Jakub Kicinski | c7d759e | 2020-07-09 17:42:47 -0700 | [diff] [blame^] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
| 2 | |
| 3 | #include <linux/ethtool_netlink.h> |
| 4 | #include <net/udp_tunnel.h> |
| 5 | |
| 6 | #include "bitset.h" |
| 7 | #include "common.h" |
| 8 | #include "netlink.h" |
| 9 | |
| 10 | static const struct nla_policy |
| 11 | ethtool_tunnel_info_policy[ETHTOOL_A_TUNNEL_INFO_MAX + 1] = { |
| 12 | [ETHTOOL_A_TUNNEL_INFO_UNSPEC] = { .type = NLA_REJECT }, |
| 13 | [ETHTOOL_A_TUNNEL_INFO_HEADER] = { .type = NLA_NESTED }, |
| 14 | }; |
| 15 | |
| 16 | static_assert(ETHTOOL_UDP_TUNNEL_TYPE_VXLAN == ilog2(UDP_TUNNEL_TYPE_VXLAN)); |
| 17 | static_assert(ETHTOOL_UDP_TUNNEL_TYPE_GENEVE == ilog2(UDP_TUNNEL_TYPE_GENEVE)); |
| 18 | static_assert(ETHTOOL_UDP_TUNNEL_TYPE_VXLAN_GPE == |
| 19 | ilog2(UDP_TUNNEL_TYPE_VXLAN_GPE)); |
| 20 | |
| 21 | static ssize_t |
| 22 | ethnl_tunnel_info_reply_size(const struct ethnl_req_info *req_base, |
| 23 | struct netlink_ext_ack *extack) |
| 24 | { |
| 25 | bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS; |
| 26 | const struct udp_tunnel_nic_info *info; |
| 27 | unsigned int i; |
| 28 | size_t size; |
| 29 | int ret; |
| 30 | |
| 31 | info = req_base->dev->udp_tunnel_nic_info; |
| 32 | if (!info) { |
| 33 | NL_SET_ERR_MSG(extack, |
| 34 | "device does not report tunnel offload info"); |
| 35 | return -EOPNOTSUPP; |
| 36 | } |
| 37 | |
| 38 | size = nla_total_size(0); /* _INFO_UDP_PORTS */ |
| 39 | |
| 40 | for (i = 0; i < UDP_TUNNEL_NIC_MAX_TABLES; i++) { |
| 41 | if (!info->tables[i].n_entries) |
| 42 | return size; |
| 43 | |
| 44 | size += nla_total_size(0); /* _UDP_TABLE */ |
| 45 | size += nla_total_size(sizeof(u32)); /* _UDP_TABLE_SIZE */ |
| 46 | ret = ethnl_bitset32_size(&info->tables[i].tunnel_types, NULL, |
| 47 | __ETHTOOL_UDP_TUNNEL_TYPE_CNT, |
| 48 | udp_tunnel_type_names, compact); |
| 49 | if (ret < 0) |
| 50 | return ret; |
| 51 | size += ret; |
| 52 | |
| 53 | size += udp_tunnel_nic_dump_size(req_base->dev, i); |
| 54 | } |
| 55 | |
| 56 | return size; |
| 57 | } |
| 58 | |
| 59 | static int |
| 60 | ethnl_tunnel_info_fill_reply(const struct ethnl_req_info *req_base, |
| 61 | struct sk_buff *skb) |
| 62 | { |
| 63 | bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS; |
| 64 | const struct udp_tunnel_nic_info *info; |
| 65 | struct nlattr *ports, *table; |
| 66 | unsigned int i; |
| 67 | |
| 68 | info = req_base->dev->udp_tunnel_nic_info; |
| 69 | if (!info) |
| 70 | return -EOPNOTSUPP; |
| 71 | |
| 72 | ports = nla_nest_start(skb, ETHTOOL_A_TUNNEL_INFO_UDP_PORTS); |
| 73 | if (!ports) |
| 74 | return -EMSGSIZE; |
| 75 | |
| 76 | for (i = 0; i < UDP_TUNNEL_NIC_MAX_TABLES; i++) { |
| 77 | if (!info->tables[i].n_entries) |
