sock.c

来自「Linux Kernel 2.6.9 for OMAP1710」· C语言 代码 · 共 851 行 · 第 1/2 页

C
851
字号
/* *  linux/fs/ncpfs/sock.c * *  Copyright (C) 1992, 1993  Rick Sladkey * *  Modified 1995, 1996 by Volker Lendecke to be usable for ncp *  Modified 1997 Peter Waltenberg, Bill Hawes, David Woodhouse for 2.1 dcache * */#include <linux/config.h>#include <linux/time.h>#include <linux/errno.h>#include <linux/socket.h>#include <linux/fcntl.h>#include <linux/stat.h>#include <asm/uaccess.h>#include <linux/in.h>#include <linux/net.h>#include <linux/mm.h>#include <linux/netdevice.h>#include <linux/signal.h>#include <net/scm.h>#include <net/sock.h>#include <linux/ipx.h>#include <linux/poll.h>#include <linux/file.h>#include <linux/ncp_fs.h>#include "ncpsign_kernel.h"static int _recv(struct socket *sock, void *buf, int size, unsigned flags){	struct msghdr msg = {NULL, };	struct kvec iov = {buf, size};	return kernel_recvmsg(sock, &msg, &iov, 1, size, flags);}static inline int do_send(struct socket *sock, struct kvec *vec, int count,			  int len, unsigned flags){	struct msghdr msg = { .msg_flags = flags };	return kernel_sendmsg(sock, &msg, vec, count, len);}static int _send(struct socket *sock, const void *buff, int len){	struct kvec vec;	vec.iov_base = (void *) buff;	vec.iov_len = len;	return do_send(sock, &vec, 1, len, 0);}struct ncp_request_reply {	struct list_head req;	wait_queue_head_t wq;	struct ncp_reply_header* reply_buf;	size_t datalen;	int result;	enum { RQ_DONE, RQ_INPROGRESS, RQ_QUEUED, RQ_IDLE } status;	struct kvec* tx_ciov;	size_t tx_totallen;	size_t tx_iovlen;	struct kvec tx_iov[3];	u_int16_t tx_type;	u_int32_t sign[6];};void ncp_tcp_data_ready(struct sock *sk, int len){	struct ncp_server *server = sk->sk_user_data;	server->data_ready(sk, len);	schedule_work(&server->rcv.tq);}void ncp_tcp_error_report(struct sock *sk){	struct ncp_server *server = sk->sk_user_data;		server->error_report(sk);	schedule_work(&server->rcv.tq);}void ncp_tcp_write_space(struct sock *sk){	struct ncp_server *server = sk->sk_user_data;		/* We do not need any locking: we first set tx.creq, and then we do sendmsg,	   not vice versa... */	server->write_space(sk);	if (server->tx.creq)		schedule_work(&server->tx.tq);}void ncpdgram_timeout_call(unsigned long v){	struct ncp_server *server = (void*)v;		schedule_work(&server->timeout_tq);}static inline void ncp_finish_request(struct ncp_request_reply *req, int result){	req->result = result;	req->status = RQ_DONE;	wake_up_all(&req->wq);}static void __abort_ncp_connection(struct ncp_server *server, struct ncp_request_reply *aborted, int err){	struct ncp_request_reply *req;	ncp_invalidate_conn(server);	del_timer(&server->timeout_tm);	while (!list_empty(&server->tx.requests)) {		req = list_entry(server->tx.requests.next, struct ncp_request_reply, req);				list_del_init(&req->req);		if (req == aborted) {			ncp_finish_request(req, err);		} else {			ncp_finish_request(req, -EIO);		}	}	req = server->rcv.creq;	if (req) {		server->rcv.creq = NULL;		if (req == aborted) {			ncp_finish_request(req, err);		} else {			ncp_finish_request(req, -EIO);		}		server->rcv.ptr = NULL;		server->rcv.state = 0;	}	req = server->tx.creq;	if (req) {		server->tx.creq = NULL;		if (req == aborted) {			ncp_finish_request(req, err);		} else {			ncp_finish_request(req, -EIO);		}	}}static inline int get_conn_number(struct ncp_reply_header *rp){	return rp->conn_low | (rp->conn_high << 8);}static inline void __ncp_abort_request(struct ncp_server *server, struct ncp_request_reply *req, int err){	/* If req is done, we got signal, but we also received answer... */	switch (req->status) {		case RQ_IDLE:		case RQ_DONE:			