rtnetlink.c 105 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344
  1. /*
  2. * INET An implementation of the TCP/IP protocol suite for the LINUX
  3. * operating system. INET is implemented using the BSD Socket
  4. * interface as the means of communication with the user level.
  5. *
  6. * Routing netlink socket interface: protocol independent part.
  7. *
  8. * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
  9. *
  10. * This program is free software; you can redistribute it and/or
  11. * modify it under the terms of the GNU General Public License
  12. * as published by the Free Software Foundation; either version
  13. * 2 of the License, or (at your option) any later version.
  14. *
  15. * Fixes:
  16. * Vitaly E. Lavrov RTA_OK arithmetics was wrong.
  17. */
  18. #include <linux/bitops.h>
  19. #include <linux/errno.h>
  20. #include <linux/module.h>
  21. #include <linux/types.h>
  22. #include <linux/socket.h>
  23. #include <linux/kernel.h>
  24. #include <linux/timer.h>
  25. #include <linux/string.h>
  26. #include <linux/sockios.h>
  27. #include <linux/net.h>
  28. #include <linux/fcntl.h>
  29. #include <linux/mm.h>
  30. #include <linux/slab.h>
  31. #include <linux/interrupt.h>
  32. #include <linux/capability.h>
  33. #include <linux/skbuff.h>
  34. #include <linux/init.h>
  35. #include <linux/security.h>
  36. #include <linux/mutex.h>
  37. #include <linux/if_addr.h>
  38. #include <linux/if_bridge.h>
  39. #include <linux/if_vlan.h>
  40. #include <linux/pci.h>
  41. #include <linux/etherdevice.h>
  42. #include <linux/bpf.h>
  43. #include <linux/uaccess.h>
  44. #include <linux/inet.h>
  45. #include <linux/netdevice.h>
  46. #include <net/switchdev.h>
  47. #include <net/ip.h>
  48. #include <net/protocol.h>
  49. #include <net/arp.h>
  50. #include <net/route.h>
  51. #include <net/udp.h>
  52. #include <net/tcp.h>
  53. #include <net/sock.h>
  54. #include <net/pkt_sched.h>
  55. #include <net/fib_rules.h>
  56. #include <net/rtnetlink.h>
  57. #include <net/net_namespace.h>
  58. struct rtnl_link {
  59. rtnl_doit_func doit;
  60. rtnl_dumpit_func dumpit;
  61. unsigned int flags;
  62. };
  63. static DEFINE_MUTEX(rtnl_mutex);
  64. void rtnl_lock(void)
  65. {
  66. mutex_lock(&rtnl_mutex);
  67. }
  68. EXPORT_SYMBOL(rtnl_lock);
  69. static struct sk_buff *defer_kfree_skb_list;
  70. void rtnl_kfree_skbs(struct sk_buff *head, struct sk_buff *tail)
  71. {
  72. if (head && tail) {
  73. tail->next = defer_kfree_skb_list;
  74. defer_kfree_skb_list = head;
  75. }
  76. }
  77. EXPORT_SYMBOL(rtnl_kfree_skbs);
  78. void __rtnl_unlock(void)
  79. {
  80. struct sk_buff *head = defer_kfree_skb_list;
  81. defer_kfree_skb_list = NULL;
  82. mutex_unlock(&rtnl_mutex);
  83. while (head) {
  84. struct sk_buff *next = head->next;
  85. kfree_skb(head);
  86. cond_resched();
  87. head = next;
  88. }
  89. }
  90. void rtnl_unlock(void)
  91. {
  92. /* This fellow will unlock it for us. */
  93. netdev_run_todo();
  94. }
  95. EXPORT_SYMBOL(rtnl_unlock);
  96. int rtnl_trylock(void)
  97. {
  98. return mutex_trylock(&rtnl_mutex);
  99. }
  100. EXPORT_SYMBOL(rtnl_trylock);
  101. int rtnl_is_locked(void)
  102. {
  103. return mutex_is_locked(&rtnl_mutex);
  104. }
  105. EXPORT_SYMBOL(rtnl_is_locked);
  106. #ifdef CONFIG_PROVE_LOCKING
  107. bool lockdep_rtnl_is_held(void)
  108. {
  109. return lockdep_is_held(&rtnl_mutex);
  110. }
  111. EXPORT_SYMBOL(lockdep_rtnl_is_held);
  112. #endif /* #ifdef CONFIG_PROVE_LOCKING */
  113. static struct rtnl_link __rcu *rtnl_msg_handlers[RTNL_FAMILY_MAX + 1];
  114. static refcount_t rtnl_msg_handlers_ref[RTNL_FAMILY_MAX + 1];
  115. static inline int rtm_msgindex(int msgtype)
  116. {
  117. int msgindex = msgtype - RTM_BASE;
  118. /*
  119. * msgindex < 0 implies someone tried to register a netlink
  120. * control code. msgindex >= RTM_NR_MSGTYPES may indicate that
  121. * the message type has not been added to linux/rtnetlink.h
  122. */
  123. BUG_ON(msgindex < 0 || msgindex >= RTM_NR_MSGTYPES);
  124. return msgindex;
  125. }
  126. /**
  127. * __rtnl_register - Register a rtnetlink message type
  128. * @protocol: Protocol family or PF_UNSPEC
  129. * @msgtype: rtnetlink message type
  130. * @doit: Function pointer called for each request message
  131. * @dumpit: Function pointer called for each dump request (NLM_F_DUMP) message
  132. * @flags: rtnl_link_flags to modifiy behaviour of doit/dumpit functions
  133. *
  134. * Registers the specified function pointers (at least one of them has
  135. * to be non-NULL) to be called whenever a request message for the
  136. * specified protocol family and message type is received.
  137. *
  138. * The special protocol family PF_UNSPEC may be used to define fallback
  139. * function pointers for the case when no entry for the specific protocol
  140. * family exists.
  141. *
  142. * Returns 0 on success or a negative error code.
  143. */
  144. int __rtnl_register(int protocol, int msgtype,
  145. rtnl_doit_func doit, rtnl_dumpit_func dumpit,
  146. unsigned int flags)
  147. {
  148. struct rtnl_link *tab;
  149. int msgindex;
  150. BUG_ON(protocol < 0 || protocol > RTNL_FAMILY_MAX);
  151. msgindex = rtm_msgindex(msgtype);
  152. tab = rcu_dereference(rtnl_msg_handlers[protocol]);
  153. if (tab == NULL) {
  154. tab = kcalloc(RTM_NR_MSGTYPES, sizeof(*tab), GFP_KERNEL);
  155. if (tab == NULL)
  156. return -ENOBUFS;
  157. rcu_assign_pointer(rtnl_msg_handlers[protocol], tab);
  158. }
  159. if (doit)
  160. tab[msgindex].doit = doit;
  161. if (dumpit)
  162. tab[msgindex].dumpit = dumpit;
  163. tab[msgindex].flags |= flags;
  164. return 0;
  165. }
  166. EXPORT_SYMBOL_GPL(__rtnl_register);
  167. /**
  168. * rtnl_register - Register a rtnetlink message type
  169. *
  170. * Identical to __rtnl_register() but panics on failure. This is useful
  171. * as failure of this function is very unlikely, it can only happen due
  172. * to lack of memory when allocating the chain to store all message
  173. * handlers for a protocol. Meant for use in init functions where lack
  174. * of memory implies no sense in continuing.
  175. */
  176. void rtnl_register(int protocol, int msgtype,
  177. rtnl_doit_func doit, rtnl_dumpit_func dumpit,
  178. unsigned int flags)
  179. {
  180. if (__rtnl_register(protocol, msgtype, doit, dumpit, flags) < 0)
  181. panic("Unable to register rtnetlink message handler, "
  182. "protocol = %d, message type = %d\n",
  183. protocol, msgtype);
  184. }
  185. EXPORT_SYMBOL_GPL(rtnl_register);
  186. /**
  187. * rtnl_unregister - Unregister a rtnetlink message type
  188. * @protocol: Protocol family or PF_UNSPEC
  189. * @msgtype: rtnetlink message type
  190. *
  191. * Returns 0 on success or a negative error code.
  192. */
  193. int rtnl_unregister(int protocol, int msgtype)
  194. {
  195. struct rtnl_link *handlers;
  196. int msgindex;
  197. BUG_ON(protocol < 0 || protocol > RTNL_FAMILY_MAX);
  198. msgindex = rtm_msgindex(msgtype);
  199. rtnl_lock();
  200. handlers = rtnl_dereference(rtnl_msg_handlers[protocol]);
  201. if (!handlers) {
  202. rtnl_unlock();
  203. return -ENOENT;
  204. }
  205. handlers[msgindex].doit = NULL;
  206. handlers[msgindex].dumpit = NULL;
  207. handlers[msgindex].flags = 0;
  208. rtnl_unlock();
  209. return 0;
  210. }
  211. EXPORT_SYMBOL_GPL(rtnl_unregister);
  212. /**
  213. * rtnl_unregister_all - Unregister all rtnetlink message type of a protocol
  214. * @protocol : Protocol family or PF_UNSPEC
  215. *
  216. * Identical to calling rtnl_unregster() for all registered message types
  217. * of a certain protocol family.
  218. */
  219. void rtnl_unregister_all(int protocol)
  220. {
  221. struct rtnl_link *handlers;
  222. BUG_ON(protocol < 0 || protocol > RTNL_FAMILY_MAX);
  223. rtnl_lock();
  224. handlers = rtnl_dereference(rtnl_msg_handlers[protocol]);
  225. RCU_INIT_POINTER(rtnl_msg_handlers[protocol], NULL);
  226. rtnl_unlock();
  227. synchronize_net();
  228. while (refcount_read(&rtnl_msg_handlers_ref[protocol]) > 0)
  229. schedule();
  230. kfree(handlers);
  231. }
  232. EXPORT_SYMBOL_GPL(rtnl_unregister_all);
  233. static LIST_HEAD(link_ops);
  234. static const struct rtnl_link_ops *rtnl_link_ops_get(const char *kind)
  235. {
  236. const struct rtnl_link_ops *ops;
  237. list_for_each_entry(ops, &link_ops, list) {
  238. if (!strcmp(ops->kind, kind))
  239. return ops;
  240. }
  241. return NULL;
  242. }
  243. /**
  244. * __rtnl_link_register - Register rtnl_link_ops with rtnetlink.
  245. * @ops: struct rtnl_link_ops * to register
  246. *
  247. * The caller must hold the rtnl_mutex. This function should be used
  248. * by drivers that create devices during module initialization. It
  249. * must be called before registering the devices.
  250. *
  251. * Returns 0 on success or a negative error code.
  252. */
  253. int __rtnl_link_register(struct rtnl_link_ops *ops)
  254. {
  255. if (rtnl_link_ops_get(ops->kind))
  256. return -EEXIST;
  257. /* The check for setup is here because if ops
  258. * does not have that filled up, it is not possible
  259. * to use the ops for creating device. So do not
  260. * fill up dellink as well. That disables rtnl_dellink.
  261. */
  262. if (ops->setup && !ops->dellink)
  263. ops->dellink = unregister_netdevice_queue;
  264. list_add_tail(&ops->list, &link_ops);
  265. return 0;
  266. }
  267. EXPORT_SYMBOL_GPL(__rtnl_link_register);
  268. /**
  269. * rtnl_link_register - Register rtnl_link_ops with rtnetlink.
  270. * @ops: struct rtnl_link_ops * to register
  271. *
  272. * Returns 0 on success or a negative error code.
  273. */
  274. int rtnl_link_register(struct rtnl_link_ops *ops)
  275. {
  276. int err;
  277. rtnl_lock();
  278. err = __rtnl_link_register(ops);
  279. rtnl_unlock();
  280. return err;
  281. }
  282. EXPORT_SYMBOL_GPL(rtnl_link_register);
  283. static void __rtnl_kill_links(struct net *net, struct rtnl_link_ops *ops)
  284. {
  285. struct net_device *dev;
  286. LIST_HEAD(list_kill);
  287. for_each_netdev(net, dev) {
  288. if (dev->rtnl_link_ops == ops)
  289. ops->dellink(dev, &list_kill);
  290. }
  291. unregister_netdevice_many(&list_kill);
  292. }
  293. /**
  294. * __rtnl_link_unregister - Unregister rtnl_link_ops from rtnetlink.
  295. * @ops: struct rtnl_link_ops * to unregister
  296. *
  297. * The caller must hold the rtnl_mutex.
  298. */
  299. void __rtnl_link_unregister(struct rtnl_link_ops *ops)
  300. {
  301. struct net *net;
  302. for_each_net(net) {
  303. __rtnl_kill_links(net, ops);
  304. }
  305. list_del(&ops->list);
  306. }
  307. EXPORT_SYMBOL_GPL(__rtnl_link_unregister);
  308. /* Return with the rtnl_lock held when there are no network
  309. * devices unregistering in any network namespace.
  310. */
  311. static void rtnl_lock_unregistering_all(void)
  312. {
  313. struct net *net;
  314. bool unregistering;
  315. DEFINE_WAIT_FUNC(wait, woken_wake_function);
  316. add_wait_queue(&netdev_unregistering_wq, &wait);
  317. for (;;) {
  318. unregistering = false;
  319. rtnl_lock();
  320. for_each_net(net) {
  321. if (net->dev_unreg_count > 0) {
  322. unregistering = true;
  323. break;
  324. }
  325. }
  326. if (!unregistering)
  327. break;
  328. __rtnl_unlock();
  329. wait_woken(&wait, TASK_UNINTERRUPTIBLE, MAX_SCHEDULE_TIMEOUT);
  330. }
  331. remove_wait_queue(&netdev_unregistering_wq, &wait);
  332. }
  333. /**
  334. * rtnl_link_unregister - Unregister rtnl_link_ops from rtnetlink.
  335. * @ops: struct rtnl_link_ops * to unregister
  336. */
  337. void rtnl_link_unregister(struct rtnl_link_ops *ops)
  338. {
  339. /* Close the race with cleanup_net() */
  340. mutex_lock(&net_mutex);
  341. rtnl_lock_unregistering_all();
  342. __rtnl_link_unregister(ops);
  343. rtnl_unlock();
  344. mutex_unlock(&net_mutex);
  345. }
  346. EXPORT_SYMBOL_GPL(rtnl_link_unregister);
  347. static size_t rtnl_link_get_slave_info_data_size(const struct net_device *dev)
  348. {
  349. struct net_device *master_dev;
  350. const struct rtnl_link_ops *ops;
  351. master_dev = netdev_master_upper_dev_get((struct net_device *) dev);
  352. if (!master_dev)
  353. return 0;
  354. ops = master_dev->rtnl_link_ops;
  355. if (!ops || !ops->get_slave_size)
  356. return 0;
  357. /* IFLA_INFO_SLAVE_DATA + nested data */
  358. return nla_total_size(sizeof(struct nlattr)) +
  359. ops->get_slave_size(master_dev, dev);
  360. }
  361. static size_t rtnl_link_get_size(const struct net_device *dev)
  362. {
  363. const struct rtnl_link_ops *ops = dev->rtnl_link_ops;
  364. size_t size;
  365. if (!ops)
  366. return 0;
  367. size = nla_total_size(sizeof(struct nlattr)) + /* IFLA_LINKINFO */
  368. nla_total_size(strlen(ops->kind) + 1); /* IFLA_INFO_KIND */
  369. if (ops->get_size)
  370. /* IFLA_INFO_DATA + nested data */
  371. size += nla_total_size(sizeof(struct nlattr)) +
  372. ops->get_size(dev);
  373. if (ops->get_xstats_size)
  374. /* IFLA_INFO_XSTATS */
  375. size += nla_total_size(ops->get_xstats_size(dev));
  376. size += rtnl_link_get_slave_info_data_size(dev);
  377. return size;
  378. }
  379. static LIST_HEAD(rtnl_af_ops);
  380. static const struct rtnl_af_ops *rtnl_af_lookup(const int family)
  381. {
  382. const struct rtnl_af_ops *ops;
  383. list_for_each_entry(ops, &rtnl_af_ops, list) {
  384. if (ops->family == family)
  385. return ops;
  386. }
  387. return NULL;
  388. }
  389. /**
  390. * rtnl_af_register - Register rtnl_af_ops with rtnetlink.
  391. * @ops: struct rtnl_af_ops * to register
  392. *
  393. * Returns 0 on success or a negative error code.
  394. */
  395. void rtnl_af_register(struct rtnl_af_ops *ops)
  396. {
  397. rtnl_lock();
  398. list_add_tail(&ops->list, &rtnl_af_ops);
  399. rtnl_unlock();
  400. }
  401. EXPORT_SYMBOL_GPL(rtnl_af_register);
  402. /**
  403. * __rtnl_af_unregister - Unregister rtnl_af_ops from rtnetlink.
  404. * @ops: struct rtnl_af_ops * to unregister
  405. *
  406. * The caller must hold the rtnl_mutex.
  407. */
  408. void __rtnl_af_unregister(struct rtnl_af_ops *ops)
  409. {
  410. list_del(&ops->list);
  411. }
  412. EXPORT_SYMBOL_GPL(__rtnl_af_unregister);
  413. /**
  414. * rtnl_af_unregister - Unregister rtnl_af_ops from rtnetlink.
