Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0 |
| 2 | /* |
| 3 | * Witness Service client for CIFS |
| 4 | * |
| 5 | * Copyright (c) 2020 Samuel Cabrero <scabrero@suse.de> |
| 6 | */ |
| 7 | |
| 8 | #include <linux/kref.h> |
| 9 | #include <net/genetlink.h> |
| 10 | #include <uapi/linux/cifs/cifs_netlink.h> |
| 11 | |
| 12 | #include "cifs_swn.h" |
| 13 | #include "cifsglob.h" |
| 14 | #include "cifsproto.h" |
| 15 | #include "fscache.h" |
| 16 | #include "cifs_debug.h" |
| 17 | #include "netlink.h" |
| 18 | |
| 19 | static DEFINE_IDR(cifs_swnreg_idr); |
| 20 | static DEFINE_MUTEX(cifs_swnreg_idr_mutex); |
| 21 | |
| 22 | struct cifs_swn_reg { |
| 23 | int id; |
| 24 | struct kref ref_count; |
| 25 | |
| 26 | const char *net_name; |
| 27 | const char *share_name; |
| 28 | bool net_name_notify; |
| 29 | bool share_name_notify; |
| 30 | bool ip_notify; |
| 31 | |
| 32 | struct cifs_tcon *tcon; |
| 33 | }; |
| 34 | |
| 35 | static int cifs_swn_auth_info_krb(struct cifs_tcon *tcon, struct sk_buff *skb) |
| 36 | { |
| 37 | int ret; |
| 38 | |
| 39 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_KRB_AUTH); |
| 40 | if (ret < 0) |
| 41 | return ret; |
| 42 | |
| 43 | return 0; |
| 44 | } |
| 45 | |
| 46 | static int cifs_swn_auth_info_ntlm(struct cifs_tcon *tcon, struct sk_buff *skb) |
| 47 | { |
| 48 | int ret; |
| 49 | |
| 50 | if (tcon->ses->user_name != NULL) { |
| 51 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_USER_NAME, tcon->ses->user_name); |
| 52 | if (ret < 0) |
| 53 | return ret; |
| 54 | } |
| 55 | |
| 56 | if (tcon->ses->password != NULL) { |
| 57 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password); |
| 58 | if (ret < 0) |
| 59 | return ret; |
| 60 | } |
| 61 | |
| 62 | if (tcon->ses->domainName != NULL) { |
| 63 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_DOMAIN_NAME, tcon->ses->domainName); |
| 64 | if (ret < 0) |
| 65 | return ret; |
| 66 | } |
| 67 | |
| 68 | return 0; |
| 69 | } |
| 70 | |
| 71 | /* |
| 72 | * Sends a register message to the userspace daemon based on the registration. |
| 73 | * The authentication information to connect to the witness service is bundled |
| 74 | * into the message. |
| 75 | */ |
| 76 | static int cifs_swn_send_register_message(struct cifs_swn_reg *swnreg) |
| 77 | { |
| 78 | struct sk_buff *skb; |
| 79 | struct genlmsghdr *hdr; |
| 80 | enum securityEnum authtype; |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 81 | struct sockaddr_storage *addr; |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 82 | int ret; |
| 83 | |
| 84 | skb = genlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL); |
| 85 | if (skb == NULL) { |
| 86 | ret = -ENOMEM; |
| 87 | goto fail; |
| 88 | } |
| 89 | |
| 90 | hdr = genlmsg_put(skb, 0, 0, &cifs_genl_family, 0, CIFS_GENL_CMD_SWN_REGISTER); |
| 91 | if (hdr == NULL) { |
| 92 | ret = -ENOMEM; |
| 93 | goto nlmsg_fail; |
| 94 | } |
| 95 | |
| 96 | ret = nla_put_u32(skb, CIFS_GENL_ATTR_SWN_REGISTRATION_ID, swnreg->id); |
| 97 | if (ret < 0) |
| 98 | goto nlmsg_fail; |
| 99 | |
| 100 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_NET_NAME, swnreg->net_name); |
| 101 | if (ret < 0) |
| 102 | goto nlmsg_fail; |
| 103 | |
| 104 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME, swnreg->share_name); |
| 105 | if (ret < 0) |
| 106 | goto nlmsg_fail; |
