~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/fs/smb/client/cifs_swn.c

Version: ~ [ linux-6.11-rc3 ] ~ [ linux-6.10.4 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.45 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.104 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.164 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.223 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.281 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.319 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 /*
  3  * Witness Service client for CIFS
  4  *
  5  * Copyright (c) 2020 Samuel Cabrero <scabrero@suse.de>
  6  */
  7 
  8 #include <linux/kref.h>
  9 #include <net/genetlink.h>
 10 #include <uapi/linux/cifs/cifs_netlink.h>
 11 
 12 #include "cifs_swn.h"
 13 #include "cifsglob.h"
 14 #include "cifsproto.h"
 15 #include "fscache.h"
 16 #include "cifs_debug.h"
 17 #include "netlink.h"
 18 
 19 static DEFINE_IDR(cifs_swnreg_idr);
 20 static DEFINE_MUTEX(cifs_swnreg_idr_mutex);
 21 
 22 struct cifs_swn_reg {
 23         int id;
 24         struct kref ref_count;
 25 
 26         const char *net_name;
 27         const char *share_name;
 28         bool net_name_notify;
 29         bool share_name_notify;
 30         bool ip_notify;
 31 
 32         struct cifs_tcon *tcon;
 33 };
 34 
 35 static int cifs_swn_auth_info_krb(struct cifs_tcon *tcon, struct sk_buff *skb)
 36 {
 37         int ret;
 38 
 39         ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_KRB_AUTH);
 40         if (ret < 0)
 41                 return ret;
 42 
 43         return 0;
 44 }
 45 
 46 static int cifs_swn_auth_info_ntlm(struct cifs_tcon *tcon, struct sk_buff *skb)
 47 {
 48         int ret;
 49 
 50         if (tcon->ses->user_name != NULL) {
 51                 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_USER_NAME, tcon->ses->user_name);
 52                 if (ret < 0)
 53                         return ret;
 54         }
 55 
 56         if (tcon->ses->password != NULL) {
 57                 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password);
 58                 if (ret < 0)
 59                         return ret;
 60         }
 61 
 62         if (tcon->ses->domainName != NULL) {
 63                 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_DOMAIN_NAME, tcon->ses->domainName);
 64                 if (ret < 0)
 65                         return ret;
 66         }
 67 
 68         return 0;
 69 }
 70 
 71 /*
 72  * Sends a register message to the userspace daemon based on the registration.
 73  * The authentication information to connect to the witness service is bundled
 74  * into the message.
 75  */
 76 static int cifs_swn_send_register_message(struct cifs_swn_reg *swnreg)
 77 {
 78         struct sk_buff *skb;
 79         struct genlmsghdr *hdr;
 80         enum securityEnum authtype;
 81         struct sockaddr_storage *addr;
 82         int ret;
 83 
 84         skb = genlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
 85         if (skb == NULL) {
 86                 ret = -ENOMEM;
 87                 goto fail;
 88         }
 89 
 90         hdr = genlmsg_put(skb, 0, 0, &cifs_genl_family, 0, CIFS_GENL_CMD_SWN_REGISTER);
 91         if (hdr == NULL) {
 92                 ret = -ENOMEM;
 93                 goto nlmsg_fail;
 94         }
 95 
 96         ret = nla_put_u32(skb, CIFS_GENL_ATTR_SWN_REGISTRATION_ID, swnreg->id);
 97         if (ret < 0)
 98                 goto nlmsg_fail;
 99 
100         ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_NET_NAME, swnreg->net_name);
101         if (ret < 0)
102                 goto nlmsg_fail;
103 
104         ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME, swnreg->share_name);
105         if (ret < 0)
106                 goto nlmsg_fail;
107 
108         /*
109          * If there is an address stored use it instead of the server address, because we are
110          * in the process of reconnecting to it after a share has been moved or we have been
111          * told to switch to it (client move message). In these cases we unregister from the
112          * server address and register to the new address when we receive the notification.
