Commit | Line | Data |
---|---|---|
bf80e5d4 SC |
1 | // SPDX-License-Identifier: GPL-2.0 |
2 | /* | |
3 | * Witness Service client for CIFS | |
4 | * | |
5 | * Copyright (c) 2020 Samuel Cabrero <scabrero@suse.de> | |
6 | */ | |
7 | ||
8 | #include <linux/kref.h> | |
9 | #include <net/genetlink.h> | |
10 | #include <uapi/linux/cifs/cifs_netlink.h> | |
11 | ||
12 | #include "cifs_swn.h" | |
13 | #include "cifsglob.h" | |
14 | #include "cifsproto.h" | |
15 | #include "fscache.h" | |
16 | #include "cifs_debug.h" | |
17 | #include "netlink.h" | |
18 | ||
19 | static DEFINE_IDR(cifs_swnreg_idr); | |
20 | static DEFINE_MUTEX(cifs_swnreg_idr_mutex); | |
21 | ||
22 | struct cifs_swn_reg { | |
23 | int id; | |
24 | struct kref ref_count; | |
25 | ||
26 | const char *net_name; | |
27 | const char *share_name; | |
28 | bool net_name_notify; | |
29 | bool share_name_notify; | |
30 | bool ip_notify; | |
31 | ||
32 | struct cifs_tcon *tcon; | |
33 | }; | |
34 | ||
35 | static int cifs_swn_auth_info_krb(struct cifs_tcon *tcon, struct sk_buff *skb) | |
36 | { | |
37 | int ret; | |
38 | ||
39 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_KRB_AUTH); | |
40 | if (ret < 0) | |
41 | return ret; | |
42 | ||
43 | return 0; | |
44 | } | |
45 | ||
46 | static int cifs_swn_auth_info_ntlm(struct cifs_tcon *tcon, struct sk_buff *skb) | |
47 | { | |
48 | int ret; | |
49 | ||
50 | if (tcon->ses->user_name != NULL) { | |
51 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_USER_NAME, tcon->ses->user_name); | |
52 | if (ret < 0) | |
53 | return ret; | |
54 | } | |
55 | ||
56 | if (tcon->ses->password != NULL) { | |
57 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password); | |
58 | if (ret < 0) | |
59 | return ret; | |
60 | } | |
61 | ||
62 | if (tcon->ses->domainName != NULL) { | |
63 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_DOMAIN_NAME, tcon->ses->domainName); | |
64 | if (ret < 0) | |
65 | return ret; | |
66 | } | |
67 | ||
68 | return 0; | |
69 | } | |
70 | ||
71 | /* | |
72 | * Sends a register message to the userspace daemon based on the registration. | |
73 | * The authentication information to connect to the witness service is bundled | |
74 | * into the message. | |
75 | */ | |
76 | static int cifs_swn_send_register_message(struct cifs_swn_reg *swnreg) | |
77 | { | |
78 | struct sk_buff *skb; | |
79 | struct genlmsghdr *hdr; | |
80 | enum securityEnum authtype; | |
121d947d | 81 | struct sockaddr_storage *addr; |
bf80e5d4 SC |
82 | int ret; |
83 | ||
84 | skb = genlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL); | |
85 | if (skb == NULL) { | |
86 | ret = -ENOMEM; | |
87 | goto fail; | |
88 | } | |
89 | ||
90 | hdr = genlmsg_put(skb, 0, 0, &cifs_genl_family, 0, CIFS_GENL_CMD_SWN_REGISTER); | |
91 | if (hdr == NULL) { | |
92 | ret = -ENOMEM; | |
93 | goto nlmsg_fail; | |
94 | } | |
95 | ||
96 | ret = nla_put_u32(skb, CIFS_GENL_ATTR_SWN_REGISTRATION_ID, swnreg->id); | |
97 | if (ret < 0) | |
98 | goto nlmsg_fail; | |
99 | ||
100 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_NET_NAME, swnreg->net_name); | |
101 | if (ret < 0) | |
102 | goto nlmsg_fail; | |
103 | ||
104 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME, swnreg->share_name); | |
105 | if (ret < 0) | |
106 | goto nlmsg_fail; | |
107 | ||
121d947d SC |
108 | /* |
109 | * If there is an address stored use it instead of the server address, because we are | |
