454fd351f2
Pull yet more networking updates from David Miller: 1) Various fixes to the new Redpine Signals wireless driver, from Fariya Fatima. 2) L2TP PPP connect code takes PMTU from the wrong socket, fix from Dmitry Petukhov. 3) UFO and TSO packets differ in whether they include the protocol header in gso_size, account for that in skb_gso_transport_seglen(). From Florian Westphal. 4) If VLAN untagging fails, we double free the SKB in the bridging output path. From Toshiaki Makita. 5) Several call sites of sk->sk_data_ready() were referencing an SKB just added to the socket receive queue in order to calculate the second argument via skb->len. This is dangerous because the moment the skb is added to the receive queue it can be consumed in another context and freed up. It turns out also that none of the sk->sk_data_ready() implementations even care about this second argument. So just kill it off and thus fix all these use-after-free bugs as a side effect. 6) Fix inverted test in tcp_v6_send_response(), from Lorenzo Colitti. 7) pktgen needs to do locking properly for LLTX devices, from Daniel Borkmann. 8) xen-netfront driver initializes TX array entries in RX loop :-) From Vincenzo Maffione. 9) After refactoring, some tunnel drivers allow a tunnel to be configured on top itself. Fix from Nicolas Dichtel. * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (46 commits) vti: don't allow to add the same tunnel twice gre: don't allow to add the same tunnel twice drivers: net: xen-netfront: fix array initialization bug pktgen: be friendly to LLTX devices r8152: check RTL8152_UNPLUG net: sun4i-emac: add promiscuous support net/apne: replace IS_ERR and PTR_ERR with PTR_ERR_OR_ZERO net: ipv6: Fix oif in TCP SYN+ACK route lookup. drivers: net: cpsw: enable interrupts after napi enable and clearing previous interrupts drivers: net: cpsw: discard all packets received when interface is down net: Fix use after free by removing length arg from sk_data_ready callbacks. Drivers: net: hyperv: Address UDP checksum issues Drivers: net: hyperv: Negotiate suitable ndis version for offload support Drivers: net: hyperv: Allocate memory for all possible per-pecket information bridge: Fix double free and memory leak around br_allowed_ingress bonding: Remove debug_fs files when module init fails i40evf: program RSS LUT correctly i40evf: remove open-coded skb_cow_head ixgb: remove open-coded skb_cow_head igbvf: remove open-coded skb_cow_head ...
174 lines
5 KiB
C
174 lines
5 KiB
C
/*
|
|
* ncp_fs_sb.h
|
|
*
|
|
* Copyright (C) 1995, 1996 by Volker Lendecke
|
|
*
|
|
*/
|
|
|
|
#ifndef _NCP_FS_SB
|
|
#define _NCP_FS_SB
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/ncp_mount.h>
|
|
#include <linux/net.h>
|
|
#include <linux/mutex.h>
|
|
#include <linux/backing-dev.h>
|
|
#include <linux/workqueue.h>
|
|
|
|
#define NCP_DEFAULT_OPTIONS 0 /* 2 for packet signatures */
|
|
|
|
struct sock;
|
|
|
|
struct ncp_mount_data_kernel {
|
|
unsigned long flags; /* NCP_MOUNT_* flags */
|
|
unsigned int int_flags; /* internal flags */
|
|
#define NCP_IMOUNT_LOGGEDIN_POSSIBLE 0x0001
|
|
kuid_t mounted_uid; /* Who may umount() this filesystem? */
|
|
struct pid *wdog_pid; /* Who cares for our watchdog packets? */
|
|
unsigned int ncp_fd; /* The socket to the ncp port */
|
|
unsigned int time_out; /* How long should I wait after
|
|
sending a NCP request? */
|
|
unsigned int retry_count; /* And how often should I retry? */
|
|
unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
|
|
kuid_t uid;
|
|
kgid_t gid;
|
|
umode_t file_mode;
|
|
umode_t dir_mode;
|
|
int info_fd;
|
|
};
|
|
|
|
struct ncp_server {
|
|
struct rcu_head rcu;
|
|
struct ncp_mount_data_kernel m; /* Nearly all of the mount data is of
|
|
interest for us later, so we store
|
|
it completely. */
|
|
|
|
__u8 name_space[NCP_NUMBER_OF_VOLUMES + 2];
|
|
|
|
struct socket *ncp_sock;/* ncp socket */
|
|
struct socket *info_sock;
|
|
|
|
u8 sequence;
|
|
u8 task;
|
|
u16 connection; /* Remote connection number */
|
|
|
|
u8 completion; /* Status message from server */
|
|
u8 conn_status; /* Bit 4 = 1 ==> Server going down, no
|
|
requests allowed anymore.
