cc391b694f
The srv_mutex is used during writeback so cifs should ensure that allocations done when that mutex is held are done with GFP_NOFS, to avoid having direct reclaim ending up waiting for the same mutex and causing a deadlock. This is detected by lockdep with the splat below: ====================================================== WARNING: possible circular locking dependency detected 5.18.0 #70 Not tainted ------------------------------------------------------ kswapd0/49 is trying to acquire lock: ffff8880195782e0 (&tcp_ses->srv_mutex){+.+.}-{3:3}, at: compound_send_recv but task is already holding lock: ffffffffa98e66c0 (fs_reclaim){+.+.}-{0:0}, at: balance_pgdat which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (fs_reclaim){+.+.}-{0:0}: fs_reclaim_acquire kmem_cache_alloc_trace __request_module crypto_alg_mod_lookup crypto_alloc_tfm_node crypto_alloc_shash cifs_alloc_hash smb311_crypto_shash_allocate smb311_update_preauth_hash compound_send_recv cifs_send_recv SMB2_negotiate smb2_negotiate cifs_negotiate_protocol cifs_get_smb_ses cifs_mount cifs_smb3_do_mount smb3_get_tree vfs_get_tree path_mount __x64_sys_mount do_syscall_64 entry_SYSCALL_64_after_hwframe -> #0 (&tcp_ses->srv_mutex){+.+.}-{3:3}: __lock_acquire lock_acquire __mutex_lock mutex_lock_nested compound_send_recv cifs_send_recv SMB2_write smb2_sync_write cifs_write cifs_writepage_locked cifs_writepage shrink_page_list shrink_lruvec shrink_node balance_pgdat kswapd kthread ret_from_fork other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(fs_reclaim); lock(&tcp_ses->srv_mutex); lock(fs_reclaim); lock(&tcp_ses->srv_mutex); *** DEADLOCK *** 1 lock held by kswapd0/49: #0: ffffffffa98e66c0 (fs_reclaim){+.+.}-{0:0}, at: balance_pgdat stack backtrace: CPU: 2 PID: 49 Comm: kswapd0 Not tainted 5.18.0 #70 Call Trace: <TASK> dump_stack_lvl dump_stack print_circular_bug.cold check_noncircular __lock_acquire lock_acquire __mutex_lock mutex_lock_nested compound_send_recv cifs_send_recv SMB2_write smb2_sync_write cifs_write cifs_writepage_locked cifs_writepage shrink_page_list shrink_lruvec shrink_node balance_pgdat kswapd kthread ret_from_fork </TASK> Fix this by using the memalloc_nofs_save/restore APIs around the places where the srv_mutex is held. Do this in a wrapper function for the lock/unlock of the srv_mutex, and rename the srv_mutex to avoid missing call sites in the conversion. Note that there is another lockdep warning involving internal crypto locks, which was masked by this problem and is visible after this fix, see the discussion in this thread: https://lore.kernel.org/all/20220523123755.GA13668@axis.com/ Link: https://lore.kernel.org/r/CANT5p=rqcYfYMVHirqvdnnca4Mo+JQSw5Qu12v=kPfpk5yhhmg@mail.gmail.com/ Reported-by: Shyam Prasad N <nspmangalore@gmail.com> Suggested-by: Lars Persson <larper@axis.com> Reviewed-by: Ronnie Sahlberg <lsahlber@redhat.com> Reviewed-by: Enzo Matsumiya <ematsumiya@suse.de> Signed-off-by: Vincent Whitchurch <vincent.whitchurch@axis.com> Signed-off-by: Steve French <stfrench@microsoft.com>
675 lines
17 KiB
C
675 lines