110 | * in the process of reconnecting to it after a share has been moved or we have been | |
111 | * told to switch to it (client move message). In these cases we unregister from the | |
112 | * server address and register to the new address when we receive the notification. | |
113 | */ | |
114 | if (swnreg->tcon->ses->server->use_swn_dstaddr) | |
115 | addr = &swnreg->tcon->ses->server->swn_dstaddr; | |
116 | else | |
117 | addr = &swnreg->tcon->ses->server->dstaddr; | |
118 | ||
119 | ret = nla_put(skb, CIFS_GENL_ATTR_SWN_IP, sizeof(struct sockaddr_storage), addr); | |
bf80e5d4 SC |
120 | if (ret < 0) |
121 | goto nlmsg_fail; | |
122 | ||
123 | if (swnreg->net_name_notify) { | |
124 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_NET_NAME_NOTIFY); | |
125 | if (ret < 0) | |
126 | goto nlmsg_fail; | |
127 | } | |
128 | ||
129 | if (swnreg->share_name_notify) { | |
130 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME_NOTIFY); | |
131 | if (ret < 0) | |
132 | goto nlmsg_fail; | |
133 | } | |
134 | ||
135 | if (swnreg->ip_notify) { | |
136 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_IP_NOTIFY); | |
137 | if (ret < 0) | |
138 | goto nlmsg_fail; | |
139 | } | |
140 | ||
141 | authtype = cifs_select_sectype(swnreg->tcon->ses->server, swnreg->tcon->ses->sectype); | |
142 | switch (authtype) { | |
143 | case Kerberos: | |
144 | ret = cifs_swn_auth_info_krb(swnreg->tcon, skb); | |
145 | if (ret < 0) { | |
146 | cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); | |
147 | goto nlmsg_fail; | |
148 | } | |
149 | break; | |
bf80e5d4 SC |
150 | case NTLMv2: |
151 | case RawNTLMSSP: | |
152 | ret = cifs_swn_auth_info_ntlm(swnreg->tcon, skb); | |
153 | if (ret < 0) { | |
154 | cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); | |
155 | goto nlmsg_fail; | |
156 | } | |
157 | break; | |
158 | default: | |
159 | cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); | |
160 | ret = -EINVAL; | |
161 | goto nlmsg_fail; | |
162 | } | |
163 | ||
164 | genlmsg_end(skb, hdr); | |
165 | genlmsg_multicast(&cifs_genl_family, skb, 0, CIFS_GENL_MCGRP_SWN, GFP_ATOMIC); | |
166 | ||
167 | cifs_dbg(FYI, "%s: Message to register for network name %s with id %d sent\n", __func__, | |
168 | swnreg->net_name, swnreg->id); | |
169 | ||
170 | return 0; | |
171 | ||
172 | nlmsg_fail: | |
173 | genlmsg_cancel(skb, hdr); | |
174 | nlmsg_free(skb); | |
175 | fail: | |
176 | return ret; | |
177 | } | |
178 | ||
179 | /* | |
180 | * Sends an uregister message to the userspace daemon based on the registration | |
181 | */ | |
182 | static int cifs_swn_send_unregister_message(struct cifs_swn_reg *swnreg) | |
183 | { | |
184 | struct sk_buff *skb; | |
185 | struct genlmsghdr *hdr; | |
186 | int ret; | |
187 | ||
188 | skb = genlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL); | |
189 | if (skb == NULL) | |
190 | return -ENOMEM; | |
191 | ||
192 | hdr = genlmsg_put(skb, 0, 0, &cifs_genl_family, 0, CIFS_GENL_CMD_SWN_UNREGISTER); | |
193 | if (hdr == NULL) { | |
194 | ret = -ENOMEM; | |
195 | goto nlmsg_fail; | |
196 | } | |
197 | ||
198 | ret = nla_put_u32(skb, CIFS_GENL_ATTR_SWN_REGISTRATION_ID, swnreg->id); | |
199 | if (ret < 0) | |
200 | goto nlmsg_fail; | |
201 | ||
202 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_NET_NAME, swnreg->net_name); | |
203 | if (ret < 0) | |
204 | goto nlmsg_fail; | |
205 | ||
206 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME, swnreg->share_name); | |