113          */
114         if (swnreg->tcon->ses->server->use_swn_dstaddr)
115                 addr = &swnreg->tcon->ses->server->swn_dstaddr;
116         else
117                 addr = &swnreg->tcon->ses->server->dstaddr;
118 
119         ret = nla_put(skb, CIFS_GENL_ATTR_SWN_IP, sizeof(struct sockaddr_storage), addr);
120         if (ret < 0)
121                 goto nlmsg_fail;
122 
123         if (swnreg->net_name_notify) {
124                 ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_NET_NAME_NOTIFY);
125                 if (ret < 0)
126                         goto nlmsg_fail;
127         }
128 
129         if (swnreg->share_name_notify) {
130                 ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME_NOTIFY);
131                 if (ret < 0)
132                         goto nlmsg_fail;
133         }
134 
135         if (swnreg->ip_notify) {
136                 ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_IP_NOTIFY);
137                 if (ret < 0)
138                         goto nlmsg_fail;
139         }
140 
141         authtype = cifs_select_sectype(swnreg->tcon->ses->server, swnreg->tcon->ses->sectype);
142         switch (authtype) {
143         case Kerberos:
144                 ret = cifs_swn_auth_info_krb(swnreg->tcon, skb);
145                 if (ret < 0) {
146                         cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret);
147                         goto nlmsg_fail;
148                 }
149                 break;
150         case NTLMv2:
151         case RawNTLMSSP:
152                 ret = cifs_swn_auth_info_ntlm(swnreg->tcon, skb);
153                 if (ret < 0) {
154                         cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret);
155                         goto nlmsg_fail;
156                 }
157                 break;
158         default:
159                 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype);
160                 ret = -EINVAL;
161                 goto nlmsg_fail;
162         }
163 
164         genlmsg_end(skb, hdr);
165         genlmsg_multicast(&cifs_genl_family, skb, 0, CIFS_GENL_MCGRP_SWN, GFP_ATOMIC);
166 
167         cifs_dbg(FYI, "%s: Message to register for network name %s with id %d sent\n", __func__,
168                         swnreg->net_name, swnreg->id);
169 
170         return 0;
171 
172 nlmsg_fail:
173         genlmsg_cancel(skb, hdr);
174         nlmsg_free(skb);
175 fail:
176         return ret;
177 }
178 
179 /*
180  * Sends an uregister message to the userspace daemon based on the registration
181  */
182 static int cifs_swn_send_unregister_message(struct cifs_swn_reg *swnreg)
183 {
184         struct sk_buff *skb;
185         struct genlmsghdr *hdr;
186         int ret;
187 
188         skb = genlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
189         if (skb == NULL)
190                 return -ENOMEM;
191 
192         hdr = genlmsg_put(skb, 0, 0, &cifs_genl_family, 0, CIFS_GENL_CMD_SWN_UNREGISTER);
193         if (hdr == NULL) {
194                 ret = -ENOMEM;
195                 goto nlmsg_fail;
196         }
197 
198         ret = nla_put_u32(skb, CIFS_GENL_ATTR_SWN_REGISTRATION_ID, swnreg->id);
199         if (ret < 0)
200                 goto nlmsg_fail;
201 
202         ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_NET_NAME, swnreg->net_name);
203         if (ret < 0)
204                 goto nlmsg_fail;
205 
206         ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME, swnreg->share_name);
207         if (ret < 0)
208                 goto nlmsg_fail;
209 
210         ret = nla_put(skb, CIFS_GENL_ATTR_SWN_IP, sizeof(struct sockaddr_storage),
211                         &swnreg->tcon->ses->server->dstaddr);
212         if (ret < 0)
213                 goto nlmsg_fail;
214 
215         if (swnreg->net_name_notify) {
216                 ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_NET_NAME_NOTIFY);
217                 if (ret < 0)
218                         goto nlmsg_fail;
219         }
220 
221         if (swnreg->share_name_notify) {
222                 ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME_NOTIFY);
223                 if (ret < 0)
224                         goto nlmsg_fail;
225         }
226 
227         if (swnreg->ip_notify) {
228                 ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_IP_NOTIFY);
229                 if (ret < 0)
230                         goto nlmsg_fail;
231         }
232 
233         genlmsg_end(skb, hdr);
234         genlmsg_multicast(&cifs_genl_family, skb, 0, CIFS_GENL_MCGRP_SWN, GFP_ATOMIC);
235 
236         cifs_dbg(FYI, "%s: Message to unregister for network name %s with id %d sent\n", __func__,
237                         swnreg->net_name, swnreg->id);
238 
239         return 0;
240 
241 nlmsg_fail:
242         genlmsg_cancel(skb, hdr);
243         nlmsg_free(skb);
244         return ret;
245 }
246 
247 /*
248  * Try to find a matching registration for the tcon's server name and share name.