|
|
Bit 0 = 1 ==> Server is down. */
|
|
|
|
int buffer_size; /* Negotiated bufsize */
|
|
|
|
int reply_size; /* Size of last reply */
|
|
|
|
int packet_size;
|
|
unsigned char *packet; /* Here we prepare requests and
|
|
receive replies */
|
|
unsigned char *txbuf; /* Storage for current request */
|
|
unsigned char *rxbuf; /* Storage for reply to current request */
|
|
|
|
int lock; /* To prevent mismatch in protocols. */
|
|
struct mutex mutex;
|
|
|
|
int current_size; /* for packet preparation */
|
|
int has_subfunction;
|
|
int ncp_reply_size;
|
|
|
|
int root_setuped;
|
|
struct mutex root_setup_lock;
|
|
|
|
/* info for packet signing */
|
|
int sign_wanted; /* 1=Server needs signed packets */
|
|
int sign_active; /* 0=don't do signing, 1=do */
|
|
char sign_root[8]; /* generated from password and encr. key */
|
|
char sign_last[16];
|
|
|
|
/* Authentication info: NDS or BINDERY, username */
|
|
struct {
|
|
int auth_type;
|
|
size_t object_name_len;
|
|
void* object_name;
|
|
int object_type;
|
|
} auth;
|
|
/* Password info */
|
|
struct {
|
|
size_t len;
|
|
void* data;
|
|
} priv;
|
|
struct rw_semaphore auth_rwsem;
|
|
|
|
/* nls info: codepage for volume and charset for I/O */
|
|
struct nls_table *nls_vol;
|
|
struct nls_table *nls_io;
|
|
|
|
/* maximum age in jiffies */
|
|
atomic_t dentry_ttl;
|
|
|
|
/* miscellaneous */
|
|
unsigned int flags;
|
|
|
|
spinlock_t requests_lock; /* Lock accesses to tx.requests, tx.creq and rcv.creq when STREAM mode */
|
|
|
|
void (*data_ready)(struct sock* sk);
|
|
void (*error_report)(struct sock* sk);
|
|
void (*write_space)(struct sock* sk); /* STREAM mode only */
|
|
struct {
|
|
struct work_struct tq; /* STREAM/DGRAM: data/error ready */
|
|
struct ncp_request_reply* creq; /* STREAM/DGRAM: awaiting reply from this request */
|
|
struct mutex creq_mutex; /* DGRAM only: lock accesses to rcv.creq */
|
|
|
|
unsigned int state; /* STREAM only: receiver state */
|
|
struct {
|
|
__u32 magic __packed;
|
|
__u32 len __packed;
|
|
__u16 type __packed;
|
|
__u16 p1 __packed;
|
|
__u16 p2 __packed;
|
|
__u16 p3 __packed;
|
|
__u16 type2 __packed;
|
|
} buf; /* STREAM only: temporary buffer */
|
|
unsigned char* ptr; /* STREAM only: pointer to data */
|
|
size_t len; /* STREAM only: length of data to receive */
|
|
} rcv;
|
|
struct {
|
|
struct list_head requests; /* STREAM only: queued requests */
|
|
struct work_struct tq; /* STREAM only: transmitter ready */
|
|
struct ncp_request_reply* creq; /* STREAM only: currently transmitted entry */
|
|
} tx;
|
|
struct timer_list timeout_tm; /* DGRAM only: timeout timer */
|
|
struct work_struct timeout_tq; /* DGRAM only: associated queue, we run timers from process context */
|
|
int timeout_last; /* DGRAM only: current timeout length */
|
|
int timeout_retries; /* DGRAM only: retries left */
|
|
struct {
|
|
size_t len;
|
|
__u8 data[128];
|
|
} unexpected_packet;
|
|
struct backing_dev_info bdi;
|
|
};
|
|
|
|
extern void ncp_tcp_rcv_proc(struct work_struct *work);
|
|
extern void ncp_tcp_tx_proc(struct work_struct *work);
|
|
extern void ncpdgram_rcv_proc(struct work_struct *work);
|
|
extern void ncpdgram_timeout_proc(struct work_struct *work);
|
|
extern void ncpdgram_timeout_call(unsigned long server);
|
|
extern void ncp_tcp_data_ready(struct sock* sk);
|
|
extern void ncp_tcp_write_space(struct sock* sk);
|
|
extern void ncp_tcp_error_report(struct sock* sk);
|
|
|
|
#define NCP_FLAG_UTF8 1
|
|
|
|
#define NCP_CLR_FLAG(server, flag) ((server)->flags &= ~(flag))
|
|
#define NCP_SET_FLAG(server, flag) ((server)->flags |= (flag))
|
|
#define NCP_IS_FLAG(server, flag) ((server)->flags & (flag))
|
|
|
|
static inline int ncp_conn_valid(struct ncp_server *server)
|
|
{
|
|
return ((server->conn_status & 0x11) == 0);
|
|
}
|
|
|
|
static inline void ncp_invalidate_conn(struct ncp_server *server)
|
|
{
|
|
server->conn_status |= 0x01;
|
|
}
|
|
|
|
#endif
|