RT-AC56 3.0.0.4.374.37 core
[tomato.git] / release / src-rt-6.x.4708 / linux / linux-2.6.36 / drivers / staging / pohmelfs / config.c
blob54cdcda0090d7bb6e8e7913f902978b040f6db16
1 /*
2 * 2007+ Copyright (c) Evgeniy Polyakov <zbr@ioremap.net>
3 * All rights reserved.
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
16 #include <linux/kernel.h>
17 #include <linux/connector.h>
18 #include <linux/crypto.h>
19 #include <linux/list.h>
20 #include <linux/mutex.h>
21 #include <linux/string.h>
22 #include <linux/in.h>
23 #include <linux/slab.h>
25 #include "netfs.h"
28 * Global configuration list.
29 * Each client can be asked to get one of them.
31 * Allows to provide remote server address (ipv4/v6/whatever), port
32 * and so on via kernel connector.
35 static struct cb_id pohmelfs_cn_id = {.idx = POHMELFS_CN_IDX, .val = POHMELFS_CN_VAL};
36 static LIST_HEAD(pohmelfs_config_list);
37 static DEFINE_MUTEX(pohmelfs_config_lock);
39 static inline int pohmelfs_config_eql(struct pohmelfs_ctl *sc, struct pohmelfs_ctl *ctl)
41 if (sc->idx == ctl->idx && sc->type == ctl->type &&
42 sc->proto == ctl->proto &&
43 sc->addrlen == ctl->addrlen &&
44 !memcmp(&sc->addr, &ctl->addr, ctl->addrlen))
45 return 1;
47 return 0;
50 static struct pohmelfs_config_group *pohmelfs_find_config_group(unsigned int idx)
52 struct pohmelfs_config_group *g, *group = NULL;
54 list_for_each_entry(g, &pohmelfs_config_list, group_entry) {
55 if (g->idx == idx) {
56 group = g;
57 break;
61 return group;
64 static struct pohmelfs_config_group *pohmelfs_find_create_config_group(unsigned int idx)
66 struct pohmelfs_config_group *g;
68 g = pohmelfs_find_config_group(idx);
69 if (g)
70 return g;
72 g = kzalloc(sizeof(struct pohmelfs_config_group), GFP_KERNEL);
73 if (!g)
74 return NULL;
76 INIT_LIST_HEAD(&g->config_list);
77 g->idx = idx;
78 g->num_entry = 0;
80 list_add_tail(&g->group_entry, &pohmelfs_config_list);
82 return g;
85 static inline void pohmelfs_insert_config_entry(struct pohmelfs_sb *psb, struct pohmelfs_config *dst)
87 struct pohmelfs_config *tmp;
89 INIT_LIST_HEAD(&dst->config_entry);
91 list_for_each_entry(tmp, &psb->state_list, config_entry) {
92 if (dst->state.ctl.prio > tmp->state.ctl.prio)
93 list_add_tail(&dst->config_entry, &tmp->config_entry);
95 if (list_empty(&dst->config_entry))
96 list_add_tail(&dst->config_entry, &psb->state_list);
99 static int pohmelfs_move_config_entry(struct pohmelfs_sb *psb,
100 struct pohmelfs_config *dst, struct pohmelfs_config *new)
102 if ((dst->state.ctl.prio == new->state.ctl.prio) &&
103 (dst->state.ctl.perm == new->state.ctl.perm))
104 return 0;
106 dprintk("%s: dst: prio: %d, perm: %x, new: prio: %d, perm: %d.\n",
107 __func__, dst->state.ctl.prio, dst->state.ctl.perm,
108 new->state.ctl.prio, new->state.ctl.perm);
109 dst->state.ctl.prio = new->state.ctl.prio;
110 dst->state.ctl.perm = new->state.ctl.perm;
112 list_del_init(&dst->config_entry);
113 pohmelfs_insert_config_entry(psb, dst);
114 return 0;
118 * pohmelfs_copy_config() is used to copy new state configs from the
119 * config group (controlled by the netlink messages) into the superblock.