| 78 | break; |
| 79 | |
| 80 | table = nla_nest_start(skb, ETHTOOL_A_TUNNEL_UDP_TABLE); |
| 81 | if (!table) |
| 82 | goto err_cancel_ports; |
| 83 | |
| 84 | if (nla_put_u32(skb, ETHTOOL_A_TUNNEL_UDP_TABLE_SIZE, |
| 85 | info->tables[i].n_entries)) |
| 86 | goto err_cancel_table; |
| 87 | |
| 88 | if (ethnl_put_bitset32(skb, ETHTOOL_A_TUNNEL_UDP_TABLE_TYPES, |
| 89 | &info->tables[i].tunnel_types, NULL, |
| 90 | __ETHTOOL_UDP_TUNNEL_TYPE_CNT, |
| 91 | udp_tunnel_type_names, compact)) |
| 92 | goto err_cancel_table; |
| 93 | |
| 94 | if (udp_tunnel_nic_dump_write(req_base->dev, i, skb)) |
| 95 | goto err_cancel_table; |
| 96 | |
| 97 | nla_nest_end(skb, table); |
| 98 | } |
| 99 | |
| 100 | nla_nest_end(skb, ports); |
| 101 | |
| 102 | return 0; |
| 103 | |
| 104 | err_cancel_table: |
| 105 | nla_nest_cancel(skb, table); |
| 106 | err_cancel_ports: |
| 107 | nla_nest_cancel(skb, ports); |
| 108 | return -EMSGSIZE; |
| 109 | } |
| 110 | |
| 111 | static int |
| 112 | ethnl_tunnel_info_req_parse(struct ethnl_req_info *req_info, |
| 113 | const struct nlmsghdr *nlhdr, struct net *net, |
| 114 | struct netlink_ext_ack *extack, bool require_dev) |
| 115 | { |
| 116 | struct nlattr *tb[ETHTOOL_A_TUNNEL_INFO_MAX + 1]; |
| 117 | int ret; |
| 118 | |
| 119 | ret = nlmsg_parse(nlhdr, GENL_HDRLEN, tb, ETHTOOL_A_TUNNEL_INFO_MAX, |
| 120 | ethtool_tunnel_info_policy, extack); |
| 121 | if (ret < 0) |
| 122 | return ret; |
| 123 | |
| 124 | return ethnl_parse_header_dev_get(req_info, |
| 125 | tb[ETHTOOL_A_TUNNEL_INFO_HEADER], |
| 126 | net, extack, require_dev); |
| 127 | } |
| 128 | |
| 129 | int ethnl_tunnel_info_doit(struct sk_buff *skb, struct genl_info *info) |
| 130 | { |
| 131 | struct ethnl_req_info req_info = {}; |
| 132 | struct sk_buff *rskb; |
| 133 | void *reply_payload; |
| 134 | int reply_len; |
| 135 | int ret; |
| 136 | |
| 137 | ret = ethnl_tunnel_info_req_parse(&req_info, info->nlhdr, |
| 138 | genl_info_net(info), info->extack, |
| 139 | true); |
| 140 | if (ret < 0) |
| 141 | return ret; |
| 142 | |
| 143 | rtnl_lock(); |
| 144 | ret = ethnl_tunnel_info_reply_size(&req_info, info->extack); |
| 145 | if (ret < 0) |
| 146 | goto err_unlock_rtnl; |
| 147 | reply_len = ret + ethnl_reply_header_size(); |
| 148 | |
| 149 | rskb = ethnl_reply_init(reply_len, req_info.dev, |
| 150 | ETHTOOL_MSG_TUNNEL_INFO_GET, |
| 151 | ETHTOOL_A_TUNNEL_INFO_HEADER, |
| 152 | info, &reply_payload); |
| 153 | if (!rskb) { |
| 154 | ret = -ENOMEM; |
| 155 | goto err_unlock_rtnl; |
| 156 | } |
| 157 | |
| 158 | ret = ethnl_tunnel_info_fill_reply(&req_info, rskb); |
| 159 | if (ret) |
| 160 | goto err_free_msg; |
| 161 | rtnl_unlock(); |
| 162 | dev_put(req_info.dev); |
| 163 | genlmsg_end(rskb, reply_payload); |