| 107 | |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 108 | /* |
| 109 | * If there is an address stored use it instead of the server address, because we are |
| 110 | * in the process of reconnecting to it after a share has been moved or we have been |
| 111 | * told to switch to it (client move message). In these cases we unregister from the |
| 112 | * server address and register to the new address when we receive the notification. |
| 113 | */ |
| 114 | if (swnreg->tcon->ses->server->use_swn_dstaddr) |
| 115 | addr = &swnreg->tcon->ses->server->swn_dstaddr; |
| 116 | else |
| 117 | addr = &swnreg->tcon->ses->server->dstaddr; |
| 118 | |
| 119 | ret = nla_put(skb, CIFS_GENL_ATTR_SWN_IP, sizeof(struct sockaddr_storage), addr); |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 120 | if (ret < 0) |
| 121 | goto nlmsg_fail; |
| 122 | |
| 123 | if (swnreg->net_name_notify) { |
| 124 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_NET_NAME_NOTIFY); |
| 125 | if (ret < 0) |
| 126 | goto nlmsg_fail; |
| 127 | } |
| 128 | |
| 129 | if (swnreg->share_name_notify) { |
| 130 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME_NOTIFY); |
| 131 | if (ret < 0) |
| 132 | goto nlmsg_fail; |
| 133 | } |
| 134 | |
| 135 | if (swnreg->ip_notify) { |
| 136 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_IP_NOTIFY); |
| 137 | if (ret < 0) |
| 138 | goto nlmsg_fail; |
| 139 | } |
| 140 | |
| 141 | authtype = cifs_select_sectype(swnreg->tcon->ses->server, swnreg->tcon->ses->sectype); |
| 142 | switch (authtype) { |
| 143 | case Kerberos: |
| 144 | ret = cifs_swn_auth_info_krb(swnreg->tcon, skb); |
| 145 | if (ret < 0) { |
| 146 | cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); |
| 147 | goto nlmsg_fail; |
| 148 | } |
| 149 | break; |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 150 | case NTLMv2: |
| 151 | case RawNTLMSSP: |
| 152 | ret = cifs_swn_auth_info_ntlm(swnreg->tcon, skb); |
| 153 | if (ret < 0) { |
| 154 | cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); |
| 155 | goto nlmsg_fail; |
| 156 | } |
| 157 | break; |
| 158 | default: |
| 159 | cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); |
| 160 | ret = -EINVAL; |
| 161 | goto nlmsg_fail; |
| 162 | } |
| 163 | |
| 164 | genlmsg_end(skb, hdr); |
| 165 | genlmsg_multicast(&cifs_genl_family, skb, 0, CIFS_GENL_MCGRP_SWN, GFP_ATOMIC); |
| 166 | |
| 167 | cifs_dbg(FYI, "%s: Message to register for network name %s with id %d sent\n", __func__, |
| 168 | swnreg->net_name, swnreg->id); |
| 169 | |
| 170 | return 0; |
| 171 | |
| 172 | nlmsg_fail: |
| 173 | genlmsg_cancel(skb, hdr); |
| 174 | nlmsg_free(skb); |
| 175 | fail: |
| 176 | return ret; |
| 177 | } |
| 178 | |
| 179 | /* |
| 180 | * Sends an uregister message to the userspace daemon based on the registration |
| 181 | */ |
| 182 | static int cifs_swn_send_unregister_message(struct cifs_swn_reg *swnreg) |
| 183 | { |
| 184 | struct sk_buff *skb; |
| 185 | struct genlmsghdr *hdr; |
| 186 | int ret; |
| 187 | |
| 188 | skb = genlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL); |
| 189 | if (skb == NULL) |
| 190 | return -ENOMEM; |
| 191 | |
| 192 | hdr = genlmsg_put(skb, 0, 0, &cifs_genl_family, 0, CIFS_GENL_CMD_SWN_UNREGISTER); |
| 193 | if (hdr == NULL) { |
| 194 | ret = -ENOMEM; |
| 195 | goto nlmsg_fail; |
| 196 | } |
| 197 | |