120 * This happens either at startup time where no transactions can access
121 * the list of the configs (and thus list of the network states), or at
122 * run-time, where it is protected by the psb->state_lock.
124 int pohmelfs_copy_config(struct pohmelfs_sb *psb)
126 struct pohmelfs_config_group *g;
127 struct pohmelfs_config *c, *dst;
128 int err = -ENODEV;
130 mutex_lock(&pohmelfs_config_lock);
132 g = pohmelfs_find_config_group(psb->idx);
133 if (!g)
134 goto out_unlock;
137 * Run over all entries in given config group and try to crate and
138 * initialize those, which do not exist in superblock list.
139 * Skip all existing entries.
142 list_for_each_entry(c, &g->config_list, config_entry) {
143 err = 0;
144 list_for_each_entry(dst, &psb->state_list, config_entry) {
145 if (pohmelfs_config_eql(&dst->state.ctl, &c->state.ctl)) {
146 err = pohmelfs_move_config_entry(psb, dst, c);
147 if (!err)
148 err = -EEXIST;
149 break;
153 if (err)
154 continue;
156 dst = kzalloc(sizeof(struct pohmelfs_config), GFP_KERNEL);
157 if (!dst) {
158 err = -ENOMEM;
159 break;
162 memcpy(&dst->state.ctl, &c->state.ctl, sizeof(struct pohmelfs_ctl));
164 pohmelfs_insert_config_entry(psb, dst);
166 err = pohmelfs_state_init_one(psb, dst);
167 if (err) {
168 list_del(&dst->config_entry);
169 kfree(dst);
172 err = 0;
175 out_unlock:
176 mutex_unlock(&pohmelfs_config_lock);
178 return err;
181 int pohmelfs_copy_crypto(struct pohmelfs_sb *psb)
183 struct pohmelfs_config_group *g;
184 int err = -ENOENT;
186 mutex_lock(&pohmelfs_config_lock);
187 g = pohmelfs_find_config_group(psb->idx);
188 if (!g)
189 goto err_out_exit;
191 if (g->hash_string) {
192 err = -ENOMEM;
193 psb->hash_string = kstrdup(g->hash_string, GFP_KERNEL);
194 if (!psb->hash_string)
195 goto err_out_exit;
196 psb->hash_strlen = g->hash_strlen;
199 if (g->cipher_string) {
200 psb->cipher_string = kstrdup(g->cipher_string, GFP_KERNEL);
201 if (!psb->cipher_string)
202 goto err_out_free_hash_string;
203 psb->cipher_strlen = g->cipher_strlen;
206 if (g->hash_keysize) {
207 psb->hash_key = kmemdup(g->hash_key, g->hash_keysize,
208 GFP_KERNEL);
209 if (!psb->hash_key)
210 goto err_out_free_cipher_string;
211 psb->hash_keysize = g->hash_keysize;
214 if (g->cipher_keysize) {
215 psb->cipher_key = kmemdup(g->cipher_key, g->cipher_keysize,
216 GFP_KERNEL);
217 if (!psb->cipher_key)
218 goto err_out_free_hash;
219 psb->cipher_keysize = g->cipher_keysize;
222 mutex_unlock(&pohmelfs_config_lock);
224 return 0;
226 err_out_free_hash:
227 kfree(psb->hash_key);
228 err_out_free_cipher_string:
229 kfree(psb->cipher_string);
230 err_out_free_hash_string:
231 kfree(psb->hash_string);
232 err_out_exit:
233 mutex_unlock(&pohmelfs_config_lock);
234 return err;
237 static int pohmelfs_send_reply(int err, int msg_num, int action, struct cn_msg *msg, struct pohmelfs_ctl *ctl)
239 struct pohmelfs_cn_ack *ack;
