]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - net/core/rtnetlink.c
rtnetlink: switch rtnl_link_get_slave_info_data_size to rcu
[thirdparty/kernel/stable.git] / net / core / rtnetlink.c
CommitLineData
1da177e4
LT
1/*
2 * INET An implementation of the TCP/IP protocol suite for the LINUX
3 * operating system. INET is implemented using the BSD Socket
4 * interface as the means of communication with the user level.
5 *
6 * Routing netlink socket interface: protocol independent part.
7 *
8 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
9 *
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * as published by the Free Software Foundation; either version
13 * 2 of the License, or (at your option) any later version.
14 *
15 * Fixes:
16 * Vitaly E. Lavrov RTA_OK arithmetics was wrong.
17 */
18
ee5d032f 19#include <linux/bitops.h>
1da177e4
LT
20#include <linux/errno.h>
21#include <linux/module.h>
22#include <linux/types.h>
23#include <linux/socket.h>
24#include <linux/kernel.h>
1da177e4
LT
25#include <linux/timer.h>
26#include <linux/string.h>
27#include <linux/sockios.h>
28#include <linux/net.h>
29#include <linux/fcntl.h>
30#include <linux/mm.h>
31#include <linux/slab.h>
32#include <linux/interrupt.h>
33#include <linux/capability.h>
34#include <linux/skbuff.h>
35#include <linux/init.h>
36#include <linux/security.h>
6756ae4b 37#include <linux/mutex.h>
1823730f 38#include <linux/if_addr.h>
77162022 39#include <linux/if_bridge.h>
f6f6424b 40#include <linux/if_vlan.h>
ebc08a6f 41#include <linux/pci.h>
77162022 42#include <linux/etherdevice.h>
58038695 43#include <linux/bpf.h>
1da177e4 44
7c0f6ba6 45#include <linux/uaccess.h>
1da177e4
LT
46
47#include <linux/inet.h>
48#include <linux/netdevice.h>
82f28412 49#include <net/switchdev.h>
1da177e4
LT
50#include <net/ip.h>
51#include <net/protocol.h>
52#include <net/arp.h>
53#include <net/route.h>
54#include <net/udp.h>
ea697639 55#include <net/tcp.h>
1da177e4
LT
56#include <net/sock.h>
57#include <net/pkt_sched.h>
14c0b97d 58#include <net/fib_rules.h>
e2849863 59#include <net/rtnetlink.h>
30ffee84 60#include <net/net_namespace.h>
1da177e4 61
e0d087af 62struct rtnl_link {
e2849863
TG
63 rtnl_doit_func doit;
64 rtnl_dumpit_func dumpit;
62256f98 65 unsigned int flags;
e2849863
TG
66};
67
6756ae4b 68static DEFINE_MUTEX(rtnl_mutex);
1da177e4
LT
69
70void rtnl_lock(void)
71{
6756ae4b 72 mutex_lock(&rtnl_mutex);
1da177e4 73}
e0d087af 74EXPORT_SYMBOL(rtnl_lock);
1da177e4 75
1b5c5493
ED
76static struct sk_buff *defer_kfree_skb_list;
77void rtnl_kfree_skbs(struct sk_buff *head, struct sk_buff *tail)
78{
79 if (head && tail) {
80 tail->next = defer_kfree_skb_list;
81 defer_kfree_skb_list = head;
82 }
83}
84EXPORT_SYMBOL(rtnl_kfree_skbs);
85
6756ae4b 86void __rtnl_unlock(void)
1da177e4 87{
1b5c5493
ED
88 struct sk_buff *head = defer_kfree_skb_list;
89
90 defer_kfree_skb_list = NULL;
91
6756ae4b 92 mutex_unlock(&rtnl_mutex);
1b5c5493
ED
93
94 while (head) {
95 struct sk_buff *next = head->next;
96
97 kfree_skb(head);
98 cond_resched();
99 head = next;
100 }
1da177e4 101}
6756ae4b 102
1da177e4
LT
103void rtnl_unlock(void)
104{
58ec3b4d 105 /* This fellow will unlock it for us. */
1da177e4
LT
106 netdev_run_todo();
107}
e0d087af 108EXPORT_SYMBOL(rtnl_unlock);
1da177e4 109
6756ae4b
SH
110int rtnl_trylock(void)
111{
112 return mutex_trylock(&rtnl_mutex);
113}
e0d087af 114EXPORT_SYMBOL(rtnl_trylock);
6756ae4b 115
c9c1014b
PM
116int rtnl_is_locked(void)
117{
118 return mutex_is_locked(&rtnl_mutex);
119}
e0d087af 120EXPORT_SYMBOL(rtnl_is_locked);
c9c1014b 121
a898def2 122#ifdef CONFIG_PROVE_LOCKING
0cbf3343 123bool lockdep_rtnl_is_held(void)
a898def2
PM
124{
125 return lockdep_is_held(&rtnl_mutex);
126}
127EXPORT_SYMBOL(lockdep_rtnl_is_held);
128#endif /* #ifdef CONFIG_PROVE_LOCKING */
129
6853dd48 130static struct rtnl_link __rcu *rtnl_msg_handlers[RTNL_FAMILY_MAX + 1];
019a3169 131static refcount_t rtnl_msg_handlers_ref[RTNL_FAMILY_MAX + 1];
e2849863
TG
132
133static inline int rtm_msgindex(int msgtype)
134{
135 int msgindex = msgtype - RTM_BASE;
136
137 /*
138 * msgindex < 0 implies someone tried to register a netlink
139 * control code. msgindex >= RTM_NR_MSGTYPES may indicate that
140 * the message type has not been added to linux/rtnetlink.h
141 */
142 BUG_ON(msgindex < 0 || msgindex >= RTM_NR_MSGTYPES);
143
144 return msgindex;
145}
146
e2849863
TG
147/**
148 * __rtnl_register - Register a rtnetlink message type
149 * @protocol: Protocol family or PF_UNSPEC
150 * @msgtype: rtnetlink message type
151 * @doit: Function pointer called for each request message
152 * @dumpit: Function pointer called for each dump request (NLM_F_DUMP) message
b97bac64 153 * @flags: rtnl_link_flags to modifiy behaviour of doit/dumpit functions
e2849863
TG
154 *
155 * Registers the specified function pointers (at least one of them has
156 * to be non-NULL) to be called whenever a request message for the
157 * specified protocol family and message type is received.
158 *
159 * The special protocol family PF_UNSPEC may be used to define fallback
160 * function pointers for the case when no entry for the specific protocol
161 * family exists.
162 *
163 * Returns 0 on success or a negative error code.
164 */
165int __rtnl_register(int protocol, int msgtype,
c7ac8679 166 rtnl_doit_func doit, rtnl_dumpit_func dumpit,
b97bac64 167 unsigned int flags)
e2849863
TG
168{
169 struct rtnl_link *tab;
170 int msgindex;
171
25239cee 172 BUG_ON(protocol < 0 || protocol > RTNL_FAMILY_MAX);
e2849863
TG
173 msgindex = rtm_msgindex(msgtype);
174
377cb248 175 tab = rcu_dereference_raw(rtnl_msg_handlers[protocol]);
e2849863
TG
176 if (tab == NULL) {
177 tab = kcalloc(RTM_NR_MSGTYPES, sizeof(*tab), GFP_KERNEL);
178 if (tab == NULL)
179 return -ENOBUFS;
180
6853dd48 181 rcu_assign_pointer(rtnl_msg_handlers[protocol], tab);
e2849863
TG
182 }
183
184 if (doit)
185 tab[msgindex].doit = doit;
e2849863
TG
186 if (dumpit)
187 tab[msgindex].dumpit = dumpit;
62256f98 188 tab[msgindex].flags |= flags;
e2849863
TG
189
190 return 0;
191}
e2849863
TG
192EXPORT_SYMBOL_GPL(__rtnl_register);
193
194/**
195 * rtnl_register - Register a rtnetlink message type
196 *
197 * Identical to __rtnl_register() but panics on failure. This is useful
198 * as failure of this function is very unlikely, it can only happen due
199 * to lack of memory when allocating the chain to store all message
200 * handlers for a protocol. Meant for use in init functions where lack
25985edc 201 * of memory implies no sense in continuing.
e2849863
TG
202 */
203void rtnl_register(int protocol, int msgtype,
c7ac8679 204 rtnl_doit_func doit, rtnl_dumpit_func dumpit,
b97bac64 205 unsigned int flags)
e2849863 206{
b97bac64 207 if (__rtnl_register(protocol, msgtype, doit, dumpit, flags) < 0)
e2849863
TG
208 panic("Unable to register rtnetlink message handler, "
209 "protocol = %d, message type = %d\n",
210 protocol, msgtype);
211}
e2849863
TG
212EXPORT_SYMBOL_GPL(rtnl_register);
213
214/**
215 * rtnl_unregister - Unregister a rtnetlink message type
216 * @protocol: Protocol family or PF_UNSPEC
217 * @msgtype: rtnetlink message type
218 *
219 * Returns 0 on success or a negative error code.
220 */
221int rtnl_unregister(int protocol, int msgtype)
222{
6853dd48 223 struct rtnl_link *handlers;
e2849863
TG
224 int msgindex;
225
25239cee 226 BUG_ON(protocol < 0 || protocol > RTNL_FAMILY_MAX);
e2849863
TG
227 msgindex = rtm_msgindex(msgtype);
228
6853dd48
FW
229 rtnl_lock();
230 handlers = rtnl_dereference(rtnl_msg_handlers[protocol]);
231 if (!handlers) {
232 rtnl_unlock();
e2849863 233 return -ENOENT;
6853dd48 234 }
e2849863 235
6853dd48
FW
236 handlers[msgindex].doit = NULL;
237 handlers[msgindex].dumpit = NULL;
62256f98 238 handlers[msgindex].flags = 0;
6853dd48 239 rtnl_unlock();
e2849863
TG
240
241 return 0;
242}
e2849863
TG
243EXPORT_SYMBOL_GPL(rtnl_unregister);
244
245/**
246 * rtnl_unregister_all - Unregister all rtnetlink message type of a protocol
247 * @protocol : Protocol family or PF_UNSPEC
248 *
249 * Identical to calling rtnl_unregster() for all registered message types
250 * of a certain protocol family.
251 */
252void rtnl_unregister_all(int protocol)
253{
019a3169
FW
254 struct rtnl_link *handlers;
255
25239cee 256 BUG_ON(protocol < 0 || protocol > RTNL_FAMILY_MAX);
e2849863 257
019a3169 258 rtnl_lock();
6853dd48
FW
259 handlers = rtnl_dereference(rtnl_msg_handlers[protocol]);
260 RCU_INIT_POINTER(rtnl_msg_handlers[protocol], NULL);
019a3169
FW
261 rtnl_unlock();
262
6853dd48
FW
263 synchronize_net();
264
019a3169
FW
265 while (refcount_read(&rtnl_msg_handlers_ref[protocol]) > 0)
266 schedule();
267 kfree(handlers);
e2849863 268}
e2849863 269EXPORT_SYMBOL_GPL(rtnl_unregister_all);
1da177e4 270
38f7b870
PM
271static LIST_HEAD(link_ops);
272
c63044f0
ED
273static const struct rtnl_link_ops *rtnl_link_ops_get(const char *kind)
274{
275 const struct rtnl_link_ops *ops;
276
277 list_for_each_entry(ops, &link_ops, list) {
278 if (!strcmp(ops->kind, kind))
279 return ops;
280 }
281 return NULL;
282}
283
38f7b870
PM
284/**
285 * __rtnl_link_register - Register rtnl_link_ops with rtnetlink.
286 * @ops: struct rtnl_link_ops * to register
287 *
288 * The caller must hold the rtnl_mutex. This function should be used
289 * by drivers that create devices during module initialization. It
290 * must be called before registering the devices.
291 *
292 * Returns 0 on success or a negative error code.
293 */
294int __rtnl_link_register(struct rtnl_link_ops *ops)
295{
c63044f0
ED
296 if (rtnl_link_ops_get(ops->kind))
297 return -EEXIST;
298
b0ab2fab
JP
299 /* The check for setup is here because if ops
300 * does not have that filled up, it is not possible
301 * to use the ops for creating device. So do not
302 * fill up dellink as well. That disables rtnl_dellink.
303 */
304 if (ops->setup && !ops->dellink)
23289a37 305 ops->dellink = unregister_netdevice_queue;
2d85cba2 306
38f7b870
PM
307 list_add_tail(&ops->list, &link_ops);
308 return 0;
309}
38f7b870
PM
310EXPORT_SYMBOL_GPL(__rtnl_link_register);
311
312/**
313 * rtnl_link_register - Register rtnl_link_ops with rtnetlink.
314 * @ops: struct rtnl_link_ops * to register
315 *
316 * Returns 0 on success or a negative error code.
317 */
318int rtnl_link_register(struct rtnl_link_ops *ops)
319{
320 int err;
321
322 rtnl_lock();
323 err = __rtnl_link_register(ops);
324 rtnl_unlock();
325 return err;
326}
38f7b870
PM
327EXPORT_SYMBOL_GPL(rtnl_link_register);
328
669f87ba
PE
329static void __rtnl_kill_links(struct net *net, struct rtnl_link_ops *ops)
330{
331 struct net_device *dev;
23289a37
ED
332 LIST_HEAD(list_kill);
333
669f87ba 334 for_each_netdev(net, dev) {
23289a37
ED
335 if (dev->rtnl_link_ops == ops)
336 ops->dellink(dev, &list_kill);
669f87ba 337 }
23289a37 338 unregister_netdevice_many(&list_kill);
669f87ba
PE
339}
340
38f7b870
PM
341/**
342 * __rtnl_link_unregister - Unregister rtnl_link_ops from rtnetlink.
343 * @ops: struct rtnl_link_ops * to unregister
344 *
2d85cba2 345 * The caller must hold the rtnl_mutex.
38f7b870
PM
346 */
347void __rtnl_link_unregister(struct rtnl_link_ops *ops)
348{
881d966b 349 struct net *net;
2d85cba2 350
881d966b 351 for_each_net(net) {
669f87ba 352 __rtnl_kill_links(net, ops);
2d85cba2 353 }
38f7b870
PM
354 list_del(&ops->list);
355}
38f7b870
PM
356EXPORT_SYMBOL_GPL(__rtnl_link_unregister);
357
200b916f
CW
358/* Return with the rtnl_lock held when there are no network
359 * devices unregistering in any network namespace.