17 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* Witness Service client for CIFS
|
|
*
|
|
* Copyright (c) 2020 Samuel Cabrero <scabrero@suse.de>
|
|
*/
|
|
|
|
#include <linux/kref.h>
|
|
#include <net/genetlink.h>
|
|
#include <uapi/linux/cifs/cifs_netlink.h>
|
|
|
|
#include "cifs_swn.h"
|
|
#include "cifsglob.h"
|
|
#include "cifsproto.h"
|
|
#include "fscache.h"
|
|
#include "cifs_debug.h"
|
|
#include "netlink.h"
|
|
|
|
static DEFINE_IDR(cifs_swnreg_idr);
|
|
static DEFINE_MUTEX(cifs_swnreg_idr_mutex);
|
|
|
|
struct cifs_swn_reg {
|
|
int id;
|
|
struct kref ref_count;
|
|
|
|
const char *net_name;
|
|
const char *share_name;
|
|
bool net_name_notify;
|
|
bool share_name_notify;
|
|
bool ip_notify;
|
|
|
|
struct cifs_tcon *tcon;
|
|
};
|
|
|
|
static int cifs_swn_auth_info_krb(struct cifs_tcon *tcon, struct sk_buff *skb)
|
|
{
|
|
int ret;
|
|
|
|
ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_KRB_AUTH);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int cifs_swn_auth_info_ntlm(struct cifs_tcon *tcon, struct sk_buff *skb)
|
|
{
|
|
int ret;
|
|
|
|
if (tcon->ses->user_name != NULL) {
|
|
ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_USER_NAME, tcon->ses->user_name);
|
|
if (ret < 0)
|
|
return ret;
|
|
}
|
|
|
|
if (tcon->ses->password != NULL) {
|
|
ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password);
|
|
if (ret < 0)
|
|
return ret;
|
|
}
|
|
|
|
if (tcon->ses->domainName != NULL) {
|
|
ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_DOMAIN_NAME, tcon->ses->domainName);
|
|
if (ret < 0)
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Sends a register message to the userspace daemon based on the registration.
|
|
* The authentication information to connect to the witness service is bundled
|
|
* into the message.
|
|
*/
|
|
static int cifs_swn_send_register_message(struct cifs_swn_reg *swnreg)
|
|
{
|
|
struct sk_buff *skb;
|
|
struct genlmsghdr *hdr;
|
|
enum securityEnum authtype;
|
|
struct sockaddr_storage *addr;
|
|
int ret;
|
|
|
|
skb = genlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
|
|
if (skb == NULL) {
|
|
ret = -ENOMEM;
|
|
goto fail;
|
|
}
|
|
|
|
hdr = genlmsg_put(skb, 0, 0, &cifs_genl_family, 0, CIFS_GENL_CMD_SWN_REGISTER);
|
|
if (hdr == NULL) {
|
|
ret = -ENOMEM;
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
ret = nla_put_u32(skb, CIFS_GENL_ATTR_SWN_REGISTRATION_ID, swnreg->id);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
|
|
ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_NET_NAME, swnreg->net_name);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
|
|
ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME, swnreg->share_name);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
|
|
/*
|
|
* If there is an address stored use it instead of the server address, because we are
|
|
* in the process of reconnecting to it after a share has been moved or we have been
|
|
* told to switch to it (client move message). In these cases we unregister from the
|
|
* server address and register to the new address when we receive the notification.