207 | if (ret < 0) | |
208 | goto nlmsg_fail; | |
209 | ||
210 | ret = nla_put(skb, CIFS_GENL_ATTR_SWN_IP, sizeof(struct sockaddr_storage), | |
211 | &swnreg->tcon->ses->server->dstaddr); | |
212 | if (ret < 0) | |
213 | goto nlmsg_fail; | |
214 | ||
215 | if (swnreg->net_name_notify) { | |
216 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_NET_NAME_NOTIFY); | |
217 | if (ret < 0) | |
218 | goto nlmsg_fail; | |
219 | } | |
220 | ||
221 | if (swnreg->share_name_notify) { | |
222 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME_NOTIFY); | |
223 | if (ret < 0) | |
224 | goto nlmsg_fail; | |
225 | } | |
226 | ||
227 | if (swnreg->ip_notify) { | |
228 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_IP_NOTIFY); | |
229 | if (ret < 0) | |
230 | goto nlmsg_fail; | |
231 | } | |
232 | ||
233 | genlmsg_end(skb, hdr); | |
234 | genlmsg_multicast(&cifs_genl_family, skb, 0, CIFS_GENL_MCGRP_SWN, GFP_ATOMIC); | |
235 | ||
236 | cifs_dbg(FYI, "%s: Message to unregister for network name %s with id %d sent\n", __func__, | |
237 | swnreg->net_name, swnreg->id); | |
238 | ||
239 | return 0; | |
240 | ||
241 | nlmsg_fail: | |
242 | genlmsg_cancel(skb, hdr); | |
243 | nlmsg_free(skb); | |
244 | return ret; | |
245 | } | |
246 | ||
247 | /* | |
248 | * Try to find a matching registration for the tcon's server name and share name. | |
403dba00 | 249 | * Calls to this function must be protected by cifs_swnreg_idr_mutex. |
bf80e5d4 SC |
250 | * TODO Try to avoid memory allocations |
251 | */ | |
252 | static struct cifs_swn_reg *cifs_find_swn_reg(struct cifs_tcon *tcon) | |
253 | { | |
254 | struct cifs_swn_reg *swnreg; | |
255 | int id; | |
256 | const char *share_name; | |
257 | const char *net_name; | |
258 | ||
68e14569 | 259 | net_name = extract_hostname(tcon->tree_name); |
09a8361e | 260 | if (IS_ERR(net_name)) { |
bf80e5d4 SC |
261 | int ret; |
262 | ||
263 | ret = PTR_ERR(net_name); | |
264 | cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", | |
68e14569 | 265 | __func__, tcon->tree_name, ret); |
09a8361e | 266 | return ERR_PTR(-EINVAL); |
bf80e5d4 SC |
267 | } |
268 | ||
68e14569 | 269 | share_name = extract_sharename(tcon->tree_name); |
09a8361e | 270 | if (IS_ERR(share_name)) { |
bf80e5d4 SC |
271 | int ret; |
272 | ||
af982da9 | 273 | ret = PTR_ERR(share_name); |
bf80e5d4 | 274 | cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", |
68e14569 | 275 | __func__, tcon->tree_name, ret); |
bf80e5d4 | 276 | kfree(net_name); |
09a8361e | 277 | return ERR_PTR(-EINVAL); |
bf80e5d4 SC |
278 | } |
279 | ||
280 | idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) { | |
281 | if (strcasecmp(swnreg->net_name, net_name) != 0 | |
282 | || strcasecmp(swnreg->share_name, share_name) != 0) { | |
283 | continue; | |
284 | } | |
285 | ||
bf80e5d4 SC |
286 | cifs_dbg(FYI, "Existing swn registration for %s:%s found\n", swnreg->net_name, |
287 | swnreg->share_name); | |
288 | ||
289 | kfree(net_name); | |
290 | kfree(share_name); | |
291 | ||
292 | return swnreg; | |
293 | } | |
294 | ||
295 | kfree(net_name); | |
296 | kfree(share_name); | |
297 | ||
09a8361e | 298 | return ERR_PTR(-EEXIST); |
bf80e5d4 SC |
299 | } |
300 | ||
301 | /* | |
302 | * Get a registration for the tcon's server and share name, allocating a new one if it does not | |
303 | * exists | |
304 | */ | |
305 | static struct cifs_swn_reg *cifs_get_swn_reg(struct cifs_tcon *tcon) | |
