip_port->pp_flags & PPF_PROMISC)
{
/* Deal with promiscuous mode. */
hdr_pack= bf_memreq(sizeof(*hdr));
hdr= (psip_io_hdr_t *)ptr2acc_data(hdr_pack);
memset(hdr, '\0', sizeof(*hdr));
hdr->pih_flags |= PF_REM2LOC;
hdr->pih_nexthop= nexthop;
pack->acc_linkC++;
hdr_pack->acc_next= pack;
hdr_pack->acc_ext_link= NULL;
if (psip_port->pp_promisc_head)
{
/* Append at the end. */
psip_port->pp_promisc_tail->acc_ext_link= hdr_pack;
psip_port->pp_promisc_tail= hdr_pack;
}
else
{
/* First packet. */
psip_port->pp_promisc_head= hdr_pack;
psip_port->pp_promisc_tail= hdr_pack;
if (psip_port->pp_rd_head)
promisc_restart_read(psip_port);
}
}
ipps_put(psip_port->pp_ipdev, nexthop, pack);
pack= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, (size_t)count,
(size_t)0, FALSE);
assert(pack == NULL);
return NW_OK;
}
PRIVATE int psip_select(fd, operations)
int fd;
unsigned operations;
{
printf("psip_select: not implemented\n");
return 0;
}
PRIVATE void psip_close(fd)
int fd;
{
psip_port_t *psip_port;
psip_fd_t *psip_fd;
assert(fd >= 0 && fd < PSIP_FD_NR);
psip_fd= &psip_fd_table[fd];
psip_port= psip_fd->pf_port;
if (psip_fd->pf_flags & PFF_PROMISC)
{
/* Check if the port should still be in promiscuous mode.
*/
psip_fd->pf_flags &= ~PFF_PROMISC;
check_promisc(psip_fd->pf_port);
}
assert(psip_port->pp_opencnt >0);
psip_port->pp_opencnt--;
psip_fd->pf_flags= PFF_EMPTY;
ipps_get(psip_port->pp_ipdev);
}
PRIVATE int psip_cancel(fd, which_operation)
int fd;
int which_operation;
{
psip_port_t *psip_port;
psip_fd_t *psip_fd, *prev_fd, *tmp_fd;
int result;
DBLOCK(1, printf("psip_cancel(%d, %d)\n", fd, which_operation));
assert(fd >= 0 && fd < PSIP_FD_NR);
psip_fd= &psip_fd_table[fd];
psip_port= psip_fd->pf_port;
switch(which_operation)
{
case SR_CANCEL_IOCTL:
ip_panic(( "should not be here" ));
case SR_CANCEL_READ:
assert(psip_fd->pf_flags & PFF_READ_IP);
for (prev_fd= NULL, tmp_fd= psip_port->pp_rd_head; tmp_fd;
prev_fd= tmp_fd, tmp_fd= tmp_fd->pf_rd_next)
{
if (tmp_fd == psip_fd)
break;
}
if (tmp_fd == NULL)
ip_panic(( "unable to find to request to cancel" ));
if (prev_fd == NULL)
psip_port->pp_rd_head= psip_fd->pf_rd_next;
else
prev_fd->pf_rd_next= psip_fd->pf_rd_next;
if (psip_fd->pf_rd_next == NULL)
psip_port->pp_rd_tail= prev_fd;
psip_fd->pf_flags &= ~PFF_READ_IP;
result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
(size_t)EINTR, NULL, FALSE);
assert(result == NW_OK);
break;
case SR_CANCEL_WRITE:
ip_panic(( "should not be here" ));
default:
ip_panic(( "invalid operation for cancel" ));
}
return NW_OK;
}
PRIVATE void promisc_restart_read(psip_port)
psip_port_t *psip_port;
{
psip_fd_t *psip_fd, *prev, *next;
acc_t *pack;
size_t buf_size;
int result, result1;
/* Overkill at the moment: just one reader in promiscious mode is
* allowed.