| 198 | ret = nla_put_u32(skb, CIFS_GENL_ATTR_SWN_REGISTRATION_ID, swnreg->id); |
| 199 | if (ret < 0) |
| 200 | goto nlmsg_fail; |
| 201 | |
| 202 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_NET_NAME, swnreg->net_name); |
| 203 | if (ret < 0) |
| 204 | goto nlmsg_fail; |
| 205 | |
| 206 | ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME, swnreg->share_name); |
| 207 | if (ret < 0) |
| 208 | goto nlmsg_fail; |
| 209 | |
| 210 | ret = nla_put(skb, CIFS_GENL_ATTR_SWN_IP, sizeof(struct sockaddr_storage), |
| 211 | &swnreg->tcon->ses->server->dstaddr); |
| 212 | if (ret < 0) |
| 213 | goto nlmsg_fail; |
| 214 | |
| 215 | if (swnreg->net_name_notify) { |
| 216 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_NET_NAME_NOTIFY); |
| 217 | if (ret < 0) |
| 218 | goto nlmsg_fail; |
| 219 | } |
| 220 | |
| 221 | if (swnreg->share_name_notify) { |
| 222 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME_NOTIFY); |
| 223 | if (ret < 0) |
| 224 | goto nlmsg_fail; |
| 225 | } |
| 226 | |
| 227 | if (swnreg->ip_notify) { |
| 228 | ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_IP_NOTIFY); |
| 229 | if (ret < 0) |
| 230 | goto nlmsg_fail; |
| 231 | } |
| 232 | |
| 233 | genlmsg_end(skb, hdr); |
| 234 | genlmsg_multicast(&cifs_genl_family, skb, 0, CIFS_GENL_MCGRP_SWN, GFP_ATOMIC); |
| 235 | |
| 236 | cifs_dbg(FYI, "%s: Message to unregister for network name %s with id %d sent\n", __func__, |
| 237 | swnreg->net_name, swnreg->id); |
| 238 | |
| 239 | return 0; |
| 240 | |
| 241 | nlmsg_fail: |
| 242 | genlmsg_cancel(skb, hdr); |
| 243 | nlmsg_free(skb); |
| 244 | return ret; |
| 245 | } |
| 246 | |
| 247 | /* |
| 248 | * Try to find a matching registration for the tcon's server name and share name. |
Liu xuzhi | 403dba0 | 2021-03-18 17:46:57 -0700 | [diff] [blame] | 249 | * Calls to this function must be protected by cifs_swnreg_idr_mutex. |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 250 | * TODO Try to avoid memory allocations |
| 251 | */ |
| 252 | static struct cifs_swn_reg *cifs_find_swn_reg(struct cifs_tcon *tcon) |
| 253 | { |
| 254 | struct cifs_swn_reg *swnreg; |
| 255 | int id; |
| 256 | const char *share_name; |
| 257 | const char *net_name; |
| 258 | |
| 259 | net_name = extract_hostname(tcon->treeName); |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 260 | if (IS_ERR(net_name)) { |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 261 | int ret; |
| 262 | |
| 263 | ret = PTR_ERR(net_name); |
| 264 | cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", |
| 265 | __func__, tcon->treeName, ret); |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 266 | return ERR_PTR(-EINVAL); |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 267 | } |
| 268 | |
| 269 | share_name = extract_sharename(tcon->treeName); |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 270 | if (IS_ERR(share_name)) { |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 271 | int ret; |
| 272 | |
YueHaibing | af982da | 2021-02-18 17:28:12 +0800 | [diff] [blame] | 273 | ret = PTR_ERR(share_name); |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 274 | cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", |
| 275 | __func__, tcon->treeName, ret); |
| 276 | kfree(net_name); |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 277 | return ERR_PTR(-EINVAL); |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 278 | } |