  415. * @ops: struct rtnl_af_ops * to unregister
  416. */
  417. void rtnl_af_unregister(struct rtnl_af_ops *ops)
  418. {
  419. rtnl_lock();
  420. __rtnl_af_unregister(ops);
  421. rtnl_unlock();
  422. }
  423. EXPORT_SYMBOL_GPL(rtnl_af_unregister);
  424. static size_t rtnl_link_get_af_size(const struct net_device *dev,
  425. u32 ext_filter_mask)
  426. {
  427. struct rtnl_af_ops *af_ops;
  428. size_t size;
  429. /* IFLA_AF_SPEC */
  430. size = nla_total_size(sizeof(struct nlattr));
  431. list_for_each_entry(af_ops, &rtnl_af_ops, list) {
  432. if (af_ops->get_link_af_size) {
  433. /* AF_* + nested data */
  434. size += nla_total_size(sizeof(struct nlattr)) +
  435. af_ops->get_link_af_size(dev, ext_filter_mask);
  436. }
  437. }
  438. return size;
  439. }
  440. static bool rtnl_have_link_slave_info(const struct net_device *dev)
  441. {
  442. struct net_device *master_dev;
  443. master_dev = netdev_master_upper_dev_get((struct net_device *) dev);
  444. if (master_dev && master_dev->rtnl_link_ops)
  445. return true;
  446. return false;
  447. }
  448. static int rtnl_link_slave_info_fill(struct sk_buff *skb,
  449. const struct net_device *dev)
  450. {
  451. struct net_device *master_dev;
  452. const struct rtnl_link_ops *ops;
  453. struct nlattr *slave_data;
  454. int err;
  455. master_dev = netdev_master_upper_dev_get((struct net_device *) dev);
  456. if (!master_dev)
  457. return 0;
  458. ops = master_dev->rtnl_link_ops;
  459. if (!ops)
  460. return 0;
  461. if (nla_put_string(skb, IFLA_INFO_SLAVE_KIND, ops->kind) < 0)
  462. return -EMSGSIZE;
  463. if (ops->fill_slave_info) {
  464. slave_data = nla_nest_start(skb, IFLA_INFO_SLAVE_DATA);
  465. if (!slave_data)
  466. return -EMSGSIZE;
  467. err = ops->fill_slave_info(skb, master_dev, dev);
  468. if (err < 0)
  469. goto err_cancel_slave_data;
  470. nla_nest_end(skb, slave_data);
  471. }
  472. return 0;
  473. err_cancel_slave_data:
  474. nla_nest_cancel(skb, slave_data);
  475. return err;
  476. }
  477. static int rtnl_link_info_fill(struct sk_buff *skb,
  478. const struct net_device *dev)
  479. {
  480. const struct rtnl_link_ops *ops = dev->rtnl_link_ops;
  481. struct nlattr *data;
  482. int err;
  483. if (!ops)
  484. return 0;
  485. if (nla_put_string(skb, IFLA_INFO_KIND, ops->kind) < 0)
  486. return -EMSGSIZE;
  487. if (ops->fill_xstats) {
  488. err = ops->fill_xstats(skb, dev);
  489. if (err < 0)
  490. return err;
  491. }
  492. if (ops->fill_info) {
  493. data = nla_nest_start(skb, IFLA_INFO_DATA);
  494. if (data == NULL)
  495. return -EMSGSIZE;
  496. err = ops->fill_info(skb, dev);
  497. if (err < 0)
  498. goto err_cancel_data;
  499. nla_nest_end(skb, data);
  500. }
  501. return 0;
  502. err_cancel_data:
  503. nla_nest_cancel(skb, data);
  504. return err;
  505. }
  506. static int rtnl_link_fill(struct sk_buff *skb, const struct net_device *dev)
  507. {
  508. struct nlattr *linkinfo;
  509. int err = -EMSGSIZE;
  510. linkinfo = nla_nest_start(skb, IFLA_LINKINFO);
  511. if (linkinfo == NULL)
  512. goto out;
  513. err = rtnl_link_info_fill(skb, dev);
  514. if (err < 0)
  515. goto err_cancel_link;
  516. err = rtnl_link_slave_info_fill(skb, dev);
  517. if (err < 0)
  518. goto err_cancel_link;
  519. nla_nest_end(skb, linkinfo);
  520. return 0;
  521. err_cancel_link:
  522. nla_nest_cancel(skb, linkinfo);
  523. out:
  524. return err;
  525. }
  526. int rtnetlink_send(struct sk_buff *skb, struct net *net, u32 pid, unsigned int group, int echo)
  527. {
  528. struct sock *rtnl = net->rtnl;
  529. int err = 0;
  530. NETLINK_CB(skb).dst_group = group;
  531. if (echo)
  532. refcount_inc(&skb->users);
  533. netlink_broadcast(rtnl, skb, pid, group, GFP_KERNEL);
  534. if (echo)
  535. err = netlink_unicast(rtnl, skb, pid, MSG_DONTWAIT);
  536. return err;
  537. }
  538. int rtnl_unicast(struct sk_buff *skb, struct net *net, u32 pid)
  539. {
  540. struct sock *rtnl = net->rtnl;
  541. return nlmsg_unicast(rtnl, skb, pid);
  542. }
  543. EXPORT_SYMBOL(rtnl_unicast);
  544. void rtnl_notify(struct sk_buff *skb, struct net *net, u32 pid, u32 group,
  545. struct nlmsghdr *nlh, gfp_t flags)
  546. {
  547. struct sock *rtnl = net->rtnl;
  548. int report = 0;
  549. if (nlh)
  550. report = nlmsg_report(nlh);
  551. nlmsg_notify(rtnl, skb, pid, group, report, flags);
  552. }
  553. EXPORT_SYMBOL(rtnl_notify);
  554. void rtnl_set_sk_err(struct net *net, u32 group, int error)
  555. {
  556. struct sock *rtnl = net->rtnl;
  557. netlink_set_err(rtnl, 0, group, error);
  558. }
  559. EXPORT_SYMBOL(rtnl_set_sk_err);
  560. int rtnetlink_put_metrics(struct sk_buff *skb, u32 *metrics)
  561. {
  562. struct nlattr *mx;
  563. int i, valid = 0;
  564. mx = nla_nest_start(skb, RTA_METRICS);
  565. if (mx == NULL)
  566. return -ENOBUFS;
  567. for (i = 0; i < RTAX_MAX; i++) {
  568. if (metrics[i]) {
  569. if (i == RTAX_CC_ALGO - 1) {
  570. char tmp[TCP_CA_NAME_MAX], *name;
  571. name = tcp_ca_get_name_by_key(metrics[i], tmp);
  572. if (!name)
  573. continue;
  574. if (nla_put_string(skb, i + 1, name))
  575. goto nla_put_failure;
  576. } else if (i == RTAX_FEATURES - 1) {
  577. u32 user_features = metrics[i] & RTAX_FEATURE_MASK;
  578. if (!user_features)
  579. continue;
  580. BUILD_BUG_ON(RTAX_FEATURE_MASK & DST_FEATURE_MASK);
  581. if (nla_put_u32(skb, i + 1, user_features))
  582. goto nla_put_failure;
  583. } else {
  584. if (nla_put_u32(skb, i + 1, metrics[i]))
  585. goto nla_put_failure;
  586. }
  587. valid++;
  588. }
  589. }
  590. if (!valid) {
  591. nla_nest_cancel(skb, mx);
  592. return 0;
  593. }
  594. return nla_nest_end(skb, mx);
  595. nla_put_failure:
  596. nla_nest_cancel(skb, mx);
  597. return -EMSGSIZE;
  598. }
  599. EXPORT_SYMBOL(rtnetlink_put_metrics);
  600. int rtnl_put_cacheinfo(struct sk_buff *skb, struct dst_entry *dst, u32 id,
  601. long expires, u32 error)
  602. {
  603. struct rta_cacheinfo ci = {
  604. .rta_lastuse = jiffies_delta_to_clock_t(jiffies - dst->lastuse),
  605. .rta_used = dst->__use,
  606. .rta_clntref = atomic_read(&(dst->__refcnt)),
  607. .rta_error = error,
  608. .rta_id = id,
  609. };
  610. if (expires) {
  611. unsigned long clock;
  612. clock = jiffies_to_clock_t(abs(expires));
  613. clock = min_t(unsigned long, clock, INT_MAX);
  614. ci.rta_expires = (expires > 0) ? clock : -clock;
  615. }
  616. return nla_put(skb, RTA_CACHEINFO, sizeof(ci), &ci);
  617. }
  618. EXPORT_SYMBOL_GPL(rtnl_put_cacheinfo);
  619. static void set_operstate(struct net_device *dev, unsigned char transition)
  620. {
  621. unsigned char operstate = dev->operstate;
  622. switch (transition) {
  623. case IF_OPER_UP:
  624. if ((operstate == IF_OPER_DORMANT ||
  625. operstate == IF_OPER_UNKNOWN) &&
  626. !netif_dormant(dev))
  627. operstate = IF_OPER_UP;
  628. break;
  629. case IF_OPER_DORMANT:
  630. if (operstate == IF_OPER_UP ||
  631. operstate == IF_OPER_UNKNOWN)
  632. operstate = IF_OPER_DORMANT;
  633. break;
  634. }
  635. if (dev->operstate != operstate) {
  636. write_lock_bh(&dev_base_lock);
  637. dev->operstate = operstate;
  638. write_unlock_bh(&dev_base_lock);
  639. netdev_state_change(dev);
  640. }
  641. }
  642. static unsigned int rtnl_dev_get_flags(const struct net_device *dev)
  643. {
  644. return (dev->flags & ~(IFF_PROMISC | IFF_ALLMULTI)) |
  645. (dev->gflags & (IFF_PROMISC | IFF_ALLMULTI));
  646. }
  647. static unsigned int rtnl_dev_combine_flags(const struct net_device *dev,
  648. const struct ifinfomsg *ifm)
  649. {
  650. unsigned int flags = ifm->ifi_flags;
  651. /* bugwards compatibility: ifi_change == 0 is treated as ~0 */
  652. if (ifm->ifi_change)
  653. flags = (flags & ifm->ifi_change) |
  654. (rtnl_dev_get_flags(dev) & ~ifm->ifi_change);
  655. return flags;
  656. }
  657. static void copy_rtnl_link_stats(struct rtnl_link_stats *a,
  658. const struct rtnl_link_stats64 *b)
  659. {
  660. a->rx_packets = b->rx_packets;
  661. a->tx_packets = b->tx_packets;
  662. a->rx_bytes = b->rx_bytes;
  663. a->tx_bytes = b->tx_bytes;
  664. a->rx_errors = b->rx_errors;
  665. a->tx_errors = b->tx_errors;
  666. a->rx_dropped = b->rx_dropped;
  667. a->tx_dropped = b->tx_dropped;
  668. a->multicast = b->multicast;
  669. a->collisions = b->collisions;
  670. a->rx_length_errors = b->rx_length_errors;
  671. a->rx_over_errors = b->rx_over_errors;
  672. a->rx_crc_errors = b->rx_crc_errors;
  673. a->rx_frame_errors = b->rx_frame_errors;
  674. a->rx_fifo_errors = b->rx_fifo_errors;
  675. a->rx_missed_errors = b->rx_missed_errors;
  676. a->tx_aborted_errors = b->tx_aborted_errors;
  677. a->tx_carrier_errors = b->tx_carrier_errors;
  678. a->tx_fifo_errors = b->tx_fifo_errors;
  679. a->tx_heartbeat_errors = b->tx_heartbeat_errors;
  680. a->tx_window_errors = b->tx_window_errors;
  681. a->rx_compressed = b->rx_compressed;
  682. a->tx_compressed = b->tx_compressed;
  683. a->rx_nohandler = b->rx_nohandler;
  684. }
  685. /* All VF info */
  686. static inline int rtnl_vfinfo_size(const struct net_device *dev,
  687. u32 ext_filter_mask)
  688. {
  689. if (dev->dev.parent && (ext_filter_mask & RTEXT_FILTER_VF)) {
  690. int num_vfs = dev_num_vf(dev->dev.parent);
  691. size_t size = nla_total_size(0);
  692. size += num_vfs *
  693. (nla_total_size(0) +
  694. nla_total_size(sizeof(struct ifla_vf_mac)) +
  695. nla_total_size(sizeof(struct ifla_vf_vlan)) +
  696. nla_total_size(0) + /* nest IFLA_VF_VLAN_LIST */
  697. nla_total_size(MAX_VLAN_LIST_LEN *
  698. sizeof(struct ifla_vf_vlan_info)) +
  699. nla_total_size(sizeof(struct ifla_vf_spoofchk)) +
  700. nla_total_size(sizeof(struct ifla_vf_tx_rate)) +
  701. nla_total_size(sizeof(struct ifla_vf_rate)) +
  702. nla_total_size(sizeof(struct ifla_vf_link_state)) +
  703. nla_total_size(sizeof(struct ifla_vf_rss_query_en)) +
  704. nla_total_size(0) + /* nest IFLA_VF_STATS */
  705. /* IFLA_VF_STATS_RX_PACKETS */
  706. nla_total_size_64bit(sizeof(__u64)) +
  707. /* IFLA_VF_STATS_TX_PACKETS */
  708. nla_total_size_64bit(sizeof(__u64)) +
  709. /* IFLA_VF_STATS_RX_BYTES */
  710. nla_total_size_64bit(sizeof(__u64)) +
  711. /* IFLA_VF_STATS_TX_BYTES */
  712. nla_total_size_64bit(sizeof(__u64)) +
  713. /* IFLA_VF_STATS_BROADCAST */
  714. nla_total_size_64bit(sizeof(__u64)) +
  715. /* IFLA_VF_STATS_MULTICAST */
  716. nla_total_size_64bit(sizeof(__u64)) +
  717. nla_total_size(sizeof(struct ifla_vf_trust)));
  718. return size;
  719. } else
  720. return 0;
  721. }
  722. static size_t rtnl_port_size(const struct net_device *dev,
  723. u32 ext_filter_mask)
  724. {
  725. size_t port_size = nla_total_size(4) /* PORT_VF */
  726. + nla_total_size(PORT_PROFILE_MAX) /* PORT_PROFILE */
  727. + nla_total_size(PORT_UUID_MAX) /* PORT_INSTANCE_UUID */
  728. + nla_total_size(PORT_UUID_MAX) /* PORT_HOST_UUID */
  729. + nla_total_size(1) /* PROT_VDP_REQUEST */
  730. + nla_total_size(2); /* PORT_VDP_RESPONSE */
  731. size_t vf_ports_size = nla_total_size(sizeof(struct nlattr));
  732. size_t vf_port_size = nla_total_size(sizeof(struct nlattr))
  733. + port_size;
  734. size_t port_self_size = nla_total_size(sizeof(struct nlattr))
  735. + port_size;
  736. if (!dev->netdev_ops->ndo_get_vf_port || !dev->dev.parent ||
  737. !(ext_filter_mask & RTEXT_FILTER_VF))
  738. return 0;
  739. if (dev_num_vf(dev->dev.parent))
  740. return port_self_size + vf_ports_size +
  741. vf_port_size * dev_num_vf(dev->dev.parent);
  742. else
  743. return port_self_size;
  744. }
  745. static size_t rtnl_xdp_size(void)
  746. {
  747. size_t xdp_size = nla_total_size(0) + /* nest IFLA_XDP */
  748. nla_total_size(1) + /* XDP_ATTACHED */
  749. nla_total_size(4); /* XDP_PROG_ID */
  750. return xdp_size;
  751. }
  752. static noinline size_t if_nlmsg_size(const struct net_device *dev,
  753. u32 ext_filter_mask)
  754. {
  755. return NLMSG_ALIGN(sizeof(struct ifinfomsg))
  756. + nla_total_size(IFNAMSIZ) /* IFLA_IFNAME */
  757. + nla_total_size(IFALIASZ) /* IFLA_IFALIAS */
  758. + nla_total_size(IFNAMSIZ) /* IFLA_QDISC */
  759. + nla_total_size_64bit(sizeof(struct rtnl_link_ifmap))
  760. + nla_total_size(sizeof(struct rtnl_link_stats))
  761. + nla_total_size_64bit(sizeof(struct rtnl_link_stats64))
  762. + nla_total_size(MAX_ADDR_LEN) /* IFLA_ADDRESS */
  763. + nla_total_size(MAX_ADDR_LEN) /* IFLA_BROADCAST */
  764. + nla_total_size(4) /* IFLA_TXQLEN */
  765. + nla_total_size(4) /* IFLA_WEIGHT */
  766. + nla_total_size(4) /* IFLA_MTU */
  767. + nla_total_size(4) /* IFLA_LINK */
  768. + nla_total_size(4) /* IFLA_MASTER */
  769. + nla_total_size(1) /* IFLA_CARRIER */
  770. + nla_total_size(4) /* IFLA_PROMISCUITY */
  771. + nla_total_size(4) /* IFLA_NUM_TX_QUEUES */
  772. + nla_total_size(4) /* IFLA_NUM_RX_QUEUES */
  773. + nla_total_size(4) /* IFLA_GSO_MAX_SEGS */
  774. + nla_total_size(4) /* IFLA_GSO_MAX_SIZE */
  775. + nla_total_size(1) /* IFLA_OPERSTATE */
  776. + nla_total_size(1) /* IFLA_LINKMODE */
  777. + nla_total_size(4) /* IFLA_CARRIER_CHANGES */
  778. + nla_total_size(4) /* IFLA_LINK_NETNSID */
  779. + nla_total_size(4) /* IFLA_GROUP */
  780. + nla_total_size(ext_filter_mask
  781. & RTEXT_FILTER_VF ? 4 : 0) /* IFLA_NUM_VF */
  782. + rtnl_vfinfo_size(dev, ext_filter_mask) /* IFLA_VFINFO_LIST */
  783. + rtnl_port_size(dev, ext_filter_mask) /* IFLA_VF_PORTS + IFLA_PORT_SELF */
  784. + rtnl_link_get_size(dev) /* IFLA_LINKINFO */
  785. + rtnl_link_get_af_size(dev, ext_filter_mask) /* IFLA_AF_SPEC */
  786. + nla_total_size(MAX_PHYS_ITEM_ID_LEN) /* IFLA_PHYS_PORT_ID */
  787. + nla_total_size(MAX_PHYS_ITEM_ID_LEN) /* IFLA_PHYS_SWITCH_ID */
  788. + nla_total_size(IFNAMSIZ) /* IFLA_PHYS_PORT_NAME */
  789. + rtnl_xdp_size() /* IFLA_XDP */
  790. + nla_total_size(4) /* IFLA_EVENT */
  791. + nla_total_size(1); /* IFLA_PROTO_DOWN */
  792. }
  793. static int rtnl_vf_ports_fill(struct sk_buff *skb, struct net_device *dev)
  794. {
  795. struct nlattr *vf_ports;
  796. struct nlattr *vf_port;
  797. int vf;
  798. int err;
  799. vf_ports = nla_nest_start(skb, IFLA_VF_PORTS);
  800. if (!vf_ports)
  801. return -EMSGSIZE;
  802. for (vf = 0; vf < dev_num_vf(dev->dev.parent); vf++) {
  803. vf_port = nla_nest_start(skb, IFLA_VF_PORT);
  804. if (!vf_port)
  805. goto nla_put_failure;
  806. if (nla_put_u32(skb, IFLA_PORT_VF, vf))
  807. goto nla_put_failure;
  808. err = dev->netdev_ops->ndo_get_vf_port(dev, vf, skb);
  809. if (err == -EMSGSIZE)
  810. goto nla_put_failure;
  811. if (err) {
  812. nla_nest_cancel(skb, vf_port);
  813. continue;
  814. }
  815. nla_nest_end(skb, vf_port);
  816. }
  817. nla_nest_end(skb, vf_ports);
  818. return 0;
  819. nla_put_failure:
  820. nla_nest_cancel(skb, vf_ports);
  821. return -EMSGSIZE;
  822. }
  823. static int rtnl_port_self_fill(struct sk_buff *skb, struct net_device *dev)
  824. {
  825. struct nlattr *port_self;
  826. int err;
  827. port_self = nla_nest_start(skb, IFLA_PORT_SELF);
  828. if (!port_self)
  829. return -EMSGSIZE;
  830. err = dev->netdev_ops->ndo_get_vf_port(dev, PORT_SELF_VF, skb);
  831. if (err) {
  832. nla_nest_cancel(skb, port_self);
  833. return (err == -EMSGSIZE) ? err : 0;
  834. }
  835. nla_nest_end(skb, port_self);
  836. return 0;
  837. }
  838. static int rtnl_port_fill(struct sk_buff *skb, struct net_device *dev,
  839. u32 ext_filter_mask)
  840. {
  841. int err;
  842. if (!dev->netdev_ops->ndo_get_vf_port || !dev->dev.parent ||
  843. !(ext_filter_mask & RTEXT_FILTER_VF))
  844. return 0;
  845. err = rtnl_port_self_fill(skb, dev);
  846. if (err)
  847. return err;
  848. if (dev_num_vf(dev->dev.parent)) {
  849. err = rtnl_vf_ports_fill(skb, dev);
  850. if (err)
  851. return err;
  852. }
  853. return 0;
  854. }
  855. static int rtnl_phys_port_id_fill(struct sk_buff *skb, struct net_device *dev)
  856. {
  857. int err;
  858. struct netdev_phys_item_id ppid;
  859. err = dev_get_phys_port_id(dev, &ppid);
  860. if (err) {
  861. if (err == -EOPNOTSUPP)
  862. return 0;
  863. return err;
  864. }
  865. if (nla_put(skb, IFLA_PHYS_PORT_ID, ppid.id_len, ppid.id))
  866. return -EMSGSIZE;
  867. return 0;
  868. }
  869. static int rtnl_phys_port_name_fill(struct sk_buff *skb, struct net_device *dev)
  870. {
  871. char name[IFNAMSIZ];
  872. int err;
  873. err = dev_get_phys_port_name(dev, name, sizeof(name));
  874. if (err) {
  875. if (err == -EOPNOTSUPP)
  876. return 0;
  877. return err;
  878. }
  879. if (nla_put_string(skb, IFLA_PHYS_PORT_NAME, name))
  880. return -EMSGSIZE;
  881. return 0;
  882. }
  883. static int rtnl_phys_switch_id_fill(struct sk_buff *skb, struct net_device *dev)
  884. {
  885. int err;
  886. struct switchdev_attr attr = {
  887. .orig_dev = dev,
  888. .id = SWITCHDEV_ATTR_ID_PORT_PARENT_ID,
  889. .flags = SWITCHDEV_F_NO_RECURSE,
  890. };
  891. err = switchdev_port_attr_get(dev, &attr);
  892. if (err) {
  893. if (err == -EOPNOTSUPP)
  894. return 0;
  895. return err;
  896. }
  897. if (nla_put(skb, IFLA_PHYS_SWITCH_ID, attr.u.ppid.id_len,
  898. attr.u.ppid.id))
  899. return -EMSGSIZE;
  900. return 0;
  901. }
  902. static noinline_for_stack int rtnl_fill_stats(struct sk_buff *skb,
  903. struct net_device *dev)
  904. {
  905. struct rtnl_link_stats64 *sp;
  906. struct nlattr *attr;
  907. attr = nla_reserve_64bit(skb, IFLA_STATS64,
  908. sizeof(struct rtnl_link_stats64), IFLA_PAD);
  909. if (!attr)
  910. return -EMSGSIZE;
  911. sp = nla_data(attr);
  912. dev_get_stats(dev, sp);
  913. attr = nla_reserve(skb, IFLA_STATS,
  914. sizeof(struct rtnl_link_stats));
  915. if (!attr)
  916. return -EMSGSIZE;
  917. copy_rtnl_link_stats(nla_data(attr), sp);
  918. return 0;
  919. }
  920. static noinline_for_stack int rtnl_fill_vfinfo(struct sk_buff *skb,
  921. struct net_device *dev,
  922. int vfs_num,
  923. struct nlattr *vfinfo)
  924. {
  925. struct ifla_vf_rss_query_en vf_rss_query_en;
  926. struct nlattr *vf, *vfstats, *vfvlanlist;
  927. struct ifla_vf_link_state vf_linkstate;
  928. struct ifla_vf_vlan_info vf_vlan_info;
  929. struct ifla_vf_spoofchk vf_spoofchk;
  930. struct ifla_vf_tx_rate vf_tx_rate;
  931. struct ifla_vf_stats vf_stats;
  932. struct ifla_vf_trust vf_trust;
  933. struct ifla_vf_vlan vf_vlan;
  934. struct ifla_vf_rate vf_rate;
  935. struct ifla_vf_mac vf_mac;
  936. struct ifla_vf_info ivi;
  937. memset(&ivi, 0, sizeof(ivi));
  938. /* Not all SR-IOV capable drivers support the
  939. * spoofcheck and "RSS query enable" query. Preset to
  940. * -1 so the user space tool can detect that the driver
  941. * didn't report anything.