360 */
361static void rtnl_lock_unregistering_all(void)
362{
363 struct net *net;
364 bool unregistering;
ff960a73 365 DEFINE_WAIT_FUNC(wait, woken_wake_function);
200b916f 366
ff960a73 367 add_wait_queue(&netdev_unregistering_wq, &wait);
200b916f 368 for (;;) {
200b916f
CW
369 unregistering = false;
370 rtnl_lock();
371 for_each_net(net) {
372 if (net->dev_unreg_count > 0) {
373 unregistering = true;
374 break;
375 }
376 }
377 if (!unregistering)
378 break;
379 __rtnl_unlock();
ff960a73
PZ
380
381 wait_woken(&wait, TASK_UNINTERRUPTIBLE, MAX_SCHEDULE_TIMEOUT);
200b916f 382 }
ff960a73 383 remove_wait_queue(&netdev_unregistering_wq, &wait);
200b916f
CW
384}
385
38f7b870
PM
386/**
387 * rtnl_link_unregister - Unregister rtnl_link_ops from rtnetlink.
388 * @ops: struct rtnl_link_ops * to unregister
389 */
390void rtnl_link_unregister(struct rtnl_link_ops *ops)
391{
200b916f
CW
392 /* Close the race with cleanup_net() */
393 mutex_lock(&net_mutex);
394 rtnl_lock_unregistering_all();
38f7b870
PM
395 __rtnl_link_unregister(ops);
396 rtnl_unlock();
200b916f 397 mutex_unlock(&net_mutex);
38f7b870 398}
38f7b870
PM
399EXPORT_SYMBOL_GPL(rtnl_link_unregister);
400
ba7d49b1
JP
401static size_t rtnl_link_get_slave_info_data_size(const struct net_device *dev)
402{
403 struct net_device *master_dev;
404 const struct rtnl_link_ops *ops;
8515ae38 405 size_t size = 0;
ba7d49b1 406
8515ae38
FW
407 rcu_read_lock();
408
409 master_dev = netdev_master_upper_dev_get_rcu((struct net_device *)dev);
ba7d49b1 410 if (!master_dev)
8515ae38
FW
411 goto out;
412
ba7d49b1 413 ops = master_dev->rtnl_link_ops;
6049f253 414 if (!ops || !ops->get_slave_size)
8515ae38 415 goto out;
ba7d49b1 416 /* IFLA_INFO_SLAVE_DATA + nested data */
8515ae38 417 size = nla_total_size(sizeof(struct nlattr)) +
ba7d49b1 418 ops->get_slave_size(master_dev, dev);
8515ae38
FW
419
420out:
421 rcu_read_unlock();
422 return size;
ba7d49b1
JP
423}
424
38f7b870
PM
425static size_t rtnl_link_get_size(const struct net_device *dev)
426{
427 const struct rtnl_link_ops *ops = dev->rtnl_link_ops;
428 size_t size;
429
430 if (!ops)
431 return 0;
432
369cf77a
TG
433 size = nla_total_size(sizeof(struct nlattr)) + /* IFLA_LINKINFO */
434 nla_total_size(strlen(ops->kind) + 1); /* IFLA_INFO_KIND */
38f7b870
PM
435
436 if (ops->get_size)
437 /* IFLA_INFO_DATA + nested data */
369cf77a 438 size += nla_total_size(sizeof(struct nlattr)) +
38f7b870
PM
439 ops->get_size(dev);
440
441 if (ops->get_xstats_size)
369cf77a
TG
442 /* IFLA_INFO_XSTATS */
443 size += nla_total_size(ops->get_xstats_size(dev));
38f7b870 444
ba7d49b1
JP
445 size += rtnl_link_get_slave_info_data_size(dev);
446
38f7b870
PM
447 return size;
448}
449
f8ff182c
TG
450static LIST_HEAD(rtnl_af_ops);
451
452static const struct rtnl_af_ops *rtnl_af_lookup(const int family)
453{
454 const struct rtnl_af_ops *ops;
455
456 list_for_each_entry(ops, &rtnl_af_ops, list) {
457 if (ops->family == family)
458 return ops;
459 }
460
461 return NULL;
462}
463
f8ff182c
TG
464/**
465 * rtnl_af_register - Register rtnl_af_ops with rtnetlink.
466 * @ops: struct rtnl_af_ops * to register
467 *
468 * Returns 0 on success or a negative error code.
469 */
3678a9d8 470void rtnl_af_register(struct rtnl_af_ops *ops)
f8ff182c 471{
f8ff182c 472 rtnl_lock();
3678a9d8 473 list_add_tail(&ops->list, &rtnl_af_ops);
f8ff182c 474 rtnl_unlock();
f8ff182c
TG
475}
476EXPORT_SYMBOL_GPL(rtnl_af_register);
477
478/**
479 * __rtnl_af_unregister - Unregister rtnl_af_ops from rtnetlink.
480 * @ops: struct rtnl_af_ops * to unregister
481 *
482 * The caller must hold the rtnl_mutex.
483 */
484void __rtnl_af_unregister(struct rtnl_af_ops *ops)
485{
486 list_del(&ops->list);
487}
488EXPORT_SYMBOL_GPL(__rtnl_af_unregister);
489
490/**
491 * rtnl_af_unregister - Unregister rtnl_af_ops from rtnetlink.
492 * @ops: struct rtnl_af_ops * to unregister
493 */
494void rtnl_af_unregister(struct rtnl_af_ops *ops)
495{
496 rtnl_lock();
497 __rtnl_af_unregister(ops);
498 rtnl_unlock();
499}
500EXPORT_SYMBOL_GPL(rtnl_af_unregister);
501
b1974ed0
AR
502static size_t rtnl_link_get_af_size(const struct net_device *dev,
503 u32 ext_filter_mask)
f8ff182c
TG
504{
505 struct rtnl_af_ops *af_ops;
506 size_t size;
507
508 /* IFLA_AF_SPEC */
509 size = nla_total_size(sizeof(struct nlattr));
510
511 list_for_each_entry(af_ops, &rtnl_af_ops, list) {
512 if (af_ops->get_link_af_size) {
513 /* AF_* + nested data */
514 size += nla_total_size(sizeof(struct nlattr)) +
b1974ed0 515 af_ops->get_link_af_size(dev, ext_filter_mask);
f8ff182c
TG
516 }
517 }
518
519 return size;
520}
521
ba7d49b1 522static bool rtnl_have_link_slave_info(const struct net_device *dev)
38f7b870 523{
ba7d49b1 524 struct net_device *master_dev;
38f7b870 525
ba7d49b1 526 master_dev = netdev_master_upper_dev_get((struct net_device *) dev);
813f020c 527 if (master_dev && master_dev->rtnl_link_ops)
ba7d49b1
JP
528 return true;
529 return false;
530}
531
532static int rtnl_link_slave_info_fill(struct sk_buff *skb,
533 const struct net_device *dev)
534{
535 struct net_device *master_dev;
536 const struct rtnl_link_ops *ops;
537 struct nlattr *slave_data;
538 int err;
38f7b870 539
ba7d49b1
JP
540 master_dev = netdev_master_upper_dev_get((struct net_device *) dev);
541 if (!master_dev)
542 return 0;
543 ops = master_dev->rtnl_link_ops;
544 if (!ops)
545 return 0;
546 if (nla_put_string(skb, IFLA_INFO_SLAVE_KIND, ops->kind) < 0)
547 return -EMSGSIZE;
548 if (ops->fill_slave_info) {
549 slave_data = nla_nest_start(skb, IFLA_INFO_SLAVE_DATA);
550 if (!slave_data)
551 return -EMSGSIZE;
552 err = ops->fill_slave_info(skb, master_dev, dev);
553 if (err < 0)
554 goto err_cancel_slave_data;
555 nla_nest_end(skb, slave_data);
556 }
557 return 0;
558
559err_cancel_slave_data:
560 nla_nest_cancel(skb, slave_data);
561 return err;
562}
563
564static int rtnl_link_info_fill(struct sk_buff *skb,
565 const struct net_device *dev)
566{
567 const struct rtnl_link_ops *ops = dev->rtnl_link_ops;
568 struct nlattr *data;
569 int err;
570
571 if (!ops)
572 return 0;
38f7b870 573 if (nla_put_string(skb, IFLA_INFO_KIND, ops->kind) < 0)
ba7d49b1 574 return -EMSGSIZE;
38f7b870
PM
575 if (ops->fill_xstats) {
576 err = ops->fill_xstats(skb, dev);
577 if (err < 0)
ba7d49b1 578 return err;
38f7b870
PM
579 }
580 if (ops->fill_info) {
581 data = nla_nest_start(skb, IFLA_INFO_DATA);
ba7d49b1
JP
582 if (data == NULL)
583 return -EMSGSIZE;
38f7b870
PM
584 err = ops->fill_info(skb, dev);
585 if (err < 0)
586 goto err_cancel_data;
587 nla_nest_end(skb, data);
588 }
38f7b870
PM
589 return 0;
590
591err_cancel_data:
592 nla_nest_cancel(skb, data);
ba7d49b1
JP
593 return err;
594}
595
596static int rtnl_link_fill(struct sk_buff *skb, const struct net_device *dev)
597{
598 struct nlattr *linkinfo;
599 int err = -EMSGSIZE;
600
601 linkinfo = nla_nest_start(skb, IFLA_LINKINFO);
602 if (linkinfo == NULL)
603 goto out;
604
605 err = rtnl_link_info_fill(skb, dev);
606 if (err < 0)
607 goto err_cancel_link;
608
609 err = rtnl_link_slave_info_fill(skb, dev);
610 if (err < 0)
611 goto err_cancel_link;
612
613 nla_nest_end(skb, linkinfo);
614 return 0;
615
38f7b870
PM
616err_cancel_link:
617 nla_nest_cancel(skb, linkinfo);
618out:
619 return err;
620}
621
95c96174 622int rtnetlink_send(struct sk_buff *skb, struct net *net, u32 pid, unsigned int group, int echo)
1da177e4 623{
97c53cac 624 struct sock *rtnl = net->rtnl;
1da177e4
LT
625 int err = 0;
626
ac6d439d 627 NETLINK_CB(skb).dst_group = group;
1da177e4 628 if (echo)
63354797 629 refcount_inc(&skb->users);
1da177e4
LT
630 netlink_broadcast(rtnl, skb, pid, group, GFP_KERNEL);
631 if (echo)
632 err = netlink_unicast(rtnl, skb, pid, MSG_DONTWAIT);
633 return err;
634}
635
97c53cac 636int rtnl_unicast(struct sk_buff *skb, struct net *net, u32 pid)
2942e900 637{
97c53cac
DL
638 struct sock *rtnl = net->rtnl;
639
2942e900
TG
640 return nlmsg_unicast(rtnl, skb, pid);
641}
e0d087af 642EXPORT_SYMBOL(rtnl_unicast);
2942e900 643
1ce85fe4
PNA
644void rtnl_notify(struct sk_buff *skb, struct net *net, u32 pid, u32 group,
645 struct nlmsghdr *nlh, gfp_t flags)
97676b6b 646{
97c53cac 647 struct sock *rtnl = net->rtnl;
97676b6b
TG
648 int report = 0;
649
650 if (nlh)
651 report = nlmsg_report(nlh);
652
1ce85fe4 653 nlmsg_notify(rtnl, skb, pid, group, report, flags);
97676b6b 654}
e0d087af 655EXPORT_SYMBOL(rtnl_notify);
97676b6b 656
97c53cac 657void rtnl_set_sk_err(struct net *net, u32 group, int error)
97676b6b 658{
97c53cac
DL
659 struct sock *rtnl = net->rtnl;
660
97676b6b
TG
661 netlink_set_err(rtnl, 0, group, error);
662}
e0d087af 663EXPORT_SYMBOL(rtnl_set_sk_err);
97676b6b 664
1da177e4
LT
665int rtnetlink_put_metrics(struct sk_buff *skb, u32 *metrics)
666{
2d7202bf
TG
667 struct nlattr *mx;
668 int i, valid = 0;
669
670 mx = nla_nest_start(skb, RTA_METRICS);
671 if (mx == NULL)
672 return -ENOBUFS;
673
674 for (i = 0; i < RTAX_MAX; i++) {
675 if (metrics[i]) {
ea697639
DB
676 if (i == RTAX_CC_ALGO - 1) {
677 char tmp[TCP_CA_NAME_MAX], *name;
678
679 name = tcp_ca_get_name_by_key(metrics[i], tmp);
680 if (!name)
681 continue;
682 if (nla_put_string(skb, i + 1, name))
683 goto nla_put_failure;
c3a8d947
DB
684 } else if (i == RTAX_FEATURES - 1) {
685 u32 user_features = metrics[i] & RTAX_FEATURE_MASK;
686
f8edcd12
PS
687 if (!user_features)
688 continue;
c3a8d947
DB
689 BUILD_BUG_ON(RTAX_FEATURE_MASK & DST_FEATURE_MASK);
690 if (nla_put_u32(skb, i + 1, user_features))
691 goto nla_put_failure;
ea697639
DB
692 } else {
693 if (nla_put_u32(skb, i + 1, metrics[i]))
694 goto nla_put_failure;
695 }
2d7202bf 696 valid++;
2d7202bf 697 }
1da177e4 698 }
1da177e4 699
a57d27fc
DM
700 if (!valid) {
701 nla_nest_cancel(skb, mx);
702 return 0;
703 }
2d7202bf
TG
704
705 return nla_nest_end(skb, mx);
706
707nla_put_failure:
bc3ed28c
TG
708 nla_nest_cancel(skb, mx);
709 return -EMSGSIZE;
1da177e4 710}