break;		case RQ_QUEUED:			list_del_init(&req->req);			ncp_finish_request(req, err);			break;		case RQ_INPROGRESS:			__abort_ncp_connection(server, req, err);			break;	}}static inline void ncp_abort_request(struct ncp_server *server, struct ncp_request_reply *req, int err){	down(&server->rcv.creq_sem);	__ncp_abort_request(server, req, err);	up(&server->rcv.creq_sem);}static inline void __ncptcp_abort(struct ncp_server *server){	__abort_ncp_connection(server, NULL, 0);}static int ncpdgram_send(struct socket *sock, struct ncp_request_reply *req){	struct kvec vec[3];	/* sock_sendmsg updates iov pointers for us :-( */	memcpy(vec, req->tx_ciov, req->tx_iovlen * sizeof(vec[0]));	return do_send(sock, vec, req->tx_iovlen,		       req->tx_totallen, MSG_DONTWAIT);}static void __ncptcp_try_send(struct ncp_server *server){	struct ncp_request_reply *rq;	struct kvec *iov;	struct kvec iovc[3];	int result;	rq = server->tx.creq;	if (!rq)		return;	/* sock_sendmsg updates iov pointers for us :-( */	memcpy(iovc, rq->tx_ciov, rq->tx_iovlen * sizeof(iov[0]));	result = do_send(server->ncp_sock, iovc, rq->tx_iovlen,			 rq->tx_totallen, MSG_NOSIGNAL | MSG_DONTWAIT);	if (result == -EAGAIN)		return;	if (result < 0) {		printk(KERN_ERR "ncpfs: tcp: Send failed: %d\n", result);		__ncp_abort_request(server, rq, result);		return;	}	if (result >= rq->tx_totallen) {		server->rcv.creq = rq;		server->tx.creq = NULL;		return;	}	rq->tx_totallen -= result;	iov = rq->tx_ciov;	while (iov->iov_len <= result) {		result -= iov->iov_len;		iov++;		rq->tx_iovlen--;	}	iov->iov_base += result;	iov->iov_len -= result;	rq->tx_ciov = iov;}static inline void ncp_init_header(struct ncp_server *server, struct ncp_request_reply *req, struct ncp_request_header *h){	req->status = RQ_INPROGRESS;	h->conn_low = server->connection;	h->conn_high = server->connection >> 8;	h->sequence = ++server->sequence;}	static void ncpdgram_start_request(struct ncp_server *server, struct ncp_request_reply *req){	size_t signlen;	struct ncp_request_header* h;		req->tx_ciov = req->tx_iov + 1;	h = req->tx_iov[1].iov_base;	ncp_init_header(server, req, h);	signlen = sign_packet(server, req->tx_iov[1].iov_base + sizeof(struct ncp_request_header) - 1, 			req->tx_iov[1].iov_len - sizeof(struct ncp_request_header) + 1,			cpu_to_le32(req->tx_totallen), req->sign);	if (signlen) {		req->tx_ciov[1].iov_base = req->sign;		req->tx_ciov[1].iov_len = signlen;		req->tx_iovlen += 1;		req->tx_totallen += signlen;	}	server->rcv.creq = req;	server->timeout_last = server->m.time_out;	server->timeout_retries = server->m.retry_count;	ncpdgram_send(server->ncp_sock, req);	mod_timer(&server->timeout_tm, jiffies + server->m.time_out);}#define NCP_TCP_XMIT_MAGIC	(0x446D6454)#define NCP_TCP_XMIT_VERSION	(1)#define NCP_TCP_RCVD_MAGIC	(0x744E6350)static void ncptcp_start_request(struct ncp_server *server, struct ncp_request_reply *req){	size_t signlen;	struct ncp_request_header* h;	req->tx_ciov = req->tx_iov;	h = req->tx_iov[1].iov_base;	ncp_init_header(server, req, h);	signlen = sign_packet(server, req->tx_iov[1].iov_base + sizeof(struct ncp_request_header) - 1,			req->tx_iov[1].iov_len - sizeof(struct ncp_request_header) + 1,			cpu_to_be32(req->tx_totallen + 24), req->sign + 4) + 16;	req->sign[0] = htonl(NCP_TCP_XMIT_MAGIC);	req->sign[1] = htonl(req->tx_totallen + signlen);	req->sign[2] = htonl(NCP_TCP_XMIT_VERSION);	req->sign[3] = htonl(req->datalen + 8);	req->tx_iov[0].iov_base = req->sign;	req->tx_iov[0].iov_len = signlen;	req->tx_iovlen += 1;	req->tx_totallen += signlen;	server->tx.creq = req;	__ncptcp_try_send(server);}static inline void __ncp_start_request(struct