241 ack = kzalloc(sizeof(struct pohmelfs_cn_ack), GFP_KERNEL);
242 if (!ack)
243 return -ENOMEM;
245 memcpy(&ack->msg, msg, sizeof(struct cn_msg));
247 if (action == POHMELFS_CTLINFO_ACK)
248 memcpy(&ack->ctl, ctl, sizeof(struct pohmelfs_ctl));
250 ack->msg.len = sizeof(struct pohmelfs_cn_ack) - sizeof(struct cn_msg);
251 ack->msg.ack = msg->ack + 1;
252 ack->error = err;
253 ack->msg_num = msg_num;
255 cn_netlink_send(&ack->msg, 0, GFP_KERNEL);
256 kfree(ack);
257 return 0;
260 static int pohmelfs_cn_disp(struct cn_msg *msg)
262 struct pohmelfs_config_group *g;
263 struct pohmelfs_ctl *ctl = (struct pohmelfs_ctl *)msg->data;
264 struct pohmelfs_config *c, *tmp;
265 int err = 0, i = 1;
267 if (msg->len != sizeof(struct pohmelfs_ctl))
268 return -EBADMSG;
270 mutex_lock(&pohmelfs_config_lock);
272 g = pohmelfs_find_config_group(ctl->idx);
273 if (!g) {
274 pohmelfs_send_reply(err, 0, POHMELFS_NOINFO_ACK, msg, NULL);
275 goto out_unlock;
278 list_for_each_entry_safe(c, tmp, &g->config_list, config_entry) {
279 struct pohmelfs_ctl *sc = &c->state.ctl;
280 if (pohmelfs_send_reply(err, g->num_entry - i, POHMELFS_CTLINFO_ACK, msg, sc)) {
281 err = -ENOMEM;
282 goto out_unlock;
284 i += 1;
287 out_unlock:
288 mutex_unlock(&pohmelfs_config_lock);
289 return err;
292 static int pohmelfs_cn_dump(struct cn_msg *msg)
294 struct pohmelfs_config_group *g;
295 struct pohmelfs_config *c, *tmp;
296 int err = 0, i = 1;
297 int total_msg = 0;
299 if (msg->len != sizeof(struct pohmelfs_ctl))
300 return -EBADMSG;
302 mutex_lock(&pohmelfs_config_lock);
304 list_for_each_entry(g, &pohmelfs_config_list, group_entry) {
305 if (g)
306 total_msg += g->num_entry;
308 if (total_msg == 0) {
309 if (pohmelfs_send_reply(err, 0, POHMELFS_NOINFO_ACK, msg, NULL))
310 err = -ENOMEM;
311 goto out_unlock;
314 list_for_each_entry(g, &pohmelfs_config_list, group_entry) {
315 if (g) {
316 list_for_each_entry_safe(c, tmp, &g->config_list, config_entry) {
317 struct pohmelfs_ctl *sc = &c->state.ctl;
318 if (pohmelfs_send_reply(err, total_msg - i, POHMELFS_CTLINFO_ACK, msg, sc)) {
319 err = -ENOMEM;
320 goto out_unlock;
322 i += 1;
327 out_unlock:
328 mutex_unlock(&pohmelfs_config_lock);
329 return err;
332 static int pohmelfs_cn_flush(struct cn_msg *msg)
334 struct pohmelfs_config_group *g;
335 struct pohmelfs_ctl *ctl = (struct pohmelfs_ctl *)msg->data;
336 struct pohmelfs_config *c, *tmp;
337 int err = 0;
339 if (msg->len != sizeof(struct pohmelfs_ctl))
340 return -EBADMSG;
342 mutex_lock(&pohmelfs_config_lock);
344 if (ctl->idx != POHMELFS_NULL_IDX) {
345 g = pohmelfs_find_config_group(ctl->idx);
347 if (!g)
348 goto out_unlock;
350 list_for_each_entry_safe(c, tmp, &g->config_list, config_entry) {
351 list_del(&c->config_entry);
352 g->num_entry--;
353 kfree(c);
355 } else {
356 list_for_each_entry(g, &pohmelfs_config_list, group_entry) {
357 if (g) {