e0d087af 711EXPORT_SYMBOL(rtnetlink_put_metrics);
1da177e4 712
e3703b3d 713int rtnl_put_cacheinfo(struct sk_buff *skb, struct dst_entry *dst, u32 id,
87a50699 714 long expires, u32 error)
e3703b3d
TG
715{
716 struct rta_cacheinfo ci = {
a399a805 717 .rta_lastuse = jiffies_delta_to_clock_t(jiffies - dst->lastuse),
e3703b3d
TG
718 .rta_used = dst->__use,
719 .rta_clntref = atomic_read(&(dst->__refcnt)),
720 .rta_error = error,
721 .rta_id = id,
e3703b3d
TG
722 };
723
8253947e
LW
724 if (expires) {
725 unsigned long clock;
e3703b3d 726
8253947e
LW
727 clock = jiffies_to_clock_t(abs(expires));
728 clock = min_t(unsigned long, clock, INT_MAX);
729 ci.rta_expires = (expires > 0) ? clock : -clock;
730 }
e3703b3d
TG
731 return nla_put(skb, RTA_CACHEINFO, sizeof(ci), &ci);
732}
e3703b3d 733EXPORT_SYMBOL_GPL(rtnl_put_cacheinfo);
1da177e4 734
93b2d4a2 735static void set_operstate(struct net_device *dev, unsigned char transition)
b00055aa
SR
736{
737 unsigned char operstate = dev->operstate;
738
e0d087af 739 switch (transition) {
b00055aa
SR
740 case IF_OPER_UP:
741 if ((operstate == IF_OPER_DORMANT ||
742 operstate == IF_OPER_UNKNOWN) &&
743 !netif_dormant(dev))
744 operstate = IF_OPER_UP;
745 break;
746
747 case IF_OPER_DORMANT:
748 if (operstate == IF_OPER_UP ||
749 operstate == IF_OPER_UNKNOWN)
750 operstate = IF_OPER_DORMANT;
751 break;
3ff50b79 752 }
b00055aa
SR
753
754 if (dev->operstate != operstate) {
755 write_lock_bh(&dev_base_lock);
756 dev->operstate = operstate;
757 write_unlock_bh(&dev_base_lock);
93b2d4a2
DM
758 netdev_state_change(dev);
759 }
b00055aa
SR
760}
761
b1beb681
JB
762static unsigned int rtnl_dev_get_flags(const struct net_device *dev)
763{
764 return (dev->flags & ~(IFF_PROMISC | IFF_ALLMULTI)) |
765 (dev->gflags & (IFF_PROMISC | IFF_ALLMULTI));
766}
767
3729d502
PM
768static unsigned int rtnl_dev_combine_flags(const struct net_device *dev,
769 const struct ifinfomsg *ifm)
770{
771 unsigned int flags = ifm->ifi_flags;
772
773 /* bugwards compatibility: ifi_change == 0 is treated as ~0 */
774 if (ifm->ifi_change)
775 flags = (flags & ifm->ifi_change) |
b1beb681 776 (rtnl_dev_get_flags(dev) & ~ifm->ifi_change);
3729d502
PM
777
778 return flags;
779}
780
b60c5115 781static void copy_rtnl_link_stats(struct rtnl_link_stats *a,
be1f3c2c 782 const struct rtnl_link_stats64 *b)
1da177e4 783{
b60c5115
TG
784 a->rx_packets = b->rx_packets;
785 a->tx_packets = b->tx_packets;
786 a->rx_bytes = b->rx_bytes;
787 a->tx_bytes = b->tx_bytes;
788 a->rx_errors = b->rx_errors;
789 a->tx_errors = b->tx_errors;
790 a->rx_dropped = b->rx_dropped;
791 a->tx_dropped = b->tx_dropped;
792
793 a->multicast = b->multicast;
794 a->collisions = b->collisions;
795
796 a->rx_length_errors = b->rx_length_errors;
797 a->rx_over_errors = b->rx_over_errors;
798 a->rx_crc_errors = b->rx_crc_errors;
799 a->rx_frame_errors = b->rx_frame_errors;
800 a->rx_fifo_errors = b->rx_fifo_errors;
801 a->rx_missed_errors = b->rx_missed_errors;
802
803 a->tx_aborted_errors = b->tx_aborted_errors;
804 a->tx_carrier_errors = b->tx_carrier_errors;
805 a->tx_fifo_errors = b->tx_fifo_errors;
806 a->tx_heartbeat_errors = b->tx_heartbeat_errors;
807 a->tx_window_errors = b->tx_window_errors;
808
809 a->rx_compressed = b->rx_compressed;
810 a->tx_compressed = b->tx_compressed;
6e7333d3
JW
811
812 a->rx_nohandler = b->rx_nohandler;
10708f37
JE
813}
814
c02db8c6 815/* All VF info */
115c9b81
GR
816static inline int rtnl_vfinfo_size(const struct net_device *dev,
817 u32 ext_filter_mask)
ebc08a6f 818{
9af15c38 819 if (dev->dev.parent && (ext_filter_mask & RTEXT_FILTER_VF)) {
c02db8c6 820 int num_vfs = dev_num_vf(dev->dev.parent);
7e75f74a 821 size_t size = nla_total_size(0);
045de01a 822 size += num_vfs *
7e75f74a
SD
823 (nla_total_size(0) +
824 nla_total_size(sizeof(struct ifla_vf_mac)) +
825 nla_total_size(sizeof(struct ifla_vf_vlan)) +
826 nla_total_size(0) + /* nest IFLA_VF_VLAN_LIST */
79aab093
MS
827 nla_total_size(MAX_VLAN_LIST_LEN *
828 sizeof(struct ifla_vf_vlan_info)) +
ed616689 829 nla_total_size(sizeof(struct ifla_vf_spoofchk)) +
7e75f74a 830 nla_total_size(sizeof(struct ifla_vf_tx_rate)) +
945a3676 831 nla_total_size(sizeof(struct ifla_vf_rate)) +
01a3d796 832 nla_total_size(sizeof(struct ifla_vf_link_state)) +
3b766cd8 833 nla_total_size(sizeof(struct ifla_vf_rss_query_en)) +
7e75f74a 834 nla_total_size(0) + /* nest IFLA_VF_STATS */
3b766cd8 835 /* IFLA_VF_STATS_RX_PACKETS */
343a6d8e 836 nla_total_size_64bit(sizeof(__u64)) +
3b766cd8 837 /* IFLA_VF_STATS_TX_PACKETS */
343a6d8e 838 nla_total_size_64bit(sizeof(__u64)) +
3b766cd8 839 /* IFLA_VF_STATS_RX_BYTES */
343a6d8e 840 nla_total_size_64bit(sizeof(__u64)) +
3b766cd8 841 /* IFLA_VF_STATS_TX_BYTES */
343a6d8e 842 nla_total_size_64bit(sizeof(__u64)) +
3b766cd8 843 /* IFLA_VF_STATS_BROADCAST */
343a6d8e 844 nla_total_size_64bit(sizeof(__u64)) +
3b766cd8 845 /* IFLA_VF_STATS_MULTICAST */
343a6d8e 846 nla_total_size_64bit(sizeof(__u64)) +
dd461d6a 847 nla_total_size(sizeof(struct ifla_vf_trust)));
c02db8c6
CW
848 return size;
849 } else
ebc08a6f
WM
850 return 0;
851}
852
c53864fd
DG
853static size_t rtnl_port_size(const struct net_device *dev,
854 u32 ext_filter_mask)
57b61080
SF
855{
856 size_t port_size = nla_total_size(4) /* PORT_VF */
857 + nla_total_size(PORT_PROFILE_MAX) /* PORT_PROFILE */
57b61080
SF
858 + nla_total_size(PORT_UUID_MAX) /* PORT_INSTANCE_UUID */
859 + nla_total_size(PORT_UUID_MAX) /* PORT_HOST_UUID */
860 + nla_total_size(1) /* PROT_VDP_REQUEST */
861 + nla_total_size(2); /* PORT_VDP_RESPONSE */
862 size_t vf_ports_size = nla_total_size(sizeof(struct nlattr));
863 size_t vf_port_size = nla_total_size(sizeof(struct nlattr))
864 + port_size;
865 size_t port_self_size = nla_total_size(sizeof(struct nlattr))
866 + port_size;
867
c53864fd
DG
868 if (!dev->netdev_ops->ndo_get_vf_port || !dev->dev.parent ||
869 !(ext_filter_mask & RTEXT_FILTER_VF))
57b61080
SF
870 return 0;
871 if (dev_num_vf(dev->dev.parent))
872 return port_self_size + vf_ports_size +
873 vf_port_size * dev_num_vf(dev->dev.parent);
874 else
875 return port_self_size;
876}
877
b5cdae32 878static size_t rtnl_xdp_size(void)
d1fdd913 879{
b3cfaa31 880 size_t xdp_size = nla_total_size(0) + /* nest IFLA_XDP */
58038695
MKL
881 nla_total_size(1) + /* XDP_ATTACHED */
882 nla_total_size(4); /* XDP_PROG_ID */
d1fdd913 883
b5cdae32 884 return xdp_size;
d1fdd913
BB
885}
886
115c9b81
GR
887static noinline size_t if_nlmsg_size(const struct net_device *dev,
888 u32 ext_filter_mask)
339bf98f
TG
889{
890 return NLMSG_ALIGN(sizeof(struct ifinfomsg))
891 + nla_total_size(IFNAMSIZ) /* IFLA_IFNAME */
0b815a1a 892 + nla_total_size(IFALIASZ) /* IFLA_IFALIAS */
339bf98f 893 + nla_total_size(IFNAMSIZ) /* IFLA_QDISC */
270cb4d0 894 + nla_total_size_64bit(sizeof(struct rtnl_link_ifmap))
339bf98f 895 + nla_total_size(sizeof(struct rtnl_link_stats))
35c58459 896 + nla_total_size_64bit(sizeof(struct rtnl_link_stats64))
339bf98f
TG
897 + nla_total_size(MAX_ADDR_LEN) /* IFLA_ADDRESS */
898 + nla_total_size(MAX_ADDR_LEN) /* IFLA_BROADCAST */
899 + nla_total_size(4) /* IFLA_TXQLEN */
900 + nla_total_size(4) /* IFLA_WEIGHT */
901 + nla_total_size(4) /* IFLA_MTU */
902 + nla_total_size(4) /* IFLA_LINK */
903 + nla_total_size(4) /* IFLA_MASTER */
9a57247f 904 + nla_total_size(1) /* IFLA_CARRIER */
edbc0bb3 905 + nla_total_size(4) /* IFLA_PROMISCUITY */
76ff5cc9
JP
906 + nla_total_size(4) /* IFLA_NUM_TX_QUEUES */
907 + nla_total_size(4) /* IFLA_NUM_RX_QUEUES */
6919756c
TK
908 + nla_total_size(4) /* IFLA_GSO_MAX_SEGS */
909 + nla_total_size(4) /* IFLA_GSO_MAX_SIZE */
339bf98f 910 + nla_total_size(1) /* IFLA_OPERSTATE */
38f7b870 911 + nla_total_size(1) /* IFLA_LINKMODE */
2d3b479d 912 + nla_total_size(4) /* IFLA_CARRIER_CHANGES */
d37512a2 913 + nla_total_size(4) /* IFLA_LINK_NETNSID */
db833d40 914 + nla_total_size(4) /* IFLA_GROUP */
115c9b81
GR
915 + nla_total_size(ext_filter_mask
916 & RTEXT_FILTER_VF ? 4 : 0) /* IFLA_NUM_VF */
917 + rtnl_vfinfo_size(dev, ext_filter_mask) /* IFLA_VFINFO_LIST */
c53864fd 918 + rtnl_port_size(dev, ext_filter_mask) /* IFLA_VF_PORTS + IFLA_PORT_SELF */
f8ff182c 919 + rtnl_link_get_size(dev) /* IFLA_LINKINFO */
b1974ed0 920 + rtnl_link_get_af_size(dev, ext_filter_mask) /* IFLA_AF_SPEC */
82f28412 921 + nla_total_size(MAX_PHYS_ITEM_ID_LEN) /* IFLA_PHYS_PORT_ID */
88d6378b 922 + nla_total_size(MAX_PHYS_ITEM_ID_LEN) /* IFLA_PHYS_SWITCH_ID */
c57c7a95 923 + nla_total_size(IFNAMSIZ) /* IFLA_PHYS_PORT_NAME */
b5cdae32 924 + rtnl_xdp_size() /* IFLA_XDP */
3d3ea5af 925 + nla_total_size(4) /* IFLA_EVENT */
88d6378b
AK
926 + nla_total_size(1); /* IFLA_PROTO_DOWN */
927
339bf98f
TG
928}
929
57b61080
SF
930static int rtnl_vf_ports_fill(struct sk_buff *skb, struct net_device *dev)
931{
932 struct nlattr *vf_ports;
933 struct nlattr *vf_port;
934 int vf;
935 int err;
936
937 vf_ports = nla_nest_start(skb, IFLA_VF_PORTS);
938 if (!vf_ports)
939 return -EMSGSIZE;
940
941 for (vf = 0; vf < dev_num_vf(dev->dev.parent); vf++) {
942 vf_port = nla_nest_start(skb, IFLA_VF_PORT);
8ca94183
SF
943 if (!vf_port)
944 goto nla_put_failure;
a6574349
DM
945 if (nla_put_u32(skb, IFLA_PORT_VF, vf))
946 goto nla_put_failure;
57b61080 947 err = dev->netdev_ops->ndo_get_vf_port(dev, vf, skb);
8ca94183
SF
948 if (err == -EMSGSIZE)
949 goto nla_put_failure;
57b61080 950 if (err) {
57b61080
SF
951 nla_nest_cancel(skb, vf_port);
952 continue;
953 }
954 nla_nest_end(skb, vf_port);
955 }
956
957 nla_nest_end(skb, vf_ports);
958
959 return 0;
8ca94183
SF
960
961nla_put_failure:
962 nla_nest_cancel(skb, vf_ports);
963 return -EMSGSIZE;
57b61080
SF
964}
965
966static int rtnl_port_self_fill(struct sk_buff *skb, struct net_device *dev)
967{
968 struct nlattr *port_self;
969 int err;
970
971 port_self = nla_nest_start(skb, IFLA_PORT_SELF);
972 if (!port_self)
973 return -EMSGSIZE;
974