  942. */
  943. ivi.spoofchk = -1;
  944. ivi.rss_query_en = -1;
  945. ivi.trusted = -1;
  946. /* The default value for VF link state is "auto"
  947. * IFLA_VF_LINK_STATE_AUTO which equals zero
  948. */
  949. ivi.linkstate = 0;
  950. /* VLAN Protocol by default is 802.1Q */
  951. ivi.vlan_proto = htons(ETH_P_8021Q);
  952. if (dev->netdev_ops->ndo_get_vf_config(dev, vfs_num, &ivi))
  953. return 0;
  954. memset(&vf_vlan_info, 0, sizeof(vf_vlan_info));
  955. vf_mac.vf =
  956. vf_vlan.vf =
  957. vf_vlan_info.vf =
  958. vf_rate.vf =
  959. vf_tx_rate.vf =
  960. vf_spoofchk.vf =
  961. vf_linkstate.vf =
  962. vf_rss_query_en.vf =
  963. vf_trust.vf = ivi.vf;
  964. memcpy(vf_mac.mac, ivi.mac, sizeof(ivi.mac));
  965. vf_vlan.vlan = ivi.vlan;
  966. vf_vlan.qos = ivi.qos;
  967. vf_vlan_info.vlan = ivi.vlan;
  968. vf_vlan_info.qos = ivi.qos;
  969. vf_vlan_info.vlan_proto = ivi.vlan_proto;
  970. vf_tx_rate.rate = ivi.max_tx_rate;
  971. vf_rate.min_tx_rate = ivi.min_tx_rate;
  972. vf_rate.max_tx_rate = ivi.max_tx_rate;
  973. vf_spoofchk.setting = ivi.spoofchk;
  974. vf_linkstate.link_state = ivi.linkstate;
  975. vf_rss_query_en.setting = ivi.rss_query_en;
  976. vf_trust.setting = ivi.trusted;
  977. vf = nla_nest_start(skb, IFLA_VF_INFO);
  978. if (!vf)
  979. goto nla_put_vfinfo_failure;
  980. if (nla_put(skb, IFLA_VF_MAC, sizeof(vf_mac), &vf_mac) ||
  981. nla_put(skb, IFLA_VF_VLAN, sizeof(vf_vlan), &vf_vlan) ||
  982. nla_put(skb, IFLA_VF_RATE, sizeof(vf_rate),
  983. &vf_rate) ||
  984. nla_put(skb, IFLA_VF_TX_RATE, sizeof(vf_tx_rate),
  985. &vf_tx_rate) ||
  986. nla_put(skb, IFLA_VF_SPOOFCHK, sizeof(vf_spoofchk),
  987. &vf_spoofchk) ||
  988. nla_put(skb, IFLA_VF_LINK_STATE, sizeof(vf_linkstate),
  989. &vf_linkstate) ||
  990. nla_put(skb, IFLA_VF_RSS_QUERY_EN,
  991. sizeof(vf_rss_query_en),
  992. &vf_rss_query_en) ||
  993. nla_put(skb, IFLA_VF_TRUST,
  994. sizeof(vf_trust), &vf_trust))
  995. goto nla_put_vf_failure;
  996. vfvlanlist = nla_nest_start(skb, IFLA_VF_VLAN_LIST);
  997. if (!vfvlanlist)
  998. goto nla_put_vf_failure;
  999. if (nla_put(skb, IFLA_VF_VLAN_INFO, sizeof(vf_vlan_info),
  1000. &vf_vlan_info)) {
  1001. nla_nest_cancel(skb, vfvlanlist);
  1002. goto nla_put_vf_failure;
  1003. }
  1004. nla_nest_end(skb, vfvlanlist);
  1005. memset(&vf_stats, 0, sizeof(vf_stats));
  1006. if (dev->netdev_ops->ndo_get_vf_stats)
  1007. dev->netdev_ops->ndo_get_vf_stats(dev, vfs_num,
  1008. &vf_stats);
  1009. vfstats = nla_nest_start(skb, IFLA_VF_STATS);
  1010. if (!vfstats)
  1011. goto nla_put_vf_failure;
  1012. if (nla_put_u64_64bit(skb, IFLA_VF_STATS_RX_PACKETS,
  1013. vf_stats.rx_packets, IFLA_VF_STATS_PAD) ||
  1014. nla_put_u64_64bit(skb, IFLA_VF_STATS_TX_PACKETS,
  1015. vf_stats.tx_packets, IFLA_VF_STATS_PAD) ||
  1016. nla_put_u64_64bit(skb, IFLA_VF_STATS_RX_BYTES,
  1017. vf_stats.rx_bytes, IFLA_VF_STATS_PAD) ||
  1018. nla_put_u64_64bit(skb, IFLA_VF_STATS_TX_BYTES,
  1019. vf_stats.tx_bytes, IFLA_VF_STATS_PAD) ||
  1020. nla_put_u64_64bit(skb, IFLA_VF_STATS_BROADCAST,
  1021. vf_stats.broadcast, IFLA_VF_STATS_PAD) ||
  1022. nla_put_u64_64bit(skb, IFLA_VF_STATS_MULTICAST,
  1023. vf_stats.multicast, IFLA_VF_STATS_PAD)) {
  1024. nla_nest_cancel(skb, vfstats);
  1025. goto nla_put_vf_failure;
  1026. }
  1027. nla_nest_end(skb, vfstats);
  1028. nla_nest_end(skb, vf);
  1029. return 0;
  1030. nla_put_vf_failure:
  1031. nla_nest_cancel(skb, vf);
  1032. nla_put_vfinfo_failure:
  1033. nla_nest_cancel(skb, vfinfo);
  1034. return -EMSGSIZE;
  1035. }
  1036. static int rtnl_fill_link_ifmap(struct sk_buff *skb, struct net_device *dev)
  1037. {
  1038. struct rtnl_link_ifmap map;
  1039. memset(&map, 0, sizeof(map));
  1040. map.mem_start = dev->mem_start;
  1041. map.mem_end = dev->mem_end;
  1042. map.base_addr = dev->base_addr;
  1043. map.irq = dev->irq;
  1044. map.dma = dev->dma;
  1045. map.port = dev->if_port;
  1046. if (nla_put_64bit(skb, IFLA_MAP, sizeof(map), &map, IFLA_PAD))
  1047. return -EMSGSIZE;
  1048. return 0;
  1049. }
  1050. static u8 rtnl_xdp_attached_mode(struct net_device *dev, u32 *prog_id)
  1051. {
  1052. const struct net_device_ops *ops = dev->netdev_ops;
  1053. const struct bpf_prog *generic_xdp_prog;
  1054. ASSERT_RTNL();
  1055. *prog_id = 0;
  1056. generic_xdp_prog = rtnl_dereference(dev->xdp_prog);
  1057. if (generic_xdp_prog) {
  1058. *prog_id = generic_xdp_prog->aux->id;
  1059. return XDP_ATTACHED_SKB;
  1060. }
  1061. if (!ops->ndo_xdp)
  1062. return XDP_ATTACHED_NONE;
  1063. return __dev_xdp_attached(dev, ops->ndo_xdp, prog_id);
  1064. }
  1065. static int rtnl_xdp_fill(struct sk_buff *skb, struct net_device *dev)
  1066. {
  1067. struct nlattr *xdp;
  1068. u32 prog_id;
  1069. int err;
  1070. xdp = nla_nest_start(skb, IFLA_XDP);
  1071. if (!xdp)
  1072. return -EMSGSIZE;
  1073. err = nla_put_u8(skb, IFLA_XDP_ATTACHED,
  1074. rtnl_xdp_attached_mode(dev, &prog_id));
  1075. if (err)
  1076. goto err_cancel;
  1077. if (prog_id) {
  1078. err = nla_put_u32(skb, IFLA_XDP_PROG_ID, prog_id);
  1079. if (err)
  1080. goto err_cancel;
  1081. }
  1082. nla_nest_end(skb, xdp);
  1083. return 0;
  1084. err_cancel:
  1085. nla_nest_cancel(skb, xdp);
  1086. return err;
  1087. }
  1088. static u32 rtnl_get_event(unsigned long event)
  1089. {
  1090. u32 rtnl_event_type = IFLA_EVENT_NONE;
  1091. switch (event) {
  1092. case NETDEV_REBOOT:
  1093. rtnl_event_type = IFLA_EVENT_REBOOT;
  1094. break;
  1095. case NETDEV_FEAT_CHANGE:
  1096. rtnl_event_type = IFLA_EVENT_FEATURES;
  1097. break;
  1098. case NETDEV_BONDING_FAILOVER:
  1099. rtnl_event_type = IFLA_EVENT_BONDING_FAILOVER;
  1100. break;
  1101. case NETDEV_NOTIFY_PEERS:
  1102. rtnl_event_type = IFLA_EVENT_NOTIFY_PEERS;
  1103. break;
  1104. case NETDEV_RESEND_IGMP:
  1105. rtnl_event_type = IFLA_EVENT_IGMP_RESEND;
  1106. break;
  1107. case NETDEV_CHANGEINFODATA:
  1108. rtnl_event_type = IFLA_EVENT_BONDING_OPTIONS;
  1109. break;
  1110. default:
  1111. break;
  1112. }
  1113. return rtnl_event_type;
  1114. }
  1115. static int rtnl_fill_ifinfo(struct sk_buff *skb, struct net_device *dev,
  1116. int type, u32 pid, u32 seq, u32 change,
  1117. unsigned int flags, u32 ext_filter_mask,
  1118. u32 event)
  1119. {
  1120. struct ifinfomsg *ifm;
  1121. struct nlmsghdr *nlh;
  1122. struct nlattr *af_spec;
  1123. struct rtnl_af_ops *af_ops;
  1124. struct net_device *upper_dev = netdev_master_upper_dev_get(dev);
  1125. ASSERT_RTNL();
  1126. nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ifm), flags);
  1127. if (nlh == NULL)
  1128. return -EMSGSIZE;
  1129. ifm = nlmsg_data(nlh);
  1130. ifm->ifi_family = AF_UNSPEC;
  1131. ifm->__ifi_pad = 0;
  1132. ifm->ifi_type = dev->type;
  1133. ifm->ifi_index = dev->ifindex;
  1134. ifm->ifi_flags = dev_get_flags(dev);
  1135. ifm->ifi_change = change;
  1136. if (nla_put_string(skb, IFLA_IFNAME, dev->name) ||
  1137. nla_put_u32(skb, IFLA_TXQLEN, dev->tx_queue_len) ||
  1138. nla_put_u8(skb, IFLA_OPERSTATE,
  1139. netif_running(dev) ? dev->operstate : IF_OPER_DOWN) ||
  1140. nla_put_u8(skb, IFLA_LINKMODE, dev->link_mode) ||
  1141. nla_put_u32(skb, IFLA_MTU, dev->mtu) ||
  1142. nla_put_u32(skb, IFLA_GROUP, dev->group) ||
  1143. nla_put_u32(skb, IFLA_PROMISCUITY, dev->promiscuity) ||
  1144. nla_put_u32(skb, IFLA_NUM_TX_QUEUES, dev->num_tx_queues) ||
  1145. nla_put_u32(skb, IFLA_GSO_MAX_SEGS, dev->gso_max_segs) ||
  1146. nla_put_u32(skb, IFLA_GSO_MAX_SIZE, dev->gso_max_size) ||
  1147. #ifdef CONFIG_RPS
  1148. nla_put_u32(skb, IFLA_NUM_RX_QUEUES, dev->num_rx_queues) ||
  1149. #endif
  1150. (dev->ifindex != dev_get_iflink(dev) &&
  1151. nla_put_u32(skb, IFLA_LINK, dev_get_iflink(dev))) ||
  1152. (upper_dev &&
  1153. nla_put_u32(skb, IFLA_MASTER, upper_dev->ifindex)) ||
  1154. nla_put_u8(skb, IFLA_CARRIER, netif_carrier_ok(dev)) ||
  1155. (dev->qdisc &&
  1156. nla_put_string(skb, IFLA_QDISC, dev->qdisc->ops->id)) ||
  1157. (dev->ifalias &&
  1158. nla_put_string(skb, IFLA_IFALIAS, dev->ifalias)) ||
  1159. nla_put_u32(skb, IFLA_CARRIER_CHANGES,
  1160. atomic_read(&dev->carrier_changes)) ||
  1161. nla_put_u8(skb, IFLA_PROTO_DOWN, dev->proto_down))
  1162. goto nla_put_failure;
  1163. if (event != IFLA_EVENT_NONE) {
  1164. if (nla_put_u32(skb, IFLA_EVENT, event))
  1165. goto nla_put_failure;
  1166. }
  1167. if (rtnl_fill_link_ifmap(skb, dev))
  1168. goto nla_put_failure;
  1169. if (dev->addr_len) {
  1170. if (nla_put(skb, IFLA_ADDRESS, dev->addr_len, dev->dev_addr) ||
  1171. nla_put(skb, IFLA_BROADCAST, dev->addr_len, dev->broadcast))
  1172. goto nla_put_failure;
  1173. }
  1174. if (rtnl_phys_port_id_fill(skb, dev))
  1175. goto nla_put_failure;
  1176. if (rtnl_phys_port_name_fill(skb, dev))
  1177. goto nla_put_failure;
  1178. if (rtnl_phys_switch_id_fill(skb, dev))
  1179. goto nla_put_failure;
  1180. if (rtnl_fill_stats(skb, dev))
  1181. goto nla_put_failure;
  1182. if (dev->dev.parent && (ext_filter_mask & RTEXT_FILTER_VF) &&
  1183. nla_put_u32(skb, IFLA_NUM_VF, dev_num_vf(dev->dev.parent)))
  1184. goto nla_put_failure;
  1185. if (dev->netdev_ops->ndo_get_vf_config && dev->dev.parent &&
  1186. ext_filter_mask & RTEXT_FILTER_VF) {
  1187. int i;
  1188. struct nlattr *vfinfo;
  1189. int num_vfs = dev_num_vf(dev->dev.parent);
  1190. vfinfo = nla_nest_start(skb, IFLA_VFINFO_LIST);
  1191. if (!vfinfo)
  1192. goto nla_put_failure;
  1193. for (i = 0; i < num_vfs; i++) {
  1194. if (rtnl_fill_vfinfo(skb, dev, i, vfinfo))
  1195. goto nla_put_failure;
  1196. }
  1197. nla_nest_end(skb, vfinfo);
  1198. }
  1199. if (rtnl_port_fill(skb, dev, ext_filter_mask))
  1200. goto nla_put_failure;
  1201. if (rtnl_xdp_fill(skb, dev))
  1202. goto nla_put_failure;
  1203. if (dev->rtnl_link_ops || rtnl_have_link_slave_info(dev)) {
  1204. if (rtnl_link_fill(skb, dev) < 0)
  1205. goto nla_put_failure;
  1206. }
  1207. if (dev->rtnl_link_ops &&
  1208. dev->rtnl_link_ops->get_link_net) {
  1209. struct net *link_net = dev->rtnl_link_ops->get_link_net(dev);
  1210. if (!net_eq(dev_net(dev), link_net)) {
  1211. int id = peernet2id_alloc(dev_net(dev), link_net);
  1212. if (nla_put_s32(skb, IFLA_LINK_NETNSID, id))
  1213. goto nla_put_failure;
  1214. }
  1215. }
  1216. if (!(af_spec = nla_nest_start(skb, IFLA_AF_SPEC)))
  1217. goto nla_put_failure;
  1218. list_for_each_entry(af_ops, &rtnl_af_ops, list) {
  1219. if (af_ops->fill_link_af) {
  1220. struct nlattr *af;
  1221. int err;
  1222. if (!(af = nla_nest_start(skb, af_ops->family)))
  1223. goto nla_put_failure;
  1224. err = af_ops->fill_link_af(skb, dev, ext_filter_mask);
  1225. /*
  1226. * Caller may return ENODATA to indicate that there
  1227. * was no data to be dumped. This is not an error, it
  1228. * means we should trim the attribute header and
  1229. * continue.
  1230. */
  1231. if (err == -ENODATA)
  1232. nla_nest_cancel(skb, af);
  1233. else if (err < 0)
  1234. goto nla_put_failure;
  1235. nla_nest_end(skb, af);
  1236. }
  1237. }
  1238. nla_nest_end(skb, af_spec);
  1239. nlmsg_end(skb, nlh);
  1240. return 0;
  1241. nla_put_failure:
  1242. nlmsg_cancel(skb, nlh);
  1243. return -EMSGSIZE;
  1244. }
  1245. static const struct nla_policy ifla_policy[IFLA_MAX+1] = {
  1246. [IFLA_IFNAME] = { .type = NLA_STRING, .len = IFNAMSIZ-1 },
  1247. [IFLA_ADDRESS] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN },
  1248. [IFLA_BROADCAST] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN },
  1249. [IFLA_MAP] = { .len = sizeof(struct rtnl_link_ifmap) },
  1250. [IFLA_MTU] = { .type = NLA_U32 },
  1251. [IFLA_LINK] = { .type = NLA_U32 },
  1252. [IFLA_MASTER] = { .type = NLA_U32 },
  1253. [IFLA_CARRIER] = { .type = NLA_U8 },
  1254. [IFLA_TXQLEN] = { .type = NLA_U32 },
  1255. [IFLA_WEIGHT] = { .type = NLA_U32 },
  1256. [IFLA_OPERSTATE] = { .type = NLA_U8 },
  1257. [IFLA_LINKMODE] = { .type = NLA_U8 },
  1258. [IFLA_LINKINFO] = { .type = NLA_NESTED },
  1259. [IFLA_NET_NS_PID] = { .type = NLA_U32 },
  1260. [IFLA_NET_NS_FD] = { .type = NLA_U32 },
  1261. [IFLA_IFALIAS] = { .type = NLA_STRING, .len = IFALIASZ-1 },
  1262. [IFLA_VFINFO_LIST] = {. type = NLA_NESTED },
  1263. [IFLA_VF_PORTS] = { .type = NLA_NESTED },
  1264. [IFLA_PORT_SELF] = { .type = NLA_NESTED },
  1265. [IFLA_AF_SPEC] = { .type = NLA_NESTED },
  1266. [IFLA_EXT_MASK] = { .type = NLA_U32 },
  1267. [IFLA_PROMISCUITY] = { .type = NLA_U32 },
  1268. [IFLA_NUM_TX_QUEUES] = { .type = NLA_U32 },
  1269. [IFLA_NUM_RX_QUEUES] = { .type = NLA_U32 },
  1270. [IFLA_PHYS_PORT_ID] = { .type = NLA_BINARY, .len = MAX_PHYS_ITEM_ID_LEN },
  1271. [IFLA_CARRIER_CHANGES] = { .type = NLA_U32 }, /* ignored */
  1272. [IFLA_PHYS_SWITCH_ID] = { .type = NLA_BINARY, .len = MAX_PHYS_ITEM_ID_LEN },
  1273. [IFLA_LINK_NETNSID] = { .type = NLA_S32 },
  1274. [IFLA_PROTO_DOWN] = { .type = NLA_U8 },
  1275. [IFLA_XDP] = { .type = NLA_NESTED },
  1276. [IFLA_EVENT] = { .type = NLA_U32 },
  1277. [IFLA_GROUP] = { .type = NLA_U32 },
  1278. };
  1279. static const struct nla_policy ifla_info_policy[IFLA_INFO_MAX+1] = {
  1280. [IFLA_INFO_KIND] = { .type = NLA_STRING },
  1281. [IFLA_INFO_DATA] = { .type = NLA_NESTED },
  1282. [IFLA_INFO_SLAVE_KIND] = { .type = NLA_STRING },
  1283. [IFLA_INFO_SLAVE_DATA] = { .type = NLA_NESTED },
  1284. };
  1285. static const struct nla_policy ifla_vf_policy[IFLA_VF_MAX+1] = {
  1286. [IFLA_VF_MAC] = { .len = sizeof(struct ifla_vf_mac) },
  1287. [IFLA_VF_VLAN] = { .len = sizeof(struct ifla_vf_vlan) },
  1288. [IFLA_VF_VLAN_LIST] = { .type = NLA_NESTED },
  1289. [IFLA_VF_TX_RATE] = { .len = sizeof(struct ifla_vf_tx_rate) },
  1290. [IFLA_VF_SPOOFCHK] = { .len = sizeof(struct ifla_vf_spoofchk) },
  1291. [IFLA_VF_RATE] = { .len = sizeof(struct ifla_vf_rate) },
  1292. [IFLA_VF_LINK_STATE] = { .len = sizeof(struct ifla_vf_link_state) },
  1293. [IFLA_VF_RSS_QUERY_EN] = { .len = sizeof(struct ifla_vf_rss_query_en) },
  1294. [IFLA_VF_STATS] = { .type = NLA_NESTED },
  1295. [IFLA_VF_TRUST] = { .len = sizeof(struct ifla_vf_trust) },
  1296. [IFLA_VF_IB_NODE_GUID] = { .len = sizeof(struct ifla_vf_guid) },
  1297. [IFLA_VF_IB_PORT_GUID] = { .len = sizeof(struct ifla_vf_guid) },
  1298. };
  1299. static const struct nla_policy ifla_port_policy[IFLA_PORT_MAX+1] = {
  1300. [IFLA_PORT_VF] = { .type = NLA_U32 },
  1301. [IFLA_PORT_PROFILE] = { .type = NLA_STRING,
  1302. .len = PORT_PROFILE_MAX },
  1303. [IFLA_PORT_INSTANCE_UUID] = { .type = NLA_BINARY,
  1304. .len = PORT_UUID_MAX },
  1305. [IFLA_PORT_HOST_UUID] = { .type = NLA_STRING,
  1306. .len = PORT_UUID_MAX },
  1307. [IFLA_PORT_REQUEST] = { .type = NLA_U8, },
  1308. [IFLA_PORT_RESPONSE] = { .type = NLA_U16, },
  1309. /* Unused, but we need to keep it here since user space could
  1310. * fill it. It's also broken with regard to NLA_BINARY use in
  1311. * combination with structs.