306 | { | |
307 | struct cifs_swn_reg *reg = NULL; | |
308 | int ret; | |
309 | ||
310 | mutex_lock(&cifs_swnreg_idr_mutex); | |
311 | ||
312 | /* Check if we are already registered for this network and share names */ | |
313 | reg = cifs_find_swn_reg(tcon); | |
09a8361e | 314 | if (!IS_ERR(reg)) { |
bf80e5d4 SC |
315 | kref_get(®->ref_count); |
316 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
317 | return reg; | |
09a8361e SC |
318 | } else if (PTR_ERR(reg) != -EEXIST) { |
319 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
320 | return reg; | |
bf80e5d4 SC |
321 | } |
322 | ||
323 | reg = kmalloc(sizeof(struct cifs_swn_reg), GFP_ATOMIC); | |
324 | if (reg == NULL) { | |
325 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
326 | return ERR_PTR(-ENOMEM); | |
327 | } | |
328 | ||
329 | kref_init(®->ref_count); | |
330 | ||
331 | reg->id = idr_alloc(&cifs_swnreg_idr, reg, 1, 0, GFP_ATOMIC); | |
332 | if (reg->id < 0) { | |
333 | cifs_dbg(FYI, "%s: failed to allocate registration id\n", __func__); | |
334 | ret = reg->id; | |
335 | goto fail; | |
336 | } | |
337 | ||
68e14569 | 338 | reg->net_name = extract_hostname(tcon->tree_name); |
bf80e5d4 SC |
339 | if (IS_ERR(reg->net_name)) { |
340 | ret = PTR_ERR(reg->net_name); | |
341 | cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); | |
342 | goto fail_idr; | |
343 | } | |
344 | ||
68e14569 | 345 | reg->share_name = extract_sharename(tcon->tree_name); |
bf80e5d4 SC |
346 | if (IS_ERR(reg->share_name)) { |
347 | ret = PTR_ERR(reg->share_name); | |
348 | cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); | |
349 | goto fail_net_name; | |
350 | } | |
351 | ||
352 | reg->net_name_notify = true; | |
353 | reg->share_name_notify = true; | |
354 | reg->ip_notify = (tcon->capabilities & SMB2_SHARE_CAP_SCALEOUT); | |
355 | ||
356 | reg->tcon = tcon; | |
357 | ||
358 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
359 | ||
360 | return reg; | |
361 | ||
362 | fail_net_name: | |
363 | kfree(reg->net_name); | |
364 | fail_idr: | |
365 | idr_remove(&cifs_swnreg_idr, reg->id); | |
366 | fail: | |
367 | kfree(reg); | |
368 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
369 | return ERR_PTR(ret); | |
370 | } | |
371 | ||
372 | static void cifs_swn_reg_release(struct kref *ref) | |
373 | { | |
374 | struct cifs_swn_reg *swnreg = container_of(ref, struct cifs_swn_reg, ref_count); | |
375 | int ret; | |
376 | ||
377 | ret = cifs_swn_send_unregister_message(swnreg); | |
378 | if (ret < 0) | |
379 | cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); | |
380 | ||
381 | idr_remove(&cifs_swnreg_idr, swnreg->id); | |
382 | kfree(swnreg->net_name); | |
383 | kfree(swnreg->share_name); | |
384 | kfree(swnreg); | |
385 | } | |
386 | ||
387 | static void cifs_put_swn_reg(struct cifs_swn_reg *swnreg) | |
388 | { | |
389 | mutex_lock(&cifs_swnreg_idr_mutex); | |
390 | kref_put(&swnreg->ref_count, cifs_swn_reg_release); | |
391 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
392 | } | |
393 | ||
fed979a7 SC |
394 | static int cifs_swn_resource_state_changed(struct cifs_swn_reg *swnreg, const char *name, int state) |
395 | { | |
fed979a7 SC |
396 | switch (state) { |
397 | case CIFS_SWN_RESOURCE_STATE_UNAVAILABLE: | |
398 | cifs_dbg(FYI, "%s: resource name '%s' become unavailable\n", __func__, name); | |
dca65818 | 399 | cifs_signal_cifsd_for_reconnect(swnreg->tcon->ses->server, true); |