ncp_server *server, struct ncp_request_reply *req){	if (server->ncp_sock->type == SOCK_STREAM)		ncptcp_start_request(server, req);	else		ncpdgram_start_request(server, req);}static int ncp_add_request(struct ncp_server *server, struct ncp_request_reply *req){	down(&server->rcv.creq_sem);	if (!ncp_conn_valid(server)) {		up(&server->rcv.creq_sem);		printk(KERN_ERR "ncpfs: tcp: Server died\n");		return -EIO;	}	if (server->tx.creq || server->rcv.creq) {		req->status = RQ_QUEUED;		list_add_tail(&req->req, &server->tx.requests);		up(&server->rcv.creq_sem);		return 0;	}	__ncp_start_request(server, req);	up(&server->rcv.creq_sem);	return 0;}static void __ncp_next_request(struct ncp_server *server){	struct ncp_request_reply *req;	server->rcv.creq = NULL;	if (list_empty(&server->tx.requests)) {		return;	}	req = list_entry(server->tx.requests.next, struct ncp_request_reply, req);	list_del_init(&req->req);	__ncp_start_request(server, req);}static void info_server(struct ncp_server *server, unsigned int id, const void * data, size_t len){	if (server->info_sock) {		struct kvec iov[2];		__be32 hdr[2];			hdr[0] = cpu_to_be32(len + 8);		hdr[1] = cpu_to_be32(id);			iov[0].iov_base = hdr;		iov[0].iov_len = 8;		iov[1].iov_base = (void *) data;		iov[1].iov_len = len;		do_send(server->info_sock, iov, 2, len + 8, MSG_NOSIGNAL);	}}void ncpdgram_rcv_proc(void *s){	struct ncp_server *server = s;	struct socket* sock;		sock = server->ncp_sock;		while (1) {		struct ncp_reply_header reply;		int result;		result = _recv(sock, &reply, sizeof(reply), MSG_PEEK | MSG_DONTWAIT);		if (result < 0) {			break;		}		if (result >= sizeof(reply)) {			struct ncp_request_reply *req;				if (reply.type == NCP_WATCHDOG) {				unsigned char buf[10];				if (server->connection != get_conn_number(&reply)) {					goto drop;				}				result = _recv(sock, buf, sizeof(buf), MSG_DONTWAIT);				if (result < 0) {					DPRINTK("recv failed with %d\n", result);					continue;				}				if (result < 10) {					DPRINTK("too short (%u) watchdog packet\n", result);					continue;				}				if (buf[9] != '?') {					DPRINTK("bad signature (%02X) in watchdog packet\n", buf[9]);					continue;				}				buf[9] = 'Y';				_send(sock, buf, sizeof(buf));				continue;			}			if (reply.type != NCP_POSITIVE_ACK && reply.type != NCP_REPLY) {				result = _recv(sock, server->unexpected_packet.data, sizeof(server->unexpected_packet.data), MSG_DONTWAIT);				if (result < 0) {					continue;				}				info_server(server, 0, server->unexpected_packet.data, result);				continue;			}			down(&server->rcv.creq_sem);					req = server->rcv.creq;			if (req && (req->tx_type == NCP_ALLOC_SLOT_REQUEST || (server->sequence == reply.sequence && 					server->connection == get_conn_number(&reply)))) {				if (reply.type == NCP_POSITIVE_ACK) {					server->timeout_retries = server->m.retry_count;					server->timeout_last = NCP_MAX_RPC_TIMEOUT;					mod_timer(&server->timeout_tm, jiffies + NCP_MAX_RPC_TIMEOUT);				} else if (reply.type == NCP_REPLY) {					result = _recv(sock, (void*)req->reply_buf, req->datalen, MSG_DONTWAIT);#ifdef CONFIG_NCPFS_PACKET_SIGNING					if (result >= 0 && server->sign_active && req->tx_type != NCP_DEALLOC_SLOT_REQUEST) {						if (result < 8 + 8) {							result = -EIO;						} else {							unsigned int hdrl;														result -= 8;							hdrl = sock->sk->sk_family == AF_INET ? 8 : 6;							if (sign_verify_reply(server, ((char*)req->reply_buf) + hdrl, result - hdrl, cpu_to_le32(result), ((char*)req->reply_buf) + result)) {								printk(KERN_INFO "ncpfs: Signature violation\n");								result = -EIO;							}						}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?