249  * Calls to this function must be protected by cifs_swnreg_idr_mutex.
250  * TODO Try to avoid memory allocations
251  */
252 static struct cifs_swn_reg *cifs_find_swn_reg(struct cifs_tcon *tcon)
253 {
254         struct cifs_swn_reg *swnreg;
255         int id;
256         const char *share_name;
257         const char *net_name;
258 
259         net_name = extract_hostname(tcon->tree_name);
260         if (IS_ERR(net_name)) {
261                 int ret;
262 
263                 ret = PTR_ERR(net_name);
264                 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n",
265                                 __func__, tcon->tree_name, ret);
266                 return ERR_PTR(-EINVAL);
267         }
268 
269         share_name = extract_sharename(tcon->tree_name);
270         if (IS_ERR(share_name)) {
271                 int ret;
272 
273                 ret = PTR_ERR(share_name);
274                 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n",
275                                 __func__, tcon->tree_name, ret);
276                 kfree(net_name);
277                 return ERR_PTR(-EINVAL);
278         }
279 
280         idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) {
281                 if (strcasecmp(swnreg->net_name, net_name) != 0
282                     || strcasecmp(swnreg->share_name, share_name) != 0) {
283                         continue;
284                 }
285 
286                 cifs_dbg(FYI, "Existing swn registration for %s:%s found\n", swnreg->net_name,
287                                 swnreg->share_name);
288 
289                 kfree(net_name);
290                 kfree(share_name);
291 
292                 return swnreg;
293         }
294 
295         kfree(net_name);
296         kfree(share_name);
297 
298         return ERR_PTR(-EEXIST);
299 }
300 
301 /*
302  * Get a registration for the tcon's server and share name, allocating a new one if it does not
303  * exists
304  */
305 static struct cifs_swn_reg *cifs_get_swn_reg(struct cifs_tcon *tcon)
306 {
307         struct cifs_swn_reg *reg = NULL;
308         int ret;
309 
310         mutex_lock(&cifs_swnreg_idr_mutex);
311 
312         /* Check if we are already registered for this network and share names */
313         reg = cifs_find_swn_reg(tcon);
314         if (!IS_ERR(reg)) {
315                 kref_get(&reg->ref_count);
316                 mutex_unlock(&cifs_swnreg_idr_mutex);
317                 return reg;
318         } else if (PTR_ERR(reg) != -EEXIST) {
319                 mutex_unlock(&cifs_swnreg_idr_mutex);
320                 return reg;
321         }
322 
323         reg = kmalloc(sizeof(struct cifs_swn_reg), GFP_ATOMIC);
324         if (reg == NULL) {
325                 mutex_unlock(&cifs_swnreg_idr_mutex);
326                 return ERR_PTR(-ENOMEM);
327         }
328 
329         kref_init(&reg->ref_count);
330 
331         reg->id = idr_alloc(&cifs_swnreg_idr, reg, 1, 0, GFP_ATOMIC);
332         if (reg->id < 0) {
333                 cifs_dbg(FYI, "%s: failed to allocate registration id\n", __func__);
334                 ret = reg->id;
335                 goto fail;
336         }
337 
338         reg->net_name = extract_hostname(tcon->tree_name);
339         if (IS_ERR(reg->net_name)) {
340                 ret = PTR_ERR(reg->net_name);
341                 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret);
342                 goto fail_idr;
343         }
344 
345         reg->share_name = extract_sharename(tcon->tree_name);
346         if (IS_ERR(reg->share_name)) {
347                 ret = PTR_ERR(reg->share_name);
348                 cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret);
349                 goto fail_net_name;
350         }
351 
352         reg->net_name_notify = true;
353         reg->share_name_notify = true;
354         reg->ip_notify = (tcon->capabilities & SMB2_SHARE_CAP_SCALEOUT);
355 
356         reg->tcon = tcon;
357 
358         mutex_unlock(&cifs_swnreg_idr_mutex);
359 
360         return reg;
361 
362 fail_net_name:
363         kfree(reg->net_name);
364 fail_idr:
365         idr_remove(&cifs_swnreg_idr, reg->id);
366 fail:
367         kfree(reg);
368         mutex_unlock(&cifs_swnreg_idr_mutex);
369         return ERR_PTR(ret);
370 }
371 
372 static void cifs_swn_reg_release(struct kref *ref)