*/
pack= psip_port->pp_promisc_head;
if (!pack)
return;
assert(pack->acc_ext_link == NULL);
for(psip_fd= psip_port->pp_rd_head, prev= NULL; psip_fd;
prev= psip_fd, psip_fd= psip_fd->pf_rd_next)
{
again:
if (!(psip_fd->pf_flags & PFF_PROMISC))
continue;
next= psip_fd->pf_rd_next;
if (prev)
prev->pf_rd_next= next;
else
psip_port->pp_rd_head= next;
if (!next)
psip_port->pp_rd_tail= prev;
assert(psip_fd->pf_flags & PFF_READ_IP);
psip_fd->pf_flags &= ~PFF_READ_IP;
buf_size= bf_bufsize(pack);
if (buf_size <= psip_fd->pf_rd_count)
{
psip_port->pp_promisc_head= pack->acc_ext_link;
result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
(size_t)0, pack, FALSE);
if (result == NW_OK)
result= buf_size;
}
else
result= EPACKSIZE;
result1= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd,
(size_t)result, NULL, FALSE);
assert(result1 == NW_OK);
if (psip_port->pp_promisc_head)
{
/* Restart from the beginning */
assert(result == EPACKSIZE);
psip_fd= psip_port->pp_rd_head;
prev= NULL;
goto again;
}
break;
}
}
PRIVATE int psip_setopt(psip_fd, newoptp)
psip_fd_t *psip_fd;
nwio_psipopt_t *newoptp;
{
nwio_psipopt_t oldopt;
unsigned int new_en_flags, new_di_flags, old_en_flags, old_di_flags;
unsigned long new_flags;
oldopt= psip_fd->pf_psipopt;
old_en_flags= oldopt.nwpo_flags & 0xffff;
old_di_flags= (oldopt.nwpo_flags >> 16) & 0xffff;
new_en_flags= newoptp->nwpo_flags & 0xffff;
new_di_flags= (newoptp->nwpo_flags >> 16) & 0xffff;
if (new_en_flags & new_di_flags)
return EBADMODE;
/* NWUO_LOCADDR_MASK */
if (!((new_en_flags | new_di_flags) & NWPO_PROMISC_MASK))
{
new_en_flags |= (old_en_flags & NWPO_PROMISC_MASK);
new_di_flags |= (old_di_flags & NWPO_PROMISC_MASK);
}
new_flags= ((unsigned long)new_di_flags << 16) | new_en_flags;
if ((new_flags & NWPO_EN_PROMISC) &&
(psip_fd->pf_port->pp_flags & PPF_PROMISC))
{
printf("psip_setopt: EBUSY for port %d, flags 0x%x\n",
psip_fd->pf_port - psip_port_table,
psip_fd->pf_port->pp_flags);
/* We can support only one at a time. */
return EBUSY;
}
psip_fd->pf_psipopt= *newoptp;
psip_fd->pf_psipopt.nwpo_flags= new_flags;
return NW_OK;
}
PRIVATE void check_promisc(psip_port)
psip_port_t *psip_port;
{
int i;
psip_fd_t *psip_fd;
acc_t *acc, *acc_next;
/* Check if the port should still be in promiscuous mode. Overkill
* at the moment.
*/
if (!(psip_port->pp_flags & PPF_PROMISC))
return;
psip_port->pp_flags &= ~PPF_PROMISC;
for (i= 0, psip_fd= psip_fd_table; i<PSIP_FD_NR; i++, psip_fd++)
{
if ((psip_fd->pf_flags & (PFF_INUSE|PFF_PROMISC)) !=
(PFF_INUSE|PFF_PROMISC))
{
continue;
}
if (psip_fd->pf_port != psip_port)
continue;
printf("check_promisc: setting PROMISC for port %d\n",
psip_port-psip_port_table);
psip_port->pp_flags |= PPF_PROMISC;
break;
}
if (!(psip_port->pp_flags & PPF_PROMISC))
{
/* Delete queued packets. */
acc= psip_port->pp_promisc_head;
psip_port->pp_promisc_head= NULL;
while (acc)
{
acc_next= acc->acc_ext_link;
bf_afree(acc);
acc= acc_next;
}
}
}
PRIVATE void psip_buffree (priority)
int priority;
{
int i;
psip_port_t *psip_port;
acc_t *tmp_acc, *next_acc;
if (priority == PSIP_PRI_EXP_PROMISC)
{
for (i=0, psip_port= psip_port_table; i<psip_conf_nr;
i++, psip_port++)
{
if (!(psip_port->pp_flags & PPF_CONFIGURED) )
continue;
if (psip_port->pp_promisc_head)
{
tmp_acc= psip_port->pp_promisc_head;
while(tmp_acc)
{
next_acc= tmp_acc->acc_ext_link;
bf_afree(tmp_acc);
tmp_acc= next_acc;
}
psip_port->pp_promisc_head= NULL;
}
}
}
}
#ifdef BUF_CONSISTENCY_CHECK
PRIVATE void psip_bufcheck()
{
int i;
psip_port_t *psip_port;
acc_t *tmp_acc;
for (i= 0, psip_port= psip_port_table; i<psip_conf_nr;
i++, psip_port++)
{
for (tmp_acc= psip_port->pp_promisc_head; tmp_acc;
tmp_acc= tmp_acc->acc_ext_link)
{
bf_check_acc(tmp_acc);
}
}
}
#endif
/*
reply_thr_put
*/
PRIVATE void reply_thr_put(psip_fd, reply, for_ioctl)
psip_fd_t *psip_fd;
int reply;
int for_ioctl;
{
int result;
result= (*psip_fd->pf_put_userdata)(psip_fd->pf_srfd, reply,
(acc_t *)0, for_ioctl);
assert(result == NW_OK);
}
/*
reply_thr_get
*/
PRIVATE void reply_thr_get(psip_fd, reply, for_ioctl)
psip_fd_t *psip_fd;
int reply;
int for_ioctl;
{
acc_t *result;
result= (*psip_fd->pf_get_userdata)(psip_fd->pf_srfd, reply,
(size_t)0, for_ioctl);
assert (!result);
}
/*
* $PchId: psip.c,v 1.15 2005/06/28 14:19:29 philip Exp $
*/