fed979a7 SC |
400 | break; |
401 | case CIFS_SWN_RESOURCE_STATE_AVAILABLE: | |
402 | cifs_dbg(FYI, "%s: resource name '%s' become available\n", __func__, name); | |
dca65818 | 403 | cifs_signal_cifsd_for_reconnect(swnreg->tcon->ses->server, true); |
fed979a7 SC |
404 | break; |
405 | case CIFS_SWN_RESOURCE_STATE_UNKNOWN: | |
406 | cifs_dbg(FYI, "%s: resource name '%s' changed to unknown state\n", __func__, name); | |
407 | break; | |
408 | } | |
409 | return 0; | |
410 | } | |
411 | ||
121d947d SC |
412 | static bool cifs_sockaddr_equal(struct sockaddr_storage *addr1, struct sockaddr_storage *addr2) |
413 | { | |
414 | if (addr1->ss_family != addr2->ss_family) | |
415 | return false; | |
416 | ||
417 | if (addr1->ss_family == AF_INET) { | |
418 | return (memcmp(&((const struct sockaddr_in *)addr1)->sin_addr, | |
419 | &((const struct sockaddr_in *)addr2)->sin_addr, | |
420 | sizeof(struct in_addr)) == 0); | |
421 | } | |
422 | ||
423 | if (addr1->ss_family == AF_INET6) { | |
424 | return (memcmp(&((const struct sockaddr_in6 *)addr1)->sin6_addr, | |
425 | &((const struct sockaddr_in6 *)addr2)->sin6_addr, | |
426 | sizeof(struct in6_addr)) == 0); | |
427 | } | |
428 | ||
429 | return false; | |
430 | } | |
431 | ||
432 | static int cifs_swn_store_swn_addr(const struct sockaddr_storage *new, | |
433 | const struct sockaddr_storage *old, | |
434 | struct sockaddr_storage *dst) | |
435 | { | |
ff93b71a | 436 | __be16 port = cpu_to_be16(CIFS_PORT); |
121d947d SC |
437 | |
438 | if (old->ss_family == AF_INET) { | |
439 | struct sockaddr_in *ipv4 = (struct sockaddr_in *)old; | |
440 | ||
441 | port = ipv4->sin_port; | |
ff93b71a | 442 | } else if (old->ss_family == AF_INET6) { |
121d947d SC |
443 | struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)old; |
444 | ||
445 | port = ipv6->sin6_port; | |
446 | } | |
447 | ||
448 | if (new->ss_family == AF_INET) { | |
449 | struct sockaddr_in *ipv4 = (struct sockaddr_in *)new; | |
450 | ||
451 | ipv4->sin_port = port; | |
ff93b71a | 452 | } else if (new->ss_family == AF_INET6) { |
121d947d SC |
453 | struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)new; |
454 | ||
455 | ipv6->sin6_port = port; | |
456 | } | |
457 | ||
458 | *dst = *new; | |
459 | ||
460 | return 0; | |
461 | } | |
462 | ||
463 | static int cifs_swn_reconnect(struct cifs_tcon *tcon, struct sockaddr_storage *addr) | |
464 | { | |
eedf8e88 DC |
465 | int ret = 0; |
466 | ||
121d947d | 467 | /* Store the reconnect address */ |
cc391b69 | 468 | cifs_server_lock(tcon->ses->server); |
0f2c66ae DC |
469 | if (cifs_sockaddr_equal(&tcon->ses->server->dstaddr, addr)) |
470 | goto unlock; | |
471 | ||
472 | ret = cifs_swn_store_swn_addr(addr, &tcon->ses->server->dstaddr, | |
473 | &tcon->ses->server->swn_dstaddr); | |
474 | if (ret < 0) { | |
475 | cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); | |
476 | goto unlock; | |
477 | } | |
478 | tcon->ses->server->use_swn_dstaddr = true; | |
121d947d | 479 | |
0f2c66ae DC |
480 | /* |
481 | * Unregister to stop receiving notifications for the old IP address. | |
482 | */ | |
483 | ret = cifs_swn_unregister(tcon); | |
484 | if (ret < 0) { | |
485 | cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", | |
486 | __func__, ret); | |
487 | goto unlock; | |
488 | } | |
121d947d | 489 | |
0f2c66ae DC |
490 | /* |
491 | * And register to receive notifications for the new IP address now that we have | |
