forked from namjaejeon/ksmbd
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathnetlink.c
314 lines (270 loc) · 7.61 KB
/
netlink.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
/*
* fs/cifsd/netlink.c
*
* Copyright (C) 2015 Samsung Electronics Co., Ltd.
* Copyright (C) 2016 Namjae Jeon <namjae.jeon@protocolfreedom.org>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include <net/netlink.h>
#include <net/net_namespace.h>
#include <linux/types.h>
#include "glob.h"
#include "export.h"
#include "netlink.h"
#define NETLINK_CIFSD 31
#define NETLINK_RRQ_RECV_TIMEOUT 10000
#define cifsd_ptr(_handle) ((void *)(unsigned long)_handle)
#define cifsd_sess_handle(_ptr) ((__u64)(unsigned long)_ptr)
struct sock *cifsd_nlsk;
static DEFINE_MUTEX(nlsk_mutex);
static int pid;
static int cifsd_nlsk_poll(struct cifsd_sess *sess)
{
int rc;
rc = wait_event_interruptible_timeout(sess->pipe_q,
sess->ev_state == NETLINK_REQ_RECV,
msecs_to_jiffies(NETLINK_RRQ_RECV_TIMEOUT));
if (unlikely(rc <= 0)) {
rc = (rc == 0) ? -ETIMEDOUT : rc;
cifsd_err("failed to get NETLINK response, err %d\n", rc);
return rc;
}
return 0;
}
int cifsd_sendmsg(struct cifsd_sess *sess, unsigned int etype,
int pipe_type, unsigned int data_size,
unsigned char *data, unsigned int out_buflen)
{
struct nlmsghdr *nlh;
struct sk_buff *skb;
struct cifsd_uevent *ev;
int len = nlmsg_total_size(sizeof(*ev) + data_size);
int rc;
struct cifsd_usr *user;
struct cifsd_pipe *pipe_desc = sess->pipe_desc[pipe_type];
if (unlikely(!pipe_desc))
return -EINVAL;
if (unlikely(data_size > NETLINK_CIFSD_MAX_PAYLOAD)) {
cifsd_err("too big(%u) message\n", data_size);
return -EOVERFLOW;
}
skb = alloc_skb(len, GFP_KERNEL);
if (unlikely(!skb)) {
cifsd_err("ignored event (%u): len %d\n", etype, len);
return -ENOMEM;
}
NETLINK_CB(skb).dst_group = 0; /* not in mcast group */
nlh = __nlmsg_put(skb, 0, 0, etype, (len - sizeof(*nlh)), 0);
ev = nlmsg_data(nlh);
memset(ev, 0, sizeof(*ev));
ev->conn_handle = cifsd_sess_handle(sess);
ev->pipe_type = pipe_type;
switch (etype) {
case CIFSD_KEVENT_CREATE_PIPE:
ev->k.c_pipe.id = pipe_desc->id;
strncpy(ev->k.c_pipe.codepage, sess->conn->local_nls->charset,
CIFSD_CODEPAGE_LEN - 1);
break;
case CIFSD_KEVENT_DESTROY_PIPE:
ev->k.d_pipe.id = pipe_desc->id;
break;
case CIFSD_KEVENT_READ_PIPE:
ev->k.r_pipe.id = pipe_desc->id;
ev->k.r_pipe.out_buflen = out_buflen;
break;
case CIFSD_KEVENT_WRITE_PIPE:
ev->k.w_pipe.id = pipe_desc->id;
break;
case CIFSD_KEVENT_IOCTL_PIPE:
ev->k.i_pipe.id = pipe_desc->id;
ev->k.i_pipe.out_buflen = out_buflen;
break;
case CIFSD_KEVENT_LANMAN_PIPE:
ev->k.l_pipe.out_buflen = out_buflen;
strncpy(ev->k.l_pipe.codepage, sess->conn->local_nls->charset,
CIFSD_CODEPAGE_LEN - 1);
user = get_smb_session_user(sess);
if (user)
strncpy(ev->k.l_pipe.username, user->name,
CIFSD_USERNAME_LEN - 1);
break;
default:
cifsd_err("invalid event %u\n", etype);
kfree_skb(skb);
return -EINVAL;
}
if (data_size) {
ev->buflen = data_size;
memcpy(ev->buffer, data, data_size);
}
cifsd_debug("sending event(%u) to sess %p\n", etype, sess);
mutex_lock(&nlsk_mutex);
sess->ev_state = NETLINK_REQ_SENT;
rc = nlmsg_unicast(cifsd_nlsk, skb, pid);
mutex_unlock(&nlsk_mutex);
if (unlikely(rc == -ESRCH))
cifsd_err("Cannot notify userspace of event %u "
". Check cifsd daemon\n",
etype);
if (unlikely(rc)) {
cifsd_err("failed to send message, err %d\n", rc);
return rc;
}
/* wait if need response from userspace */
if (!(etype == CIFSD_KEVENT_CREATE_PIPE ||