|
|
*/
|
|
if (swnreg->tcon->ses->server->use_swn_dstaddr)
|
|
addr = &swnreg->tcon->ses->server->swn_dstaddr;
|
|
else
|
|
addr = &swnreg->tcon->ses->server->dstaddr;
|
|
|
|
ret = nla_put(skb, CIFS_GENL_ATTR_SWN_IP, sizeof(struct sockaddr_storage), addr);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
|
|
if (swnreg->net_name_notify) {
|
|
ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_NET_NAME_NOTIFY);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
if (swnreg->share_name_notify) {
|
|
ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME_NOTIFY);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
if (swnreg->ip_notify) {
|
|
ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_IP_NOTIFY);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
authtype = cifs_select_sectype(swnreg->tcon->ses->server, swnreg->tcon->ses->sectype);
|
|
switch (authtype) {
|
|
case Kerberos:
|
|
ret = cifs_swn_auth_info_krb(swnreg->tcon, skb);
|
|
if (ret < 0) {
|
|
cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret);
|
|
goto nlmsg_fail;
|
|
}
|
|
break;
|
|
case NTLMv2:
|
|
case RawNTLMSSP:
|
|
ret = cifs_swn_auth_info_ntlm(swnreg->tcon, skb);
|
|
if (ret < 0) {
|
|
cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret);
|
|
goto nlmsg_fail;
|
|
}
|
|
break;
|
|
default:
|
|
cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype);
|
|
ret = -EINVAL;
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
genlmsg_end(skb, hdr);
|
|
genlmsg_multicast(&cifs_genl_family, skb, 0, CIFS_GENL_MCGRP_SWN, GFP_ATOMIC);
|
|
|
|
cifs_dbg(FYI, "%s: Message to register for network name %s with id %d sent\n", __func__,
|
|
swnreg->net_name, swnreg->id);
|
|
|
|
return 0;
|
|
|
|
nlmsg_fail:
|
|
genlmsg_cancel(skb, hdr);
|
|
nlmsg_free(skb);
|
|
fail:
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Sends an uregister message to the userspace daemon based on the registration
|
|
*/
|
|
static int cifs_swn_send_unregister_message(struct cifs_swn_reg *swnreg)
|
|
{
|
|
struct sk_buff *skb;
|
|
struct genlmsghdr *hdr;
|
|
int ret;
|
|
|
|
skb = genlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
|
|
if (skb == NULL)
|
|
return -ENOMEM;
|
|
|
|
hdr = genlmsg_put(skb, 0, 0, &cifs_genl_family, 0, CIFS_GENL_CMD_SWN_UNREGISTER);
|
|
if (hdr == NULL) {
|
|
ret = -ENOMEM;
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
ret = nla_put_u32(skb, CIFS_GENL_ATTR_SWN_REGISTRATION_ID, swnreg->id);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
|
|
ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_NET_NAME, swnreg->net_name);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
|
|
ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME, swnreg->share_name);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
|
|
ret = nla_put(skb, CIFS_GENL_ATTR_SWN_IP, sizeof(struct sockaddr_storage),
|
|
&swnreg->tcon->ses->server->dstaddr);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
|
|
if (swnreg->net_name_notify) {
|
|
ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_NET_NAME_NOTIFY);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
if (swnreg->share_name_notify) {
|
|
ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_SHARE_NAME_NOTIFY);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
if (swnreg->ip_notify) {
|
|
ret = nla_put_flag(skb, CIFS_GENL_ATTR_SWN_IP_NOTIFY);
|
|
if (ret < 0)
|
|
goto nlmsg_fail;
|
|
}
|
|
|
|
genlmsg_end(skb, hdr);
|
|
genlmsg_multicast(&cifs_genl_family, skb, 0, CIFS_GENL_MCGRP_SWN, GFP_ATOMIC);
|
|
|
|
cifs_dbg(FYI, "%s: Message to unregister for network name %s with id %d sent\n", __func__,
|
|
swnreg->net_name, swnreg->id);
|
|
|
|
return 0;
|
|
|
|
nlmsg_fail:
|
|
genlmsg_cancel(skb, hdr);
|
|
nlmsg_free(skb);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Try to find a matching registration for the tcon's server name and share name.
|
|
* Calls to this function must be protected by cifs_swnreg_idr_mutex.