373 {
374         struct cifs_swn_reg *swnreg = container_of(ref, struct cifs_swn_reg, ref_count);
375         int ret;
376 
377         ret = cifs_swn_send_unregister_message(swnreg);
378         if (ret < 0)
379                 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret);
380 
381         idr_remove(&cifs_swnreg_idr, swnreg->id);
382         kfree(swnreg->net_name);
383         kfree(swnreg->share_name);
384         kfree(swnreg);
385 }
386 
387 static void cifs_put_swn_reg(struct cifs_swn_reg *swnreg)
388 {
389         mutex_lock(&cifs_swnreg_idr_mutex);
390         kref_put(&swnreg->ref_count, cifs_swn_reg_release);
391         mutex_unlock(&cifs_swnreg_idr_mutex);
392 }
393 
394 static int cifs_swn_resource_state_changed(struct cifs_swn_reg *swnreg, const char *name, int state)
395 {
396         switch (state) {
397         case CIFS_SWN_RESOURCE_STATE_UNAVAILABLE:
398                 cifs_dbg(FYI, "%s: resource name '%s' become unavailable\n", __func__, name);
399                 cifs_signal_cifsd_for_reconnect(swnreg->tcon->ses->server, true);
400                 break;
401         case CIFS_SWN_RESOURCE_STATE_AVAILABLE:
402                 cifs_dbg(FYI, "%s: resource name '%s' become available\n", __func__, name);
403                 cifs_signal_cifsd_for_reconnect(swnreg->tcon->ses->server, true);
404                 break;
405         case CIFS_SWN_RESOURCE_STATE_UNKNOWN:
406                 cifs_dbg(FYI, "%s: resource name '%s' changed to unknown state\n", __func__, name);
407                 break;
408         }
409         return 0;
410 }
411 
412 static bool cifs_sockaddr_equal(struct sockaddr_storage *addr1, struct sockaddr_storage *addr2)
413 {
414         if (addr1->ss_family != addr2->ss_family)
415                 return false;
416 
417         if (addr1->ss_family == AF_INET) {
418                 return (memcmp(&((const struct sockaddr_in *)addr1)->sin_addr,
419                                 &((const struct sockaddr_in *)addr2)->sin_addr,
420                                 sizeof(struct in_addr)) == 0);
421         }
422 
423         if (addr1->ss_family == AF_INET6) {
424                 return (memcmp(&((const struct sockaddr_in6 *)addr1)->sin6_addr,
425                                 &((const struct sockaddr_in6 *)addr2)->sin6_addr,
426                                 sizeof(struct in6_addr)) == 0);
427         }
428 
429         return false;
430 }
431 
432 static int cifs_swn_store_swn_addr(const struct sockaddr_storage *new,
433                                    const struct sockaddr_storage *old,
434                                    struct sockaddr_storage *dst)
435 {
436         __be16 port = cpu_to_be16(CIFS_PORT);
437 
438         if (old->ss_family == AF_INET) {
439                 struct sockaddr_in *ipv4 = (struct sockaddr_in *)old;
440 
441                 port = ipv4->sin_port;
442         } else if (old->ss_family == AF_INET6) {
443                 struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)old;
444 
445                 port = ipv6->sin6_port;
446         }
447 
448         if (new->ss_family == AF_INET) {
449                 struct sockaddr_in *ipv4 = (struct sockaddr_in *)new;
450 
451                 ipv4->sin_port = port;
452         } else if (new->ss_family == AF_INET6) {
453                 struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)new;
454 
455                 ipv6->sin6_port = port;
456         }
457 
458         *dst = *new;
459 
460         return 0;
461 }
462 
463 static int cifs_swn_reconnect(struct cifs_tcon *tcon, struct sockaddr_storage *addr)
464 {
465         int ret = 0;
466 
467         /* Store the reconnect address */
468         cifs_server_lock(tcon->ses->server);
469         if (cifs_sockaddr_equal(&tcon->ses->server->dstaddr, addr))
470                 goto unlock;
471 
472         ret = cifs_swn_store_swn_addr(addr, &tcon->ses->server->dstaddr,
473                                       &tcon->ses->server->swn_dstaddr);
474         if (ret < 0) {
475                 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret);
476                 goto unlock;
477         }
478         tcon->ses->server->use_swn_dstaddr = true;
479 
480         /*
481          * Unregister to stop receiving notifications for the old IP address.