| 279 | |
| 280 | idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) { |
| 281 | if (strcasecmp(swnreg->net_name, net_name) != 0 |
| 282 | || strcasecmp(swnreg->share_name, share_name) != 0) { |
| 283 | continue; |
| 284 | } |
| 285 | |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 286 | cifs_dbg(FYI, "Existing swn registration for %s:%s found\n", swnreg->net_name, |
| 287 | swnreg->share_name); |
| 288 | |
| 289 | kfree(net_name); |
| 290 | kfree(share_name); |
| 291 | |
| 292 | return swnreg; |
| 293 | } |
| 294 | |
| 295 | kfree(net_name); |
| 296 | kfree(share_name); |
| 297 | |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 298 | return ERR_PTR(-EEXIST); |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 299 | } |
| 300 | |
| 301 | /* |
| 302 | * Get a registration for the tcon's server and share name, allocating a new one if it does not |
| 303 | * exists |
| 304 | */ |
| 305 | static struct cifs_swn_reg *cifs_get_swn_reg(struct cifs_tcon *tcon) |
| 306 | { |
| 307 | struct cifs_swn_reg *reg = NULL; |
| 308 | int ret; |
| 309 | |
| 310 | mutex_lock(&cifs_swnreg_idr_mutex); |
| 311 | |
| 312 | /* Check if we are already registered for this network and share names */ |
| 313 | reg = cifs_find_swn_reg(tcon); |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 314 | if (!IS_ERR(reg)) { |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 315 | kref_get(®->ref_count); |
| 316 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 317 | return reg; |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 318 | } else if (PTR_ERR(reg) != -EEXIST) { |
| 319 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 320 | return reg; |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 321 | } |
| 322 | |
| 323 | reg = kmalloc(sizeof(struct cifs_swn_reg), GFP_ATOMIC); |
| 324 | if (reg == NULL) { |
| 325 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 326 | return ERR_PTR(-ENOMEM); |
| 327 | } |
| 328 | |
| 329 | kref_init(®->ref_count); |
| 330 | |
| 331 | reg->id = idr_alloc(&cifs_swnreg_idr, reg, 1, 0, GFP_ATOMIC); |
| 332 | if (reg->id < 0) { |
| 333 | cifs_dbg(FYI, "%s: failed to allocate registration id\n", __func__); |
| 334 | ret = reg->id; |
| 335 | goto fail; |
| 336 | } |
| 337 | |
| 338 | reg->net_name = extract_hostname(tcon->treeName); |
| 339 | if (IS_ERR(reg->net_name)) { |
| 340 | ret = PTR_ERR(reg->net_name); |
| 341 | cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); |
| 342 | goto fail_idr; |
| 343 | } |
| 344 | |
| 345 | reg->share_name = extract_sharename(tcon->treeName); |
| 346 | if (IS_ERR(reg->share_name)) { |
| 347 | ret = PTR_ERR(reg->share_name); |
| 348 | cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); |
| 349 | goto fail_net_name; |
| 350 | } |
| 351 | |
| 352 | reg->net_name_notify = true; |
| 353 | reg->share_name_notify = true; |
| 354 | reg->ip_notify = (tcon->capabilities & SMB2_SHARE_CAP_SCALEOUT); |
| 355 | |
| 356 | reg->tcon = tcon; |
| 357 | |
| 358 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 359 | |
| 360 | return reg; |
| 361 | |
| 362 | fail_net_name: |
| 363 | kfree(reg->net_name); |
| 364 | fail_idr: |
| 365 | idr_remove(&cifs_swnreg_idr, reg->id); |
| 366 | fail: |
| 367 | kfree(reg); |
| 368 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 369 | return ERR_PTR(ret); |
| 370 | } |
| 371 | |