  1312. */
  1313. [IFLA_PORT_VSI_TYPE] = { .type = NLA_BINARY,
  1314. .len = sizeof(struct ifla_port_vsi) },
  1315. };
  1316. static const struct nla_policy ifla_xdp_policy[IFLA_XDP_MAX + 1] = {
  1317. [IFLA_XDP_FD] = { .type = NLA_S32 },
  1318. [IFLA_XDP_ATTACHED] = { .type = NLA_U8 },
  1319. [IFLA_XDP_FLAGS] = { .type = NLA_U32 },
  1320. [IFLA_XDP_PROG_ID] = { .type = NLA_U32 },
  1321. };
  1322. static const struct rtnl_link_ops *linkinfo_to_kind_ops(const struct nlattr *nla)
  1323. {
  1324. const struct rtnl_link_ops *ops = NULL;
  1325. struct nlattr *linfo[IFLA_INFO_MAX + 1];
  1326. if (nla_parse_nested(linfo, IFLA_INFO_MAX, nla,
  1327. ifla_info_policy, NULL) < 0)
  1328. return NULL;
  1329. if (linfo[IFLA_INFO_KIND]) {
  1330. char kind[MODULE_NAME_LEN];
  1331. nla_strlcpy(kind, linfo[IFLA_INFO_KIND], sizeof(kind));
  1332. ops = rtnl_link_ops_get(kind);
  1333. }
  1334. return ops;
  1335. }
  1336. static bool link_master_filtered(struct net_device *dev, int master_idx)
  1337. {
  1338. struct net_device *master;
  1339. if (!master_idx)
  1340. return false;
  1341. master = netdev_master_upper_dev_get(dev);
  1342. if (!master || master->ifindex != master_idx)
  1343. return true;
  1344. return false;
  1345. }
  1346. static bool link_kind_filtered(const struct net_device *dev,
  1347. const struct rtnl_link_ops *kind_ops)
  1348. {
  1349. if (kind_ops && dev->rtnl_link_ops != kind_ops)
  1350. return true;
  1351. return false;
  1352. }
  1353. static bool link_dump_filtered(struct net_device *dev,
  1354. int master_idx,
  1355. const struct rtnl_link_ops *kind_ops)
  1356. {
  1357. if (link_master_filtered(dev, master_idx) ||
  1358. link_kind_filtered(dev, kind_ops))
  1359. return true;
  1360. return false;
  1361. }
  1362. static int rtnl_dump_ifinfo(struct sk_buff *skb, struct netlink_callback *cb)
  1363. {
  1364. struct net *net = sock_net(skb->sk);
  1365. int h, s_h;
  1366. int idx = 0, s_idx;
  1367. struct net_device *dev;
  1368. struct hlist_head *head;
  1369. struct nlattr *tb[IFLA_MAX+1];
  1370. u32 ext_filter_mask = 0;
  1371. const struct rtnl_link_ops *kind_ops = NULL;
  1372. unsigned int flags = NLM_F_MULTI;
  1373. int master_idx = 0;
  1374. int err;
  1375. int hdrlen;
  1376. s_h = cb->args[0];
  1377. s_idx = cb->args[1];
  1378. cb->seq = net->dev_base_seq;
  1379. /* A hack to preserve kernel<->userspace interface.
  1380. * The correct header is ifinfomsg. It is consistent with rtnl_getlink.
  1381. * However, before Linux v3.9 the code here assumed rtgenmsg and that's
  1382. * what iproute2 < v3.9.0 used.
  1383. * We can detect the old iproute2. Even including the IFLA_EXT_MASK
  1384. * attribute, its netlink message is shorter than struct ifinfomsg.
  1385. */
  1386. hdrlen = nlmsg_len(cb->nlh) < sizeof(struct ifinfomsg) ?
  1387. sizeof(struct rtgenmsg) : sizeof(struct ifinfomsg);
  1388. if (nlmsg_parse(cb->nlh, hdrlen, tb, IFLA_MAX,
  1389. ifla_policy, NULL) >= 0) {
  1390. if (tb[IFLA_EXT_MASK])
  1391. ext_filter_mask = nla_get_u32(tb[IFLA_EXT_MASK]);
  1392. if (tb[IFLA_MASTER])
  1393. master_idx = nla_get_u32(tb[IFLA_MASTER]);
  1394. if (tb[IFLA_LINKINFO])
  1395. kind_ops = linkinfo_to_kind_ops(tb[IFLA_LINKINFO]);
  1396. if (master_idx || kind_ops)
  1397. flags |= NLM_F_DUMP_FILTERED;
  1398. }
  1399. for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
  1400. idx = 0;
  1401. head = &net->dev_index_head[h];
  1402. hlist_for_each_entry(dev, head, index_hlist) {
  1403. if (link_dump_filtered(dev, master_idx, kind_ops))
  1404. goto cont;
  1405. if (idx < s_idx)
  1406. goto cont;
  1407. err = rtnl_fill_ifinfo(skb, dev, RTM_NEWLINK,
  1408. NETLINK_CB(cb->skb).portid,
  1409. cb->nlh->nlmsg_seq, 0,
  1410. flags,
  1411. ext_filter_mask, 0);
  1412. if (err < 0) {
  1413. if (likely(skb->len))
  1414. goto out;
  1415. goto out_err;
  1416. }
  1417. nl_dump_check_consistent(cb, nlmsg_hdr(skb));
  1418. cont:
  1419. idx++;
  1420. }
  1421. }
  1422. out:
  1423. err = skb->len;
  1424. out_err:
  1425. cb->args[1] = idx;
  1426. cb->args[0] = h;
  1427. return err;
  1428. }
  1429. int rtnl_nla_parse_ifla(struct nlattr **tb, const struct nlattr *head, int len,
  1430. struct netlink_ext_ack *exterr)
  1431. {
  1432. return nla_parse(tb, IFLA_MAX, head, len, ifla_policy, exterr);
  1433. }
  1434. EXPORT_SYMBOL(rtnl_nla_parse_ifla);
  1435. struct net *rtnl_link_get_net(struct net *src_net, struct nlattr *tb[])
  1436. {
  1437. struct net *net;
  1438. /* Examine the link attributes and figure out which
  1439. * network namespace we are talking about.
  1440. */
  1441. if (tb[IFLA_NET_NS_PID])
  1442. net = get_net_ns_by_pid(nla_get_u32(tb[IFLA_NET_NS_PID]));
  1443. else if (tb[IFLA_NET_NS_FD])
  1444. net = get_net_ns_by_fd(nla_get_u32(tb[IFLA_NET_NS_FD]));
  1445. else
  1446. net = get_net(src_net);
  1447. return net;
  1448. }
  1449. EXPORT_SYMBOL(rtnl_link_get_net);
  1450. static int validate_linkmsg(struct net_device *dev, struct nlattr *tb[])
  1451. {
  1452. if (dev) {
  1453. if (tb[IFLA_ADDRESS] &&
  1454. nla_len(tb[IFLA_ADDRESS]) < dev->addr_len)
  1455. return -EINVAL;
  1456. if (tb[IFLA_BROADCAST] &&
  1457. nla_len(tb[IFLA_BROADCAST]) < dev->addr_len)
  1458. return -EINVAL;
  1459. }
  1460. if (tb[IFLA_AF_SPEC]) {
  1461. struct nlattr *af;
  1462. int rem, err;
  1463. nla_for_each_nested(af, tb[IFLA_AF_SPEC], rem) {
  1464. const struct rtnl_af_ops *af_ops;
  1465. if (!(af_ops = rtnl_af_lookup(nla_type(af))))
  1466. return -EAFNOSUPPORT;
  1467. if (!af_ops->set_link_af)
  1468. return -EOPNOTSUPP;
  1469. if (af_ops->validate_link_af) {
  1470. err = af_ops->validate_link_af(dev, af);
  1471. if (err < 0)
  1472. return err;
  1473. }
  1474. }
  1475. }
  1476. return 0;
  1477. }
  1478. static int handle_infiniband_guid(struct net_device *dev, struct ifla_vf_guid *ivt,
  1479. int guid_type)
  1480. {
  1481. const struct net_device_ops *ops = dev->netdev_ops;
  1482. return ops->ndo_set_vf_guid(dev, ivt->vf, ivt->guid, guid_type);
  1483. }
  1484. static int handle_vf_guid(struct net_device *dev, struct ifla_vf_guid *ivt, int guid_type)
  1485. {
  1486. if (dev->type != ARPHRD_INFINIBAND)
  1487. return -EOPNOTSUPP;
  1488. return handle_infiniband_guid(dev, ivt, guid_type);
  1489. }
  1490. static int do_setvfinfo(struct net_device *dev, struct nlattr **tb)
  1491. {
  1492. const struct net_device_ops *ops = dev->netdev_ops;
  1493. int err = -EINVAL;
  1494. if (tb[IFLA_VF_MAC]) {
  1495. struct ifla_vf_mac *ivm = nla_data(tb[IFLA_VF_MAC]);
  1496. err = -EOPNOTSUPP;
  1497. if (ops->ndo_set_vf_mac)
  1498. err = ops->ndo_set_vf_mac(dev, ivm->vf,
  1499. ivm->mac);
  1500. if (err < 0)
  1501. return err;
  1502. }
  1503. if (tb[IFLA_VF_VLAN]) {
  1504. struct ifla_vf_vlan *ivv = nla_data(tb[IFLA_VF_VLAN]);
  1505. err = -EOPNOTSUPP;
  1506. if (ops->ndo_set_vf_vlan)
  1507. err = ops->ndo_set_vf_vlan(dev, ivv->vf, ivv->vlan,
  1508. ivv->qos,
  1509. htons(ETH_P_8021Q));
  1510. if (err < 0)
  1511. return err;
  1512. }
  1513. if (tb[IFLA_VF_VLAN_LIST]) {
  1514. struct ifla_vf_vlan_info *ivvl[MAX_VLAN_LIST_LEN];
  1515. struct nlattr *attr;
  1516. int rem, len = 0;
  1517. err = -EOPNOTSUPP;
  1518. if (!ops->ndo_set_vf_vlan)
  1519. return err;
  1520. nla_for_each_nested(attr, tb[IFLA_VF_VLAN_LIST], rem) {
  1521. if (nla_type(attr) != IFLA_VF_VLAN_INFO ||
  1522. nla_len(attr) < NLA_HDRLEN) {
  1523. return -EINVAL;
  1524. }
  1525. if (len >= MAX_VLAN_LIST_LEN)
  1526. return -EOPNOTSUPP;
  1527. ivvl[len] = nla_data(attr);
  1528. len++;
  1529. }
  1530. if (len == 0)
  1531. return -EINVAL;
  1532. err = ops->ndo_set_vf_vlan(dev, ivvl[0]->vf, ivvl[0]->vlan,
  1533. ivvl[0]->qos, ivvl[0]->vlan_proto);
  1534. if (err < 0)
  1535. return err;
  1536. }
  1537. if (tb[IFLA_VF_TX_RATE]) {
  1538. struct ifla_vf_tx_rate *ivt = nla_data(tb[IFLA_VF_TX_RATE]);
  1539. struct ifla_vf_info ivf;
  1540. err = -EOPNOTSUPP;
  1541. if (ops->ndo_get_vf_config)
  1542. err = ops->ndo_get_vf_config(dev, ivt->vf, &ivf);
  1543. if (err < 0)
  1544. return err;
  1545. err = -EOPNOTSUPP;
  1546. if (ops->ndo_set_vf_rate)
  1547. err = ops->ndo_set_vf_rate(dev, ivt->vf,
  1548. ivf.min_tx_rate,
  1549. ivt->rate);
  1550. if (err < 0)
  1551. return err;
  1552. }
  1553. if (tb[IFLA_VF_RATE]) {
  1554. struct ifla_vf_rate *ivt = nla_data(tb[IFLA_VF_RATE]);
  1555. err = -EOPNOTSUPP;
  1556. if (ops->ndo_set_vf_rate)
  1557. err = ops->ndo_set_vf_rate(dev, ivt->vf,
  1558. ivt->min_tx_rate,
  1559. ivt->max_tx_rate);
  1560. if (err < 0)
  1561. return err;
  1562. }
  1563. if (tb[IFLA_VF_SPOOFCHK]) {
  1564. struct ifla_vf_spoofchk *ivs = nla_data(tb[IFLA_VF_SPOOFCHK]);
  1565. err = -EOPNOTSUPP;
  1566. if (ops->ndo_set_vf_spoofchk)
  1567. err = ops->ndo_set_vf_spoofchk(dev, ivs->vf,
  1568. ivs->setting);
  1569. if (err < 0)
  1570. return err;
  1571. }
  1572. if (tb[IFLA_VF_LINK_STATE]) {
  1573. struct ifla_vf_link_state *ivl = nla_data(tb[IFLA_VF_LINK_STATE]);
  1574. err = -EOPNOTSUPP;
  1575. if (ops->ndo_set_vf_link_state)
  1576. err = ops->ndo_set_vf_link_state(dev, ivl->vf,
  1577. ivl->link_state);
  1578. if (err < 0)
  1579. return err;
  1580. }
  1581. if (tb[IFLA_VF_RSS_QUERY_EN]) {
  1582. struct ifla_vf_rss_query_en *ivrssq_en;
  1583. err = -EOPNOTSUPP;
  1584. ivrssq_en = nla_data(tb[IFLA_VF_RSS_QUERY_EN]);
  1585. if (ops->ndo_set_vf_rss_query_en)
  1586. err = ops->ndo_set_vf_rss_query_en(dev, ivrssq_en->vf,
  1587. ivrssq_en->setting);
  1588. if (err < 0)
  1589. return err;
  1590. }
  1591. if (tb[IFLA_VF_TRUST]) {
  1592. struct ifla_vf_trust *ivt = nla_data(tb[IFLA_VF_TRUST]);
  1593. err = -EOPNOTSUPP;
  1594. if (ops->ndo_set_vf_trust)
  1595. err = ops->ndo_set_vf_trust(dev, ivt->vf, ivt->setting);
  1596. if (err < 0)
  1597. return err;
  1598. }
  1599. if (tb[IFLA_VF_IB_NODE_GUID]) {
  1600. struct ifla_vf_guid *ivt = nla_data(tb[IFLA_VF_IB_NODE_GUID]);
  1601. if (!ops->ndo_set_vf_guid)
  1602. return -EOPNOTSUPP;
  1603. return handle_vf_guid(dev, ivt, IFLA_VF_IB_NODE_GUID);
  1604. }
  1605. if (tb[IFLA_VF_IB_PORT_GUID]) {
  1606. struct ifla_vf_guid *ivt = nla_data(tb[IFLA_VF_IB_PORT_GUID]);
  1607. if (!ops->ndo_set_vf_guid)
  1608. return -EOPNOTSUPP;
  1609. return handle_vf_guid(dev, ivt, IFLA_VF_IB_PORT_GUID);
  1610. }
  1611. return err;
  1612. }
  1613. static int do_set_master(struct net_device *dev, int ifindex)
  1614. {
  1615. struct net_device *upper_dev = netdev_master_upper_dev_get(dev);
  1616. const struct net_device_ops *ops;
  1617. int err;
  1618. if (upper_dev) {
  1619. if (upper_dev->ifindex == ifindex)
  1620. return 0;
  1621. ops = upper_dev->netdev_ops;
  1622. if (ops->ndo_del_slave) {
  1623. err = ops->ndo_del_slave(upper_dev, dev);
  1624. if (err)
  1625. return err;
  1626. } else {
  1627. return -EOPNOTSUPP;
  1628. }
  1629. }
  1630. if (ifindex) {
  1631. upper_dev = __dev_get_by_index(dev_net(dev), ifindex);
  1632. if (!upper_dev)
  1633. return -EINVAL;
  1634. ops = upper_dev->netdev_ops;
  1635. if (ops->ndo_add_slave) {
  1636. err = ops->ndo_add_slave(upper_dev, dev);
  1637. if (err)
  1638. return err;
  1639. } else {
  1640. return -EOPNOTSUPP;
  1641. }
  1642. }
  1643. return 0;
  1644. }
  1645. #define DO_SETLINK_MODIFIED 0x01
  1646. /* notify flag means notify + modified. */
  1647. #define DO_SETLINK_NOTIFY 0x03
  1648. static int do_setlink(const struct sk_buff *skb,
  1649. struct net_device *dev, struct ifinfomsg *ifm,
  1650. struct netlink_ext_ack *extack,
  1651. struct nlattr **tb, char *ifname, int status)
  1652. {
  1653. const struct net_device_ops *ops = dev->netdev_ops;
  1654. int err;
  1655. if (tb[IFLA_NET_NS_PID] || tb[IFLA_NET_NS_FD]) {
  1656. struct net *net = rtnl_link_get_net(dev_net(dev), tb);
  1657. if (IS_ERR(net)) {
  1658. err = PTR_ERR(net);
  1659. goto errout;
  1660. }
  1661. if (!netlink_ns_capable(skb, net->user_ns, CAP_NET_ADMIN)) {
  1662. put_net(net);
  1663. err = -EPERM;
  1664. goto errout;
  1665. }
  1666. err = dev_change_net_namespace(dev, net, ifname);
  1667. put_net(net);
  1668. if (err)
  1669. goto errout;
  1670. status |= DO_SETLINK_MODIFIED;
  1671. }
  1672. if (tb[IFLA_MAP]) {
  1673. struct rtnl_link_ifmap *u_map;
  1674. struct ifmap k_map;
  1675. if (!ops->ndo_set_config) {
  1676. err = -EOPNOTSUPP;
  1677. goto errout;
  1678. }
  1679. if (!netif_device_present(dev)) {
  1680. err = -ENODEV;
  1681. goto errout;
  1682. }
  1683. u_map = nla_data(tb[IFLA_MAP]);
  1684. k_map.mem_start = (unsigned long) u_map->mem_start;
  1685. k_map.mem_end = (unsigned long) u_map->mem_end;
  1686. k_map.base_addr = (unsigned short) u_map->base_addr;
  1687. k_map.irq = (unsigned char) u_map->irq;
  1688. k_map.dma = (unsigned char) u_map->dma;
  1689. k_map.port = (unsigned char) u_map->port;
  1690. err = ops->ndo_set_config(dev, &k_map);
  1691. if (err < 0)
  1692. goto errout;
  1693. status |= DO_SETLINK_NOTIFY;
  1694. }
  1695. if (tb[IFLA_ADDRESS]) {
  1696. struct sockaddr *sa;
  1697. int len;
  1698. len = sizeof(sa_family_t) + max_t(size_t, dev->addr_len,
  1699. sizeof(*sa));
  1700. sa = kmalloc(len, GFP_KERNEL);
  1701. if (!sa) {
  1702. err = -ENOMEM;
  1703. goto errout;
  1704. }
  1705. sa->sa_family = dev->type;
  1706. memcpy(sa->sa_data, nla_data(tb[IFLA_ADDRESS]),
  1707. dev->addr_len);
  1708. err = dev_set_mac_address(dev, sa);
  1709. kfree(sa);
  1710. if (err)
  1711. goto errout;
  1712. status |= DO_SETLINK_MODIFIED;
  1713. }
  1714. if (tb[IFLA_MTU]) {
  1715. err = dev_set_mtu(dev, nla_get_u32(tb[IFLA_MTU]));
  1716. if (err < 0)
  1717. goto errout;
  1718. status |= DO_SETLINK_MODIFIED;
  1719. }
  1720. if (tb[IFLA_GROUP]) {
  1721. dev_set_group(dev, nla_get_u32(tb[IFLA_GROUP]));
  1722. status |= DO_SETLINK_NOTIFY;
  1723. }
  1724. /*
  1725. * Interface selected by interface index but interface
  1726. * name provided implies that a name change has been
  1727. * requested.