492 | * stored the new address. | |
493 | */ | |
494 | ret = cifs_swn_register(tcon); | |
495 | if (ret < 0) { | |
496 | cifs_dbg(VFS, "%s: Failed to register for witness notifications: %d\n", | |
497 | __func__, ret); | |
498 | goto unlock; | |
121d947d | 499 | } |
0f2c66ae | 500 | |
dca65818 | 501 | cifs_signal_cifsd_for_reconnect(tcon->ses->server, false); |
0f2c66ae | 502 | |
eedf8e88 | 503 | unlock: |
cc391b69 | 504 | cifs_server_unlock(tcon->ses->server); |
121d947d | 505 | |
eedf8e88 | 506 | return ret; |
121d947d SC |
507 | } |
508 | ||
509 | static int cifs_swn_client_move(struct cifs_swn_reg *swnreg, struct sockaddr_storage *addr) | |
510 | { | |
511 | struct sockaddr_in *ipv4 = (struct sockaddr_in *)addr; | |
512 | struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)addr; | |
513 | ||
514 | if (addr->ss_family == AF_INET) | |
515 | cifs_dbg(FYI, "%s: move to %pI4\n", __func__, &ipv4->sin_addr); | |
516 | else if (addr->ss_family == AF_INET6) | |
517 | cifs_dbg(FYI, "%s: move to %pI6\n", __func__, &ipv6->sin6_addr); | |
518 | ||
519 | return cifs_swn_reconnect(swnreg->tcon, addr); | |
520 | } | |
521 | ||
fed979a7 SC |
522 | int cifs_swn_notify(struct sk_buff *skb, struct genl_info *info) |
523 | { | |
524 | struct cifs_swn_reg *swnreg; | |
525 | char name[256]; | |
526 | int type; | |
527 | ||
528 | if (info->attrs[CIFS_GENL_ATTR_SWN_REGISTRATION_ID]) { | |
529 | int swnreg_id; | |
530 | ||
531 | swnreg_id = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_REGISTRATION_ID]); | |
532 | mutex_lock(&cifs_swnreg_idr_mutex); | |
533 | swnreg = idr_find(&cifs_swnreg_idr, swnreg_id); | |
534 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
535 | if (swnreg == NULL) { | |
536 | cifs_dbg(FYI, "%s: registration id %d not found\n", __func__, swnreg_id); | |
537 | return -EINVAL; | |
538 | } | |
539 | } else { | |
540 | cifs_dbg(FYI, "%s: missing registration id attribute\n", __func__); | |
541 | return -EINVAL; | |
542 | } | |
543 | ||
544 | if (info->attrs[CIFS_GENL_ATTR_SWN_NOTIFICATION_TYPE]) { | |
545 | type = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_NOTIFICATION_TYPE]); | |
546 | } else { | |
547 | cifs_dbg(FYI, "%s: missing notification type attribute\n", __func__); | |
548 | return -EINVAL; | |
549 | } | |
550 | ||
551 | switch (type) { | |
552 | case CIFS_SWN_NOTIFICATION_RESOURCE_CHANGE: { | |
553 | int state; | |
554 | ||
555 | if (info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_NAME]) { | |
e13300bd | 556 | nla_strscpy(name, info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_NAME], |
fed979a7 SC |
557 | sizeof(name)); |
558 | } else { | |
559 | cifs_dbg(FYI, "%s: missing resource name attribute\n", __func__); | |
560 | return -EINVAL; | |
561 | } | |
562 | if (info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_STATE]) { | |
563 | state = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_STATE]); | |
564 | } else { | |
565 | cifs_dbg(FYI, "%s: missing resource state attribute\n", __func__); | |
566 | return -EINVAL; | |
567 | } | |
568 | return cifs_swn_resource_state_changed(swnreg, name, state); | |
569 | } | |
121d947d SC |
570 | case CIFS_SWN_NOTIFICATION_CLIENT_MOVE: { |
571 | struct sockaddr_storage addr; | |
572 | ||
573 | if (info->attrs[CIFS_GENL_ATTR_SWN_IP]) { | |
574 | nla_memcpy(&addr, info->attrs[CIFS_GENL_ATTR_SWN_IP], sizeof(addr)); | |