975 err = dev->netdev_ops->ndo_get_vf_port(dev, PORT_SELF_VF, skb);
976 if (err) {
977 nla_nest_cancel(skb, port_self);
8ca94183 978 return (err == -EMSGSIZE) ? err : 0;
57b61080
SF
979 }
980
981 nla_nest_end(skb, port_self);
982
983 return 0;
984}
985
c53864fd
DG
986static int rtnl_port_fill(struct sk_buff *skb, struct net_device *dev,
987 u32 ext_filter_mask)
57b61080
SF
988{
989 int err;
990
c53864fd
DG
991 if (!dev->netdev_ops->ndo_get_vf_port || !dev->dev.parent ||
992 !(ext_filter_mask & RTEXT_FILTER_VF))
57b61080
SF
993 return 0;
994
995 err = rtnl_port_self_fill(skb, dev);
996 if (err)
997 return err;
998
999 if (dev_num_vf(dev->dev.parent)) {
1000 err = rtnl_vf_ports_fill(skb, dev);
1001 if (err)
1002 return err;
1003 }
1004
1005 return 0;
1006}
1007
66cae9ed
JP
1008static int rtnl_phys_port_id_fill(struct sk_buff *skb, struct net_device *dev)
1009{
1010 int err;
02637fce 1011 struct netdev_phys_item_id ppid;
66cae9ed
JP
1012
1013 err = dev_get_phys_port_id(dev, &ppid);
1014 if (err) {
1015 if (err == -EOPNOTSUPP)
1016 return 0;
1017 return err;
1018 }
1019
1020 if (nla_put(skb, IFLA_PHYS_PORT_ID, ppid.id_len, ppid.id))
1021 return -EMSGSIZE;
1022
1023 return 0;
1024}
1025
db24a904
DA
1026static int rtnl_phys_port_name_fill(struct sk_buff *skb, struct net_device *dev)
1027{
1028 char name[IFNAMSIZ];
1029 int err;
1030
1031 err = dev_get_phys_port_name(dev, name, sizeof(name));
1032 if (err) {
1033 if (err == -EOPNOTSUPP)
1034 return 0;
1035 return err;
1036 }
1037
77ef033b 1038 if (nla_put_string(skb, IFLA_PHYS_PORT_NAME, name))
db24a904
DA
1039 return -EMSGSIZE;
1040
1041 return 0;
1042}
1043
82f28412
JP
1044static int rtnl_phys_switch_id_fill(struct sk_buff *skb, struct net_device *dev)
1045{
1046 int err;
f8e20a9f 1047 struct switchdev_attr attr = {
6ff64f6f 1048 .orig_dev = dev,
1f868398 1049 .id = SWITCHDEV_ATTR_ID_PORT_PARENT_ID,
f8e20a9f
SF
1050 .flags = SWITCHDEV_F_NO_RECURSE,
1051 };
82f28412 1052
f8e20a9f 1053 err = switchdev_port_attr_get(dev, &attr);
82f28412
JP
1054 if (err) {
1055 if (err == -EOPNOTSUPP)
1056 return 0;
1057 return err;
1058 }
1059
42275bd8
SF
1060 if (nla_put(skb, IFLA_PHYS_SWITCH_ID, attr.u.ppid.id_len,
1061 attr.u.ppid.id))
82f28412
JP
1062 return -EMSGSIZE;
1063
1064 return 0;
1065}
1066
b22b941b
HFS
1067static noinline_for_stack int rtnl_fill_stats(struct sk_buff *skb,
1068 struct net_device *dev)
1069{
550bce59 1070 struct rtnl_link_stats64 *sp;
b22b941b 1071 struct nlattr *attr;
18402843 1072
58414d32
ND
1073 attr = nla_reserve_64bit(skb, IFLA_STATS64,
1074 sizeof(struct rtnl_link_stats64), IFLA_PAD);
b22b941b
HFS
1075 if (!attr)
1076 return -EMSGSIZE;
1077
550bce59
RP
1078 sp = nla_data(attr);
1079 dev_get_stats(dev, sp);
b22b941b 1080
550bce59
RP
1081 attr = nla_reserve(skb, IFLA_STATS,
1082 sizeof(struct rtnl_link_stats));
b22b941b
HFS
1083 if (!attr)
1084 return -EMSGSIZE;
1085
550bce59 1086 copy_rtnl_link_stats(nla_data(attr), sp);
b22b941b
HFS
1087
1088 return 0;
1089}
1090
1091static noinline_for_stack int rtnl_fill_vfinfo(struct sk_buff *skb,
1092 struct net_device *dev,
1093 int vfs_num,
1094 struct nlattr *vfinfo)
1095{
1096 struct ifla_vf_rss_query_en vf_rss_query_en;
79aab093 1097 struct nlattr *vf, *vfstats, *vfvlanlist;
b22b941b 1098 struct ifla_vf_link_state vf_linkstate;
79aab093 1099 struct ifla_vf_vlan_info vf_vlan_info;
b22b941b
HFS
1100 struct ifla_vf_spoofchk vf_spoofchk;
1101 struct ifla_vf_tx_rate vf_tx_rate;
1102 struct ifla_vf_stats vf_stats;
1103 struct ifla_vf_trust vf_trust;
1104 struct ifla_vf_vlan vf_vlan;
1105 struct ifla_vf_rate vf_rate;
b22b941b
HFS
1106 struct ifla_vf_mac vf_mac;
1107 struct ifla_vf_info ivi;
1108
0eed9cf5
MY
1109 memset(&ivi, 0, sizeof(ivi));
1110
b22b941b
HFS
1111 /* Not all SR-IOV capable drivers support the
1112 * spoofcheck and "RSS query enable" query. Preset to
1113 * -1 so the user space tool can detect that the driver
1114 * didn't report anything.
1115 */
1116 ivi.spoofchk = -1;
1117 ivi.rss_query_en = -1;
1118 ivi.trusted = -1;
b22b941b
HFS
1119 /* The default value for VF link state is "auto"
1120 * IFLA_VF_LINK_STATE_AUTO which equals zero
1121 */
1122 ivi.linkstate = 0;
79aab093
MS
1123 /* VLAN Protocol by default is 802.1Q */
1124 ivi.vlan_proto = htons(ETH_P_8021Q);
b22b941b
HFS
1125 if (dev->netdev_ops->ndo_get_vf_config(dev, vfs_num, &ivi))
1126 return 0;
1127
775f4f05
DC
1128 memset(&vf_vlan_info, 0, sizeof(vf_vlan_info));
1129
b22b941b
HFS
1130 vf_mac.vf =
1131 vf_vlan.vf =
79aab093 1132 vf_vlan_info.vf =
b22b941b
HFS
1133 vf_rate.vf =
1134 vf_tx_rate.vf =
1135 vf_spoofchk.vf =
1136 vf_linkstate.vf =
1137 vf_rss_query_en.vf =
1138 vf_trust.vf = ivi.vf;
1139
1140 memcpy(vf_mac.mac, ivi.mac, sizeof(ivi.mac));
1141 vf_vlan.vlan = ivi.vlan;
1142 vf_vlan.qos = ivi.qos;
79aab093
MS
1143 vf_vlan_info.vlan = ivi.vlan;
1144 vf_vlan_info.qos = ivi.qos;
1145 vf_vlan_info.vlan_proto = ivi.vlan_proto;
b22b941b
HFS
1146 vf_tx_rate.rate = ivi.max_tx_rate;
1147 vf_rate.min_tx_rate = ivi.min_tx_rate;
1148 vf_rate.max_tx_rate = ivi.max_tx_rate;
1149 vf_spoofchk.setting = ivi.spoofchk;
1150 vf_linkstate.link_state = ivi.linkstate;
1151 vf_rss_query_en.setting = ivi.rss_query_en;
1152 vf_trust.setting = ivi.trusted;
1153 vf = nla_nest_start(skb, IFLA_VF_INFO);
79aab093
MS
1154 if (!vf)
1155 goto nla_put_vfinfo_failure;
b22b941b
HFS
1156 if (nla_put(skb, IFLA_VF_MAC, sizeof(vf_mac), &vf_mac) ||
1157 nla_put(skb, IFLA_VF_VLAN, sizeof(vf_vlan), &vf_vlan) ||
1158 nla_put(skb, IFLA_VF_RATE, sizeof(vf_rate),
1159 &vf_rate) ||
1160 nla_put(skb, IFLA_VF_TX_RATE, sizeof(vf_tx_rate),
1161 &vf_tx_rate) ||
1162 nla_put(skb, IFLA_VF_SPOOFCHK, sizeof(vf_spoofchk),
1163 &vf_spoofchk) ||
1164 nla_put(skb, IFLA_VF_LINK_STATE, sizeof(vf_linkstate),
1165 &vf_linkstate) ||
1166 nla_put(skb, IFLA_VF_RSS_QUERY_EN,
1167 sizeof(vf_rss_query_en),
1168 &vf_rss_query_en) ||
1169 nla_put(skb, IFLA_VF_TRUST,
1170 sizeof(vf_trust), &vf_trust))
79aab093
MS
1171 goto nla_put_vf_failure;
1172 vfvlanlist = nla_nest_start(skb, IFLA_VF_VLAN_LIST);
1173 if (!vfvlanlist)
1174 goto nla_put_vf_failure;
1175 if (nla_put(skb, IFLA_VF_VLAN_INFO, sizeof(vf_vlan_info),
1176 &vf_vlan_info)) {
1177 nla_nest_cancel(skb, vfvlanlist);
1178 goto nla_put_vf_failure;
1179 }
1180 nla_nest_end(skb, vfvlanlist);
b22b941b
HFS
1181 memset(&vf_stats, 0, sizeof(vf_stats));
1182 if (dev->netdev_ops->ndo_get_vf_stats)
1183 dev->netdev_ops->ndo_get_vf_stats(dev, vfs_num,
1184 &vf_stats);
1185 vfstats = nla_nest_start(skb, IFLA_VF_STATS);
79aab093
MS
1186 if (!vfstats)
1187 goto nla_put_vf_failure;
343a6d8e
ND
1188 if (nla_put_u64_64bit(skb, IFLA_VF_STATS_RX_PACKETS,
1189 vf_stats.rx_packets, IFLA_VF_STATS_PAD) ||
1190 nla_put_u64_64bit(skb, IFLA_VF_STATS_TX_PACKETS,
1191 vf_stats.tx_packets, IFLA_VF_STATS_PAD) ||
1192 nla_put_u64_64bit(skb, IFLA_VF_STATS_RX_BYTES,
1193 vf_stats.rx_bytes, IFLA_VF_STATS_PAD) ||
1194 nla_put_u64_64bit(skb, IFLA_VF_STATS_TX_BYTES,
1195 vf_stats.tx_bytes, IFLA_VF_STATS_PAD) ||
1196 nla_put_u64_64bit(skb, IFLA_VF_STATS_BROADCAST,
1197 vf_stats.broadcast, IFLA_VF_STATS_PAD) ||
1198 nla_put_u64_64bit(skb, IFLA_VF_STATS_MULTICAST,
79aab093
MS
1199 vf_stats.multicast, IFLA_VF_STATS_PAD)) {
1200 nla_nest_cancel(skb, vfstats);
1201 goto nla_put_vf_failure;
1202 }
b22b941b
HFS
1203 nla_nest_end(skb, vfstats);
1204 nla_nest_end(skb, vf);
1205 return 0;
79aab093
MS
1206
1207nla_put_vf_failure:
1208 nla_nest_cancel(skb, vf);
1209nla_put_vfinfo_failure:
1210 nla_nest_cancel(skb, vfinfo);
1211 return -EMSGSIZE;
b22b941b
HFS
1212}
1213
1214static int rtnl_fill_link_ifmap(struct sk_buff *skb, struct net_device *dev)
1215{
5f8e4474
KL
1216 struct rtnl_link_ifmap map;
1217
1218 memset(&map, 0, sizeof(map));
1219 map.mem_start = dev->mem_start;
1220 map.mem_end = dev->mem_end;
1221 map.base_addr = dev->base_addr;
1222 map.irq = dev->irq;
1223 map.dma = dev->dma;
1224 map.port = dev->if_port;
1225
270cb4d0 1226 if (nla_put_64bit(skb, IFLA_MAP, sizeof(map), &map, IFLA_PAD))
b22b941b
HFS
1227 return -EMSGSIZE;
1228
1229 return 0;
1230}
1231
58038695 1232static u8 rtnl_xdp_attached_mode(struct net_device *dev, u32 *prog_id)
d67b9cd2
DB
1233{
1234 const struct net_device_ops *ops = dev->netdev_ops;
58038695 1235 const struct bpf_prog *generic_xdp_prog;
d67b9cd2
DB
1236
1237 ASSERT_RTNL();
1238
58038695
MKL
1239 *prog_id = 0;
1240 generic_xdp_prog = rtnl_dereference(dev->xdp_prog);
1241 if (generic_xdp_prog) {
1242 *prog_id = generic_xdp_prog->aux->id;
d67b9cd2 1243 return XDP_ATTACHED_SKB;
58038695 1244 }
ce158e58
JK
1245 if (!ops->ndo_xdp)
1246 return XDP_ATTACHED_NONE;
d67b9cd2 1247
ce158e58 1248 return __dev_xdp_attached(dev, ops->ndo_xdp, prog_id);
d67b9cd2
DB
1249}
1250
d1fdd913
BB
1251static int rtnl_xdp_fill(struct sk_buff *skb, struct net_device *dev)
1252{
d1fdd913 1253 struct nlattr *xdp;
58038695 1254 u32 prog_id;
d1fdd913
BB
1255 int err;
1256
d1fdd913
BB
1257 xdp = nla_nest_start(skb, IFLA_XDP);
1258 if (!xdp)
1259 return -EMSGSIZE;
d67b9cd2
DB
1260
1261 err = nla_put_u8(skb, IFLA_XDP_ATTACHED,
58038695 1262 rtnl_xdp_attached_mode(dev, &prog_id));
d1fdd913
BB
1263 if (err)
1264 goto err_cancel;
1265
58038695
MKL
1266 if (prog_id) {
1267 err = nla_put_u32(skb, IFLA_XDP_PROG_ID, prog_id);
1268 if (err)
1269 goto err_cancel;
1270 }
1271
d1fdd913
BB
1272 nla_nest_end(skb, xdp);
1273 return 0;
1274
1275err_cancel:
1276 nla_nest_cancel(skb, xdp);
1277 return err;
1278}
1279
3d3ea5af
VY
1280static u32 rtnl_get_event(unsigned long event)
1281{
1282 u32 rtnl_event_type = IFLA_EVENT_NONE;
1283
1284 switch (event) {
1285 case NETDEV_REBOOT:
1286 rtnl_event_type = IFLA_EVENT_REBOOT;
1287 break;
1288 case NETDEV_FEAT_CHANGE:
1289 rtnl_event_type = IFLA_EVENT_FEATURES;
1290 break;
1291 case NETDEV_BONDING_FAILOVER:
1292 rtnl_event_type = IFLA_EVENT_BONDING_FAILOVER;
1293 break;
1294 case NETDEV_NOTIFY_PEERS:
1295 rtnl_event_type = IFLA_EVENT_NOTIFY_PEERS;
1296 break;
1297 case NETDEV_RESEND_IGMP:
1298 rtnl_event_type = IFLA_EVENT_IGMP_RESEND;
1299 break;
1300 case NETDEV_CHANGEINFODATA:
1301 rtnl_event_type = IFLA_EVENT_BONDING_OPTIONS;
1302 break;
1303 default:
1304 break;
1305 }
1306
1307 return rtnl_event_type;
1308}
1309
b60c5115 1310static int rtnl_fill_ifinfo(struct sk_buff *skb, struct net_device *dev,
575c3e2a 1311 int type, u32 pid, u32 seq, u32 change,
3d3ea5af
VY
1312 unsigned int flags, u32 ext_filter_mask,
1313 u32 event)
b60c5115
TG
1314{
1315 struct ifinfomsg *ifm;
1316 struct nlmsghdr *nlh;
b22b941b 1317 struct nlattr *af_spec;
f8ff182c 1318 struct rtnl_af_ops *af_ops;
898e5061 1319 struct net_device *upper_dev = netdev_master_upper_dev_get(dev);
1da177e4 1320
2907c35f 1321 ASSERT_RTNL();
b60c5115
TG
1322 nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ifm), flags);
1323 if (nlh == NULL)
26932566 1324 return -EMSGSIZE;
1da177e4 1325
b60c5115
TG
1326 ifm = nlmsg_data(nlh);
1327 ifm->ifi_family = AF_UNSPEC;
1328 ifm->__ifi_pad = 0;
1329 ifm->ifi_type = dev->type;
1330 ifm->ifi_index = dev->ifindex;
1331 ifm->ifi_flags = dev_get_flags(dev);
1332 ifm->ifi_change = change;
1333
a6574349
DM
1334 if (nla_put_string(skb, IFLA_IFNAME, dev->name) ||
1335 nla_put_u32(skb, IFLA_TXQLEN, dev->tx_queue_len) ||
1336 nla_put_u8(skb, IFLA_OPERSTATE,
1337 netif_running(dev) ? dev->operstate : IF_OPER_DOWN) ||
1338 nla_put_u8(skb, IFLA_LINKMODE, dev->link_mode) ||
1339 nla_put_u32(skb, IFLA_MTU, dev->mtu) ||
1340 nla_put_u32(skb, IFLA_GROUP, dev->group) ||
edbc0bb3 1341 nla_put_u32(skb, IFLA_PROMISCUITY, dev->promiscuity) ||
76ff5cc9 1342 nla_put_u32(skb, IFLA_NUM_TX_QUEUES, dev->num_tx_queues) ||
c70ce028
ED
1343 nla_put_u32(skb, IFLA_GSO_MAX_SEGS, dev->gso_max_segs) ||
1344 nla_put_u32(skb, IFLA_GSO_MAX_SIZE, dev->gso_max_size) ||
1d69c2b3 1345#ifdef CONFIG_RPS
76ff5cc9 1346 nla_put_u32(skb, IFLA_NUM_RX_QUEUES, dev->num_rx_queues) ||
1d69c2b3 1347#endif
a54acb3a
ND
1348 (dev->ifindex != dev_get_iflink(dev) &&
1349 nla_put_u32(skb, IFLA_LINK, dev_get_iflink(dev))) ||
898e5061
JP
1350 (upper_dev &&
1351 nla_put_u32(skb, IFLA_MASTER, upper_dev->ifindex)) ||
9a57247f 1352 nla_put_u8(skb, IFLA_CARRIER, netif_carrier_ok(dev)) ||
a6574349
DM
1353 (dev->qdisc &&
1354 nla_put_string(skb, IFLA_QDISC, dev->qdisc->ops->id)) ||
1355 (dev->ifalias &&
2d3b479d 1356 nla_put_string(skb, IFLA_IFALIAS, dev->ifalias)) ||
1357 nla_put_u32(skb, IFLA_CARRIER_CHANGES,
88d6378b
AK
1358 atomic_read(&dev->carrier_changes)) ||
1359 nla_put_u8(skb, IFLA_PROTO_DOWN, dev->proto_down))
a6574349 1360 goto nla_put_failure;
0b815a1a 1361
3d3ea5af
VY
1362 if (event != IFLA_EVENT_NONE) {
1363 if (nla_put_u32(skb, IFLA_EVENT, event))
1364 goto nla_put_failure;
1365 }
1366
b22b941b
HFS
1367 if (rtnl_fill_link_ifmap(skb, dev))
1368 goto nla_put_failure;
1da177e4
LT
1369
1370 if (dev->addr_len) {
a6574349
DM
1371 if (nla_put(skb, IFLA_ADDRESS, dev->addr_len, dev->dev_addr) ||
1372 nla_put(skb, IFLA_BROADCAST, dev->addr_len, dev->broadcast))
1373 goto nla_put_failure;
1da177e4
LT
1374 }
1375
66cae9ed
JP
1376 if (rtnl_phys_port_id_fill(skb, dev))
1377 goto nla_put_failure;
1378
db24a904
DA
1379 if (rtnl_phys_port_name_fill(skb, dev))
1380 goto nla_put_failure;
1381
82f28412
JP
1382 if (rtnl_phys_switch_id_fill(skb, dev))
1383 goto nla_put_failure;
1384
b22b941b 1385 if (rtnl_fill_stats(skb, dev))
10708f37 1386 goto nla_put_failure;
10708f37 1387
a6574349
DM
1388 if (dev->dev.parent && (ext_filter_mask & RTEXT_FILTER_VF) &&
1389 nla_put_u32(skb, IFLA_NUM_VF, dev_num_vf(dev->dev.parent)))
1390 goto nla_put_failure;
57b61080 1391
b22b941b
HFS
1392 if (dev->netdev_ops->ndo_get_vf_config && dev->dev.parent &&
1393 ext_filter_mask & RTEXT_FILTER_VF) {
ebc08a6f 1394 int i;
b22b941b 1395 struct nlattr *vfinfo;
c02db8c6
CW
1396 int num_vfs = dev_num_vf(dev->dev.parent);
1397
c02db8c6
CW
1398 vfinfo = nla_nest_start(skb, IFLA_VFINFO_LIST);
1399 if (!vfinfo)
1400 goto nla_put_failure;
1401 for (i = 0; i < num_vfs; i++) {
b22b941b 1402 if (rtnl_fill_vfinfo(skb, dev, i, vfinfo))
3b766cd8 1403 goto nla_put_failure;
ebc08a6f 1404 }
b22b941b 1405
c02db8c6 1406 nla_nest_end(skb, vfinfo);
ebc08a6f 1407 }
57b61080 1408
c53864fd 1409 if (rtnl_port_fill(skb, dev, ext_filter_mask))
57b61080
SF
1410 goto nla_put_failure;
1411
d1fdd913
BB
1412 if (rtnl_xdp_fill(skb, dev))
1413 goto nla_put_failure;
1414
ba7d49b1 1415 if (dev->rtnl_link_ops || rtnl_have_link_slave_info(dev)) {
38f7b870
PM
1416 if (rtnl_link_fill(skb, dev) < 0)
1417 goto nla_put_failure;
1418 }
1419
d37512a2
ND
1420 if (dev->rtnl_link_ops &&
1421 dev->rtnl_link_ops->get_link_net) {
1422 struct net *link_net = dev->rtnl_link_ops->get_link_net(dev);
1423
1424 if (!net_eq(dev_net(dev), link_net)) {
7a0877d4 1425 int id = peernet2id_alloc(dev_net(dev), link_net);
d37512a2
ND
1426
1427 if (nla_put_s32(skb, IFLA_LINK_NETNSID, id))
1428 goto nla_put_failure;
1429 }
1430 }
1431
f8ff182c
TG
1432 if (!(af_spec = nla_nest_start(skb, IFLA_AF_SPEC)))
1433 goto nla_put_failure;
1434
1435 list_for_each_entry(af_ops, &rtnl_af_ops, list) {
1436 if (af_ops->fill_link_af) {
1437 struct nlattr *af;
1438 int err;
1439
1440 if (!(af = nla_nest_start(skb, af_ops->family)))
1441 goto nla_put_failure;
1442
d5566fd7 1443 err = af_ops->fill_link_af(skb, dev, ext_filter_mask);
f8ff182c
TG
1444
1445 /*
1446 * Caller may return ENODATA to indicate that there
1447 * was no data to be dumped. This is not an error, it
1448 * means we should trim the attribute header and
1449 * continue.
1450 */
1451 if (err == -ENODATA)
1452 nla_nest_cancel(skb, af);
1453 else if (err < 0)
1454 goto nla_put_failure;
1455
1456 nla_nest_end(skb, af);
1457 }
1458 }
1459
1460 nla_nest_end(skb, af_spec);
1461
053c095a
JB
1462 nlmsg_end(skb, nlh);
1463 return 0;
b60c5115
TG
1464
1465nla_put_failure:
26932566
PM
1466 nlmsg_cancel(skb, nlh);
1467 return -EMSGSIZE;
1da177e4
LT
1468}
1469
f7b12606 1470static const struct nla_policy ifla_policy[IFLA_MAX+1] = {
5176f91e 1471 [IFLA_IFNAME] = { .type = NLA_STRING, .len = IFNAMSIZ-1 },
38f7b870
PM
1472 [IFLA_ADDRESS] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN },
1473 [IFLA_BROADCAST] = { .type = NLA_BINARY, .len = MAX_ADDR_LEN },
5176f91e 1474 [IFLA_MAP] = { .len = sizeof(struct rtnl_link_ifmap) },
da5e0494 1475 [IFLA_MTU] = { .type = NLA_U32 },
76e87306 1476 [IFLA_LINK] = { .type = NLA_U32 },
fbaec0ea 1477 [IFLA_MASTER] = { .type = NLA_U32 },
9a57247f 1478 [IFLA_CARRIER] = { .type = NLA_U8 },
da5e0494
TG
1479 [IFLA_TXQLEN] = { .type = NLA_U32 },
1480 [IFLA_WEIGHT] = { .type = NLA_U32 },
1481 [IFLA_OPERSTATE] = { .type = NLA_U8 },
1482 [IFLA_LINKMODE] = { .type = NLA_U8 },
76e87306 1483 [IFLA_LINKINFO] = { .type = NLA_NESTED },
d8a5ec67 1484 [IFLA_NET_NS_PID] = { .type = NLA_U32 },
f0630529 1485 [IFLA_NET_NS_FD] = { .type = NLA_U32 },
0b815a1a 1486 [IFLA_IFALIAS] = { .type = NLA_STRING, .len = IFALIASZ-1 },
c02db8c6 1487 [IFLA_VFINFO_LIST] = {. type = NLA_NESTED },
57b61080
SF
1488 [IFLA_VF_PORTS] = { .type = NLA_NESTED },
1489 [IFLA_PORT_SELF] = { .type = NLA_NESTED },
f8ff182c 1490 [IFLA_AF_SPEC] = { .type = NLA_NESTED },
115c9b81 1491 [IFLA_EXT_MASK] = { .type = NLA_U32 },
edbc0bb3 1492 [IFLA_PROMISCUITY] = { .type = NLA_U32 },
76ff5cc9
JP
1493 [IFLA_NUM_TX_QUEUES] = { .type = NLA_U32 },
1494 [IFLA_NUM_RX_QUEUES] = { .type = NLA_U32 },
02637fce 1495 [IFLA_PHYS_PORT_ID] = { .type = NLA_BINARY, .len = MAX_PHYS_ITEM_ID_LEN },
2d3b479d 1496 [IFLA_CARRIER_CHANGES] = { .type = NLA_U32 }, /* ignored */
82f28412 1497 [IFLA_PHYS_SWITCH_ID] = { .type = NLA_BINARY, .len = MAX_PHYS_ITEM_ID_LEN },
317f4810 1498 [IFLA_LINK_NETNSID] = { .type = NLA_S32 },
88d6378b 1499 [IFLA_PROTO_DOWN] = { .type = NLA_U8 },
d1fdd913 1500 [IFLA_XDP] = { .type = NLA_NESTED },
3d3ea5af 1501 [IFLA_EVENT] = { .type = NLA_U32 },
db833d40 1502 [IFLA_GROUP] = { .type = NLA_U32 },
da5e0494
TG
1503};
1504
38f7b870
PM
1505static const struct nla_policy ifla_info_policy[IFLA_INFO_MAX+1] = {
1506 [IFLA_INFO_KIND] = { .type = NLA_STRING },
1507 [IFLA_INFO_DATA] = { .type = NLA_NESTED },
ba7d49b1
JP
1508 [IFLA_INFO_SLAVE_KIND] = { .type = NLA_STRING },
1509 [IFLA_INFO_SLAVE_DATA] = { .type = NLA_NESTED },
38f7b870
PM
1510};
1511
c02db8c6 1512static const struct nla_policy ifla_vf_policy[IFLA_VF_MAX+1] = {
364d5716
DB
1513 [IFLA_VF_MAC] = { .len = sizeof(struct ifla_vf_mac) },
1514 [IFLA_VF_VLAN] = { .len = sizeof(struct ifla_vf_vlan) },
79aab093 1515 [IFLA_VF_VLAN_LIST] = { .type = NLA_NESTED },
364d5716
DB
1516 [IFLA_VF_TX_RATE] = { .len = sizeof(struct ifla_vf_tx_rate) },
1517 [IFLA_VF_SPOOFCHK] = { .len = sizeof(struct ifla_vf_spoofchk) },
1518 [IFLA_VF_RATE] = { .len = sizeof(struct ifla_vf_rate) },
1519 [IFLA_VF_LINK_STATE] = { .len = sizeof(struct ifla_vf_link_state) },
01a3d796 1520 [IFLA_VF_RSS_QUERY_EN] = { .len = sizeof(struct ifla_vf_rss_query_en) },
3b766cd8 1521 [IFLA_VF_STATS] = { .type = NLA_NESTED },
dd461d6a 1522 [IFLA_VF_TRUST] = { .len = sizeof(struct ifla_vf_trust) },
cc8e27cc
EC
1523 [IFLA_VF_IB_NODE_GUID] = { .len = sizeof(struct ifla_vf_guid) },
1524 [IFLA_VF_IB_PORT_GUID] = { .len = sizeof(struct ifla_vf_guid) },
3b766cd8
EBE
1525};
1526
57b61080
SF
1527static const struct nla_policy ifla_port_policy[IFLA_PORT_MAX+1] = {
1528 [IFLA_PORT_VF] = { .type = NLA_U32 },
1529 [IFLA_PORT_PROFILE] = { .type = NLA_STRING,
1530 .len = PORT_PROFILE_MAX },
57b61080
SF
1531 [IFLA_PORT_INSTANCE_UUID] = { .type = NLA_BINARY,
1532 .len = PORT_UUID_MAX },
1533 [IFLA_PORT_HOST_UUID] = { .type = NLA_STRING,
1534 .len = PORT_UUID_MAX },
1535 [IFLA_PORT_REQUEST] = { .type = NLA_U8, },
1536 [IFLA_PORT_RESPONSE] = { .type = NLA_U16, },
025331df
DB
1537
1538 /* Unused, but we need to keep it here since user space could
1539 * fill it. It's also broken with regard to NLA_BINARY use in
1540 * combination with structs.