482          */
483         ret = cifs_swn_unregister(tcon);
484         if (ret < 0) {
485                 cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n",
486                          __func__, ret);
487                 goto unlock;
488         }
489 
490         /*
491          * And register to receive notifications for the new IP address now that we have
492          * stored the new address.
493          */
494         ret = cifs_swn_register(tcon);
495         if (ret < 0) {
496                 cifs_dbg(VFS, "%s: Failed to register for witness notifications: %d\n",
497                          __func__, ret);
498                 goto unlock;
499         }
500 
501         cifs_signal_cifsd_for_reconnect(tcon->ses->server, false);
502 
503 unlock:
504         cifs_server_unlock(tcon->ses->server);
505 
506         return ret;
507 }
508 
509 static int cifs_swn_client_move(struct cifs_swn_reg *swnreg, struct sockaddr_storage *addr)
510 {
511         struct sockaddr_in *ipv4 = (struct sockaddr_in *)addr;
512         struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)addr;
513 
514         if (addr->ss_family == AF_INET)
515                 cifs_dbg(FYI, "%s: move to %pI4\n", __func__, &ipv4->sin_addr);
516         else if (addr->ss_family == AF_INET6)
517                 cifs_dbg(FYI, "%s: move to %pI6\n", __func__, &ipv6->sin6_addr);
518 
519         return cifs_swn_reconnect(swnreg->tcon, addr);
520 }
521 
522 int cifs_swn_notify(struct sk_buff *skb, struct genl_info *info)
523 {
524         struct cifs_swn_reg *swnreg;
525         char name[256];
526         int type;
527 
528         if (info->attrs[CIFS_GENL_ATTR_SWN_REGISTRATION_ID]) {
529                 int swnreg_id;
530 
531                 swnreg_id = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_REGISTRATION_ID]);
532                 mutex_lock(&cifs_swnreg_idr_mutex);
533                 swnreg = idr_find(&cifs_swnreg_idr, swnreg_id);
534                 mutex_unlock(&cifs_swnreg_idr_mutex);
535                 if (swnreg == NULL) {
536                         cifs_dbg(FYI, "%s: registration id %d not found\n", __func__, swnreg_id);
537                         return -EINVAL;
538                 }
539         } else {
540                 cifs_dbg(FYI, "%s: missing registration id attribute\n", __func__);
541                 return -EINVAL;
542         }
543 
544         if (info->attrs[CIFS_GENL_ATTR_SWN_NOTIFICATION_TYPE]) {
545                 type = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_NOTIFICATION_TYPE]);
546         } else {
547                 cifs_dbg(FYI, "%s: missing notification type attribute\n", __func__);
548                 return -EINVAL;
549         }
550 
551         switch (type) {
552         case CIFS_SWN_NOTIFICATION_RESOURCE_CHANGE: {
553                 int state;
554 
555                 if (info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_NAME]) {
556                         nla_strscpy(name, info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_NAME],
557                                         sizeof(name));
558                 } else {
559                         cifs_dbg(FYI, "%s: missing resource name attribute\n", __func__);
560                         return -EINVAL;
561                 }
562                 if (info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_STATE]) {
563                         state = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_STATE]);
564                 } else {
565                         cifs_dbg(FYI, "%s: missing resource state attribute\n", __func__);
566                         return -EINVAL;
567                 }
568                 return cifs_swn_resource_state_changed(swnreg, name, state);
569         }
570         case CIFS_SWN_NOTIFICATION_CLIENT_MOVE: {
571                 struct sockaddr_storage addr;
572 
573                 if (info->attrs[CIFS_GENL_ATTR_SWN_IP]) {