etype == CIFSD_KEVENT_DESTROY_PIPE))
rc = cifsd_nlsk_poll(sess);
sess->ev_state = NETLINK_REQ_COMPLETED;
return rc;
}
int cifsd_kthread_stop_status(int etype)
{
struct cifsd_uevent *ev;
struct nlmsghdr *nlh;
struct sk_buff *skb;
int rc;
int len = nlmsg_total_size(sizeof(*ev)+sizeof(rc));
skb = alloc_skb(len, GFP_KERNEL);
if (unlikely(!skb)) {
cifsd_err("Failed to allocate\n");
return -ENOMEM;
}
NETLINK_CB(skb).dst_group = 0; /* not in mcast group */
nlh = __nlmsg_put(skb, 0, 0, etype, (len - sizeof(*nlh)), 0);
ev = nlmsg_data(nlh);
ev->buflen = sizeof(rc);
rc = nlmsg_unicast(cifsd_nlsk, skb, pid);
return 0;
}
static int cifsd_init_connection(struct nlmsghdr *nlh)
{
cifsd_debug("init connection\n");
pid = nlh->nlmsg_pid; /*pid of sending process */
return 0;
}
static int cifsd_exit_connection(struct nlmsghdr *nlh)
{
cifsd_debug("exit connection\n");
return 0;
}
static int cifsd_common_pipe_rsp(struct nlmsghdr *nlh)
{
struct cifsd_sess *sess;
struct cifsd_uevent *ev;
struct cifsd_pipe *pipe_desc;
ev = nlmsg_data(nlh);
if (unlikely(ev->pipe_type >= MAX_PIPE)) {
cifsd_err("invalid pipe type %u\n", ev->pipe_type);
return -EINVAL;
}
sess = validate_sess_handle(cifsd_ptr(ev->conn_handle));
if (unlikely(!sess)) {
cifsd_err("invalid session handle\n");
return -EINVAL;
}
pipe_desc = sess->pipe_desc[ev->pipe_type];
if (unlikely(!pipe_desc)) {
cifsd_err("invalid pipe descriptor\n");
return -EINVAL;
}
if (unlikely(ev->error)) {
cifsd_debug("pipe io failed, err %d\n", ev->error);
goto out;
}
if (unlikely(ev->buflen > NETLINK_CIFSD_MAX_PAYLOAD)) {
cifsd_err("too big response buffer %u\n", ev->buflen);
goto out;
}
memcpy((char *)&pipe_desc->ev, (char *)ev, sizeof(*ev));
if (ev->buflen)
memcpy(pipe_desc->rsp_buf, ev->buffer, ev->buflen);
out:
sess->ev_state = NETLINK_REQ_RECV;
wake_up_interruptible(&sess->pipe_q);
return 0;
}
static int cifsd_if_recv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
{
int err = 0;
cifsd_debug("received (%u) event from (pid %u)\n",
nlh->nlmsg_type, nlh->nlmsg_pid);
switch (nlh->nlmsg_type) {
case CIFSD_UEVENT_INIT_CONNECTION:
err = cifsd_init_connection(nlh);
break;
case CIFSD_UEVENT_START_SMBPORT:
err = cifsd_create_socket();
if (err)
cifsd_err("unable to open SMB PORT\n");
break;
case CIFSD_UEVENT_STOP_SMBPORT:
cifsd_close_socket();
break;
case CIFSD_UEVENT_EXIT_CONNECTION:
err = cifsd_exit_connection(nlh);
break;
case CIFSD_UEVENT_READ_PIPE_RSP:
case CIFSD_UEVENT_WRITE_PIPE_RSP:
case CIFSD_UEVENT_IOCTL_PIPE_RSP:
case CIFSD_UEVENT_LANMAN_PIPE_RSP:
err = cifsd_common_pipe_rsp(nlh);
break;
default:
err = -EINVAL;
break;
}
return err;
}
static void cifsd_netlink_rcv(struct sk_buff *skb)
{
if (!netlink_capable(skb, CAP_NET_ADMIN))
return;
mutex_lock(&nlsk_mutex);
while (skb->len >= NLMSG_HDRLEN) {
int err;
unsigned int rlen;
struct nlmsghdr *nlh;
struct cifsd_uevent *ev;
nlh = nlmsg_hdr(skb);
if (nlh->nlmsg_len < sizeof(*nlh) ||
skb->len < nlh->nlmsg_len) {
break;
}
ev = nlmsg_data(nlh);
rlen = NLMSG_ALIGN(nlh->nlmsg_len);
if (rlen > skb->len)
rlen = skb->len;
err = cifsd_if_recv_msg(skb, nlh);
skb_pull(skb, rlen);
}
mutex_unlock(&nlsk_mutex);
}
int cifsd_net_init(void)
{
struct netlink_kernel_cfg cfg = {
.input = cifsd_netlink_rcv,
};
cifsd_nlsk = netlink_kernel_create(&init_net, NETLINK_CIFSD, &cfg);
if (unlikely(!cifsd_nlsk)) {
cifsd_err("failed to create cifsd netlink socket\n");
return -ENOMEM;
}
return 0;
}
void cifsd_net_exit(void)
{
netlink_kernel_release(cifsd_nlsk);
}