|
|
* TODO Try to avoid memory allocations
|
|
*/
|
|
static struct cifs_swn_reg *cifs_find_swn_reg(struct cifs_tcon *tcon)
|
|
{
|
|
struct cifs_swn_reg *swnreg;
|
|
int id;
|
|
const char *share_name;
|
|
const char *net_name;
|
|
|
|
net_name = extract_hostname(tcon->treeName);
|
|
if (IS_ERR(net_name)) {
|
|
int ret;
|
|
|
|
ret = PTR_ERR(net_name);
|
|
cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n",
|
|
__func__, tcon->treeName, ret);
|
|
return ERR_PTR(-EINVAL);
|
|
}
|
|
|
|
share_name = extract_sharename(tcon->treeName);
|
|
if (IS_ERR(share_name)) {
|
|
int ret;
|
|
|
|
ret = PTR_ERR(share_name);
|
|
cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n",
|
|
__func__, tcon->treeName, ret);
|
|
kfree(net_name);
|
|
return ERR_PTR(-EINVAL);
|
|
}
|
|
|
|
idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) {
|
|
if (strcasecmp(swnreg->net_name, net_name) != 0
|
|
|| strcasecmp(swnreg->share_name, share_name) != 0) {
|
|
continue;
|
|
}
|
|
|
|
cifs_dbg(FYI, "Existing swn registration for %s:%s found\n", swnreg->net_name,
|
|
swnreg->share_name);
|
|
|
|
kfree(net_name);
|
|
kfree(share_name);
|
|
|
|
return swnreg;
|
|
}
|
|
|
|
kfree(net_name);
|
|
kfree(share_name);
|
|
|
|
return ERR_PTR(-EEXIST);
|
|
}
|
|
|
|
/*
|
|
* Get a registration for the tcon's server and share name, allocating a new one if it does not
|
|
* exists
|
|
*/
|
|
static struct cifs_swn_reg *cifs_get_swn_reg(struct cifs_tcon *tcon)
|
|
{
|
|
struct cifs_swn_reg *reg = NULL;
|
|
int ret;
|
|
|
|
mutex_lock(&cifs_swnreg_idr_mutex);
|
|
|
|
/* Check if we are already registered for this network and share names */
|
|
reg = cifs_find_swn_reg(tcon);
|
|
if (!IS_ERR(reg)) {
|
|
kref_get(®->ref_count);
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
return reg;
|
|
} else if (PTR_ERR(reg) != -EEXIST) {
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
return reg;
|
|
}
|
|
|
|
reg = kmalloc(sizeof(struct cifs_swn_reg), GFP_ATOMIC);
|
|
if (reg == NULL) {
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
return ERR_PTR(-ENOMEM);
|
|
}
|
|
|
|
kref_init(®->ref_count);
|
|
|
|
reg->id = idr_alloc(&cifs_swnreg_idr, reg, 1, 0, GFP_ATOMIC);
|
|
if (reg->id < 0) {
|
|
cifs_dbg(FYI, "%s: failed to allocate registration id\n", __func__);
|
|
ret = reg->id;
|
|
goto fail;
|
|
}
|
|
|
|
reg->net_name = extract_hostname(tcon->treeName);
|
|
if (IS_ERR(reg->net_name)) {
|
|
ret = PTR_ERR(reg->net_name);
|
|
cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret);
|
|
goto fail_idr;
|
|
}
|
|
|
|
reg->share_name = extract_sharename(tcon->treeName);
|
|
if (IS_ERR(reg->share_name)) {
|
|
ret = PTR_ERR(reg->share_name);
|
|
cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret);
|
|
goto fail_net_name;
|
|
}
|
|
|
|
reg->net_name_notify = true;
|
|
reg->share_name_notify = true;
|
|
reg->ip_notify = (tcon->capabilities & SMB2_SHARE_CAP_SCALEOUT);
|
|
|
|
reg->tcon = tcon;
|
|
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
|
|
return reg;
|
|
|
|
fail_net_name:
|
|
kfree(reg->net_name);
|
|
fail_idr:
|
|
idr_remove(&cifs_swnreg_idr, reg->id);
|
|
fail:
|
|
kfree(reg);
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
return ERR_PTR(ret);
|
|
}
|
|
|
|
static void cifs_swn_reg_release(struct kref *ref)
|
|
{
|
|
struct cifs_swn_reg *swnreg = container_of(ref, struct cifs_swn_reg, ref_count);