358 list_for_each_entry_safe(c, tmp, &g->config_list, config_entry) {
359 list_del(&c->config_entry);
360 g->num_entry--;
361 kfree(c);
367 out_unlock:
368 mutex_unlock(&pohmelfs_config_lock);
369 pohmelfs_cn_dump(msg);
371 return err;
374 static int pohmelfs_modify_config(struct pohmelfs_ctl *old, struct pohmelfs_ctl *new)
376 old->perm = new->perm;
377 old->prio = new->prio;
378 return 0;
381 static int pohmelfs_cn_ctl(struct cn_msg *msg, int action)
383 struct pohmelfs_config_group *g;
384 struct pohmelfs_ctl *ctl = (struct pohmelfs_ctl *)msg->data;
385 struct pohmelfs_config *c, *tmp;
386 int err = 0;
388 if (msg->len != sizeof(struct pohmelfs_ctl))
389 return -EBADMSG;
391 mutex_lock(&pohmelfs_config_lock);
393 g = pohmelfs_find_create_config_group(ctl->idx);
394 if (!g) {
395 err = -ENOMEM;
396 goto out_unlock;
399 list_for_each_entry_safe(c, tmp, &g->config_list, config_entry) {
400 struct pohmelfs_ctl *sc = &c->state.ctl;
402 if (pohmelfs_config_eql(sc, ctl)) {
403 if (action == POHMELFS_FLAGS_ADD) {
404 err = -EEXIST;
405 goto out_unlock;
406 } else if (action == POHMELFS_FLAGS_DEL) {
407 list_del(&c->config_entry);
408 g->num_entry--;
409 kfree(c);
410 goto out_unlock;
411 } else if (action == POHMELFS_FLAGS_MODIFY) {
412 err = pohmelfs_modify_config(sc, ctl);
413 goto out_unlock;
414 } else {
415 err = -EEXIST;
416 goto out_unlock;
420 if (action == POHMELFS_FLAGS_DEL) {
421 err = -EBADMSG;
422 goto out_unlock;
425 c = kzalloc(sizeof(struct pohmelfs_config), GFP_KERNEL);
426 if (!c) {
427 err = -ENOMEM;
428 goto out_unlock;
430 memcpy(&c->state.ctl, ctl, sizeof(struct pohmelfs_ctl));
431 g->num_entry++;
433 list_add_tail(&c->config_entry, &g->config_list);
435 out_unlock:
436 mutex_unlock(&pohmelfs_config_lock);
437 if (pohmelfs_send_reply(err, 0, POHMELFS_NOINFO_ACK, msg, NULL))
438 err = -ENOMEM;
440 return err;
443 static int pohmelfs_crypto_hash_init(struct pohmelfs_config_group *g, struct pohmelfs_crypto *c)
445 char *algo = (char *)c->data;
446 u8 *key = (u8 *)(algo + c->strlen);
448 if (g->hash_string)
449 return -EEXIST;
451 g->hash_string = kstrdup(algo, GFP_KERNEL);
452 if (!g->hash_string)
453 return -ENOMEM;
454 g->hash_strlen = c->strlen;
455 g->hash_keysize = c->keysize;
457 g->hash_key = kmemdup(key, c->keysize, GFP_KERNEL);
458 if (!g->hash_key) {
459 kfree(g->hash_string);
460 return -ENOMEM;
463 return 0;
466 static int pohmelfs_crypto_cipher_init(struct pohmelfs_config_group *g, struct pohmelfs_crypto *c)
468 char *algo = (char *)c->data;
469 u8 *key = (u8 *)(algo + c->strlen);
471 if (g->cipher_string)
472 return -EEXIST;
474 g->cipher_string = kstrdup(algo, GFP_KERNEL);
475 if (!g->cipher_string)
476 return -ENOMEM;
477 g->cipher_strlen = c->strlen;
478 g->cipher_keysize = c->keysize;
480 g->cipher_key = kmemdup(key, c->keysize, GFP_KERNEL);
481 if (!g->cipher_key) {
482 kfree(g->cipher_string);
483 return -ENOMEM;