  1728. */
  1729. if (ifm->ifi_index > 0 && ifname[0]) {
  1730. err = dev_change_name(dev, ifname);
  1731. if (err < 0)
  1732. goto errout;
  1733. status |= DO_SETLINK_MODIFIED;
  1734. }
  1735. if (tb[IFLA_IFALIAS]) {
  1736. err = dev_set_alias(dev, nla_data(tb[IFLA_IFALIAS]),
  1737. nla_len(tb[IFLA_IFALIAS]));
  1738. if (err < 0)
  1739. goto errout;
  1740. status |= DO_SETLINK_NOTIFY;
  1741. }
  1742. if (tb[IFLA_BROADCAST]) {
  1743. nla_memcpy(dev->broadcast, tb[IFLA_BROADCAST], dev->addr_len);
  1744. call_netdevice_notifiers(NETDEV_CHANGEADDR, dev);
  1745. }
  1746. if (ifm->ifi_flags || ifm->ifi_change) {
  1747. err = dev_change_flags(dev, rtnl_dev_combine_flags(dev, ifm));
  1748. if (err < 0)
  1749. goto errout;
  1750. }
  1751. if (tb[IFLA_MASTER]) {
  1752. err = do_set_master(dev, nla_get_u32(tb[IFLA_MASTER]));
  1753. if (err)
  1754. goto errout;
  1755. status |= DO_SETLINK_MODIFIED;
  1756. }
  1757. if (tb[IFLA_CARRIER]) {
  1758. err = dev_change_carrier(dev, nla_get_u8(tb[IFLA_CARRIER]));
  1759. if (err)
  1760. goto errout;
  1761. status |= DO_SETLINK_MODIFIED;
  1762. }
  1763. if (tb[IFLA_TXQLEN]) {
  1764. unsigned int value = nla_get_u32(tb[IFLA_TXQLEN]);
  1765. unsigned int orig_len = dev->tx_queue_len;
  1766. if (dev->tx_queue_len ^ value) {
  1767. dev->tx_queue_len = value;
  1768. err = call_netdevice_notifiers(
  1769. NETDEV_CHANGE_TX_QUEUE_LEN, dev);
  1770. err = notifier_to_errno(err);
  1771. if (err) {
  1772. dev->tx_queue_len = orig_len;
  1773. goto errout;
  1774. }
  1775. status |= DO_SETLINK_NOTIFY;
  1776. }
  1777. }
  1778. if (tb[IFLA_OPERSTATE])
  1779. set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE]));
  1780. if (tb[IFLA_LINKMODE]) {
  1781. unsigned char value = nla_get_u8(tb[IFLA_LINKMODE]);
  1782. write_lock_bh(&dev_base_lock);
  1783. if (dev->link_mode ^ value)
  1784. status |= DO_SETLINK_NOTIFY;
  1785. dev->link_mode = value;
  1786. write_unlock_bh(&dev_base_lock);
  1787. }
  1788. if (tb[IFLA_VFINFO_LIST]) {
  1789. struct nlattr *vfinfo[IFLA_VF_MAX + 1];
  1790. struct nlattr *attr;
  1791. int rem;
  1792. nla_for_each_nested(attr, tb[IFLA_VFINFO_LIST], rem) {
  1793. if (nla_type(attr) != IFLA_VF_INFO ||
  1794. nla_len(attr) < NLA_HDRLEN) {
  1795. err = -EINVAL;
  1796. goto errout;
  1797. }
  1798. err = nla_parse_nested(vfinfo, IFLA_VF_MAX, attr,
  1799. ifla_vf_policy, NULL);
  1800. if (err < 0)
  1801. goto errout;
  1802. err = do_setvfinfo(dev, vfinfo);
  1803. if (err < 0)
  1804. goto errout;
  1805. status |= DO_SETLINK_NOTIFY;
  1806. }
  1807. }
  1808. err = 0;
  1809. if (tb[IFLA_VF_PORTS]) {
  1810. struct nlattr *port[IFLA_PORT_MAX+1];
  1811. struct nlattr *attr;
  1812. int vf;
  1813. int rem;
  1814. err = -EOPNOTSUPP;
  1815. if (!ops->ndo_set_vf_port)
  1816. goto errout;
  1817. nla_for_each_nested(attr, tb[IFLA_VF_PORTS], rem) {
  1818. if (nla_type(attr) != IFLA_VF_PORT ||
  1819. nla_len(attr) < NLA_HDRLEN) {
  1820. err = -EINVAL;
  1821. goto errout;
  1822. }
  1823. err = nla_parse_nested(port, IFLA_PORT_MAX, attr,
  1824. ifla_port_policy, NULL);
  1825. if (err < 0)
  1826. goto errout;
  1827. if (!port[IFLA_PORT_VF]) {
  1828. err = -EOPNOTSUPP;
  1829. goto errout;
  1830. }
  1831. vf = nla_get_u32(port[IFLA_PORT_VF]);
  1832. err = ops->ndo_set_vf_port(dev, vf, port);
  1833. if (err < 0)
  1834. goto errout;
  1835. status |= DO_SETLINK_NOTIFY;
  1836. }
  1837. }
  1838. err = 0;
  1839. if (tb[IFLA_PORT_SELF]) {
  1840. struct nlattr *port[IFLA_PORT_MAX+1];
  1841. err = nla_parse_nested(port, IFLA_PORT_MAX,
  1842. tb[IFLA_PORT_SELF], ifla_port_policy,
  1843. NULL);
  1844. if (err < 0)
  1845. goto errout;
  1846. err = -EOPNOTSUPP;
  1847. if (ops->ndo_set_vf_port)
  1848. err = ops->ndo_set_vf_port(dev, PORT_SELF_VF, port);
  1849. if (err < 0)
  1850. goto errout;
  1851. status |= DO_SETLINK_NOTIFY;
  1852. }
  1853. if (tb[IFLA_AF_SPEC]) {
  1854. struct nlattr *af;
  1855. int rem;
  1856. nla_for_each_nested(af, tb[IFLA_AF_SPEC], rem) {
  1857. const struct rtnl_af_ops *af_ops;
  1858. if (!(af_ops = rtnl_af_lookup(nla_type(af))))
  1859. BUG();
  1860. err = af_ops->set_link_af(dev, af);
  1861. if (err < 0)
  1862. goto errout;
  1863. status |= DO_SETLINK_NOTIFY;
  1864. }
  1865. }
  1866. err = 0;
  1867. if (tb[IFLA_PROTO_DOWN]) {
  1868. err = dev_change_proto_down(dev,
  1869. nla_get_u8(tb[IFLA_PROTO_DOWN]));
  1870. if (err)
  1871. goto errout;
  1872. status |= DO_SETLINK_NOTIFY;
  1873. }
  1874. if (tb[IFLA_XDP]) {
  1875. struct nlattr *xdp[IFLA_XDP_MAX + 1];
  1876. u32 xdp_flags = 0;
  1877. err = nla_parse_nested(xdp, IFLA_XDP_MAX, tb[IFLA_XDP],
  1878. ifla_xdp_policy, NULL);
  1879. if (err < 0)
  1880. goto errout;
  1881. if (xdp[IFLA_XDP_ATTACHED] || xdp[IFLA_XDP_PROG_ID]) {
  1882. err = -EINVAL;
  1883. goto errout;
  1884. }
  1885. if (xdp[IFLA_XDP_FLAGS]) {
  1886. xdp_flags = nla_get_u32(xdp[IFLA_XDP_FLAGS]);
  1887. if (xdp_flags & ~XDP_FLAGS_MASK) {
  1888. err = -EINVAL;
  1889. goto errout;
  1890. }
  1891. if (hweight32(xdp_flags & XDP_FLAGS_MODES) > 1) {
  1892. err = -EINVAL;
  1893. goto errout;
  1894. }
  1895. }
  1896. if (xdp[IFLA_XDP_FD]) {
  1897. err = dev_change_xdp_fd(dev, extack,
  1898. nla_get_s32(xdp[IFLA_XDP_FD]),
  1899. xdp_flags);
  1900. if (err)
  1901. goto errout;
  1902. status |= DO_SETLINK_NOTIFY;
  1903. }
  1904. }
  1905. errout:
  1906. if (status & DO_SETLINK_MODIFIED) {
  1907. if (status & DO_SETLINK_NOTIFY)
  1908. netdev_state_change(dev);
  1909. if (err < 0)
  1910. net_warn_ratelimited("A link change request failed with some changes committed already. Interface %s may have been left with an inconsistent configuration, please check.\n",
  1911. dev->name);
  1912. }
  1913. return err;
  1914. }
  1915. static int rtnl_setlink(struct sk_buff *skb, struct nlmsghdr *nlh,
  1916. struct netlink_ext_ack *extack)
  1917. {
  1918. struct net *net = sock_net(skb->sk);
  1919. struct ifinfomsg *ifm;
  1920. struct net_device *dev;
  1921. int err;
  1922. struct nlattr *tb[IFLA_MAX+1];
  1923. char ifname[IFNAMSIZ];
  1924. err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFLA_MAX, ifla_policy,
  1925. extack);
  1926. if (err < 0)
  1927. goto errout;
  1928. if (tb[IFLA_IFNAME])
  1929. nla_strlcpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ);
  1930. else
  1931. ifname[0] = '\0';
  1932. err = -EINVAL;
  1933. ifm = nlmsg_data(nlh);
  1934. if (ifm->ifi_index > 0)
  1935. dev = __dev_get_by_index(net, ifm->ifi_index);
  1936. else if (tb[IFLA_IFNAME])
  1937. dev = __dev_get_by_name(net, ifname);
  1938. else
  1939. goto errout;
  1940. if (dev == NULL) {
  1941. err = -ENODEV;
  1942. goto errout;
  1943. }
  1944. err = validate_linkmsg(dev, tb);
  1945. if (err < 0)
  1946. goto errout;
  1947. err = do_setlink(skb, dev, ifm, extack, tb, ifname, 0);
  1948. errout:
  1949. return err;
  1950. }
  1951. static int rtnl_group_dellink(const struct net *net, int group)
  1952. {
  1953. struct net_device *dev, *aux;
  1954. LIST_HEAD(list_kill);
  1955. bool found = false;
  1956. if (!group)
  1957. return -EPERM;
  1958. for_each_netdev(net, dev) {
  1959. if (dev->group == group) {
  1960. const struct rtnl_link_ops *ops;
  1961. found = true;
  1962. ops = dev->rtnl_link_ops;
  1963. if (!ops || !ops->dellink)
  1964. return -EOPNOTSUPP;
  1965. }
  1966. }
  1967. if (!found)
  1968. return -ENODEV;
  1969. for_each_netdev_safe(net, dev, aux) {
  1970. if (dev->group == group) {
  1971. const struct rtnl_link_ops *ops;
  1972. ops = dev->rtnl_link_ops;
  1973. ops->dellink(dev, &list_kill);
  1974. }
  1975. }
  1976. unregister_netdevice_many(&list_kill);
  1977. return 0;
  1978. }
  1979. int rtnl_delete_link(struct net_device *dev)
  1980. {
  1981. const struct rtnl_link_ops *ops;
  1982. LIST_HEAD(list_kill);
  1983. ops = dev->rtnl_link_ops;
  1984. if (!ops || !ops->dellink)
  1985. return -EOPNOTSUPP;
  1986. ops->dellink(dev, &list_kill);
  1987. unregister_netdevice_many(&list_kill);
  1988. return 0;
  1989. }
  1990. EXPORT_SYMBOL_GPL(rtnl_delete_link);
  1991. static int rtnl_dellink(struct sk_buff *skb, struct nlmsghdr *nlh,
  1992. struct netlink_ext_ack *extack)
  1993. {
  1994. struct net *net = sock_net(skb->sk);
  1995. struct net_device *dev;
  1996. struct ifinfomsg *ifm;
  1997. char ifname[IFNAMSIZ];
  1998. struct nlattr *tb[IFLA_MAX+1];
  1999. int err;
  2000. err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFLA_MAX, ifla_policy, extack);
  2001. if (err < 0)
  2002. return err;
  2003. if (tb[IFLA_IFNAME])
  2004. nla_strlcpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ);
  2005. ifm = nlmsg_data(nlh);
  2006. if (ifm->ifi_index > 0)
  2007. dev = __dev_get_by_index(net, ifm->ifi_index);
  2008. else if (tb[IFLA_IFNAME])
  2009. dev = __dev_get_by_name(net, ifname);
  2010. else if (tb[IFLA_GROUP])
  2011. return rtnl_group_dellink(net, nla_get_u32(tb[IFLA_GROUP]));
  2012. else
  2013. return -EINVAL;
  2014. if (!dev)
  2015. return -ENODEV;
  2016. return rtnl_delete_link(dev);
  2017. }
  2018. int rtnl_configure_link(struct net_device *dev, const struct ifinfomsg *ifm)
  2019. {
  2020. unsigned int old_flags;
  2021. int err;
  2022. old_flags = dev->flags;
  2023. if (ifm && (ifm->ifi_flags || ifm->ifi_change)) {
  2024. err = __dev_change_flags(dev, rtnl_dev_combine_flags(dev, ifm));
  2025. if (err < 0)
  2026. return err;
  2027. }
  2028. dev->rtnl_link_state = RTNL_LINK_INITIALIZED;
  2029. __dev_notify_flags(dev, old_flags, ~0U);
  2030. return 0;
  2031. }
  2032. EXPORT_SYMBOL(rtnl_configure_link);
  2033. struct net_device *rtnl_create_link(struct net *net,
  2034. const char *ifname, unsigned char name_assign_type,
  2035. const struct rtnl_link_ops *ops, struct nlattr *tb[])
  2036. {
  2037. struct net_device *dev;
  2038. unsigned int num_tx_queues = 1;
  2039. unsigned int num_rx_queues = 1;
  2040. if (tb[IFLA_NUM_TX_QUEUES])
  2041. num_tx_queues = nla_get_u32(tb[IFLA_NUM_TX_QUEUES]);
  2042. else if (ops->get_num_tx_queues)
  2043. num_tx_queues = ops->get_num_tx_queues();
  2044. if (tb[IFLA_NUM_RX_QUEUES])
  2045. num_rx_queues = nla_get_u32(tb[IFLA_NUM_RX_QUEUES]);
  2046. else if (ops->get_num_rx_queues)
  2047. num_rx_queues = ops->get_num_rx_queues();
  2048. dev = alloc_netdev_mqs(ops->priv_size, ifname, name_assign_type,
  2049. ops->setup, num_tx_queues, num_rx_queues);
  2050. if (!dev)
  2051. return ERR_PTR(-ENOMEM);
  2052. dev_net_set(dev, net);
  2053. dev->rtnl_link_ops = ops;
  2054. dev->rtnl_link_state = RTNL_LINK_INITIALIZING;
  2055. if (tb[IFLA_MTU])
  2056. dev->mtu = nla_get_u32(tb[IFLA_MTU]);
  2057. if (tb[IFLA_ADDRESS]) {
  2058. memcpy(dev->dev_addr, nla_data(tb[IFLA_ADDRESS]),
  2059. nla_len(tb[IFLA_ADDRESS]));
  2060. dev->addr_assign_type = NET_ADDR_SET;
  2061. }
  2062. if (tb[IFLA_BROADCAST])
  2063. memcpy(dev->broadcast, nla_data(tb[IFLA_BROADCAST]),
  2064. nla_len(tb[IFLA_BROADCAST]));
  2065. if (tb[IFLA_TXQLEN])
  2066. dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]);
  2067. if (tb[IFLA_OPERSTATE])
  2068. set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE]));
  2069. if (tb[IFLA_LINKMODE])
  2070. dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]);
  2071. if (tb[IFLA_GROUP])
  2072. dev_set_group(dev, nla_get_u32(tb[IFLA_GROUP]));
  2073. return dev;
  2074. }
  2075. EXPORT_SYMBOL(rtnl_create_link);
  2076. static int rtnl_group_changelink(const struct sk_buff *skb,
  2077. struct net *net, int group,
  2078. struct ifinfomsg *ifm,
  2079. struct netlink_ext_ack *extack,
  2080. struct nlattr **tb)
  2081. {
  2082. struct net_device *dev, *aux;
  2083. int err;
  2084. for_each_netdev_safe(net, dev, aux) {
  2085. if (dev->group == group) {
  2086. err = do_setlink(skb, dev, ifm, extack, tb, NULL, 0);
  2087. if (err < 0)
  2088. return err;
  2089. }
  2090. }
  2091. return 0;
  2092. }
  2093. static int rtnl_newlink(struct sk_buff *skb, struct nlmsghdr *nlh,
  2094. struct netlink_ext_ack *extack)
  2095. {
  2096. struct net *net = sock_net(skb->sk);
  2097. const struct rtnl_link_ops *ops;
  2098. const struct rtnl_link_ops *m_ops = NULL;
  2099. struct net_device *dev;
  2100. struct net_device *master_dev = NULL;
  2101. struct ifinfomsg *ifm;
  2102. char kind[MODULE_NAME_LEN];
  2103. char ifname[IFNAMSIZ];
  2104. struct nlattr *tb[IFLA_MAX+1];
  2105. struct nlattr *linkinfo[IFLA_INFO_MAX+1];
  2106. unsigned char name_assign_type = NET_NAME_USER;
  2107. int err;
  2108. #ifdef CONFIG_MODULES
  2109. replay:
  2110. #endif
  2111. err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFLA_MAX, ifla_policy, extack);
  2112. if (err < 0)
  2113. return err;
  2114. if (tb[IFLA_IFNAME])
  2115. nla_strlcpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ);
  2116. else
  2117. ifname[0] = '\0';
  2118. ifm = nlmsg_data(nlh);
  2119. if (ifm->ifi_index > 0)
  2120. dev = __dev_get_by_index(net, ifm->ifi_index);
  2121. else {
  2122. if (ifname[0])
  2123. dev = __dev_get_by_name(net, ifname);
  2124. else
  2125. dev = NULL;
  2126. }
  2127. if (dev) {
  2128. master_dev = netdev_master_upper_dev_get(dev);
  2129. if (master_dev)
  2130. m_ops = master_dev->rtnl_link_ops;
  2131. }
  2132. err = validate_linkmsg(dev, tb);
  2133. if (err < 0)
  2134. return err;
  2135. if (tb[IFLA_LINKINFO]) {
  2136. err = nla_parse_nested(linkinfo, IFLA_INFO_MAX,
  2137. tb[IFLA_LINKINFO], ifla_info_policy,
  2138. NULL);
  2139. if (err < 0)
  2140. return err;
  2141. } else
  2142. memset(linkinfo, 0, sizeof(linkinfo));
  2143. if (linkinfo[IFLA_INFO_KIND]) {
  2144. nla_strlcpy(kind, linkinfo[IFLA_INFO_KIND], sizeof(kind));
  2145. ops = rtnl_link_ops_get(kind);
  2146. } else {
  2147. kind[0] = '\0';
  2148. ops = NULL;
  2149. }
  2150. if (1) {
  2151. struct nlattr *attr[ops ? ops->maxtype + 1 : 1];
  2152. struct nlattr *slave_attr[m_ops ? m_ops->slave_maxtype + 1 : 1];
  2153. struct nlattr **data = NULL;
  2154. struct nlattr **slave_data = NULL;
  2155. struct net *dest_net, *link_net = NULL;
  2156. if (ops) {
  2157. if (ops->maxtype && linkinfo[IFLA_INFO_DATA]) {
  2158. err = nla_parse_nested(attr, ops->maxtype,
  2159. linkinfo[IFLA_INFO_DATA],
  2160. ops->policy, NULL);
  2161. if (err < 0)
  2162. return err;
  2163. data = attr;
  2164. }
  2165. if (ops->validate) {
  2166. err = ops->validate(tb, data, extack);
  2167. if (err < 0)
  2168. return err;
  2169. }
  2170. }
  2171. if (m_ops) {
  2172. if (m_ops->slave_maxtype &&
  2173. linkinfo[IFLA_INFO_SLAVE_DATA]) {
  2174. err = nla_parse_nested(slave_attr,
  2175. m_ops->slave_maxtype,
  2176. linkinfo[IFLA_INFO_SLAVE_DATA],
  2177. m_ops->slave_policy,
  2178. NULL);
  2179. if (err < 0)
  2180. return err;
  2181. slave_data = slave_attr;
  2182. }
  2183. if (m_ops->slave_validate) {
  2184. err = m_ops->slave_validate(tb, slave_data,
  2185. extack);
  2186. if (err < 0)
  2187. return err;
  2188. }
  2189. }
  2190. if (dev) {
  2191. int status = 0;
  2192. if (nlh->nlmsg_flags & NLM_F_EXCL)
  2193. return -EEXIST;
  2194. if (nlh->nlmsg_flags & NLM_F_REPLACE)
  2195. return -EOPNOTSUPP;
  2196. if (linkinfo[IFLA_INFO_DATA]) {
  2197. if (!ops || ops != dev->rtnl_link_ops ||
  2198. !ops->changelink)
  2199. return -EOPNOTSUPP;
  2200. err = ops->changelink(dev, tb, data, extack);
  2201. if (err < 0)
  2202. return err;
  2203. status |= DO_SETLINK_NOTIFY;
  2204. }
  2205. if (linkinfo[IFLA_INFO_SLAVE_DATA]) {
  2206. if (!m_ops || !m_ops->slave_changelink)
  2207. return -EOPNOTSUPP;
  2208. err = m_ops->slave_changelink(master_dev, dev,
  2209. tb, slave_data,
  2210. extack);
  2211. if (err < 0)
  2212. return err;
  2213. status |= DO_SETLINK_NOTIFY;
  2214. }
  2215. return do_setlink(skb, dev, ifm, extack, tb, ifname,
  2216. status);
  2217. }
  2218. if (!(nlh->nlmsg_flags & NLM_F_CREATE)) {
  2219. if (ifm->ifi_index == 0 && tb[IFLA_GROUP])
  2220. return rtnl_group_changelink(skb, net,
  2221. nla_get_u32(tb[IFLA_GROUP]),
  2222. ifm, extack, tb);
  2223. return -ENODEV;
  2224. }
  2225. if (tb[IFLA_MAP] || tb[IFLA_PROTINFO])
  2226. return -EOPNOTSUPP;
  2227. if (!ops) {
  2228. #ifdef CONFIG_MODULES
  2229. if (kind[0]) {
  2230. __rtnl_unlock();
  2231. request_module("rtnl-link-%s", kind);
  2232. rtnl_lock();
  2233. ops = rtnl_link_ops_get(kind);
  2234. if (ops)
  2235. goto replay;
  2236. }
  2237. #endif
  2238. return -EOPNOTSUPP;
  2239. }
  2240. if (!ops->setup)
  2241. return -EOPNOTSUPP;
  2242. if (!ifname[0]) {
  2243. snprintf(ifname, IFNAMSIZ, "%s%%d", ops->kind);
  2244. name_assign_type = NET_NAME_ENUM;
  2245. }
  2246. dest_net = rtnl_link_get_net(net, tb);
  2247. if (IS_ERR(dest_net))
  2248. return PTR_ERR(dest_net);
  2249. err = -EPERM;
  2250. if (!netlink_ns_capable(skb, dest_net->user_ns, CAP_NET_ADMIN))
  2251. goto out;
  2252. if (tb[IFLA_LINK_NETNSID]) {
  2253. int id = nla_get_s32(tb[IFLA_LINK_NETNSID]);
  2254. link_net = get_net_ns_by_id(dest_net, id);
  2255. if (!link_net) {
  2256. err = -EINVAL;
  2257. goto out;
  2258. }
  2259. err = -EPERM;
  2260. if (!netlink_ns_capable(skb, link_net->user_ns, CAP_NET_ADMIN))
  2261. goto out;
  2262. }
  2263. dev = rtnl_create_link(link_net ? : dest_net, ifname,
  2264. name_assign_type, ops, tb);
  2265. if (IS_ERR(dev)) {
  2266. err = PTR_ERR(dev);
  2267. goto out;
  2268. }
  2269. dev->ifindex = ifm->ifi_index;
  2270. if (ops->newlink) {
  2271. err = ops->newlink(link_net ? : net, dev, tb, data,
  2272. extack);
  2273. /* Drivers should call free_netdev() in ->destructor
  2274. * and unregister it on failure after registration
  2275. * so that device could be finally freed in rtnl_unlock.