|
|
int ret;
|
|
|
|
ret = cifs_swn_send_unregister_message(swnreg);
|
|
if (ret < 0)
|
|
cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret);
|
|
|
|
idr_remove(&cifs_swnreg_idr, swnreg->id);
|
|
kfree(swnreg->net_name);
|
|
kfree(swnreg->share_name);
|
|
kfree(swnreg);
|
|
}
|
|
|
|
static void cifs_put_swn_reg(struct cifs_swn_reg *swnreg)
|
|
{
|
|
mutex_lock(&cifs_swnreg_idr_mutex);
|
|
kref_put(&swnreg->ref_count, cifs_swn_reg_release);
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
}
|
|
|
|
static int cifs_swn_resource_state_changed(struct cifs_swn_reg *swnreg, const char *name, int state)
|
|
{
|
|
switch (state) {
|
|
case CIFS_SWN_RESOURCE_STATE_UNAVAILABLE:
|
|
cifs_dbg(FYI, "%s: resource name '%s' become unavailable\n", __func__, name);
|
|
cifs_signal_cifsd_for_reconnect(swnreg->tcon->ses->server, true);
|
|
break;
|
|
case CIFS_SWN_RESOURCE_STATE_AVAILABLE:
|
|
cifs_dbg(FYI, "%s: resource name '%s' become available\n", __func__, name);
|
|
cifs_signal_cifsd_for_reconnect(swnreg->tcon->ses->server, true);
|
|
break;
|
|
case CIFS_SWN_RESOURCE_STATE_UNKNOWN:
|
|
cifs_dbg(FYI, "%s: resource name '%s' changed to unknown state\n", __func__, name);
|
|
break;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static bool cifs_sockaddr_equal(struct sockaddr_storage *addr1, struct sockaddr_storage *addr2)
|
|
{
|
|
if (addr1->ss_family != addr2->ss_family)
|
|
return false;
|
|
|
|
if (addr1->ss_family == AF_INET) {
|
|
return (memcmp(&((const struct sockaddr_in *)addr1)->sin_addr,
|
|
&((const struct sockaddr_in *)addr2)->sin_addr,
|
|
sizeof(struct in_addr)) == 0);
|
|
}
|
|
|
|
if (addr1->ss_family == AF_INET6) {
|
|
return (memcmp(&((const struct sockaddr_in6 *)addr1)->sin6_addr,
|
|
&((const struct sockaddr_in6 *)addr2)->sin6_addr,
|
|
sizeof(struct in6_addr)) == 0);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static int cifs_swn_store_swn_addr(const struct sockaddr_storage *new,
|
|
const struct sockaddr_storage *old,
|
|
struct sockaddr_storage *dst)
|
|
{
|
|
__be16 port = cpu_to_be16(CIFS_PORT);
|
|
|
|
if (old->ss_family == AF_INET) {
|
|
struct sockaddr_in *ipv4 = (struct sockaddr_in *)old;
|
|
|
|
port = ipv4->sin_port;
|
|
} else if (old->ss_family == AF_INET6) {
|
|
struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)old;
|
|
|
|
port = ipv6->sin6_port;
|
|
}
|
|
|
|
if (new->ss_family == AF_INET) {
|
|
struct sockaddr_in *ipv4 = (struct sockaddr_in *)new;
|
|
|
|
ipv4->sin_port = port;
|
|
} else if (new->ss_family == AF_INET6) {
|
|
struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)new;
|
|
|
|
ipv6->sin6_port = port;
|
|
}
|
|
|
|
*dst = *new;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int cifs_swn_reconnect(struct cifs_tcon *tcon, struct sockaddr_storage *addr)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* Store the reconnect address */
|
|
cifs_server_lock(tcon->ses->server);
|
|
if (cifs_sockaddr_equal(&tcon->ses->server->dstaddr, addr))
|
|
goto unlock;
|
|
|
|
ret = cifs_swn_store_swn_addr(addr, &tcon->ses->server->dstaddr,
|
|
&tcon->ses->server->swn_dstaddr);
|
|
if (ret < 0) {
|
|
cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret);
|
|
goto unlock;
|
|
}
|
|
tcon->ses->server->use_swn_dstaddr = true;
|
|
|
|
/*
|
|
* Unregister to stop receiving notifications for the old IP address.