| 164 | |
| 165 | return genlmsg_reply(rskb, info); |
| 166 | |
| 167 | err_free_msg: |
| 168 | nlmsg_free(rskb); |
| 169 | err_unlock_rtnl: |
| 170 | rtnl_unlock(); |
| 171 | dev_put(req_info.dev); |
| 172 | return ret; |
| 173 | } |
| 174 | |
| 175 | struct ethnl_tunnel_info_dump_ctx { |
| 176 | struct ethnl_req_info req_info; |
| 177 | int pos_hash; |
| 178 | int pos_idx; |
| 179 | }; |
| 180 | |
| 181 | int ethnl_tunnel_info_start(struct netlink_callback *cb) |
| 182 | { |
| 183 | struct ethnl_tunnel_info_dump_ctx *ctx = (void *)cb->ctx; |
| 184 | int ret; |
| 185 | |
| 186 | BUILD_BUG_ON(sizeof(*ctx) > sizeof(cb->ctx)); |
| 187 | |
| 188 | memset(ctx, 0, sizeof(*ctx)); |
| 189 | |
| 190 | ret = ethnl_tunnel_info_req_parse(&ctx->req_info, cb->nlh, |
| 191 | sock_net(cb->skb->sk), cb->extack, |
| 192 | false); |
| 193 | if (ctx->req_info.dev) { |
| 194 | dev_put(ctx->req_info.dev); |
| 195 | ctx->req_info.dev = NULL; |
| 196 | } |
| 197 | |
| 198 | return ret; |
| 199 | } |
| 200 | |
| 201 | int ethnl_tunnel_info_dumpit(struct sk_buff *skb, struct netlink_callback *cb) |
| 202 | { |
| 203 | struct ethnl_tunnel_info_dump_ctx *ctx = (void *)cb->ctx; |
| 204 | struct net *net = sock_net(skb->sk); |
| 205 | int s_idx = ctx->pos_idx; |
| 206 | int h, idx = 0; |
| 207 | int ret = 0; |
| 208 | void *ehdr; |
| 209 | |
| 210 | rtnl_lock(); |
| 211 | cb->seq = net->dev_base_seq; |
| 212 | for (h = ctx->pos_hash; h < NETDEV_HASHENTRIES; h++, s_idx = 0) { |
| 213 | struct hlist_head *head; |
| 214 | struct net_device *dev; |
| 215 | |
| 216 | head = &net->dev_index_head[h]; |
| 217 | idx = 0; |
| 218 | hlist_for_each_entry(dev, head, index_hlist) { |
| 219 | if (idx < s_idx) |
| 220 | goto cont; |
| 221 | |
| 222 | ehdr = ethnl_dump_put(skb, cb, |
| 223 | ETHTOOL_MSG_TUNNEL_INFO_GET); |
| 224 | if (!ehdr) { |
| 225 | ret = -EMSGSIZE; |
| 226 | goto out; |
| 227 | } |
| 228 | |
| 229 | ret = ethnl_fill_reply_header(skb, dev, ETHTOOL_A_TUNNEL_INFO_HEADER); |
| 230 | if (ret < 0) { |
| 231 | genlmsg_cancel(skb, ehdr); |
| 232 | goto out; |
| 233 | } |
| 234 | |
| 235 | ctx->req_info.dev = dev; |
| 236 | ret = ethnl_tunnel_info_fill_reply(&ctx->req_info, skb); |
| 237 | ctx->req_info.dev = NULL; |
| 238 | if (ret < 0) { |
| 239 | genlmsg_cancel(skb, ehdr); |
| 240 | if (ret == -EOPNOTSUPP) |
| 241 | goto cont; |
| 242 | goto out; |
| 243 | } |
| 244 | genlmsg_end(skb, ehdr); |
| 245 | cont: |
| 246 | idx++; |
| 247 | } |
| 248 | } |
| 249 | out: |
| 250 | rtnl_unlock(); |
| 251 | |
| 252 | ctx->pos_hash = h; |
| 253 | ctx->pos_idx = idx; |
| 254 | nl_dump_check_consistent(cb, nlmsg_hdr(skb)); |
| 255 | |
| 256 | if (ret == -EMSGSIZE && skb->len) |
| 257 | return skb->len; |
| 258 | return ret; |
| 259 | } |