  2276. */
  2277. if (err < 0) {
  2278. /* If device is not registered at all, free it now */
  2279. if (dev->reg_state == NETREG_UNINITIALIZED)
  2280. free_netdev(dev);
  2281. goto out;
  2282. }
  2283. } else {
  2284. err = register_netdevice(dev);
  2285. if (err < 0) {
  2286. free_netdev(dev);
  2287. goto out;
  2288. }
  2289. }
  2290. err = rtnl_configure_link(dev, ifm);
  2291. if (err < 0)
  2292. goto out_unregister;
  2293. if (link_net) {
  2294. err = dev_change_net_namespace(dev, dest_net, ifname);
  2295. if (err < 0)
  2296. goto out_unregister;
  2297. }
  2298. if (tb[IFLA_MASTER]) {
  2299. err = do_set_master(dev, nla_get_u32(tb[IFLA_MASTER]));
  2300. if (err)
  2301. goto out_unregister;
  2302. }
  2303. out:
  2304. if (link_net)
  2305. put_net(link_net);
  2306. put_net(dest_net);
  2307. return err;
  2308. out_unregister:
  2309. if (ops->newlink) {
  2310. LIST_HEAD(list_kill);
  2311. ops->dellink(dev, &list_kill);
  2312. unregister_netdevice_many(&list_kill);
  2313. } else {
  2314. unregister_netdevice(dev);
  2315. }
  2316. goto out;
  2317. }
  2318. }
  2319. static int rtnl_getlink(struct sk_buff *skb, struct nlmsghdr *nlh,
  2320. struct netlink_ext_ack *extack)
  2321. {
  2322. struct net *net = sock_net(skb->sk);
  2323. struct ifinfomsg *ifm;
  2324. char ifname[IFNAMSIZ];
  2325. struct nlattr *tb[IFLA_MAX+1];
  2326. struct net_device *dev = NULL;
  2327. struct sk_buff *nskb;
  2328. int err;
  2329. u32 ext_filter_mask = 0;
  2330. err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFLA_MAX, ifla_policy, extack);
  2331. if (err < 0)
  2332. return err;
  2333. if (tb[IFLA_IFNAME])
  2334. nla_strlcpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ);
  2335. if (tb[IFLA_EXT_MASK])
  2336. ext_filter_mask = nla_get_u32(tb[IFLA_EXT_MASK]);
  2337. ifm = nlmsg_data(nlh);
  2338. if (ifm->ifi_index > 0)
  2339. dev = __dev_get_by_index(net, ifm->ifi_index);
  2340. else if (tb[IFLA_IFNAME])
  2341. dev = __dev_get_by_name(net, ifname);
  2342. else
  2343. return -EINVAL;
  2344. if (dev == NULL)
  2345. return -ENODEV;
  2346. nskb = nlmsg_new(if_nlmsg_size(dev, ext_filter_mask), GFP_KERNEL);
  2347. if (nskb == NULL)
  2348. return -ENOBUFS;
  2349. err = rtnl_fill_ifinfo(nskb, dev, RTM_NEWLINK, NETLINK_CB(skb).portid,
  2350. nlh->nlmsg_seq, 0, 0, ext_filter_mask, 0);
  2351. if (err < 0) {
  2352. /* -EMSGSIZE implies BUG in if_nlmsg_size */
  2353. WARN_ON(err == -EMSGSIZE);
  2354. kfree_skb(nskb);
  2355. } else
  2356. err = rtnl_unicast(nskb, net, NETLINK_CB(skb).portid);
  2357. return err;
  2358. }
  2359. static u16 rtnl_calcit(struct sk_buff *skb, struct nlmsghdr *nlh)
  2360. {
  2361. struct net *net = sock_net(skb->sk);
  2362. struct net_device *dev;
  2363. struct nlattr *tb[IFLA_MAX+1];
  2364. u32 ext_filter_mask = 0;
  2365. u16 min_ifinfo_dump_size = 0;
  2366. int hdrlen;
  2367. /* Same kernel<->userspace interface hack as in rtnl_dump_ifinfo. */
  2368. hdrlen = nlmsg_len(nlh) < sizeof(struct ifinfomsg) ?
  2369. sizeof(struct rtgenmsg) : sizeof(struct ifinfomsg);
  2370. if (nlmsg_parse(nlh, hdrlen, tb, IFLA_MAX, ifla_policy, NULL) >= 0) {
  2371. if (tb[IFLA_EXT_MASK])
  2372. ext_filter_mask = nla_get_u32(tb[IFLA_EXT_MASK]);
  2373. }
  2374. if (!ext_filter_mask)
  2375. return NLMSG_GOODSIZE;
  2376. /*
  2377. * traverse the list of net devices and compute the minimum
  2378. * buffer size based upon the filter mask.
  2379. */
  2380. rcu_read_lock();
  2381. for_each_netdev_rcu(net, dev) {
  2382. min_ifinfo_dump_size = max_t(u16, min_ifinfo_dump_size,
  2383. if_nlmsg_size(dev,
  2384. ext_filter_mask));
  2385. }
  2386. rcu_read_unlock();
  2387. return nlmsg_total_size(min_ifinfo_dump_size);
  2388. }
  2389. static int rtnl_dump_all(struct sk_buff *skb, struct netlink_callback *cb)
  2390. {
  2391. int idx;
  2392. int s_idx = cb->family;
  2393. if (s_idx == 0)
  2394. s_idx = 1;
  2395. for (idx = 1; idx <= RTNL_FAMILY_MAX; idx++) {
  2396. int type = cb->nlh->nlmsg_type-RTM_BASE;
  2397. struct rtnl_link *handlers;
  2398. rtnl_dumpit_func dumpit;
  2399. if (idx < s_idx || idx == PF_PACKET)
  2400. continue;
  2401. handlers = rtnl_dereference(rtnl_msg_handlers[idx]);
  2402. if (!handlers)
  2403. continue;
  2404. dumpit = READ_ONCE(handlers[type].dumpit);
  2405. if (!dumpit)
  2406. continue;
  2407. if (idx > s_idx) {
  2408. memset(&cb->args[0], 0, sizeof(cb->args));
  2409. cb->prev_seq = 0;
  2410. cb->seq = 0;
  2411. }
  2412. if (dumpit(skb, cb))
  2413. break;
  2414. }
  2415. cb->family = idx;
  2416. return skb->len;
  2417. }
  2418. struct sk_buff *rtmsg_ifinfo_build_skb(int type, struct net_device *dev,
  2419. unsigned int change,
  2420. u32 event, gfp_t flags)
  2421. {
  2422. struct net *net = dev_net(dev);
  2423. struct sk_buff *skb;
  2424. int err = -ENOBUFS;
  2425. size_t if_info_size;
  2426. skb = nlmsg_new((if_info_size = if_nlmsg_size(dev, 0)), flags);
  2427. if (skb == NULL)
  2428. goto errout;
  2429. err = rtnl_fill_ifinfo(skb, dev, type, 0, 0, change, 0, 0, event);
  2430. if (err < 0) {
  2431. /* -EMSGSIZE implies BUG in if_nlmsg_size() */
  2432. WARN_ON(err == -EMSGSIZE);
  2433. kfree_skb(skb);
  2434. goto errout;
  2435. }
  2436. return skb;
  2437. errout:
  2438. if (err < 0)
  2439. rtnl_set_sk_err(net, RTNLGRP_LINK, err);
  2440. return NULL;
  2441. }
  2442. void rtmsg_ifinfo_send(struct sk_buff *skb, struct net_device *dev, gfp_t flags)
  2443. {
  2444. struct net *net = dev_net(dev);
  2445. rtnl_notify(skb, net, 0, RTNLGRP_LINK, NULL, flags);
  2446. }
  2447. static void rtmsg_ifinfo_event(int type, struct net_device *dev,
  2448. unsigned int change, u32 event,
  2449. gfp_t flags)
  2450. {
  2451. struct sk_buff *skb;
  2452. if (dev->reg_state != NETREG_REGISTERED)
  2453. return;
  2454. skb = rtmsg_ifinfo_build_skb(type, dev, change, event, flags);
  2455. if (skb)
  2456. rtmsg_ifinfo_send(skb, dev, flags);
  2457. }
  2458. void rtmsg_ifinfo(int type, struct net_device *dev, unsigned int change,
  2459. gfp_t flags)
  2460. {
  2461. rtmsg_ifinfo_event(type, dev, change, rtnl_get_event(0), flags);
  2462. }
  2463. EXPORT_SYMBOL(rtmsg_ifinfo);
  2464. static int nlmsg_populate_fdb_fill(struct sk_buff *skb,
  2465. struct net_device *dev,
  2466. u8 *addr, u16 vid, u32 pid, u32 seq,
  2467. int type, unsigned int flags,
  2468. int nlflags, u16 ndm_state)
  2469. {
  2470. struct nlmsghdr *nlh;
  2471. struct ndmsg *ndm;
  2472. nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ndm), nlflags);
  2473. if (!nlh)
  2474. return -EMSGSIZE;
  2475. ndm = nlmsg_data(nlh);
  2476. ndm->ndm_family = AF_BRIDGE;
  2477. ndm->ndm_pad1 = 0;
  2478. ndm->ndm_pad2 = 0;
  2479. ndm->ndm_flags = flags;
  2480. ndm->ndm_type = 0;
  2481. ndm->ndm_ifindex = dev->ifindex;
  2482. ndm->ndm_state = ndm_state;
  2483. if (nla_put(skb, NDA_LLADDR, ETH_ALEN, addr))
  2484. goto nla_put_failure;
  2485. if (vid)
  2486. if (nla_put(skb, NDA_VLAN, sizeof(u16), &vid))
  2487. goto nla_put_failure;
  2488. nlmsg_end(skb, nlh);
  2489. return 0;
  2490. nla_put_failure:
  2491. nlmsg_cancel(skb, nlh);
  2492. return -EMSGSIZE;
  2493. }
  2494. static inline size_t rtnl_fdb_nlmsg_size(void)
  2495. {
  2496. return NLMSG_ALIGN(sizeof(struct ndmsg)) +
  2497. nla_total_size(ETH_ALEN) + /* NDA_LLADDR */
  2498. nla_total_size(sizeof(u16)) + /* NDA_VLAN */
  2499. 0;
  2500. }
  2501. static void rtnl_fdb_notify(struct net_device *dev, u8 *addr, u16 vid, int type,
  2502. u16 ndm_state)
  2503. {
  2504. struct net *net = dev_net(dev);
  2505. struct sk_buff *skb;
  2506. int err = -ENOBUFS;
  2507. skb = nlmsg_new(rtnl_fdb_nlmsg_size(), GFP_ATOMIC);
  2508. if (!skb)
  2509. goto errout;
  2510. err = nlmsg_populate_fdb_fill(skb, dev, addr, vid,
  2511. 0, 0, type, NTF_SELF, 0, ndm_state);
  2512. if (err < 0) {
  2513. kfree_skb(skb);
  2514. goto errout;
  2515. }
  2516. rtnl_notify(skb, net, 0, RTNLGRP_NEIGH, NULL, GFP_ATOMIC);
  2517. return;
  2518. errout:
  2519. rtnl_set_sk_err(net, RTNLGRP_NEIGH, err);
  2520. }
  2521. /**
  2522. * ndo_dflt_fdb_add - default netdevice operation to add an FDB entry
  2523. */
  2524. int ndo_dflt_fdb_add(struct ndmsg *ndm,
  2525. struct nlattr *tb[],
  2526. struct net_device *dev,
  2527. const unsigned char *addr, u16 vid,
  2528. u16 flags)
  2529. {
  2530. int err = -EINVAL;
  2531. /* If aging addresses are supported device will need to
  2532. * implement its own handler for this.
  2533. */
  2534. if (ndm->ndm_state && !(ndm->ndm_state & NUD_PERMANENT)) {
  2535. pr_info("%s: FDB only supports static addresses\n", dev->name);
  2536. return err;
  2537. }
  2538. if (vid) {
  2539. pr_info("%s: vlans aren't supported yet for dev_uc|mc_add()\n", dev->name);
  2540. return err;
  2541. }
  2542. if (is_unicast_ether_addr(addr) || is_link_local_ether_addr(addr))
  2543. err = dev_uc_add_excl(dev, addr);
  2544. else if (is_multicast_ether_addr(addr))
  2545. err = dev_mc_add_excl(dev, addr);
  2546. /* Only return duplicate errors if NLM_F_EXCL is set */
  2547. if (err == -EEXIST && !(flags & NLM_F_EXCL))
  2548. err = 0;
  2549. return err;
  2550. }
  2551. EXPORT_SYMBOL(ndo_dflt_fdb_add);
  2552. static int fdb_vid_parse(struct nlattr *vlan_attr, u16 *p_vid)
  2553. {
  2554. u16 vid = 0;
  2555. if (vlan_attr) {
  2556. if (nla_len(vlan_attr) != sizeof(u16)) {
  2557. pr_info("PF_BRIDGE: RTM_NEWNEIGH with invalid vlan\n");
  2558. return -EINVAL;
  2559. }
  2560. vid = nla_get_u16(vlan_attr);
  2561. if (!vid || vid >= VLAN_VID_MASK) {
  2562. pr_info("PF_BRIDGE: RTM_NEWNEIGH with invalid vlan id %d\n",
  2563. vid);
  2564. return -EINVAL;
  2565. }
  2566. }
  2567. *p_vid = vid;
  2568. return 0;
  2569. }
  2570. static int rtnl_fdb_add(struct sk_buff *skb, struct nlmsghdr *nlh,
  2571. struct netlink_ext_ack *extack)
  2572. {
  2573. struct net *net = sock_net(skb->sk);
  2574. struct ndmsg *ndm;
  2575. struct nlattr *tb[NDA_MAX+1];
  2576. struct net_device *dev;
  2577. u8 *addr;
  2578. u16 vid;
  2579. int err;
  2580. err = nlmsg_parse(nlh, sizeof(*ndm), tb, NDA_MAX, NULL, extack);
  2581. if (err < 0)
  2582. return err;
  2583. ndm = nlmsg_data(nlh);
  2584. if (ndm->ndm_ifindex == 0) {
  2585. pr_info("PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex\n");
  2586. return -EINVAL;
  2587. }
  2588. dev = __dev_get_by_index(net, ndm->ndm_ifindex);
  2589. if (dev == NULL) {
  2590. pr_info("PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex\n");
  2591. return -ENODEV;
  2592. }
  2593. if (!tb[NDA_LLADDR] || nla_len(tb[NDA_LLADDR]) != ETH_ALEN) {
  2594. pr_info("PF_BRIDGE: RTM_NEWNEIGH with invalid address\n");
  2595. return -EINVAL;
  2596. }
  2597. addr = nla_data(tb[NDA_LLADDR]);
  2598. err = fdb_vid_parse(tb[NDA_VLAN], &vid);
  2599. if (err)
  2600. return err;
  2601. err = -EOPNOTSUPP;
  2602. /* Support fdb on master device the net/bridge default case */
  2603. if ((!ndm->ndm_flags || ndm->ndm_flags & NTF_MASTER) &&
  2604. (dev->priv_flags & IFF_BRIDGE_PORT)) {
  2605. struct net_device *br_dev = netdev_master_upper_dev_get(dev);
  2606. const struct net_device_ops *ops = br_dev->netdev_ops;
  2607. err = ops->ndo_fdb_add(ndm, tb, dev, addr, vid,
  2608. nlh->nlmsg_flags);
  2609. if (err)
  2610. goto out;
  2611. else
  2612. ndm->ndm_flags &= ~NTF_MASTER;
  2613. }
  2614. /* Embedded bridge, macvlan, and any other device support */
  2615. if ((ndm->ndm_flags & NTF_SELF)) {
  2616. if (dev->netdev_ops->ndo_fdb_add)
  2617. err = dev->netdev_ops->ndo_fdb_add(ndm, tb, dev, addr,
  2618. vid,
  2619. nlh->nlmsg_flags);
  2620. else
  2621. err = ndo_dflt_fdb_add(ndm, tb, dev, addr, vid,
  2622. nlh->nlmsg_flags);
  2623. if (!err) {
  2624. rtnl_fdb_notify(dev, addr, vid, RTM_NEWNEIGH,
  2625. ndm->ndm_state);
  2626. ndm->ndm_flags &= ~NTF_SELF;
  2627. }
  2628. }
  2629. out:
  2630. return err;
  2631. }
  2632. /**
  2633. * ndo_dflt_fdb_del - default netdevice operation to delete an FDB entry
  2634. */
  2635. int ndo_dflt_fdb_del(struct ndmsg *ndm,
  2636. struct nlattr *tb[],
  2637. struct net_device *dev,
  2638. const unsigned char *addr, u16 vid)
  2639. {
  2640. int err = -EINVAL;
  2641. /* If aging addresses are supported device will need to
  2642. * implement its own handler for this.
  2643. */
  2644. if (!(ndm->ndm_state & NUD_PERMANENT)) {
  2645. pr_info("%s: FDB only supports static addresses\n", dev->name);
  2646. return err;
  2647. }
  2648. if (is_unicast_ether_addr(addr) || is_link_local_ether_addr(addr))
  2649. err = dev_uc_del(dev, addr);
  2650. else if (is_multicast_ether_addr(addr))
  2651. err = dev_mc_del(dev, addr);
  2652. return err;
  2653. }
  2654. EXPORT_SYMBOL(ndo_dflt_fdb_del);
  2655. static int rtnl_fdb_del(struct sk_buff *skb, struct nlmsghdr *nlh,
  2656. struct netlink_ext_ack *extack)
  2657. {
  2658. struct net *net = sock_net(skb->sk);
  2659. struct ndmsg *ndm;
  2660. struct nlattr *tb[NDA_MAX+1];
  2661. struct net_device *dev;
  2662. int err = -EINVAL;
  2663. __u8 *addr;
  2664. u16 vid;
  2665. if (!netlink_capable(skb, CAP_NET_ADMIN))
  2666. return -EPERM;
  2667. err = nlmsg_parse(nlh, sizeof(*ndm), tb, NDA_MAX, NULL, extack);
  2668. if (err < 0)
  2669. return err;
  2670. ndm = nlmsg_data(nlh);
  2671. if (ndm->ndm_ifindex == 0) {
  2672. pr_info("PF_BRIDGE: RTM_DELNEIGH with invalid ifindex\n");
  2673. return -EINVAL;
  2674. }
  2675. dev = __dev_get_by_index(net, ndm->ndm_ifindex);
  2676. if (dev == NULL) {
  2677. pr_info("PF_BRIDGE: RTM_DELNEIGH with unknown ifindex\n");
  2678. return -ENODEV;
  2679. }
  2680. if (!tb[NDA_LLADDR] || nla_len(tb[NDA_LLADDR]) != ETH_ALEN) {
  2681. pr_info("PF_BRIDGE: RTM_DELNEIGH with invalid address\n");
  2682. return -EINVAL;
  2683. }
  2684. addr = nla_data(tb[NDA_LLADDR]);
  2685. err = fdb_vid_parse(tb[NDA_VLAN], &vid);
  2686. if (err)
  2687. return err;
  2688. err = -EOPNOTSUPP;
  2689. /* Support fdb on master device the net/bridge default case */
  2690. if ((!ndm->ndm_flags || ndm->ndm_flags & NTF_MASTER) &&
  2691. (dev->priv_flags & IFF_BRIDGE_PORT)) {
  2692. struct net_device *br_dev = netdev_master_upper_dev_get(dev);
  2693. const struct net_device_ops *ops = br_dev->netdev_ops;
  2694. if (ops->ndo_fdb_del)
  2695. err = ops->ndo_fdb_del(ndm, tb, dev, addr, vid);
  2696. if (err)
  2697. goto out;
  2698. else
  2699. ndm->ndm_flags &= ~NTF_MASTER;
  2700. }
  2701. /* Embedded bridge, macvlan, and any other device support */
  2702. if (ndm->ndm_flags & NTF_SELF) {
  2703. if (dev->netdev_ops->ndo_fdb_del)
  2704. err = dev->netdev_ops->ndo_fdb_del(ndm, tb, dev, addr,
  2705. vid);
  2706. else
  2707. err = ndo_dflt_fdb_del(ndm, tb, dev, addr, vid);
  2708. if (!err) {
  2709. rtnl_fdb_notify(dev, addr, vid, RTM_DELNEIGH,
  2710. ndm->ndm_state);
  2711. ndm->ndm_flags &= ~NTF_SELF;
  2712. }
  2713. }
  2714. out:
  2715. return err;
  2716. }
  2717. static int nlmsg_populate_fdb(struct sk_buff *skb,
  2718. struct netlink_callback *cb,
  2719. struct net_device *dev,
  2720. int *idx,
  2721. struct netdev_hw_addr_list *list)
  2722. {
  2723. struct netdev_hw_addr *ha;
  2724. int err;
  2725. u32 portid, seq;
  2726. portid = NETLINK_CB(cb->skb).portid;
  2727. seq = cb->nlh->nlmsg_seq;
  2728. list_for_each_entry(ha, &list->list, list) {
  2729. if (*idx < cb->args[2])
  2730. goto skip;
  2731. err = nlmsg_populate_fdb_fill(skb, dev, ha->addr, 0,
  2732. portid, seq,
  2733. RTM_NEWNEIGH, NTF_SELF,
  2734. NLM_F_MULTI, NUD_PERMANENT);
  2735. if (err < 0)
  2736. return err;
  2737. skip:
  2738. *idx += 1;
  2739. }
  2740. return 0;
  2741. }
  2742. /**
  2743. * ndo_dflt_fdb_dump - default netdevice operation to dump an FDB table.