| 372 | static void cifs_swn_reg_release(struct kref *ref) |
| 373 | { |
| 374 | struct cifs_swn_reg *swnreg = container_of(ref, struct cifs_swn_reg, ref_count); |
| 375 | int ret; |
| 376 | |
| 377 | ret = cifs_swn_send_unregister_message(swnreg); |
| 378 | if (ret < 0) |
| 379 | cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); |
| 380 | |
| 381 | idr_remove(&cifs_swnreg_idr, swnreg->id); |
| 382 | kfree(swnreg->net_name); |
| 383 | kfree(swnreg->share_name); |
| 384 | kfree(swnreg); |
| 385 | } |
| 386 | |
| 387 | static void cifs_put_swn_reg(struct cifs_swn_reg *swnreg) |
| 388 | { |
| 389 | mutex_lock(&cifs_swnreg_idr_mutex); |
| 390 | kref_put(&swnreg->ref_count, cifs_swn_reg_release); |
| 391 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 392 | } |
| 393 | |
Samuel Cabrero | fed979a | 2020-11-30 19:02:52 +0100 | [diff] [blame] | 394 | static int cifs_swn_resource_state_changed(struct cifs_swn_reg *swnreg, const char *name, int state) |
| 395 | { |
Samuel Cabrero | fed979a | 2020-11-30 19:02:52 +0100 | [diff] [blame] | 396 | switch (state) { |
| 397 | case CIFS_SWN_RESOURCE_STATE_UNAVAILABLE: |
| 398 | cifs_dbg(FYI, "%s: resource name '%s' become unavailable\n", __func__, name); |
Shyam Prasad N | 52492ff | 2022-02-08 19:15:17 +0000 | [diff] [blame^] | 399 | cifs_mark_tcp_ses_conns_for_reconnect(swnreg->tcon->ses->server, true); |
Samuel Cabrero | fed979a | 2020-11-30 19:02:52 +0100 | [diff] [blame] | 400 | break; |
| 401 | case CIFS_SWN_RESOURCE_STATE_AVAILABLE: |
| 402 | cifs_dbg(FYI, "%s: resource name '%s' become available\n", __func__, name); |
Shyam Prasad N | 52492ff | 2022-02-08 19:15:17 +0000 | [diff] [blame^] | 403 | cifs_mark_tcp_ses_conns_for_reconnect(swnreg->tcon->ses->server, true); |
Samuel Cabrero | fed979a | 2020-11-30 19:02:52 +0100 | [diff] [blame] | 404 | break; |
| 405 | case CIFS_SWN_RESOURCE_STATE_UNKNOWN: |
| 406 | cifs_dbg(FYI, "%s: resource name '%s' changed to unknown state\n", __func__, name); |
| 407 | break; |
| 408 | } |
| 409 | return 0; |
| 410 | } |
| 411 | |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 412 | static bool cifs_sockaddr_equal(struct sockaddr_storage *addr1, struct sockaddr_storage *addr2) |
| 413 | { |
| 414 | if (addr1->ss_family != addr2->ss_family) |
| 415 | return false; |
| 416 | |
| 417 | if (addr1->ss_family == AF_INET) { |
| 418 | return (memcmp(&((const struct sockaddr_in *)addr1)->sin_addr, |
| 419 | &((const struct sockaddr_in *)addr2)->sin_addr, |
| 420 | sizeof(struct in_addr)) == 0); |
| 421 | } |
| 422 | |
| 423 | if (addr1->ss_family == AF_INET6) { |
| 424 | return (memcmp(&((const struct sockaddr_in6 *)addr1)->sin6_addr, |
| 425 | &((const struct sockaddr_in6 *)addr2)->sin6_addr, |
| 426 | sizeof(struct in6_addr)) == 0); |
| 427 | } |
| 428 | |
| 429 | return false; |
| 430 | } |
| 431 | |
| 432 | static int cifs_swn_store_swn_addr(const struct sockaddr_storage *new, |
| 433 | const struct sockaddr_storage *old, |
| 434 | struct sockaddr_storage *dst) |
| 435 | { |
Steve French | ff93b71 | 2021-06-19 12:22:20 -0500 | [diff] [blame] | 436 | __be16 port = cpu_to_be16(CIFS_PORT); |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 437 | |
| 438 | if (old->ss_family == AF_INET) { |
| 439 | struct sockaddr_in *ipv4 = (struct sockaddr_in *)old; |
| 440 | |
| 441 | port = ipv4->sin_port; |