|
|
*/
|
|
ret = cifs_swn_unregister(tcon);
|
|
if (ret < 0) {
|
|
cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n",
|
|
__func__, ret);
|
|
goto unlock;
|
|
}
|
|
|
|
/*
|
|
* And register to receive notifications for the new IP address now that we have
|
|
* stored the new address.
|
|
*/
|
|
ret = cifs_swn_register(tcon);
|
|
if (ret < 0) {
|
|
cifs_dbg(VFS, "%s: Failed to register for witness notifications: %d\n",
|
|
__func__, ret);
|
|
goto unlock;
|
|
}
|
|
|
|
cifs_signal_cifsd_for_reconnect(tcon->ses->server, false);
|
|
|
|
unlock:
|
|
cifs_server_unlock(tcon->ses->server);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int cifs_swn_client_move(struct cifs_swn_reg *swnreg, struct sockaddr_storage *addr)
|
|
{
|
|
struct sockaddr_in *ipv4 = (struct sockaddr_in *)addr;
|
|
struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)addr;
|
|
|
|
if (addr->ss_family == AF_INET)
|
|
cifs_dbg(FYI, "%s: move to %pI4\n", __func__, &ipv4->sin_addr);
|
|
else if (addr->ss_family == AF_INET6)
|
|
cifs_dbg(FYI, "%s: move to %pI6\n", __func__, &ipv6->sin6_addr);
|
|
|
|
return cifs_swn_reconnect(swnreg->tcon, addr);
|
|
}
|
|
|
|
int cifs_swn_notify(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct cifs_swn_reg *swnreg;
|
|
char name[256];
|
|
int type;
|
|
|
|
if (info->attrs[CIFS_GENL_ATTR_SWN_REGISTRATION_ID]) {
|
|
int swnreg_id;
|
|
|
|
swnreg_id = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_REGISTRATION_ID]);
|
|
mutex_lock(&cifs_swnreg_idr_mutex);
|
|
swnreg = idr_find(&cifs_swnreg_idr, swnreg_id);
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
if (swnreg == NULL) {
|
|
cifs_dbg(FYI, "%s: registration id %d not found\n", __func__, swnreg_id);
|
|
return -EINVAL;
|
|
}
|
|
} else {
|
|
cifs_dbg(FYI, "%s: missing registration id attribute\n", __func__);
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (info->attrs[CIFS_GENL_ATTR_SWN_NOTIFICATION_TYPE]) {
|
|
type = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_NOTIFICATION_TYPE]);
|
|
} else {
|
|
cifs_dbg(FYI, "%s: missing notification type attribute\n", __func__);
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (type) {
|
|
case CIFS_SWN_NOTIFICATION_RESOURCE_CHANGE: {
|
|
int state;
|
|
|
|
if (info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_NAME]) {
|
|
nla_strscpy(name, info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_NAME],
|
|
sizeof(name));
|
|
} else {
|
|
cifs_dbg(FYI, "%s: missing resource name attribute\n", __func__);
|
|
return -EINVAL;
|
|
}
|
|
if (info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_STATE]) {
|
|
state = nla_get_u32(info->attrs[CIFS_GENL_ATTR_SWN_RESOURCE_STATE]);
|
|
} else {
|
|
cifs_dbg(FYI, "%s: missing resource state attribute\n", __func__);
|
|
return -EINVAL;
|
|
}
|
|
return cifs_swn_resource_state_changed(swnreg, name, state);
|
|
}
|
|
case CIFS_SWN_NOTIFICATION_CLIENT_MOVE: {
|
|
struct sockaddr_storage addr;