  2744. * @nlh: netlink message header
  2745. * @dev: netdevice
  2746. *
  2747. * Default netdevice operation to dump the existing unicast address list.
  2748. * Returns number of addresses from list put in skb.
  2749. */
  2750. int ndo_dflt_fdb_dump(struct sk_buff *skb,
  2751. struct netlink_callback *cb,
  2752. struct net_device *dev,
  2753. struct net_device *filter_dev,
  2754. int *idx)
  2755. {
  2756. int err;
  2757. netif_addr_lock_bh(dev);
  2758. err = nlmsg_populate_fdb(skb, cb, dev, idx, &dev->uc);
  2759. if (err)
  2760. goto out;
  2761. err = nlmsg_populate_fdb(skb, cb, dev, idx, &dev->mc);
  2762. out:
  2763. netif_addr_unlock_bh(dev);
  2764. return err;
  2765. }
  2766. EXPORT_SYMBOL(ndo_dflt_fdb_dump);
  2767. static int rtnl_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb)
  2768. {
  2769. struct net_device *dev;
  2770. struct nlattr *tb[IFLA_MAX+1];
  2771. struct net_device *br_dev = NULL;
  2772. const struct net_device_ops *ops = NULL;
  2773. const struct net_device_ops *cops = NULL;
  2774. struct ifinfomsg *ifm = nlmsg_data(cb->nlh);
  2775. struct net *net = sock_net(skb->sk);
  2776. struct hlist_head *head;
  2777. int brport_idx = 0;
  2778. int br_idx = 0;
  2779. int h, s_h;
  2780. int idx = 0, s_idx;
  2781. int err = 0;
  2782. int fidx = 0;
  2783. err = nlmsg_parse(cb->nlh, sizeof(struct ifinfomsg), tb,
  2784. IFLA_MAX, ifla_policy, NULL);
  2785. if (err < 0) {
  2786. return -EINVAL;
  2787. } else if (err == 0) {
  2788. if (tb[IFLA_MASTER])
  2789. br_idx = nla_get_u32(tb[IFLA_MASTER]);
  2790. }
  2791. brport_idx = ifm->ifi_index;
  2792. if (br_idx) {
  2793. br_dev = __dev_get_by_index(net, br_idx);
  2794. if (!br_dev)
  2795. return -ENODEV;
  2796. ops = br_dev->netdev_ops;
  2797. }
  2798. s_h = cb->args[0];
  2799. s_idx = cb->args[1];
  2800. for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
  2801. idx = 0;
  2802. head = &net->dev_index_head[h];
  2803. hlist_for_each_entry(dev, head, index_hlist) {
  2804. if (brport_idx && (dev->ifindex != brport_idx))
  2805. continue;
  2806. if (!br_idx) { /* user did not specify a specific bridge */
  2807. if (dev->priv_flags & IFF_BRIDGE_PORT) {
  2808. br_dev = netdev_master_upper_dev_get(dev);
  2809. cops = br_dev->netdev_ops;
  2810. }
  2811. } else {
  2812. if (dev != br_dev &&
  2813. !(dev->priv_flags & IFF_BRIDGE_PORT))
  2814. continue;
  2815. if (br_dev != netdev_master_upper_dev_get(dev) &&
  2816. !(dev->priv_flags & IFF_EBRIDGE))
  2817. continue;
  2818. cops = ops;
  2819. }
  2820. if (idx < s_idx)
  2821. goto cont;
  2822. if (dev->priv_flags & IFF_BRIDGE_PORT) {
  2823. if (cops && cops->ndo_fdb_dump) {
  2824. err = cops->ndo_fdb_dump(skb, cb,
  2825. br_dev, dev,
  2826. &fidx);
  2827. if (err == -EMSGSIZE)
  2828. goto out;
  2829. }
  2830. }
  2831. if (dev->netdev_ops->ndo_fdb_dump)
  2832. err = dev->netdev_ops->ndo_fdb_dump(skb, cb,
  2833. dev, NULL,
  2834. &fidx);
  2835. else
  2836. err = ndo_dflt_fdb_dump(skb, cb, dev, NULL,
  2837. &fidx);
  2838. if (err == -EMSGSIZE)
  2839. goto out;
  2840. cops = NULL;
  2841. /* reset fdb offset to 0 for rest of the interfaces */
  2842. cb->args[2] = 0;
  2843. fidx = 0;
  2844. cont:
  2845. idx++;
  2846. }
  2847. }
  2848. out:
  2849. cb->args[0] = h;
  2850. cb->args[1] = idx;
  2851. cb->args[2] = fidx;
  2852. return skb->len;
  2853. }
  2854. static int brport_nla_put_flag(struct sk_buff *skb, u32 flags, u32 mask,
  2855. unsigned int attrnum, unsigned int flag)
  2856. {
  2857. if (mask & flag)
  2858. return nla_put_u8(skb, attrnum, !!(flags & flag));
  2859. return 0;
  2860. }
  2861. int ndo_dflt_bridge_getlink(struct sk_buff *skb, u32 pid, u32 seq,
  2862. struct net_device *dev, u16 mode,
  2863. u32 flags, u32 mask, int nlflags,
  2864. u32 filter_mask,
  2865. int (*vlan_fill)(struct sk_buff *skb,
  2866. struct net_device *dev,
  2867. u32 filter_mask))
  2868. {
  2869. struct nlmsghdr *nlh;
  2870. struct ifinfomsg *ifm;
  2871. struct nlattr *br_afspec;
  2872. struct nlattr *protinfo;
  2873. u8 operstate = netif_running(dev) ? dev->operstate : IF_OPER_DOWN;
  2874. struct net_device *br_dev = netdev_master_upper_dev_get(dev);
  2875. int err = 0;
  2876. nlh = nlmsg_put(skb, pid, seq, RTM_NEWLINK, sizeof(*ifm), nlflags);
  2877. if (nlh == NULL)
  2878. return -EMSGSIZE;
  2879. ifm = nlmsg_data(nlh);
  2880. ifm->ifi_family = AF_BRIDGE;
  2881. ifm->__ifi_pad = 0;
  2882. ifm->ifi_type = dev->type;
  2883. ifm->ifi_index = dev->ifindex;
  2884. ifm->ifi_flags = dev_get_flags(dev);
  2885. ifm->ifi_change = 0;
  2886. if (nla_put_string(skb, IFLA_IFNAME, dev->name) ||
  2887. nla_put_u32(skb, IFLA_MTU, dev->mtu) ||
  2888. nla_put_u8(skb, IFLA_OPERSTATE, operstate) ||
  2889. (br_dev &&
  2890. nla_put_u32(skb, IFLA_MASTER, br_dev->ifindex)) ||
  2891. (dev->addr_len &&
  2892. nla_put(skb, IFLA_ADDRESS, dev->addr_len, dev->dev_addr)) ||
  2893. (dev->ifindex != dev_get_iflink(dev) &&
  2894. nla_put_u32(skb, IFLA_LINK, dev_get_iflink(dev))))
  2895. goto nla_put_failure;
  2896. br_afspec = nla_nest_start(skb, IFLA_AF_SPEC);
  2897. if (!br_afspec)
  2898. goto nla_put_failure;
  2899. if (nla_put_u16(skb, IFLA_BRIDGE_FLAGS, BRIDGE_FLAGS_SELF)) {
  2900. nla_nest_cancel(skb, br_afspec);
  2901. goto nla_put_failure;
  2902. }
  2903. if (mode != BRIDGE_MODE_UNDEF) {
  2904. if (nla_put_u16(skb, IFLA_BRIDGE_MODE, mode)) {
  2905. nla_nest_cancel(skb, br_afspec);
  2906. goto nla_put_failure;
  2907. }
  2908. }
  2909. if (vlan_fill) {
  2910. err = vlan_fill(skb, dev, filter_mask);
  2911. if (err) {
  2912. nla_nest_cancel(skb, br_afspec);
  2913. goto nla_put_failure;
  2914. }
  2915. }
  2916. nla_nest_end(skb, br_afspec);
  2917. protinfo = nla_nest_start(skb, IFLA_PROTINFO | NLA_F_NESTED);
  2918. if (!protinfo)
  2919. goto nla_put_failure;
  2920. if (brport_nla_put_flag(skb, flags, mask,
  2921. IFLA_BRPORT_MODE, BR_HAIRPIN_MODE) ||
  2922. brport_nla_put_flag(skb, flags, mask,
  2923. IFLA_BRPORT_GUARD, BR_BPDU_GUARD) ||
  2924. brport_nla_put_flag(skb, flags, mask,
  2925. IFLA_BRPORT_FAST_LEAVE,
  2926. BR_MULTICAST_FAST_LEAVE) ||
  2927. brport_nla_put_flag(skb, flags, mask,
  2928. IFLA_BRPORT_PROTECT, BR_ROOT_BLOCK) ||
  2929. brport_nla_put_flag(skb, flags, mask,
  2930. IFLA_BRPORT_LEARNING, BR_LEARNING) ||
  2931. brport_nla_put_flag(skb, flags, mask,
  2932. IFLA_BRPORT_LEARNING_SYNC, BR_LEARNING_SYNC) ||
  2933. brport_nla_put_flag(skb, flags, mask,
  2934. IFLA_BRPORT_UNICAST_FLOOD, BR_FLOOD) ||
  2935. brport_nla_put_flag(skb, flags, mask,
  2936. IFLA_BRPORT_PROXYARP, BR_PROXYARP)) {
  2937. nla_nest_cancel(skb, protinfo);
  2938. goto nla_put_failure;
  2939. }
  2940. nla_nest_end(skb, protinfo);
  2941. nlmsg_end(skb, nlh);
  2942. return 0;
  2943. nla_put_failure:
  2944. nlmsg_cancel(skb, nlh);
  2945. return err ? err : -EMSGSIZE;
  2946. }
  2947. EXPORT_SYMBOL_GPL(ndo_dflt_bridge_getlink);
  2948. static int rtnl_bridge_getlink(struct sk_buff *skb, struct netlink_callback *cb)
  2949. {
  2950. struct net *net = sock_net(skb->sk);
  2951. struct net_device *dev;
  2952. int idx = 0;
  2953. u32 portid = NETLINK_CB(cb->skb).portid;
  2954. u32 seq = cb->nlh->nlmsg_seq;
  2955. u32 filter_mask = 0;
  2956. int err;
  2957. if (nlmsg_len(cb->nlh) > sizeof(struct ifinfomsg)) {
  2958. struct nlattr *extfilt;
  2959. extfilt = nlmsg_find_attr(cb->nlh, sizeof(struct ifinfomsg),
  2960. IFLA_EXT_MASK);
  2961. if (extfilt) {
  2962. if (nla_len(extfilt) < sizeof(filter_mask))
  2963. return -EINVAL;
  2964. filter_mask = nla_get_u32(extfilt);
  2965. }
  2966. }
  2967. rcu_read_lock();
  2968. for_each_netdev_rcu(net, dev) {
  2969. const struct net_device_ops *ops = dev->netdev_ops;
  2970. struct net_device *br_dev = netdev_master_upper_dev_get(dev);
  2971. if (br_dev && br_dev->netdev_ops->ndo_bridge_getlink) {
  2972. if (idx >= cb->args[0]) {
  2973. err = br_dev->netdev_ops->ndo_bridge_getlink(
  2974. skb, portid, seq, dev,
  2975. filter_mask, NLM_F_MULTI);
  2976. if (err < 0 && err != -EOPNOTSUPP) {
  2977. if (likely(skb->len))
  2978. break;
  2979. goto out_err;
  2980. }
  2981. }
  2982. idx++;
  2983. }
  2984. if (ops->ndo_bridge_getlink) {
  2985. if (idx >= cb->args[0]) {
  2986. err = ops->ndo_bridge_getlink(skb, portid,
  2987. seq, dev,
  2988. filter_mask,
  2989. NLM_F_MULTI);
  2990. if (err < 0 && err != -EOPNOTSUPP) {
  2991. if (likely(skb->len))
  2992. break;
  2993. goto out_err;
  2994. }
  2995. }
  2996. idx++;
  2997. }
  2998. }
  2999. err = skb->len;
  3000. out_err:
  3001. rcu_read_unlock();
  3002. cb->args[0] = idx;
  3003. return err;
  3004. }
  3005. static inline size_t bridge_nlmsg_size(void)
  3006. {
  3007. return NLMSG_ALIGN(sizeof(struct ifinfomsg))
  3008. + nla_total_size(IFNAMSIZ) /* IFLA_IFNAME */
  3009. + nla_total_size(MAX_ADDR_LEN) /* IFLA_ADDRESS */
  3010. + nla_total_size(sizeof(u32)) /* IFLA_MASTER */
  3011. + nla_total_size(sizeof(u32)) /* IFLA_MTU */
  3012. + nla_total_size(sizeof(u32)) /* IFLA_LINK */
  3013. + nla_total_size(sizeof(u32)) /* IFLA_OPERSTATE */
  3014. + nla_total_size(sizeof(u8)) /* IFLA_PROTINFO */
  3015. + nla_total_size(sizeof(struct nlattr)) /* IFLA_AF_SPEC */
  3016. + nla_total_size(sizeof(u16)) /* IFLA_BRIDGE_FLAGS */
  3017. + nla_total_size(sizeof(u16)); /* IFLA_BRIDGE_MODE */
  3018. }
  3019. static int rtnl_bridge_notify(struct net_device *dev)
  3020. {
  3021. struct net *net = dev_net(dev);
  3022. struct sk_buff *skb;
  3023. int err = -EOPNOTSUPP;
  3024. if (!dev->netdev_ops->ndo_bridge_getlink)
  3025. return 0;
  3026. skb = nlmsg_new(bridge_nlmsg_size(), GFP_ATOMIC);
  3027. if (!skb) {
  3028. err = -ENOMEM;
  3029. goto errout;
  3030. }
  3031. err = dev->netdev_ops->ndo_bridge_getlink(skb, 0, 0, dev, 0, 0);
  3032. if (err < 0)
  3033. goto errout;
  3034. if (!skb->len)
  3035. goto errout;
  3036. rtnl_notify(skb, net, 0, RTNLGRP_LINK, NULL, GFP_ATOMIC);
  3037. return 0;
  3038. errout:
  3039. WARN_ON(err == -EMSGSIZE);
  3040. kfree_skb(skb);
  3041. if (err)
  3042. rtnl_set_sk_err(net, RTNLGRP_LINK, err);
  3043. return err;
  3044. }
  3045. static int rtnl_bridge_setlink(struct sk_buff *skb, struct nlmsghdr *nlh,
  3046. struct netlink_ext_ack *extack)
  3047. {
  3048. struct net *net = sock_net(skb->sk);
  3049. struct ifinfomsg *ifm;
  3050. struct net_device *dev;
  3051. struct nlattr *br_spec, *attr = NULL;
  3052. int rem, err = -EOPNOTSUPP;
  3053. u16 flags = 0;
  3054. bool have_flags = false;
  3055. if (nlmsg_len(nlh) < sizeof(*ifm))
  3056. return -EINVAL;
  3057. ifm = nlmsg_data(nlh);
  3058. if (ifm->ifi_family != AF_BRIDGE)
  3059. return -EPFNOSUPPORT;
  3060. dev = __dev_get_by_index(net, ifm->ifi_index);
  3061. if (!dev) {
  3062. pr_info("PF_BRIDGE: RTM_SETLINK with unknown ifindex\n");
  3063. return -ENODEV;
  3064. }
  3065. br_spec = nlmsg_find_attr(nlh, sizeof(struct ifinfomsg), IFLA_AF_SPEC);
  3066. if (br_spec) {
  3067. nla_for_each_nested(attr, br_spec, rem) {
  3068. if (nla_type(attr) == IFLA_BRIDGE_FLAGS) {
  3069. if (nla_len(attr) < sizeof(flags))
  3070. return -EINVAL;
  3071. have_flags = true;
  3072. flags = nla_get_u16(attr);
  3073. break;
  3074. }
  3075. }
  3076. }
  3077. if (!flags || (flags & BRIDGE_FLAGS_MASTER)) {
  3078. struct net_device *br_dev = netdev_master_upper_dev_get(dev);
  3079. if (!br_dev || !br_dev->netdev_ops->ndo_bridge_setlink) {
  3080. err = -EOPNOTSUPP;
  3081. goto out;
  3082. }
  3083. err = br_dev->netdev_ops->ndo_bridge_setlink(dev, nlh, flags);
  3084. if (err)
  3085. goto out;
  3086. flags &= ~BRIDGE_FLAGS_MASTER;
  3087. }
  3088. if ((flags & BRIDGE_FLAGS_SELF)) {
  3089. if (!dev->netdev_ops->ndo_bridge_setlink)
  3090. err = -EOPNOTSUPP;
  3091. else
  3092. err = dev->netdev_ops->ndo_bridge_setlink(dev, nlh,
  3093. flags);
  3094. if (!err) {
  3095. flags &= ~BRIDGE_FLAGS_SELF;
  3096. /* Generate event to notify upper layer of bridge
  3097. * change
  3098. */
  3099. err = rtnl_bridge_notify(dev);
  3100. }
  3101. }
  3102. if (have_flags)
  3103. memcpy(nla_data(attr), &flags, sizeof(flags));
  3104. out:
  3105. return err;
  3106. }
  3107. static int rtnl_bridge_dellink(struct sk_buff *skb, struct nlmsghdr *nlh,
  3108. struct netlink_ext_ack *extack)
  3109. {
  3110. struct net *net = sock_net(skb->sk);
  3111. struct ifinfomsg *ifm;
  3112. struct net_device *dev;
  3113. struct nlattr *br_spec, *attr = NULL;
  3114. int rem, err = -EOPNOTSUPP;
  3115. u16 flags = 0;
  3116. bool have_flags = false;
  3117. if (nlmsg_len(nlh) < sizeof(*ifm))
  3118. return -EINVAL;
  3119. ifm = nlmsg_data(nlh);
  3120. if (ifm->ifi_family != AF_BRIDGE)
  3121. return -EPFNOSUPPORT;
  3122. dev = __dev_get_by_index(net, ifm->ifi_index);
  3123. if (!dev) {
  3124. pr_info("PF_BRIDGE: RTM_SETLINK with unknown ifindex\n");
  3125. return -ENODEV;
  3126. }
  3127. br_spec = nlmsg_find_attr(nlh, sizeof(struct ifinfomsg), IFLA_AF_SPEC);
  3128. if (br_spec) {
  3129. nla_for_each_nested(attr, br_spec, rem) {
  3130. if (nla_type(attr) == IFLA_BRIDGE_FLAGS) {
  3131. if (nla_len(attr) < sizeof(flags))
  3132. return -EINVAL;
  3133. have_flags = true;
  3134. flags = nla_get_u16(attr);
  3135. break;
  3136. }
  3137. }
  3138. }
  3139. if (!flags || (flags & BRIDGE_FLAGS_MASTER)) {
  3140. struct net_device *br_dev = netdev_master_upper_dev_get(dev);
  3141. if (!br_dev || !br_dev->netdev_ops->ndo_bridge_dellink) {
  3142. err = -EOPNOTSUPP;
  3143. goto out;
  3144. }
  3145. err = br_dev->netdev_ops->ndo_bridge_dellink(dev, nlh, flags);
  3146. if (err)
  3147. goto out;
  3148. flags &= ~BRIDGE_FLAGS_MASTER;
  3149. }
  3150. if ((flags & BRIDGE_FLAGS_SELF)) {
  3151. if (!dev->netdev_ops->ndo_bridge_dellink)
  3152. err = -EOPNOTSUPP;
  3153. else
  3154. err = dev->netdev_ops->ndo_bridge_dellink(dev, nlh,
  3155. flags);
  3156. if (!err) {
  3157. flags &= ~BRIDGE_FLAGS_SELF;
  3158. /* Generate event to notify upper layer of bridge
  3159. * change
  3160. */
  3161. err = rtnl_bridge_notify(dev);
  3162. }
  3163. }
  3164. if (have_flags)
  3165. memcpy(nla_data(attr), &flags, sizeof(flags));
  3166. out:
  3167. return err;
  3168. }
  3169. static bool stats_attr_valid(unsigned int mask, int attrid, int idxattr)
  3170. {
  3171. return (mask & IFLA_STATS_FILTER_BIT(attrid)) &&
  3172. (!idxattr || idxattr == attrid);
  3173. }
  3174. #define IFLA_OFFLOAD_XSTATS_FIRST (IFLA_OFFLOAD_XSTATS_UNSPEC + 1)
  3175. static int rtnl_get_offload_stats_attr_size(int attr_id)
  3176. {
  3177. switch (attr_id) {
  3178. case IFLA_OFFLOAD_XSTATS_CPU_HIT:
  3179. return sizeof(struct rtnl_link_stats64);
  3180. }
  3181. return 0;
  3182. }
  3183. static int rtnl_get_offload_stats(struct sk_buff *skb, struct net_device *dev,
  3184. int *prividx)
  3185. {
  3186. struct nlattr *attr = NULL;
  3187. int attr_id, size;
  3188. void *attr_data;
  3189. int err;
  3190. if (!(dev->netdev_ops && dev->netdev_ops->ndo_has_offload_stats &&
  3191. dev->netdev_ops->ndo_get_offload_stats))
  3192. return -ENODATA;
  3193. for (attr_id = IFLA_OFFLOAD_XSTATS_FIRST;
  3194. attr_id <= IFLA_OFFLOAD_XSTATS_MAX; attr_id++) {
  3195. if (attr_id < *prividx)
  3196. continue;
  3197. size = rtnl_get_offload_stats_attr_size(attr_id);
  3198. if (!size)
  3199. continue;
  3200. if (!dev->netdev_ops->ndo_has_offload_stats(dev, attr_id))
  3201. continue;
  3202. attr = nla_reserve_64bit(skb, attr_id, size,
  3203. IFLA_OFFLOAD_XSTATS_UNSPEC);
  3204. if (!attr)
  3205. goto nla_put_failure;
  3206. attr_data = nla_data(attr);
  3207. memset(attr_data, 0, size);
  3208. err = dev->netdev_ops->ndo_get_offload_stats(attr_id, dev,
  3209. attr_data);