Steve French | ff93b71 | 2021-06-19 12:22:20 -0500 | [diff] [blame] | 442 | } else if (old->ss_family == AF_INET6) { |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 443 | struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)old; |
| 444 | |
| 445 | port = ipv6->sin6_port; |
| 446 | } |
| 447 | |
| 448 | if (new->ss_family == AF_INET) { |
| 449 | struct sockaddr_in *ipv4 = (struct sockaddr_in *)new; |
| 450 | |
| 451 | ipv4->sin_port = port; |
Steve French | ff93b71 | 2021-06-19 12:22:20 -0500 | [diff] [blame] | 452 | } else if (new->ss_family == AF_INET6) { |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 453 | struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)new; |
| 454 | |
| 455 | ipv6->sin6_port = port; |
| 456 | } |
| 457 | |
| 458 | *dst = *new; |
| 459 | |
| 460 | return 0; |
| 461 | } |
| 462 | |
| 463 | static int cifs_swn_reconnect(struct cifs_tcon *tcon, struct sockaddr_storage *addr) |
| 464 | { |
Dan Carpenter | eedf8e8 | 2020-12-17 14:02:29 +0300 | [diff] [blame] | 465 | int ret = 0; |
| 466 | |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 467 | /* Store the reconnect address */ |
| 468 | mutex_lock(&tcon->ses->server->srv_mutex); |
Dan Carpenter | 0f2c66a | 2020-12-17 14:03:35 +0300 | [diff] [blame] | 469 | if (cifs_sockaddr_equal(&tcon->ses->server->dstaddr, addr)) |
| 470 | goto unlock; |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 471 | |
Dan Carpenter | 0f2c66a | 2020-12-17 14:03:35 +0300 | [diff] [blame] | 472 | ret = cifs_swn_store_swn_addr(addr, &tcon->ses->server->dstaddr, |
| 473 | &tcon->ses->server->swn_dstaddr); |
| 474 | if (ret < 0) { |
| 475 | cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); |
| 476 | goto unlock; |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 477 | } |
Dan Carpenter | 0f2c66a | 2020-12-17 14:03:35 +0300 | [diff] [blame] | 478 | tcon->ses->server->use_swn_dstaddr = true; |
| 479 | |
| 480 | /* |
| 481 | * Unregister to stop receiving notifications for the old IP address. |
| 482 | */ |
| 483 | ret = cifs_swn_unregister(tcon); |
| 484 | if (ret < 0) { |
| 485 | cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", |
| 486 | __func__, ret); |
| 487 | goto unlock; |
| 488 | } |
| 489 | |
| 490 | /* |
| 491 | * And register to receive notifications for the new IP address now that we have |
| 492 | * stored the new address. |
| 493 | */ |
| 494 | ret = cifs_swn_register(tcon); |
| 495 | if (ret < 0) { |
| 496 | cifs_dbg(VFS, "%s: Failed to register for witness notifications: %d\n", |
| 497 | __func__, ret); |
| 498 | goto unlock; |
| 499 | } |
| 500 | |
Shyam Prasad N | 52492ff | 2022-02-08 19:15:17 +0000 | [diff] [blame^] | 501 | cifs_mark_tcp_ses_conns_for_reconnect(tcon->ses->server, false); |
Dan Carpenter | 0f2c66a | 2020-12-17 14:03:35 +0300 | [diff] [blame] | 502 | |
Dan Carpenter | eedf8e8 | 2020-12-17 14:02:29 +0300 | [diff] [blame] | 503 | unlock: |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 504 | mutex_unlock(&tcon->ses->server->srv_mutex); |
| 505 | |
Dan Carpenter | eedf8e8 | 2020-12-17 14:02:29 +0300 | [diff] [blame] | 506 | return ret; |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 507 | } |
| 508 | |
| 509 | static int cifs_swn_client_move(struct cifs_swn_reg *swnreg, struct sockaddr_storage *addr) |
| 510 | { |
| 511 | struct sockaddr_in *ipv4 = (struct sockaddr_in *)addr; |