1541 */
1542 [IFLA_PORT_VSI_TYPE] = { .type = NLA_BINARY,
1543 .len = sizeof(struct ifla_port_vsi) },
57b61080
SF
1544};
1545
d1fdd913
BB
1546static const struct nla_policy ifla_xdp_policy[IFLA_XDP_MAX + 1] = {
1547 [IFLA_XDP_FD] = { .type = NLA_S32 },
1548 [IFLA_XDP_ATTACHED] = { .type = NLA_U8 },
85de8576 1549 [IFLA_XDP_FLAGS] = { .type = NLA_U32 },
58038695 1550 [IFLA_XDP_PROG_ID] = { .type = NLA_U32 },
d1fdd913
BB
1551};
1552
dc599f76
DA
1553static const struct rtnl_link_ops *linkinfo_to_kind_ops(const struct nlattr *nla)
1554{
1555 const struct rtnl_link_ops *ops = NULL;
1556 struct nlattr *linfo[IFLA_INFO_MAX + 1];
1557
fceb6435
JB
1558 if (nla_parse_nested(linfo, IFLA_INFO_MAX, nla,
1559 ifla_info_policy, NULL) < 0)
dc599f76
DA
1560 return NULL;
1561
1562 if (linfo[IFLA_INFO_KIND]) {
1563 char kind[MODULE_NAME_LEN];
1564
1565 nla_strlcpy(kind, linfo[IFLA_INFO_KIND], sizeof(kind));
1566 ops = rtnl_link_ops_get(kind);
1567 }
1568
1569 return ops;
1570}
1571
1572static bool link_master_filtered(struct net_device *dev, int master_idx)
1573{
1574 struct net_device *master;
1575
1576 if (!master_idx)
1577 return false;
1578
1579 master = netdev_master_upper_dev_get(dev);
1580 if (!master || master->ifindex != master_idx)
1581 return true;
1582
1583 return false;
1584}
1585
1586static bool link_kind_filtered(const struct net_device *dev,
1587 const struct rtnl_link_ops *kind_ops)
1588{
1589 if (kind_ops && dev->rtnl_link_ops != kind_ops)
1590 return true;
1591
1592 return false;
1593}
1594
1595static bool link_dump_filtered(struct net_device *dev,
1596 int master_idx,
1597 const struct rtnl_link_ops *kind_ops)
1598{
1599 if (link_master_filtered(dev, master_idx) ||
1600 link_kind_filtered(dev, kind_ops))
1601 return true;
1602
1603 return false;
1604}
1605
f7b12606
JP
1606static int rtnl_dump_ifinfo(struct sk_buff *skb, struct netlink_callback *cb)
1607{
1608 struct net *net = sock_net(skb->sk);
1609 int h, s_h;
1610 int idx = 0, s_idx;
1611 struct net_device *dev;
1612 struct hlist_head *head;
1613 struct nlattr *tb[IFLA_MAX+1];
1614 u32 ext_filter_mask = 0;
dc599f76
DA
1615 const struct rtnl_link_ops *kind_ops = NULL;
1616 unsigned int flags = NLM_F_MULTI;
1617 int master_idx = 0;
973462bb 1618 int err;
e5eca6d4 1619 int hdrlen;
f7b12606
JP
1620
1621 s_h = cb->args[0];
1622 s_idx = cb->args[1];
1623
f7b12606
JP
1624 cb->seq = net->dev_base_seq;
1625
e5eca6d4
MS
1626 /* A hack to preserve kernel<->userspace interface.
1627 * The correct header is ifinfomsg. It is consistent with rtnl_getlink.
1628 * However, before Linux v3.9 the code here assumed rtgenmsg and that's
1629 * what iproute2 < v3.9.0 used.
1630 * We can detect the old iproute2. Even including the IFLA_EXT_MASK
1631 * attribute, its netlink message is shorter than struct ifinfomsg.
1632 */
1633 hdrlen = nlmsg_len(cb->nlh) < sizeof(struct ifinfomsg) ?
1634 sizeof(struct rtgenmsg) : sizeof(struct ifinfomsg);
1635
fceb6435
JB
1636 if (nlmsg_parse(cb->nlh, hdrlen, tb, IFLA_MAX,
1637 ifla_policy, NULL) >= 0) {
f7b12606
JP
1638 if (tb[IFLA_EXT_MASK])
1639 ext_filter_mask = nla_get_u32(tb[IFLA_EXT_MASK]);
dc599f76
DA
1640
1641 if (tb[IFLA_MASTER])
1642 master_idx = nla_get_u32(tb[IFLA_MASTER]);
1643
1644 if (tb[IFLA_LINKINFO])
1645 kind_ops = linkinfo_to_kind_ops(tb[IFLA_LINKINFO]);
1646
1647 if (master_idx || kind_ops)
1648 flags |= NLM_F_DUMP_FILTERED;
f7b12606
JP
1649 }
1650
1651 for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
1652 idx = 0;
1653 head = &net->dev_index_head[h];
cac5e65e 1654 hlist_for_each_entry(dev, head, index_hlist) {
dc599f76 1655 if (link_dump_filtered(dev, master_idx, kind_ops))
3f0ae05d 1656 goto cont;
f7b12606
JP
1657 if (idx < s_idx)
1658 goto cont;
973462bb
DG
1659 err = rtnl_fill_ifinfo(skb, dev, RTM_NEWLINK,
1660 NETLINK_CB(cb->skb).portid,
1661 cb->nlh->nlmsg_seq, 0,
dc599f76 1662 flags,
3d3ea5af 1663 ext_filter_mask, 0);
973462bb 1664
f6c5775f
DA
1665 if (err < 0) {
1666 if (likely(skb->len))
1667 goto out;
1668
1669 goto out_err;
1670 }
f7b12606
JP
1671
1672 nl_dump_check_consistent(cb, nlmsg_hdr(skb));
1673cont:
1674 idx++;
1675 }
1676 }
1677out:
f6c5775f
DA
1678 err = skb->len;
1679out_err:
f7b12606
JP
1680 cb->args[1] = idx;
1681 cb->args[0] = h;
1682
f6c5775f 1683 return err;
f7b12606
JP
1684}
1685
fceb6435
JB
1686int rtnl_nla_parse_ifla(struct nlattr **tb, const struct nlattr *head, int len,
1687 struct netlink_ext_ack *exterr)
f7b12606 1688{
fceb6435 1689 return nla_parse(tb, IFLA_MAX, head, len, ifla_policy, exterr);
f7b12606
JP
1690}
1691EXPORT_SYMBOL(rtnl_nla_parse_ifla);
1692
81adee47
EB
1693struct net *rtnl_link_get_net(struct net *src_net, struct nlattr *tb[])
1694{
1695 struct net *net;
1696 /* Examine the link attributes and figure out which
1697 * network namespace we are talking about.
1698 */
1699 if (tb[IFLA_NET_NS_PID])
1700 net = get_net_ns_by_pid(nla_get_u32(tb[IFLA_NET_NS_PID]));
f0630529
EB
1701 else if (tb[IFLA_NET_NS_FD])
1702 net = get_net_ns_by_fd(nla_get_u32(tb[IFLA_NET_NS_FD]));
81adee47
EB
1703 else
1704 net = get_net(src_net);
1705 return net;
1706}
1707EXPORT_SYMBOL(rtnl_link_get_net);
1708
1840bb13
TG
1709static int validate_linkmsg(struct net_device *dev, struct nlattr *tb[])
1710{
1711 if (dev) {
1712 if (tb[IFLA_ADDRESS] &&
1713 nla_len(tb[IFLA_ADDRESS]) < dev->addr_len)
1714 return -EINVAL;
1715
1716 if (tb[IFLA_BROADCAST] &&
1717 nla_len(tb[IFLA_BROADCAST]) < dev->addr_len)
1718 return -EINVAL;
1719 }
1720
cf7afbfe
TG
1721 if (tb[IFLA_AF_SPEC]) {
1722 struct nlattr *af;
1723 int rem, err;
1724
1725 nla_for_each_nested(af, tb[IFLA_AF_SPEC], rem) {
1726 const struct rtnl_af_ops *af_ops;
1727
1728 if (!(af_ops = rtnl_af_lookup(nla_type(af))))
1729 return -EAFNOSUPPORT;
1730
1731 if (!af_ops->set_link_af)
1732 return -EOPNOTSUPP;
1733
1734 if (af_ops->validate_link_af) {
6d3a9a68 1735 err = af_ops->validate_link_af(dev, af);
cf7afbfe
TG
1736 if (err < 0)
1737 return err;
1738 }
1739 }
1740 }
1741
1840bb13
TG
1742 return 0;
1743}
1744
cc8e27cc
EC
1745static int handle_infiniband_guid(struct net_device *dev, struct ifla_vf_guid *ivt,
1746 int guid_type)
1747{
1748 const struct net_device_ops *ops = dev->netdev_ops;
1749
1750 return ops->ndo_set_vf_guid(dev, ivt->vf, ivt->guid, guid_type);
1751}
1752
1753static int handle_vf_guid(struct net_device *dev, struct ifla_vf_guid *ivt, int guid_type)
1754{
1755 if (dev->type != ARPHRD_INFINIBAND)
1756 return -EOPNOTSUPP;
1757
1758 return handle_infiniband_guid(dev, ivt, guid_type);
1759}
1760
4f7d2cdf 1761static int do_setvfinfo(struct net_device *dev, struct nlattr **tb)
c02db8c6 1762{
c02db8c6 1763 const struct net_device_ops *ops = dev->netdev_ops;
4f7d2cdf 1764 int err = -EINVAL;
c02db8c6 1765
4f7d2cdf
DB
1766 if (tb[IFLA_VF_MAC]) {
1767 struct ifla_vf_mac *ivm = nla_data(tb[IFLA_VF_MAC]);
01a3d796 1768
4f7d2cdf
DB
1769 err = -EOPNOTSUPP;
1770 if (ops->ndo_set_vf_mac)
1771 err = ops->ndo_set_vf_mac(dev, ivm->vf,
1772 ivm->mac);
1773 if (err < 0)
1774 return err;
1775 }
1776
1777 if (tb[IFLA_VF_VLAN]) {
1778 struct ifla_vf_vlan *ivv = nla_data(tb[IFLA_VF_VLAN]);
1779
1780 err = -EOPNOTSUPP;
1781 if (ops->ndo_set_vf_vlan)
1782 err = ops->ndo_set_vf_vlan(dev, ivv->vf, ivv->vlan,
79aab093
MS
1783 ivv->qos,
1784 htons(ETH_P_8021Q));
1785 if (err < 0)
1786 return err;
1787 }
1788
1789 if (tb[IFLA_VF_VLAN_LIST]) {
1790 struct ifla_vf_vlan_info *ivvl[MAX_VLAN_LIST_LEN];
1791 struct nlattr *attr;
1792 int rem, len = 0;
1793
1794 err = -EOPNOTSUPP;
1795 if (!ops->ndo_set_vf_vlan)
1796 return err;
1797
1798 nla_for_each_nested(attr, tb[IFLA_VF_VLAN_LIST], rem) {
1799 if (nla_type(attr) != IFLA_VF_VLAN_INFO ||
1800 nla_len(attr) < NLA_HDRLEN) {
1801 return -EINVAL;
1802 }
1803 if (len >= MAX_VLAN_LIST_LEN)
1804 return -EOPNOTSUPP;
1805 ivvl[len] = nla_data(attr);
1806
1807 len++;
1808 }
fa34cd94
AB
1809 if (len == 0)
1810 return -EINVAL;
1811
79aab093
MS
1812 err = ops->ndo_set_vf_vlan(dev, ivvl[0]->vf, ivvl[0]->vlan,
1813 ivvl[0]->qos, ivvl[0]->vlan_proto);
4f7d2cdf
DB
1814 if (err < 0)
1815 return err;
c02db8c6 1816 }
4f7d2cdf
DB
1817
1818 if (tb[IFLA_VF_TX_RATE]) {
1819 struct ifla_vf_tx_rate *ivt = nla_data(tb[IFLA_VF_TX_RATE]);
1820 struct ifla_vf_info ivf;
1821
1822 err = -EOPNOTSUPP;
1823 if (ops->ndo_get_vf_config)
1824 err = ops->ndo_get_vf_config(dev, ivt->vf, &ivf);
1825 if (err < 0)
1826 return err;
1827
1828 err = -EOPNOTSUPP;
1829 if (ops->ndo_set_vf_rate)
1830 err = ops->ndo_set_vf_rate(dev, ivt->vf,
1831 ivf.min_tx_rate,
1832 ivt->rate);
1833 if (err < 0)
1834 return err;
1835 }
1836
1837 if (tb[IFLA_VF_RATE]) {
1838 struct ifla_vf_rate *ivt = nla_data(tb[IFLA_VF_RATE]);
1839
1840 err = -EOPNOTSUPP;
1841 if (ops->ndo_set_vf_rate)
1842 err = ops->ndo_set_vf_rate(dev, ivt->vf,
1843 ivt->min_tx_rate,
1844 ivt->max_tx_rate);
1845 if (err < 0)
1846 return err;
1847 }
1848
1849 if (tb[IFLA_VF_SPOOFCHK]) {
1850 struct ifla_vf_spoofchk *ivs = nla_data(tb[IFLA_VF_SPOOFCHK]);
1851
1852 err = -EOPNOTSUPP;
1853 if (ops->ndo_set_vf_spoofchk)
1854 err = ops->ndo_set_vf_spoofchk(dev, ivs->vf,
1855 ivs->setting);
1856 if (err < 0)
1857 return err;
1858 }
1859
1860 if (tb[IFLA_VF_LINK_STATE]) {
1861 struct ifla_vf_link_state *ivl = nla_data(tb[IFLA_VF_LINK_STATE]);
1862
1863 err = -EOPNOTSUPP;
1864 if (ops->ndo_set_vf_link_state)
1865 err = ops->ndo_set_vf_link_state(dev, ivl->vf,
1866 ivl->link_state);
1867 if (err < 0)
1868 return err;
1869 }
1870
1871 if (tb[IFLA_VF_RSS_QUERY_EN]) {