  3210. if (err)
  3211. goto get_offload_stats_failure;
  3212. }
  3213. if (!attr)
  3214. return -ENODATA;
  3215. *prividx = 0;
  3216. return 0;
  3217. nla_put_failure:
  3218. err = -EMSGSIZE;
  3219. get_offload_stats_failure:
  3220. *prividx = attr_id;
  3221. return err;
  3222. }
  3223. static int rtnl_get_offload_stats_size(const struct net_device *dev)
  3224. {
  3225. int nla_size = 0;
  3226. int attr_id;
  3227. int size;
  3228. if (!(dev->netdev_ops && dev->netdev_ops->ndo_has_offload_stats &&
  3229. dev->netdev_ops->ndo_get_offload_stats))
  3230. return 0;
  3231. for (attr_id = IFLA_OFFLOAD_XSTATS_FIRST;
  3232. attr_id <= IFLA_OFFLOAD_XSTATS_MAX; attr_id++) {
  3233. if (!dev->netdev_ops->ndo_has_offload_stats(dev, attr_id))
  3234. continue;
  3235. size = rtnl_get_offload_stats_attr_size(attr_id);
  3236. nla_size += nla_total_size_64bit(size);
  3237. }
  3238. if (nla_size != 0)
  3239. nla_size += nla_total_size(0);
  3240. return nla_size;
  3241. }
  3242. static int rtnl_fill_statsinfo(struct sk_buff *skb, struct net_device *dev,
  3243. int type, u32 pid, u32 seq, u32 change,
  3244. unsigned int flags, unsigned int filter_mask,
  3245. int *idxattr, int *prividx)
  3246. {
  3247. struct if_stats_msg *ifsm;
  3248. struct nlmsghdr *nlh;
  3249. struct nlattr *attr;
  3250. int s_prividx = *prividx;
  3251. int err;
  3252. ASSERT_RTNL();
  3253. nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ifsm), flags);
  3254. if (!nlh)
  3255. return -EMSGSIZE;
  3256. ifsm = nlmsg_data(nlh);
  3257. ifsm->ifindex = dev->ifindex;
  3258. ifsm->filter_mask = filter_mask;
  3259. if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_64, *idxattr)) {
  3260. struct rtnl_link_stats64 *sp;
  3261. attr = nla_reserve_64bit(skb, IFLA_STATS_LINK_64,
  3262. sizeof(struct rtnl_link_stats64),
  3263. IFLA_STATS_UNSPEC);
  3264. if (!attr)
  3265. goto nla_put_failure;
  3266. sp = nla_data(attr);
  3267. dev_get_stats(dev, sp);
  3268. }
  3269. if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_XSTATS, *idxattr)) {
  3270. const struct rtnl_link_ops *ops = dev->rtnl_link_ops;
  3271. if (ops && ops->fill_linkxstats) {
  3272. *idxattr = IFLA_STATS_LINK_XSTATS;
  3273. attr = nla_nest_start(skb,
  3274. IFLA_STATS_LINK_XSTATS);
  3275. if (!attr)
  3276. goto nla_put_failure;
  3277. err = ops->fill_linkxstats(skb, dev, prividx, *idxattr);
  3278. nla_nest_end(skb, attr);
  3279. if (err)
  3280. goto nla_put_failure;
  3281. *idxattr = 0;
  3282. }
  3283. }
  3284. if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_XSTATS_SLAVE,
  3285. *idxattr)) {
  3286. const struct rtnl_link_ops *ops = NULL;
  3287. const struct net_device *master;
  3288. master = netdev_master_upper_dev_get(dev);
  3289. if (master)
  3290. ops = master->rtnl_link_ops;
  3291. if (ops && ops->fill_linkxstats) {
  3292. *idxattr = IFLA_STATS_LINK_XSTATS_SLAVE;
  3293. attr = nla_nest_start(skb,
  3294. IFLA_STATS_LINK_XSTATS_SLAVE);
  3295. if (!attr)
  3296. goto nla_put_failure;
  3297. err = ops->fill_linkxstats(skb, dev, prividx, *idxattr);
  3298. nla_nest_end(skb, attr);
  3299. if (err)
  3300. goto nla_put_failure;
  3301. *idxattr = 0;
  3302. }
  3303. }
  3304. if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_OFFLOAD_XSTATS,
  3305. *idxattr)) {
  3306. *idxattr = IFLA_STATS_LINK_OFFLOAD_XSTATS;
  3307. attr = nla_nest_start(skb, IFLA_STATS_LINK_OFFLOAD_XSTATS);
  3308. if (!attr)
  3309. goto nla_put_failure;
  3310. err = rtnl_get_offload_stats(skb, dev, prividx);
  3311. if (err == -ENODATA)
  3312. nla_nest_cancel(skb, attr);
  3313. else
  3314. nla_nest_end(skb, attr);
  3315. if (err && err != -ENODATA)
  3316. goto nla_put_failure;
  3317. *idxattr = 0;
  3318. }
  3319. if (stats_attr_valid(filter_mask, IFLA_STATS_AF_SPEC, *idxattr)) {
  3320. struct rtnl_af_ops *af_ops;
  3321. *idxattr = IFLA_STATS_AF_SPEC;
  3322. attr = nla_nest_start(skb, IFLA_STATS_AF_SPEC);
  3323. if (!attr)
  3324. goto nla_put_failure;
  3325. list_for_each_entry(af_ops, &rtnl_af_ops, list) {
  3326. if (af_ops->fill_stats_af) {
  3327. struct nlattr *af;
  3328. int err;
  3329. af = nla_nest_start(skb, af_ops->family);
  3330. if (!af)
  3331. goto nla_put_failure;
  3332. err = af_ops->fill_stats_af(skb, dev);
  3333. if (err == -ENODATA)
  3334. nla_nest_cancel(skb, af);
  3335. else if (err < 0)
  3336. goto nla_put_failure;
  3337. nla_nest_end(skb, af);
  3338. }
  3339. }
  3340. nla_nest_end(skb, attr);
  3341. *idxattr = 0;
  3342. }
  3343. nlmsg_end(skb, nlh);
  3344. return 0;
  3345. nla_put_failure:
  3346. /* not a multi message or no progress mean a real error */
  3347. if (!(flags & NLM_F_MULTI) || s_prividx == *prividx)
  3348. nlmsg_cancel(skb, nlh);
  3349. else
  3350. nlmsg_end(skb, nlh);
  3351. return -EMSGSIZE;
  3352. }
  3353. static size_t if_nlmsg_stats_size(const struct net_device *dev,
  3354. u32 filter_mask)
  3355. {
  3356. size_t size = 0;
  3357. if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_64, 0))
  3358. size += nla_total_size_64bit(sizeof(struct rtnl_link_stats64));
  3359. if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_XSTATS, 0)) {
  3360. const struct rtnl_link_ops *ops = dev->rtnl_link_ops;
  3361. int attr = IFLA_STATS_LINK_XSTATS;
  3362. if (ops && ops->get_linkxstats_size) {
  3363. size += nla_total_size(ops->get_linkxstats_size(dev,
  3364. attr));
  3365. /* for IFLA_STATS_LINK_XSTATS */
  3366. size += nla_total_size(0);
  3367. }
  3368. }
  3369. if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_XSTATS_SLAVE, 0)) {
  3370. struct net_device *_dev = (struct net_device *)dev;
  3371. const struct rtnl_link_ops *ops = NULL;
  3372. const struct net_device *master;
  3373. /* netdev_master_upper_dev_get can't take const */
  3374. master = netdev_master_upper_dev_get(_dev);
  3375. if (master)
  3376. ops = master->rtnl_link_ops;
  3377. if (ops && ops->get_linkxstats_size) {
  3378. int attr = IFLA_STATS_LINK_XSTATS_SLAVE;
  3379. size += nla_total_size(ops->get_linkxstats_size(dev,
  3380. attr));
  3381. /* for IFLA_STATS_LINK_XSTATS_SLAVE */
  3382. size += nla_total_size(0);
  3383. }
  3384. }
  3385. if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_OFFLOAD_XSTATS, 0))
  3386. size += rtnl_get_offload_stats_size(dev);
  3387. if (stats_attr_valid(filter_mask, IFLA_STATS_AF_SPEC, 0)) {
  3388. struct rtnl_af_ops *af_ops;
  3389. /* for IFLA_STATS_AF_SPEC */
  3390. size += nla_total_size(0);
  3391. list_for_each_entry(af_ops, &rtnl_af_ops, list) {
  3392. if (af_ops->get_stats_af_size) {
  3393. size += nla_total_size(
  3394. af_ops->get_stats_af_size(dev));
  3395. /* for AF_* */
  3396. size += nla_total_size(0);
  3397. }
  3398. }
  3399. }
  3400. return size;
  3401. }
  3402. static int rtnl_stats_get(struct sk_buff *skb, struct nlmsghdr *nlh,
  3403. struct netlink_ext_ack *extack)
  3404. {
  3405. struct net *net = sock_net(skb->sk);
  3406. struct net_device *dev = NULL;
  3407. int idxattr = 0, prividx = 0;
  3408. struct if_stats_msg *ifsm;
  3409. struct sk_buff *nskb;
  3410. u32 filter_mask;
  3411. int err;
  3412. if (nlmsg_len(nlh) < sizeof(*ifsm))
  3413. return -EINVAL;
  3414. ifsm = nlmsg_data(nlh);
  3415. if (ifsm->ifindex > 0)
  3416. dev = __dev_get_by_index(net, ifsm->ifindex);
  3417. else
  3418. return -EINVAL;
  3419. if (!dev)
  3420. return -ENODEV;
  3421. filter_mask = ifsm->filter_mask;
  3422. if (!filter_mask)
  3423. return -EINVAL;
  3424. nskb = nlmsg_new(if_nlmsg_stats_size(dev, filter_mask), GFP_KERNEL);
  3425. if (!nskb)
  3426. return -ENOBUFS;
  3427. err = rtnl_fill_statsinfo(nskb, dev, RTM_NEWSTATS,
  3428. NETLINK_CB(skb).portid, nlh->nlmsg_seq, 0,
  3429. 0, filter_mask, &idxattr, &prividx);
  3430. if (err < 0) {
  3431. /* -EMSGSIZE implies BUG in if_nlmsg_stats_size */
  3432. WARN_ON(err == -EMSGSIZE);
  3433. kfree_skb(nskb);
  3434. } else {
  3435. err = rtnl_unicast(nskb, net, NETLINK_CB(skb).portid);
  3436. }
  3437. return err;
  3438. }
  3439. static int rtnl_stats_dump(struct sk_buff *skb, struct netlink_callback *cb)
  3440. {
  3441. int h, s_h, err, s_idx, s_idxattr, s_prividx;
  3442. struct net *net = sock_net(skb->sk);
  3443. unsigned int flags = NLM_F_MULTI;
  3444. struct if_stats_msg *ifsm;
  3445. struct hlist_head *head;
  3446. struct net_device *dev;
  3447. u32 filter_mask = 0;
  3448. int idx = 0;
  3449. s_h = cb->args[0];
  3450. s_idx = cb->args[1];
  3451. s_idxattr = cb->args[2];
  3452. s_prividx = cb->args[3];
  3453. cb->seq = net->dev_base_seq;
  3454. if (nlmsg_len(cb->nlh) < sizeof(*ifsm))
  3455. return -EINVAL;
  3456. ifsm = nlmsg_data(cb->nlh);
  3457. filter_mask = ifsm->filter_mask;
  3458. if (!filter_mask)
  3459. return -EINVAL;
  3460. for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
  3461. idx = 0;
  3462. head = &net->dev_index_head[h];
  3463. hlist_for_each_entry(dev, head, index_hlist) {
  3464. if (idx < s_idx)
  3465. goto cont;
  3466. err = rtnl_fill_statsinfo(skb, dev, RTM_NEWSTATS,
  3467. NETLINK_CB(cb->skb).portid,
  3468. cb->nlh->nlmsg_seq, 0,
  3469. flags, filter_mask,
  3470. &s_idxattr, &s_prividx);
  3471. /* If we ran out of room on the first message,
  3472. * we're in trouble
  3473. */
  3474. WARN_ON((err == -EMSGSIZE) && (skb->len == 0));
  3475. if (err < 0)
  3476. goto out;
  3477. s_prividx = 0;
  3478. s_idxattr = 0;
  3479. nl_dump_check_consistent(cb, nlmsg_hdr(skb));
  3480. cont:
  3481. idx++;
  3482. }
  3483. }
  3484. out:
  3485. cb->args[3] = s_prividx;
  3486. cb->args[2] = s_idxattr;
  3487. cb->args[1] = idx;
  3488. cb->args[0] = h;
  3489. return skb->len;
  3490. }
  3491. /* Process one rtnetlink message. */
  3492. static int rtnetlink_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh,
  3493. struct netlink_ext_ack *extack)
  3494. {
  3495. struct net *net = sock_net(skb->sk);
  3496. struct rtnl_link *handlers;
  3497. int err = -EOPNOTSUPP;
  3498. rtnl_doit_func doit;
  3499. unsigned int flags;
  3500. int kind;
  3501. int family;
  3502. int type;
  3503. type = nlh->nlmsg_type;
  3504. if (type > RTM_MAX)
  3505. return -EOPNOTSUPP;
  3506. type -= RTM_BASE;
  3507. /* All the messages must have at least 1 byte length */
  3508. if (nlmsg_len(nlh) < sizeof(struct rtgenmsg))
  3509. return 0;
  3510. family = ((struct rtgenmsg *)nlmsg_data(nlh))->rtgen_family;
  3511. kind = type&3;
  3512. if (kind != 2 && !netlink_net_capable(skb, CAP_NET_ADMIN))
  3513. return -EPERM;
  3514. if (family > ARRAY_SIZE(rtnl_msg_handlers))
  3515. family = PF_UNSPEC;
  3516. rcu_read_lock();
  3517. handlers = rcu_dereference(rtnl_msg_handlers[family]);
  3518. if (!handlers) {
  3519. family = PF_UNSPEC;
  3520. handlers = rcu_dereference(rtnl_msg_handlers[family]);
  3521. }
  3522. if (kind == 2 && nlh->nlmsg_flags&NLM_F_DUMP) {
  3523. struct sock *rtnl;
  3524. rtnl_dumpit_func dumpit;
  3525. u16 min_dump_alloc = 0;
  3526. dumpit = READ_ONCE(handlers[type].dumpit);
  3527. if (!dumpit) {
  3528. family = PF_UNSPEC;
  3529. handlers = rcu_dereference(rtnl_msg_handlers[PF_UNSPEC]);
  3530. if (!handlers)
  3531. goto err_unlock;
  3532. dumpit = READ_ONCE(handlers[type].dumpit);
  3533. if (!dumpit)
  3534. goto err_unlock;
  3535. }
  3536. refcount_inc(&rtnl_msg_handlers_ref[family]);
  3537. if (type == RTM_GETLINK)
  3538. min_dump_alloc = rtnl_calcit(skb, nlh);
  3539. rcu_read_unlock();
  3540. rtnl = net->rtnl;
  3541. {
  3542. struct netlink_dump_control c = {
  3543. .dump = dumpit,
  3544. .min_dump_alloc = min_dump_alloc,
  3545. };
  3546. err = netlink_dump_start(rtnl, skb, nlh, &c);
  3547. }
  3548. refcount_dec(&rtnl_msg_handlers_ref[family]);
  3549. return err;
  3550. }
  3551. flags = READ_ONCE(handlers[type].flags);
  3552. if (flags & RTNL_FLAG_DOIT_UNLOCKED) {
  3553. refcount_inc(&rtnl_msg_handlers_ref[family]);
  3554. doit = READ_ONCE(handlers[type].doit);
  3555. rcu_read_unlock();
  3556. if (doit)
  3557. err = doit(skb, nlh, extack);
  3558. refcount_dec(&rtnl_msg_handlers_ref[family]);
  3559. return err;
  3560. }
  3561. rcu_read_unlock();
  3562. rtnl_lock();
  3563. handlers = rtnl_dereference(rtnl_msg_handlers[family]);
  3564. if (handlers) {
  3565. doit = READ_ONCE(handlers[type].doit);
  3566. if (doit)
  3567. err = doit(skb, nlh, extack);
  3568. }
  3569. rtnl_unlock();
  3570. return err;
  3571. err_unlock:
  3572. rcu_read_unlock();
  3573. return -EOPNOTSUPP;
  3574. }
  3575. static void rtnetlink_rcv(struct sk_buff *skb)
  3576. {
  3577. netlink_rcv_skb(skb, &rtnetlink_rcv_msg);
  3578. }
  3579. static int rtnetlink_bind(struct net *net, int group)
  3580. {
  3581. switch (group) {
  3582. case RTNLGRP_IPV4_MROUTE_R:
  3583. case RTNLGRP_IPV6_MROUTE_R:
  3584. if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
  3585. return -EPERM;
  3586. break;
  3587. }
  3588. return 0;
  3589. }
  3590. static int rtnetlink_event(struct notifier_block *this, unsigned long event, void *ptr)
  3591. {
  3592. struct net_device *dev = netdev_notifier_info_to_dev(ptr);
  3593. switch (event) {
  3594. case NETDEV_REBOOT:
  3595. case NETDEV_CHANGEADDR:
  3596. case NETDEV_CHANGENAME:
  3597. case NETDEV_FEAT_CHANGE:
  3598. case NETDEV_BONDING_FAILOVER:
  3599. case NETDEV_NOTIFY_PEERS:
  3600. case NETDEV_RESEND_IGMP:
  3601. case NETDEV_CHANGEINFODATA:
  3602. rtmsg_ifinfo_event(RTM_NEWLINK, dev, 0, rtnl_get_event(event),
  3603. GFP_KERNEL);
  3604. break;
  3605. default:
  3606. break;
  3607. }
  3608. return NOTIFY_DONE;
  3609. }
  3610. static struct notifier_block rtnetlink_dev_notifier = {
  3611. .notifier_call = rtnetlink_event,
  3612. };
  3613. static int __net_init rtnetlink_net_init(struct net *net)
  3614. {
  3615. struct sock *sk;
  3616. struct netlink_kernel_cfg cfg = {
  3617. .groups = RTNLGRP_MAX,
  3618. .input = rtnetlink_rcv,
  3619. .cb_mutex = &rtnl_mutex,
  3620. .flags = NL_CFG_F_NONROOT_RECV,
  3621. .bind = rtnetlink_bind,
  3622. };
  3623. sk = netlink_kernel_create(net, NETLINK_ROUTE, &cfg);
  3624. if (!sk)
  3625. return -ENOMEM;
  3626. net->rtnl = sk;
  3627. return 0;
  3628. }
  3629. static void __net_exit rtnetlink_net_exit(struct net *net)
  3630. {
  3631. netlink_kernel_release(net->rtnl);
  3632. net->rtnl = NULL;
  3633. }
  3634. static struct pernet_operations rtnetlink_net_ops = {
  3635. .init = rtnetlink_net_init,
  3636. .exit = rtnetlink_net_exit,
  3637. };
  3638. void __init rtnetlink_init(void)
  3639. {
  3640. if (register_pernet_subsys(&rtnetlink_net_ops))
  3641. panic("rtnetlink_init: cannot initialize rtnetlink\n");
  3642. register_netdevice_notifier(&rtnetlink_dev_notifier);
  3643. rtnl_register(PF_UNSPEC, RTM_GETLINK, rtnl_getlink,
  3644. rtnl_dump_ifinfo, 0);
  3645. rtnl_register(PF_UNSPEC, RTM_SETLINK, rtnl_setlink, NULL, 0);
  3646. rtnl_register(PF_UNSPEC, RTM_NEWLINK, rtnl_newlink, NULL, 0);
  3647. rtnl_register(PF_UNSPEC, RTM_DELLINK, rtnl_dellink, NULL, 0);
  3648. rtnl_register(PF_UNSPEC, RTM_GETADDR, NULL, rtnl_dump_all, 0);
  3649. rtnl_register(PF_UNSPEC, RTM_GETROUTE, NULL, rtnl_dump_all, 0);
  3650. rtnl_register(PF_UNSPEC, RTM_GETNETCONF, NULL, rtnl_dump_all, 0);
  3651. rtnl_register(PF_BRIDGE, RTM_NEWNEIGH, rtnl_fdb_add, NULL, 0);
  3652. rtnl_register(PF_BRIDGE, RTM_DELNEIGH, rtnl_fdb_del, NULL, 0);
  3653. rtnl_register(PF_BRIDGE, RTM_GETNEIGH, NULL, rtnl_fdb_dump, 0);
  3654. rtnl_register(PF_BRIDGE, RTM_GETLINK, NULL, rtnl_bridge_getlink, 0);
  3655. rtnl_register(PF_BRIDGE, RTM_DELLINK, rtnl_bridge_dellink, NULL, 0);
  3656. rtnl_register(PF_BRIDGE, RTM_SETLINK, rtnl_bridge_setlink, NULL, 0);
  3657. rtnl_register(PF_UNSPEC, RTM_GETSTATS, rtnl_stats_get, rtnl_stats_dump,
  3658. 0);
  3659. }