| 512 | struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)addr; |
| 513 | |
| 514 | if (addr->ss_family == AF_INET) |
| 515 | cifs_dbg(FYI, "%s: move to %pI4\n", __func__, &ipv4->sin_addr); |
| 516 | else if (addr->ss_family == AF_INET6) |
| 517 | cifs_dbg(FYI, "%s: move to %pI6\n", __func__, &ipv6->sin6_addr); |
| 518 | |
| 519 | return cifs_swn_reconnect(swnreg->tcon, addr); |
| 520 | } |
| 521 | |
Samuel Cabrero | fed979a | 2020-11-30 19:02:52 +0100 | [diff] [blame] | 522 | int cifs_swn_notify(struct sk_buff *skb, struct genl_info *info) |
| 523 | { |
| 524 | struct cifs_swn_reg *swnreg; |
| 525 | char name[256]; |
| 526 | int type; |
| 527 | |
| 528 | if (info->attrs[CIFS_GENL_ATTR_SWN_REGISTRATION_ID]) { |
| 529 | int swnreg_id; |
| 530 | |
| 531 | swnreg_id = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_REGISTRATION_ID]); |
| 532 | mutex_lock(&cifs_swnreg_idr_mutex); |
| 533 | swnreg = idr_find(&cifs_swnreg_idr, swnreg_id); |
| 534 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 535 | if (swnreg == NULL) { |
| 536 | cifs_dbg(FYI, "%s: registration id %d not found\n", __func__, swnreg_id); |
| 537 | return -EINVAL; |
| 538 | } |
| 539 | } else { |
| 540 | cifs_dbg(FYI, "%s: missing registration id attribute\n", __func__); |
| 541 | return -EINVAL; |
| 542 | } |
| 543 | |
| 544 | if (info->attrs[CIFS_GENL_ATTR_SWN_NOTIFICATION_TYPE]) { |
| 545 | type = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_NOTIFICATION_TYPE]); |
| 546 | } else { |
| 547 | cifs_dbg(FYI, "%s: missing notification type attribute\n", __func__); |
| 548 | return -EINVAL; |
| 549 | } |
| 550 | |
| 551 | switch (type) { |
| 552 | case CIFS_SWN_NOTIFICATION_RESOURCE_CHANGE: { |
| 553 | int state; |
| 554 | |
| 555 | if (info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_NAME]) { |
Linus Torvalds | e13300b | 2020-12-17 17:41:37 -0800 | [diff] [blame] | 556 | nla_strscpy(name, info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_NAME], |
Samuel Cabrero | fed979a | 2020-11-30 19:02:52 +0100 | [diff] [blame] | 557 | sizeof(name)); |
| 558 | } else { |
| 559 | cifs_dbg(FYI, "%s: missing resource name attribute\n", __func__); |
| 560 | return -EINVAL; |
| 561 | } |
| 562 | if (info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_STATE]) { |
| 563 | state = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_STATE]); |
| 564 | } else { |
| 565 | cifs_dbg(FYI, "%s: missing resource state attribute\n", __func__); |
| 566 | return -EINVAL; |
| 567 | } |
| 568 | return cifs_swn_resource_state_changed(swnreg, name, state); |
| 569 | } |
Samuel Cabrero | 121d947 | 2020-11-30 19:02:56 +0100 | [diff] [blame] | 570 | case CIFS_SWN_NOTIFICATION_CLIENT_MOVE: { |
| 571 | struct sockaddr_storage addr; |
| 572 | |
| 573 | if (info->attrs[CIFS_GENL_ATTR_SWN_IP]) { |
| 574 | nla_memcpy(&addr, info->attrs[CIFS_GENL_ATTR_SWN_IP], sizeof(addr)); |
| 575 | } else { |
| 576 | cifs_dbg(FYI, "%s: missing IP address attribute\n", __func__); |
| 577 | return -EINVAL; |
| 578 | } |
| 579 | return cifs_swn_client_move(swnreg, &addr); |
| 580 | } |
Samuel Cabrero | fed979a | 2020-11-30 19:02:52 +0100 | [diff] [blame] | 581 | default: |
| 582 | cifs_dbg(FYI, "%s: unknown notification type %d\n", __func__, type); |
| 583 | break; |
| 584 | } |
| 585 | |
| 586 | return 0; |
| 587 | } |