575 | } else { | |
576 | cifs_dbg(FYI, "%s: missing IP address attribute\n", __func__); | |
577 | return -EINVAL; | |
578 | } | |
579 | return cifs_swn_client_move(swnreg, &addr); | |
580 | } | |
fed979a7 SC |
581 | default: |
582 | cifs_dbg(FYI, "%s: unknown notification type %d\n", __func__, type); | |
583 | break; | |
584 | } | |
585 | ||
586 | return 0; | |
587 | } | |
588 | ||
bf80e5d4 SC |
589 | int cifs_swn_register(struct cifs_tcon *tcon) |
590 | { | |
591 | struct cifs_swn_reg *swnreg; | |
592 | int ret; | |
593 | ||
594 | swnreg = cifs_get_swn_reg(tcon); | |
595 | if (IS_ERR(swnreg)) | |
596 | return PTR_ERR(swnreg); | |
597 | ||
598 | ret = cifs_swn_send_register_message(swnreg); | |
599 | if (ret < 0) { | |
600 | cifs_dbg(VFS, "%s: Failed to send swn register message: %d\n", __func__, ret); | |
601 | /* Do not put the swnreg or return error, the echo task will retry */ | |
602 | } | |
603 | ||
604 | return 0; | |
605 | } | |
606 | ||
607 | int cifs_swn_unregister(struct cifs_tcon *tcon) | |
608 | { | |
609 | struct cifs_swn_reg *swnreg; | |
610 | ||
611 | mutex_lock(&cifs_swnreg_idr_mutex); | |
612 | ||
613 | swnreg = cifs_find_swn_reg(tcon); | |
09a8361e | 614 | if (IS_ERR(swnreg)) { |
bf80e5d4 | 615 | mutex_unlock(&cifs_swnreg_idr_mutex); |
09a8361e | 616 | return PTR_ERR(swnreg); |
bf80e5d4 SC |
617 | } |
618 | ||
619 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
620 | ||
621 | cifs_put_swn_reg(swnreg); | |
622 | ||
623 | return 0; | |
624 | } | |
20fab0da SC |
625 | |
626 | void cifs_swn_dump(struct seq_file *m) | |
627 | { | |
628 | struct cifs_swn_reg *swnreg; | |
629 | struct sockaddr_in *sa; | |
630 | struct sockaddr_in6 *sa6; | |
631 | int id; | |
632 | ||
633 | seq_puts(m, "Witness registrations:"); | |
634 | ||
635 | mutex_lock(&cifs_swnreg_idr_mutex); | |
636 | idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) { | |
637 | seq_printf(m, "\nId: %u Refs: %u Network name: '%s'%s Share name: '%s'%s Ip address: ", | |
638 | id, kref_read(&swnreg->ref_count), | |
639 | swnreg->net_name, swnreg->net_name_notify ? "(y)" : "(n)", | |
640 | swnreg->share_name, swnreg->share_name_notify ? "(y)" : "(n)"); | |
641 | switch (swnreg->tcon->ses->server->dstaddr.ss_family) { | |
642 | case AF_INET: | |
643 | sa = (struct sockaddr_in *) &swnreg->tcon->ses->server->dstaddr; | |
644 | seq_printf(m, "%pI4", &sa->sin_addr.s_addr); | |
645 | break; | |
646 | case AF_INET6: | |
647 | sa6 = (struct sockaddr_in6 *) &swnreg->tcon->ses->server->dstaddr; | |
648 | seq_printf(m, "%pI6", &sa6->sin6_addr.s6_addr); | |
649 | if (sa6->sin6_scope_id) | |
650 | seq_printf(m, "%%%u", sa6->sin6_scope_id); | |
651 | break; | |
652 | default: | |
653 | seq_puts(m, "(unknown)"); | |
654 | } | |
655 | seq_printf(m, "%s", swnreg->ip_notify ? "(y)" : "(n)"); | |
656 | } | |
657 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
658 | seq_puts(m, "\n"); | |
659 | } | |
21077c62 SC |
660 | |
661 | void cifs_swn_check(void) | |
662 | { | |
663 | struct cifs_swn_reg *swnreg; | |
664 | int id; | |
665 | int ret; | |
666 | ||
667 | mutex_lock(&cifs_swnreg_idr_mutex); | |
668 | idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) { | |
669 | ret = cifs_swn_send_register_message(swnreg); | |
670 | if (ret < 0) | |
671 | cifs_dbg(FYI, "%s: Failed to send register message: %d\n", __func__, ret); | |
672 | } | |
673 | mutex_unlock(&cifs_swnreg_idr_mutex); | |
674 | } |