486 return 0;
489 static int pohmelfs_cn_crypto(struct cn_msg *msg)
491 struct pohmelfs_crypto *crypto = (struct pohmelfs_crypto *)msg->data;
492 struct pohmelfs_config_group *g;
493 int err = 0;
495 dprintk("%s: idx: %u, strlen: %u, type: %u, keysize: %u, algo: %s.\n",
496 __func__, crypto->idx, crypto->strlen, crypto->type,
497 crypto->keysize, (char *)crypto->data);
499 mutex_lock(&pohmelfs_config_lock);
500 g = pohmelfs_find_create_config_group(crypto->idx);
501 if (!g) {
502 err = -ENOMEM;
503 goto out_unlock;
506 switch (crypto->type) {
507 case POHMELFS_CRYPTO_HASH:
508 err = pohmelfs_crypto_hash_init(g, crypto);
509 break;
510 case POHMELFS_CRYPTO_CIPHER:
511 err = pohmelfs_crypto_cipher_init(g, crypto);
512 break;
513 default:
514 err = -ENOTSUPP;
515 break;
518 out_unlock:
519 mutex_unlock(&pohmelfs_config_lock);
520 if (pohmelfs_send_reply(err, 0, POHMELFS_NOINFO_ACK, msg, NULL))
521 err = -ENOMEM;
523 return err;
526 static void pohmelfs_cn_callback(struct cn_msg *msg, struct netlink_skb_parms *nsp)
528 int err;
530 if (!cap_raised(nsp->eff_cap, CAP_SYS_ADMIN))
531 return;
533 switch (msg->flags) {
534 case POHMELFS_FLAGS_ADD:
535 case POHMELFS_FLAGS_DEL:
536 case POHMELFS_FLAGS_MODIFY:
537 err = pohmelfs_cn_ctl(msg, msg->flags);
538 break;
539 case POHMELFS_FLAGS_FLUSH:
540 err = pohmelfs_cn_flush(msg);
541 break;
542 case POHMELFS_FLAGS_SHOW:
543 err = pohmelfs_cn_disp(msg);
544 break;
545 case POHMELFS_FLAGS_DUMP:
546 err = pohmelfs_cn_dump(msg);
547 break;
548 case POHMELFS_FLAGS_CRYPTO:
549 err = pohmelfs_cn_crypto(msg);
550 break;
551 default:
552 err = -ENOSYS;
553 break;
557 int pohmelfs_config_check(struct pohmelfs_config *config, int idx)
559 struct pohmelfs_ctl *ctl = &config->state.ctl;
560 struct pohmelfs_config *tmp;
561 int err = -ENOENT;
562 struct pohmelfs_ctl *sc;
563 struct pohmelfs_config_group *g;
565 mutex_lock(&pohmelfs_config_lock);
567 g = pohmelfs_find_config_group(ctl->idx);
568 if (g) {
569 list_for_each_entry(tmp, &g->config_list, config_entry) {
570 sc = &tmp->state.ctl;
572 if (pohmelfs_config_eql(sc, ctl)) {
573 err = 0;
574 break;
579 mutex_unlock(&pohmelfs_config_lock);
581 return err;
584 int __init pohmelfs_config_init(void)
586 return cn_add_callback(&pohmelfs_cn_id, "pohmelfs", (void *)pohmelfs_cn_callback);
589 void pohmelfs_config_exit(void)
591 struct pohmelfs_config *c, *tmp;
592 struct pohmelfs_config_group *g, *gtmp;
594 cn_del_callback(&pohmelfs_cn_id);
596 mutex_lock(&pohmelfs_config_lock);
597 list_for_each_entry_safe(g, gtmp, &pohmelfs_config_list, group_entry) {
598 list_for_each_entry_safe(c, tmp, &g->config_list, config_entry) {
599 list_del(&c->config_entry);
600 kfree(c);
603 list_del(&g->group_entry);
605 if (g->hash_string)
606 kfree(g->hash_string);
608 if (g->cipher_string)
609 kfree(g->cipher_string);
611 kfree(g);
613 mutex_unlock(&pohmelfs_config_lock);