| 588 | |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 589 | int cifs_swn_register(struct cifs_tcon *tcon) |
| 590 | { |
| 591 | struct cifs_swn_reg *swnreg; |
| 592 | int ret; |
| 593 | |
| 594 | swnreg = cifs_get_swn_reg(tcon); |
| 595 | if (IS_ERR(swnreg)) |
| 596 | return PTR_ERR(swnreg); |
| 597 | |
| 598 | ret = cifs_swn_send_register_message(swnreg); |
| 599 | if (ret < 0) { |
| 600 | cifs_dbg(VFS, "%s: Failed to send swn register message: %d\n", __func__, ret); |
| 601 | /* Do not put the swnreg or return error, the echo task will retry */ |
| 602 | } |
| 603 | |
| 604 | return 0; |
| 605 | } |
| 606 | |
| 607 | int cifs_swn_unregister(struct cifs_tcon *tcon) |
| 608 | { |
| 609 | struct cifs_swn_reg *swnreg; |
| 610 | |
| 611 | mutex_lock(&cifs_swnreg_idr_mutex); |
| 612 | |
| 613 | swnreg = cifs_find_swn_reg(tcon); |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 614 | if (IS_ERR(swnreg)) { |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 615 | mutex_unlock(&cifs_swnreg_idr_mutex); |
Samuel Cabrero | 09a8361 | 2020-12-15 17:46:56 +0100 | [diff] [blame] | 616 | return PTR_ERR(swnreg); |
Samuel Cabrero | bf80e5d | 2020-11-30 19:02:51 +0100 | [diff] [blame] | 617 | } |
| 618 | |
| 619 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 620 | |
| 621 | cifs_put_swn_reg(swnreg); |
| 622 | |
| 623 | return 0; |
| 624 | } |
Samuel Cabrero | 20fab0d | 2020-11-30 19:02:53 +0100 | [diff] [blame] | 625 | |
| 626 | void cifs_swn_dump(struct seq_file *m) |
| 627 | { |
| 628 | struct cifs_swn_reg *swnreg; |
| 629 | struct sockaddr_in *sa; |
| 630 | struct sockaddr_in6 *sa6; |
| 631 | int id; |
| 632 | |
| 633 | seq_puts(m, "Witness registrations:"); |
| 634 | |
| 635 | mutex_lock(&cifs_swnreg_idr_mutex); |
| 636 | idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) { |
| 637 | seq_printf(m, "\nId: %u Refs: %u Network name: '%s'%s Share name: '%s'%s Ip address: ", |
| 638 | id, kref_read(&swnreg->ref_count), |
| 639 | swnreg->net_name, swnreg->net_name_notify ? "(y)" : "(n)", |
| 640 | swnreg->share_name, swnreg->share_name_notify ? "(y)" : "(n)"); |
| 641 | switch (swnreg->tcon->ses->server->dstaddr.ss_family) { |
| 642 | case AF_INET: |
| 643 | sa = (struct sockaddr_in *) &swnreg->tcon->ses->server->dstaddr; |
| 644 | seq_printf(m, "%pI4", &sa->sin_addr.s_addr); |
| 645 | break; |
| 646 | case AF_INET6: |
| 647 | sa6 = (struct sockaddr_in6 *) &swnreg->tcon->ses->server->dstaddr; |
| 648 | seq_printf(m, "%pI6", &sa6->sin6_addr.s6_addr); |
| 649 | if (sa6->sin6_scope_id) |
| 650 | seq_printf(m, "%%%u", sa6->sin6_scope_id); |
| 651 | break; |
| 652 | default: |
| 653 | seq_puts(m, "(unknown)"); |
| 654 | } |
| 655 | seq_printf(m, "%s", swnreg->ip_notify ? "(y)" : "(n)"); |
| 656 | } |
| 657 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 658 | seq_puts(m, "\n"); |
| 659 | } |
Samuel Cabrero | 21077c6 | 2020-11-30 19:02:54 +0100 | [diff] [blame] | 660 | |
| 661 | void cifs_swn_check(void) |
| 662 | { |
| 663 | struct cifs_swn_reg *swnreg; |
| 664 | int id; |
| 665 | int ret; |
| 666 | |
| 667 | mutex_lock(&cifs_swnreg_idr_mutex); |
| 668 | idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) { |
| 669 | ret = cifs_swn_send_register_message(swnreg); |
| 670 | if (ret < 0) |
| 671 | cifs_dbg(FYI, "%s: Failed to send register message: %d\n", __func__, ret); |
| 672 | } |
| 673 | mutex_unlock(&cifs_swnreg_idr_mutex); |
| 674 | } |