1872 struct ifla_vf_rss_query_en *ivrssq_en;
1873
1874 err = -EOPNOTSUPP;
1875 ivrssq_en = nla_data(tb[IFLA_VF_RSS_QUERY_EN]);
1876 if (ops->ndo_set_vf_rss_query_en)
1877 err = ops->ndo_set_vf_rss_query_en(dev, ivrssq_en->vf,
1878 ivrssq_en->setting);
1879 if (err < 0)
1880 return err;
1881 }
1882
dd461d6a
HS
1883 if (tb[IFLA_VF_TRUST]) {
1884 struct ifla_vf_trust *ivt = nla_data(tb[IFLA_VF_TRUST]);
1885
1886 err = -EOPNOTSUPP;
1887 if (ops->ndo_set_vf_trust)
1888 err = ops->ndo_set_vf_trust(dev, ivt->vf, ivt->setting);
1889 if (err < 0)
1890 return err;
1891 }
1892
cc8e27cc
EC
1893 if (tb[IFLA_VF_IB_NODE_GUID]) {
1894 struct ifla_vf_guid *ivt = nla_data(tb[IFLA_VF_IB_NODE_GUID]);
1895
1896 if (!ops->ndo_set_vf_guid)
1897 return -EOPNOTSUPP;
1898
1899 return handle_vf_guid(dev, ivt, IFLA_VF_IB_NODE_GUID);
1900 }
1901
1902 if (tb[IFLA_VF_IB_PORT_GUID]) {
1903 struct ifla_vf_guid *ivt = nla_data(tb[IFLA_VF_IB_PORT_GUID]);
1904
1905 if (!ops->ndo_set_vf_guid)
1906 return -EOPNOTSUPP;
1907
1908 return handle_vf_guid(dev, ivt, IFLA_VF_IB_PORT_GUID);
1909 }
1910
c02db8c6
CW
1911 return err;
1912}
1913
fbaec0ea
JP
1914static int do_set_master(struct net_device *dev, int ifindex)
1915{
898e5061 1916 struct net_device *upper_dev = netdev_master_upper_dev_get(dev);
fbaec0ea
JP
1917 const struct net_device_ops *ops;
1918 int err;
1919
898e5061
JP
1920 if (upper_dev) {
1921 if (upper_dev->ifindex == ifindex)
fbaec0ea 1922 return 0;
898e5061 1923 ops = upper_dev->netdev_ops;
fbaec0ea 1924 if (ops->ndo_del_slave) {
898e5061 1925 err = ops->ndo_del_slave(upper_dev, dev);
fbaec0ea
JP
1926 if (err)
1927 return err;
1928 } else {
1929 return -EOPNOTSUPP;
1930 }
1931 }
1932
1933 if (ifindex) {
898e5061
JP
1934 upper_dev = __dev_get_by_index(dev_net(dev), ifindex);
1935 if (!upper_dev)
fbaec0ea 1936 return -EINVAL;
898e5061 1937 ops = upper_dev->netdev_ops;
fbaec0ea 1938 if (ops->ndo_add_slave) {
898e5061 1939 err = ops->ndo_add_slave(upper_dev, dev);
fbaec0ea
JP
1940 if (err)
1941 return err;
1942 } else {
1943 return -EOPNOTSUPP;
1944 }
1945 }
1946 return 0;
1947}
1948
90c325e3 1949#define DO_SETLINK_MODIFIED 0x01
ba998906
ND
1950/* notify flag means notify + modified. */
1951#define DO_SETLINK_NOTIFY 0x03
90f62cf3
EB
1952static int do_setlink(const struct sk_buff *skb,
1953 struct net_device *dev, struct ifinfomsg *ifm,
ddf9f970 1954 struct netlink_ext_ack *extack,
90c325e3 1955 struct nlattr **tb, char *ifname, int status)
1da177e4 1956{
d314774c 1957 const struct net_device_ops *ops = dev->netdev_ops;
0157f60c 1958 int err;
1da177e4 1959
f0630529 1960 if (tb[IFLA_NET_NS_PID] || tb[IFLA_NET_NS_FD]) {
81adee47 1961 struct net *net = rtnl_link_get_net(dev_net(dev), tb);
d8a5ec67
EB
1962 if (IS_ERR(net)) {
1963 err = PTR_ERR(net);
1964 goto errout;
1965 }
90f62cf3 1966 if (!netlink_ns_capable(skb, net->user_ns, CAP_NET_ADMIN)) {
e0ebde0e 1967 put_net(net);
b51642f6
EB
1968 err = -EPERM;
1969 goto errout;
1970 }
d8a5ec67
EB
1971 err = dev_change_net_namespace(dev, net, ifname);
1972 put_net(net);
1973 if (err)
1974 goto errout;
90c325e3 1975 status |= DO_SETLINK_MODIFIED;
d8a5ec67
EB
1976 }
1977
da5e0494 1978 if (tb[IFLA_MAP]) {
1da177e4
LT
1979 struct rtnl_link_ifmap *u_map;
1980 struct ifmap k_map;
1981
d314774c 1982 if (!ops->ndo_set_config) {
1da177e4 1983 err = -EOPNOTSUPP;
0157f60c 1984 goto errout;
1da177e4
LT
1985 }
1986
1987 if (!netif_device_present(dev)) {
1988 err = -ENODEV;
0157f60c 1989 goto errout;
1da177e4 1990 }
1da177e4 1991
da5e0494 1992 u_map = nla_data(tb[IFLA_MAP]);
1da177e4
LT
1993 k_map.mem_start = (unsigned long) u_map->mem_start;
1994 k_map.mem_end = (unsigned long) u_map->mem_end;
1995 k_map.base_addr = (unsigned short) u_map->base_addr;
1996 k_map.irq = (unsigned char) u_map->irq;
1997 k_map.dma = (unsigned char) u_map->dma;
1998 k_map.port = (unsigned char) u_map->port;
1999
d314774c 2000 err = ops->ndo_set_config(dev, &k_map);
da5e0494 2001 if (err < 0)
0157f60c 2002 goto errout;
1da177e4 2003
ba998906 2004 status |= DO_SETLINK_NOTIFY;
1da177e4
LT
2005 }
2006
da5e0494 2007 if (tb[IFLA_ADDRESS]) {
70f8e78e
DM
2008 struct sockaddr *sa;
2009 int len;
2010
153711f9
WC
2011 len = sizeof(sa_family_t) + max_t(size_t, dev->addr_len,
2012 sizeof(*sa));
70f8e78e
DM
2013 sa = kmalloc(len, GFP_KERNEL);
2014 if (!sa) {
2015 err = -ENOMEM;
0157f60c 2016 goto errout;
70f8e78e
DM
2017 }
2018 sa->sa_family = dev->type;
da5e0494 2019 memcpy(sa->sa_data, nla_data(tb[IFLA_ADDRESS]),
70f8e78e 2020 dev->addr_len);
e7c3273e 2021 err = dev_set_mac_address(dev, sa);
70f8e78e 2022 kfree(sa);
1da177e4 2023 if (err)
0157f60c 2024 goto errout;
90c325e3 2025 status |= DO_SETLINK_MODIFIED;
1da177e4
LT
2026 }
2027
da5e0494
TG
2028 if (tb[IFLA_MTU]) {
2029 err = dev_set_mtu(dev, nla_get_u32(tb[IFLA_MTU]));
2030 if (err < 0)
0157f60c 2031 goto errout;
90c325e3 2032 status |= DO_SETLINK_MODIFIED;
1da177e4
LT
2033 }
2034
cbda10fa
VD
2035 if (tb[IFLA_GROUP]) {
2036 dev_set_group(dev, nla_get_u32(tb[IFLA_GROUP]));
ba998906 2037 status |= DO_SETLINK_NOTIFY;
cbda10fa
VD
2038 }
2039
da5e0494
TG
2040 /*
2041 * Interface selected by interface index but interface
2042 * name provided implies that a name change has been
2043 * requested.
2044 */
51055be8 2045 if (ifm->ifi_index > 0 && ifname[0]) {
da5e0494
TG
2046 err = dev_change_name(dev, ifname);
2047 if (err < 0)
0157f60c 2048 goto errout;
90c325e3 2049 status |= DO_SETLINK_MODIFIED;
1da177e4
LT
2050 }
2051
0b815a1a
SH
2052 if (tb[IFLA_IFALIAS]) {
2053 err = dev_set_alias(dev, nla_data(tb[IFLA_IFALIAS]),
2054 nla_len(tb[IFLA_IFALIAS]));
2055 if (err < 0)
2056 goto errout;
ba998906 2057 status |= DO_SETLINK_NOTIFY;
0b815a1a
SH
2058 }
2059
da5e0494
TG
2060 if (tb[IFLA_BROADCAST]) {
2061 nla_memcpy(dev->broadcast, tb[IFLA_BROADCAST], dev->addr_len);
e7c3273e 2062 call_netdevice_notifiers(NETDEV_CHANGEADDR, dev);
1da177e4
LT
2063 }
2064
83b496e9 2065 if (ifm->ifi_flags || ifm->ifi_change) {
3729d502 2066 err = dev_change_flags(dev, rtnl_dev_combine_flags(dev, ifm));
5f9021cf
JB
2067 if (err < 0)
2068 goto errout;
83b496e9 2069 }
1da177e4 2070
fbaec0ea
JP
2071 if (tb[IFLA_MASTER]) {
2072 err = do_set_master(dev, nla_get_u32(tb[IFLA_MASTER]));
2073 if (err)
2074 goto errout;
90c325e3 2075 status |= DO_SETLINK_MODIFIED;
fbaec0ea
JP
2076 }
2077
9a57247f
JP
2078 if (tb[IFLA_CARRIER]) {
2079 err = dev_change_carrier(dev, nla_get_u8(tb[IFLA_CARRIER]));
2080 if (err)
2081 goto errout;
90c325e3 2082 status |= DO_SETLINK_MODIFIED;
9a57247f
JP
2083 }
2084
5d1180fc 2085 if (tb[IFLA_TXQLEN]) {
0cd29503
AD
2086 unsigned int value = nla_get_u32(tb[IFLA_TXQLEN]);
2087 unsigned int orig_len = dev->tx_queue_len;
08294a26
JW
2088
2089 if (dev->tx_queue_len ^ value) {
2090 dev->tx_queue_len = value;
2091 err = call_netdevice_notifiers(
2092 NETDEV_CHANGE_TX_QUEUE_LEN, dev);
2093 err = notifier_to_errno(err);
2094 if (err) {
2095 dev->tx_queue_len = orig_len;
2096 goto errout;
2097 }
ba998906 2098 status |= DO_SETLINK_NOTIFY;
08294a26 2099 }
5d1180fc 2100 }
b00055aa 2101
da5e0494 2102 if (tb[IFLA_OPERSTATE])
93b2d4a2 2103 set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE]));
b00055aa 2104
da5e0494 2105 if (tb[IFLA_LINKMODE]) {
1889b0e7
ND
2106 unsigned char value = nla_get_u8(tb[IFLA_LINKMODE]);
2107
93b2d4a2 2108 write_lock_bh(&dev_base_lock);
1889b0e7 2109 if (dev->link_mode ^ value)
ba998906 2110 status |= DO_SETLINK_NOTIFY;
1889b0e7 2111 dev->link_mode = value;
93b2d4a2 2112 write_unlock_bh(&dev_base_lock);
b00055aa
SR
2113 }
2114
c02db8c6 2115 if (tb[IFLA_VFINFO_LIST]) {
4f7d2cdf 2116 struct nlattr *vfinfo[IFLA_VF_MAX + 1];
c02db8c6
CW
2117 struct nlattr *attr;
2118 int rem;
4f7d2cdf 2119
c02db8c6 2120 nla_for_each_nested(attr, tb[IFLA_VFINFO_LIST], rem) {
4f7d2cdf
DB
2121 if (nla_type(attr) != IFLA_VF_INFO ||
2122 nla_len(attr) < NLA_HDRLEN) {
253683bb 2123 err = -EINVAL;
c02db8c6 2124 goto errout;
253683bb 2125 }
4f7d2cdf 2126 err = nla_parse_nested(vfinfo, IFLA_VF_MAX, attr,
fceb6435 2127 ifla_vf_policy, NULL);
4f7d2cdf
DB
2128 if (err < 0)
2129 goto errout;
2130 err = do_setvfinfo(dev, vfinfo);
c02db8c6
CW
2131 if (err < 0)
2132 goto errout;
ba998906 2133 status |= DO_SETLINK_NOTIFY;
c02db8c6 2134 }
ebc08a6f 2135 }
1da177e4
LT
2136 err = 0;
2137
57b61080
SF
2138 if (tb[IFLA_VF_PORTS]) {
2139 struct nlattr *port[IFLA_PORT_MAX+1];
2140 struct nlattr *attr;
2141 int vf;
2142 int rem;
2143
2144 err = -EOPNOTSUPP;
2145 if (!ops->ndo_set_vf_port)
2146 goto errout;
2147
2148 nla_for_each_nested(attr, tb[IFLA_VF_PORTS], rem) {
035d210f
DB
2149 if (nla_type(attr) != IFLA_VF_PORT ||
2150 nla_len(attr) < NLA_HDRLEN) {
2151 err = -EINVAL;
2152 goto errout;
2153 }
2154 err = nla_parse_nested(port, IFLA_PORT_MAX, attr,
fceb6435 2155 ifla_port_policy, NULL);
57b61080
SF
2156 if (err < 0)
2157 goto errout;
2158 if (!port[IFLA_PORT_VF]) {
2159 err = -EOPNOTSUPP;
2160 goto errout;
2161 }
2162 vf = nla_get_u32(port[IFLA_PORT_VF]);
2163 err = ops->ndo_set_vf_port(dev, vf, port);
2164 if (err < 0)
2165 goto errout;
ba998906 2166 status |= DO_SETLINK_NOTIFY;
57b61080
SF
2167 }
2168 }
2169 err = 0;
2170
2171 if (tb[IFLA_PORT_SELF]) {
2172 struct nlattr *port[IFLA_PORT_MAX+1];
2173
2174 err = nla_parse_nested(port, IFLA_PORT_MAX,
fceb6435
JB
2175 tb[IFLA_PORT_SELF], ifla_port_policy,
2176 NULL);
57b61080
SF
2177 if (err < 0)
2178 goto errout;
2179
2180 err = -EOPNOTSUPP;
2181 if (ops->ndo_set_vf_port)
2182 err = ops->ndo_set_vf_port(dev, PORT_SELF_VF, port);