574                         nla_memcpy(&addr, info->attrs[CIFS_GENL_ATTR_SWN_IP], sizeof(addr));
575                 } else {
576                         cifs_dbg(FYI, "%s: missing IP address attribute\n", __func__);
577                         return -EINVAL;
578                 }
579                 return cifs_swn_client_move(swnreg, &addr);
580         }
581         default:
582                 cifs_dbg(FYI, "%s: unknown notification type %d\n", __func__, type);
583                 break;
584         }
585 
586         return 0;
587 }
588 
589 int cifs_swn_register(struct cifs_tcon *tcon)
590 {
591         struct cifs_swn_reg *swnreg;
592         int ret;
593 
594         swnreg = cifs_get_swn_reg(tcon);
595         if (IS_ERR(swnreg))
596                 return PTR_ERR(swnreg);
597 
598         ret = cifs_swn_send_register_message(swnreg);
599         if (ret < 0) {
600                 cifs_dbg(VFS, "%s: Failed to send swn register message: %d\n", __func__, ret);
601                 /* Do not put the swnreg or return error, the echo task will retry */
602         }
603 
604         return 0;
605 }
606 
607 int cifs_swn_unregister(struct cifs_tcon *tcon)
608 {
609         struct cifs_swn_reg *swnreg;
610 
611         mutex_lock(&cifs_swnreg_idr_mutex);
612 
613         swnreg = cifs_find_swn_reg(tcon);
614         if (IS_ERR(swnreg)) {
615                 mutex_unlock(&cifs_swnreg_idr_mutex);
616                 return PTR_ERR(swnreg);
617         }
618 
619         mutex_unlock(&cifs_swnreg_idr_mutex);
620 
621         cifs_put_swn_reg(swnreg);
622 
623         return 0;
624 }
625 
626 void cifs_swn_dump(struct seq_file *m)
627 {
628         struct cifs_swn_reg *swnreg;
629         struct sockaddr_in *sa;
630         struct sockaddr_in6 *sa6;
631         int id;
632 
633         seq_puts(m, "Witness registrations:");
634 
635         mutex_lock(&cifs_swnreg_idr_mutex);
636         idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) {
637                 seq_printf(m, "\nId: %u Refs: %u Network name: '%s'%s Share name: '%s'%s Ip address: ",
638                                 id, kref_read(&swnreg->ref_count),
639                                 swnreg->net_name, swnreg->net_name_notify ? "(y)" : "(n)",
640                                 swnreg->share_name, swnreg->share_name_notify ? "(y)" : "(n)");
641                 switch (swnreg->tcon->ses->server->dstaddr.ss_family) {
642                 case AF_INET:
643                         sa = (struct sockaddr_in *) &swnreg->tcon->ses->server->dstaddr;
644                         seq_printf(m, "%pI4", &sa->sin_addr.s_addr);
645                         break;
646                 case AF_INET6:
647                         sa6 = (struct sockaddr_in6 *) &swnreg->tcon->ses->server->dstaddr;
648                         seq_printf(m, "%pI6", &sa6->sin6_addr.s6_addr);
649                         if (sa6->sin6_scope_id)
650                                 seq_printf(m, "%%%u", sa6->sin6_scope_id);
651                         break;
652                 default:
653                         seq_puts(m, "(unknown)");
654                 }
655                 seq_printf(m, "%s", swnreg->ip_notify ? "(y)" : "(n)");
656         }
657         mutex_unlock(&cifs_swnreg_idr_mutex);
658         seq_puts(m, "\n");
659 }
660 
661 void cifs_swn_check(void)
662 {
663         struct cifs_swn_reg *swnreg;
664         int id;
665         int ret;
666 
667         mutex_lock(&cifs_swnreg_idr_mutex);
668         idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) {
669                 ret = cifs_swn_send_register_message(swnreg);
670                 if (ret < 0)
671                         cifs_dbg(FYI, "%s: Failed to send register message: %d\n", __func__, ret);
672         }
673         mutex_unlock(&cifs_swnreg_idr_mutex);
674 }
675 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php