|
|
|
|
if (info->attrs[CIFS_GENL_ATTR_SWN_IP]) {
|
|
nla_memcpy(&addr, info->attrs[CIFS_GENL_ATTR_SWN_IP], sizeof(addr));
|
|
} else {
|
|
cifs_dbg(FYI, "%s: missing IP address attribute\n", __func__);
|
|
return -EINVAL;
|
|
}
|
|
return cifs_swn_client_move(swnreg, &addr);
|
|
}
|
|
default:
|
|
cifs_dbg(FYI, "%s: unknown notification type %d\n", __func__, type);
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int cifs_swn_register(struct cifs_tcon *tcon)
|
|
{
|
|
struct cifs_swn_reg *swnreg;
|
|
int ret;
|
|
|
|
swnreg = cifs_get_swn_reg(tcon);
|
|
if (IS_ERR(swnreg))
|
|
return PTR_ERR(swnreg);
|
|
|
|
ret = cifs_swn_send_register_message(swnreg);
|
|
if (ret < 0) {
|
|
cifs_dbg(VFS, "%s: Failed to send swn register message: %d\n", __func__, ret);
|
|
/* Do not put the swnreg or return error, the echo task will retry */
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int cifs_swn_unregister(struct cifs_tcon *tcon)
|
|
{
|
|
struct cifs_swn_reg *swnreg;
|
|
|
|
mutex_lock(&cifs_swnreg_idr_mutex);
|
|
|
|
swnreg = cifs_find_swn_reg(tcon);
|
|
if (IS_ERR(swnreg)) {
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
return PTR_ERR(swnreg);
|
|
}
|
|
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
|
|
cifs_put_swn_reg(swnreg);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void cifs_swn_dump(struct seq_file *m)
|
|
{
|
|
struct cifs_swn_reg *swnreg;
|
|
struct sockaddr_in *sa;
|
|
struct sockaddr_in6 *sa6;
|
|
int id;
|
|
|
|
seq_puts(m, "Witness registrations:");
|
|
|
|
mutex_lock(&cifs_swnreg_idr_mutex);
|
|
idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) {
|
|
seq_printf(m, "\nId: %u Refs: %u Network name: '%s'%s Share name: '%s'%s Ip address: ",
|
|
id, kref_read(&swnreg->ref_count),
|
|
swnreg->net_name, swnreg->net_name_notify ? "(y)" : "(n)",
|
|
swnreg->share_name, swnreg->share_name_notify ? "(y)" : "(n)");
|
|
switch (swnreg->tcon->ses->server->dstaddr.ss_family) {
|
|
case AF_INET:
|
|
sa = (struct sockaddr_in *) &swnreg->tcon->ses->server->dstaddr;
|
|
seq_printf(m, "%pI4", &sa->sin_addr.s_addr);
|
|
break;
|
|
case AF_INET6:
|
|
sa6 = (struct sockaddr_in6 *) &swnreg->tcon->ses->server->dstaddr;
|
|
seq_printf(m, "%pI6", &sa6->sin6_addr.s6_addr);
|
|
if (sa6->sin6_scope_id)
|
|
seq_printf(m, "%%%u", sa6->sin6_scope_id);
|
|
break;
|
|
default:
|
|
seq_puts(m, "(unknown)");
|
|
}
|
|
seq_printf(m, "%s", swnreg->ip_notify ? "(y)" : "(n)");
|
|
}
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
seq_puts(m, "\n");
|
|
}
|
|
|
|
void cifs_swn_check(void)
|
|
{
|
|
struct cifs_swn_reg *swnreg;
|
|
int id;
|
|
int ret;
|
|
|
|
mutex_lock(&cifs_swnreg_idr_mutex);
|
|
idr_for_each_entry(&cifs_swnreg_idr, swnreg, id) {
|
|
ret = cifs_swn_send_register_message(swnreg);
|
|
if (ret < 0)
|
|
cifs_dbg(FYI, "%s: Failed to send register message: %d\n", __func__, ret);
|
|
}
|
|
mutex_unlock(&cifs_swnreg_idr_mutex);
|
|
}
|