Blame view

kernel/linux-rt-4.4.41/fs/ncpfs/ncp_fs_sb.h 5.03 KB
5113f6f70   김현기   kernel add
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
  /*
   *  ncp_fs_sb.h
   *
   *  Copyright (C) 1995, 1996 by Volker Lendecke
   *
   */
  
  #ifndef _NCP_FS_SB
  #define _NCP_FS_SB
  
  #include <linux/types.h>
  #include <linux/ncp_mount.h>
  #include <linux/net.h>
  #include <linux/mutex.h>
  #include <linux/backing-dev.h>
  #include <linux/workqueue.h>
  
  #define NCP_DEFAULT_OPTIONS 0		/* 2 for packet signatures */
  
  struct sock;
  
  struct ncp_mount_data_kernel {
  	unsigned long    flags;		/* NCP_MOUNT_* flags */
  	unsigned int	 int_flags;	/* internal flags */
  #define NCP_IMOUNT_LOGGEDIN_POSSIBLE	0x0001
  	kuid_t		 mounted_uid;	/* Who may umount() this filesystem? */
  	struct pid      *wdog_pid;	/* Who cares for our watchdog packets? */
  	unsigned int     ncp_fd;	/* The socket to the ncp port */
  	unsigned int     time_out;	/* How long should I wait after
  					   sending a NCP request? */
  	unsigned int     retry_count;	/* And how often should I retry? */
  	unsigned char	 mounted_vol[NCP_VOLNAME_LEN + 1];
  	kuid_t		 uid;
  	kgid_t		 gid;
  	umode_t		 file_mode;
  	umode_t		 dir_mode;
  	int		 info_fd;
  };
  
  struct ncp_server {
  	struct rcu_head rcu;
  	struct ncp_mount_data_kernel m;	/* Nearly all of the mount data is of
  					   interest for us later, so we store
  					   it completely. */
  
  	__u8 name_space[NCP_NUMBER_OF_VOLUMES + 2];
  
  	struct socket *ncp_sock;/* ncp socket */
  	struct socket *info_sock;
  
  	u8 sequence;
  	u8 task;
  	u16 connection;		/* Remote connection number */
  
  	u8 completion;		/* Status message from server */
  	u8 conn_status;		/* Bit 4 = 1 ==> Server going down, no
  				   requests allowed anymore.
  				   Bit 0 = 1 ==> Server is down. */
  
  	int buffer_size;	/* Negotiated bufsize */
  
  	int reply_size;		/* Size of last reply */
  
  	int packet_size;
  	unsigned char *packet;	/* Here we prepare requests and
  				   receive replies */
  	unsigned char *txbuf;	/* Storage for current request */
  	unsigned char *rxbuf;	/* Storage for reply to current request */
  
  	int lock;		/* To prevent mismatch in protocols. */
  	struct mutex mutex;
  
  	int current_size;	/* for packet preparation */
  	int has_subfunction;
  	int ncp_reply_size;
  
  	int root_setuped;
  	struct mutex root_setup_lock;
  
  	/* info for packet signing */
  	int sign_wanted;	/* 1=Server needs signed packets */
  	int sign_active;	/* 0=don't do signing, 1=do */
  	char sign_root[8];	/* generated from password and encr. key */
  	char sign_last[16];	
  
  	/* Authentication info: NDS or BINDERY, username */
  	struct {
  		int	auth_type;
  		size_t	object_name_len;
  		void*	object_name;
  		int	object_type;
  	} auth;
  	/* Password info */
  	struct {
  		size_t	len;
  		void*	data;
  	} priv;
  	struct rw_semaphore auth_rwsem;
  
  	/* nls info: codepage for volume and charset for I/O */
  	struct nls_table *nls_vol;
  	struct nls_table *nls_io;
  
  	/* maximum age in jiffies */
  	atomic_t dentry_ttl;
  
  	/* miscellaneous */
  	unsigned int flags;
  
  	spinlock_t requests_lock;	/* Lock accesses to tx.requests, tx.creq and rcv.creq when STREAM mode */
  
  	void (*data_ready)(struct sock* sk);
  	void (*error_report)(struct sock* sk);
  	void (*write_space)(struct sock* sk);	/* STREAM mode only */
  	struct {
  		struct work_struct tq;		/* STREAM/DGRAM: data/error ready */
  		struct ncp_request_reply* creq;	/* STREAM/DGRAM: awaiting reply from this request */
  		struct mutex creq_mutex;	/* DGRAM only: lock accesses to rcv.creq */
  
  		unsigned int state;		/* STREAM only: receiver state */
  		struct {
  			__u32 magic __packed;
  			__u32 len __packed;
  			__u16 type __packed;
  			__u16 p1 __packed;
  			__u16 p2 __packed;
  			__u16 p3 __packed;
  			__u16 type2 __packed;
  		} buf;				/* STREAM only: temporary buffer */
  		unsigned char* ptr;		/* STREAM only: pointer to data */
  		size_t len;			/* STREAM only: length of data to receive */
  	} rcv;
  	struct {
  		struct list_head requests;	/* STREAM only: queued requests */
  		struct work_struct tq;		/* STREAM only: transmitter ready */
  		struct ncp_request_reply* creq;	/* STREAM only: currently transmitted entry */
  	} tx;
  	struct timer_list timeout_tm;		/* DGRAM only: timeout timer */
  	struct work_struct timeout_tq;		/* DGRAM only: associated queue, we run timers from process context */
  	int timeout_last;			/* DGRAM only: current timeout length */
  	int timeout_retries;			/* DGRAM only: retries left */
  	struct {
  		size_t len;
  		__u8 data[128];
  	} unexpected_packet;
  	struct backing_dev_info bdi;
  };
  
  extern void ncp_tcp_rcv_proc(struct work_struct *work);
  extern void ncp_tcp_tx_proc(struct work_struct *work);
  extern void ncpdgram_rcv_proc(struct work_struct *work);
  extern void ncpdgram_timeout_proc(struct work_struct *work);
  extern void ncpdgram_timeout_call(unsigned long server);
  extern void ncp_tcp_data_ready(struct sock* sk);
  extern void ncp_tcp_write_space(struct sock* sk);
  extern void ncp_tcp_error_report(struct sock* sk);
  
  #define NCP_FLAG_UTF8	1
  
  #define NCP_CLR_FLAG(server, flag)	((server)->flags &= ~(flag))
  #define NCP_SET_FLAG(server, flag)	((server)->flags |= (flag))
  #define NCP_IS_FLAG(server, flag)	((server)->flags & (flag))
  
  static inline int ncp_conn_valid(struct ncp_server *server)
  {
  	return ((server->conn_status & 0x11) == 0);
  }
  
  static inline void ncp_invalidate_conn(struct ncp_server *server)
  {
  	server->conn_status |= 0x01;
  }
  
  #endif