2183 if (err < 0)
2184 goto errout;
ba998906 2185 status |= DO_SETLINK_NOTIFY;
57b61080 2186 }
f8ff182c
TG
2187
2188 if (tb[IFLA_AF_SPEC]) {
2189 struct nlattr *af;
2190 int rem;
2191
2192 nla_for_each_nested(af, tb[IFLA_AF_SPEC], rem) {
2193 const struct rtnl_af_ops *af_ops;
2194
2195 if (!(af_ops = rtnl_af_lookup(nla_type(af))))
cf7afbfe 2196 BUG();
f8ff182c 2197
cf7afbfe 2198 err = af_ops->set_link_af(dev, af);
f8ff182c
TG
2199 if (err < 0)
2200 goto errout;
2201
ba998906 2202 status |= DO_SETLINK_NOTIFY;
f8ff182c
TG
2203 }
2204 }
57b61080
SF
2205 err = 0;
2206
88d6378b
AK
2207 if (tb[IFLA_PROTO_DOWN]) {
2208 err = dev_change_proto_down(dev,
2209 nla_get_u8(tb[IFLA_PROTO_DOWN]));
2210 if (err)
2211 goto errout;
2212 status |= DO_SETLINK_NOTIFY;
2213 }
2214
d1fdd913
BB
2215 if (tb[IFLA_XDP]) {
2216 struct nlattr *xdp[IFLA_XDP_MAX + 1];
85de8576 2217 u32 xdp_flags = 0;
d1fdd913
BB
2218
2219 err = nla_parse_nested(xdp, IFLA_XDP_MAX, tb[IFLA_XDP],
fceb6435 2220 ifla_xdp_policy, NULL);
d1fdd913
BB
2221 if (err < 0)
2222 goto errout;
2223
58038695 2224 if (xdp[IFLA_XDP_ATTACHED] || xdp[IFLA_XDP_PROG_ID]) {
262d8625
BB
2225 err = -EINVAL;
2226 goto errout;
2227 }
85de8576
DB
2228
2229 if (xdp[IFLA_XDP_FLAGS]) {
2230 xdp_flags = nla_get_u32(xdp[IFLA_XDP_FLAGS]);
2231 if (xdp_flags & ~XDP_FLAGS_MASK) {
2232 err = -EINVAL;
2233 goto errout;
2234 }
ee5d032f 2235 if (hweight32(xdp_flags & XDP_FLAGS_MODES) > 1) {
0489df9a
DB
2236 err = -EINVAL;
2237 goto errout;
2238 }
85de8576
DB
2239 }
2240
d1fdd913 2241 if (xdp[IFLA_XDP_FD]) {
ddf9f970 2242 err = dev_change_xdp_fd(dev, extack,
85de8576
DB
2243 nla_get_s32(xdp[IFLA_XDP_FD]),
2244 xdp_flags);
d1fdd913
BB
2245 if (err)
2246 goto errout;
2247 status |= DO_SETLINK_NOTIFY;
2248 }
2249 }
2250
0157f60c 2251errout:
ba998906
ND
2252 if (status & DO_SETLINK_MODIFIED) {
2253 if (status & DO_SETLINK_NOTIFY)
2254 netdev_state_change(dev);
2255
2256 if (err < 0)
2257 net_warn_ratelimited("A link change request failed with some changes committed already. Interface %s may have been left with an inconsistent configuration, please check.\n",
2258 dev->name);
2259 }
da5e0494 2260
0157f60c
PM
2261 return err;
2262}
1da177e4 2263
c21ef3e3
DA
2264static int rtnl_setlink(struct sk_buff *skb, struct nlmsghdr *nlh,
2265 struct netlink_ext_ack *extack)
0157f60c 2266{
3b1e0a65 2267 struct net *net = sock_net(skb->sk);
0157f60c
PM
2268 struct ifinfomsg *ifm;
2269 struct net_device *dev;
2270 int err;
2271 struct nlattr *tb[IFLA_MAX+1];
2272 char ifname[IFNAMSIZ];
2273
c21ef3e3
DA
2274 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFLA_MAX, ifla_policy,
2275 extack);
0157f60c
PM
2276 if (err < 0)
2277 goto errout;
2278
2279 if (tb[IFLA_IFNAME])
2280 nla_strlcpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ);
2281 else
2282 ifname[0] = '\0';
2283
2284 err = -EINVAL;
2285 ifm = nlmsg_data(nlh);
2286 if (ifm->ifi_index > 0)
a3d12891 2287 dev = __dev_get_by_index(net, ifm->ifi_index);
0157f60c 2288 else if (tb[IFLA_IFNAME])
a3d12891 2289 dev = __dev_get_by_name(net, ifname);
0157f60c
PM
2290 else
2291 goto errout;
2292
2293 if (dev == NULL) {
2294 err = -ENODEV;
2295 goto errout;
2296 }
2297
e0d087af
ED
2298 err = validate_linkmsg(dev, tb);
2299 if (err < 0)
a3d12891 2300 goto errout;
0157f60c 2301
ddf9f970 2302 err = do_setlink(skb, dev, ifm, extack, tb, ifname, 0);
da5e0494 2303errout:
1da177e4
LT
2304 return err;
2305}
2306
66400d54
WC
2307static int rtnl_group_dellink(const struct net *net, int group)
2308{
2309 struct net_device *dev, *aux;
2310 LIST_HEAD(list_kill);
2311 bool found = false;
2312
2313 if (!group)
2314 return -EPERM;
2315
2316 for_each_netdev(net, dev) {
2317 if (dev->group == group) {
2318 const struct rtnl_link_ops *ops;
2319
2320 found = true;
2321 ops = dev->rtnl_link_ops;
2322 if (!ops || !ops->dellink)
2323 return -EOPNOTSUPP;
2324 }
2325 }
2326
2327 if (!found)
2328 return -ENODEV;
2329
2330 for_each_netdev_safe(net, dev, aux) {
2331 if (dev->group == group) {
2332 const struct rtnl_link_ops *ops;
2333
2334 ops = dev->rtnl_link_ops;
2335 ops->dellink(dev, &list_kill);
2336 }
2337 }
2338 unregister_netdevice_many(&list_kill);
2339
2340 return 0;
2341}
2342
614732ea
TG
2343int rtnl_delete_link(struct net_device *dev)
2344{
2345 const struct rtnl_link_ops *ops;
2346 LIST_HEAD(list_kill);
2347
2348 ops = dev->rtnl_link_ops;
2349 if (!ops || !ops->dellink)
2350 return -EOPNOTSUPP;
2351
2352 ops->dellink(dev, &list_kill);
2353 unregister_netdevice_many(&list_kill);
2354
2355 return 0;
2356}
2357EXPORT_SYMBOL_GPL(rtnl_delete_link);
2358
c21ef3e3
DA
2359static int rtnl_dellink(struct sk_buff *skb, struct nlmsghdr *nlh,
2360 struct netlink_ext_ack *extack)
38f7b870 2361{
3b1e0a65 2362 struct net *net = sock_net(skb->sk);
38f7b870
PM
2363 struct net_device *dev;
2364 struct ifinfomsg *ifm;
2365 char ifname[IFNAMSIZ];
2366 struct nlattr *tb[IFLA_MAX+1];
2367 int err;
2368
c21ef3e3 2369 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFLA_MAX, ifla_policy, extack);
38f7b870
PM
2370 if (err < 0)
2371 return err;
2372
2373 if (tb[IFLA_IFNAME])
2374 nla_strlcpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ);
2375
2376 ifm = nlmsg_data(nlh);
2377 if (ifm->ifi_index > 0)
881d966b 2378 dev = __dev_get_by_index(net, ifm->ifi_index);
38f7b870 2379 else if (tb[IFLA_IFNAME])
881d966b 2380 dev = __dev_get_by_name(net, ifname);
66400d54
WC
2381 else if (tb[IFLA_GROUP])
2382 return rtnl_group_dellink(net, nla_get_u32(tb[IFLA_GROUP]));
38f7b870
PM
2383 else
2384 return -EINVAL;
2385
2386 if (!dev)
2387 return -ENODEV;
2388
614732ea 2389 return rtnl_delete_link(dev);
38f7b870
PM
2390}
2391
3729d502
PM
2392int rtnl_configure_link(struct net_device *dev, const struct ifinfomsg *ifm)
2393{
2394 unsigned int old_flags;
2395 int err;
2396
2397 old_flags = dev->flags;
2398 if (ifm && (ifm->ifi_flags || ifm->ifi_change)) {
2399 err = __dev_change_flags(dev, rtnl_dev_combine_flags(dev, ifm));
2400 if (err < 0)
2401 return err;
2402 }
2403
2404 dev->rtnl_link_state = RTNL_LINK_INITIALIZED;
3729d502 2405
a528c219 2406 __dev_notify_flags(dev, old_flags, ~0U);
3729d502
PM
2407 return 0;
2408}
2409EXPORT_SYMBOL(rtnl_configure_link);
2410
c0713563 2411struct net_device *rtnl_create_link(struct net *net,
78ebb0d0 2412 const char *ifname, unsigned char name_assign_type,
5517750f 2413 const struct rtnl_link_ops *ops, struct nlattr *tb[])
e7199288 2414{
e7199288 2415 struct net_device *dev;
d40156aa
JP
2416 unsigned int num_tx_queues = 1;
2417 unsigned int num_rx_queues = 1;
e7199288 2418
76ff5cc9
JP
2419 if (tb[IFLA_NUM_TX_QUEUES])
2420 num_tx_queues = nla_get_u32(tb[IFLA_NUM_TX_QUEUES]);
2421 else if (ops->get_num_tx_queues)
d40156aa 2422 num_tx_queues = ops->get_num_tx_queues();
76ff5cc9
JP
2423
2424 if (tb[IFLA_NUM_RX_QUEUES])
2425 num_rx_queues = nla_get_u32(tb[IFLA_NUM_RX_QUEUES]);
2426 else if (ops->get_num_rx_queues)
d40156aa 2427 num_rx_queues = ops->get_num_rx_queues();
efacb309 2428
5517750f 2429 dev = alloc_netdev_mqs(ops->priv_size, ifname, name_assign_type,
c835a677 2430 ops->setup, num_tx_queues, num_rx_queues);
e7199288 2431 if (!dev)
d1892e4e 2432 return ERR_PTR(-ENOMEM);
e7199288 2433
81adee47
EB
2434 dev_net_set(dev, net);
2435 dev->rtnl_link_ops = ops;
3729d502 2436 dev->rtnl_link_state = RTNL_LINK_INITIALIZING;
81adee47 2437
e7199288
PE
2438 if (tb[IFLA_MTU])
2439 dev->mtu = nla_get_u32(tb[IFLA_MTU]);
2afb9b53 2440 if (tb[IFLA_ADDRESS]) {
e7199288
PE
2441 memcpy(dev->dev_addr, nla_data(tb[IFLA_ADDRESS]),
2442 nla_len(tb[IFLA_ADDRESS]));
2afb9b53
JP
2443 dev->addr_assign_type = NET_ADDR_SET;
2444 }
e7199288
PE
2445 if (tb[IFLA_BROADCAST])
2446 memcpy(dev->broadcast, nla_data(tb[IFLA_BROADCAST]),
2447 nla_len(tb[IFLA_BROADCAST]));
2448 if (tb[IFLA_TXQLEN])
2449 dev->tx_queue_len = nla_get_u32(tb[IFLA_TXQLEN]);
2450 if (tb[IFLA_OPERSTATE])
93b2d4a2 2451 set_operstate(dev, nla_get_u8(tb[IFLA_OPERSTATE]));
e7199288
PE
2452 if (tb[IFLA_LINKMODE])
2453 dev->link_mode = nla_get_u8(tb[IFLA_LINKMODE]);
ffa934f1
PM
2454 if (tb[IFLA_GROUP])
2455 dev_set_group(dev, nla_get_u32(tb[IFLA_GROUP]));
e7199288
PE
2456
2457 return dev;
e7199288 2458}
e0d087af 2459EXPORT_SYMBOL(rtnl_create_link);
e7199288 2460
90f62cf3
EB
2461static int rtnl_group_changelink(const struct sk_buff *skb,
2462 struct net *net, int group,
e7ed828f 2463 struct ifinfomsg *ifm,
ddf9f970 2464 struct netlink_ext_ack *extack,
e7ed828f
VD
2465 struct nlattr **tb)
2466{
d079535d 2467 struct net_device *dev, *aux;
e7ed828f
VD
2468 int err;
2469
d079535d 2470 for_each_netdev_safe(net, dev, aux) {
e7ed828f 2471 if (dev->group == group) {
ddf9f970 2472 err = do_setlink(skb, dev, ifm, extack, tb, NULL, 0);
e7ed828f
VD
2473 if (err < 0)
2474 return err;
2475 }
2476 }
2477
2478 return 0;
2479}
2480
c21ef3e3
DA
2481static int rtnl_newlink(struct sk_buff *skb, struct nlmsghdr *nlh,
2482 struct netlink_ext_ack *extack)
38f7b870 2483{
3b1e0a65 2484 struct net *net = sock_net(skb->sk);
38f7b870 2485 const struct rtnl_link_ops *ops;
ba7d49b1 2486 const struct rtnl_link_ops *m_ops = NULL;
38f7b870 2487 struct net_device *dev;
ba7d49b1 2488 struct net_device *master_dev = NULL;
38f7b870
PM
2489 struct ifinfomsg *ifm;
2490 char kind[MODULE_NAME_LEN];
2491 char ifname[IFNAMSIZ];
2492 struct nlattr *tb[IFLA_MAX+1];
2493 struct nlattr *linkinfo[IFLA_INFO_MAX+1];
5517750f 2494 unsigned char name_assign_type = NET_NAME_USER;
38f7b870
PM
2495 int err;
2496
95a5afca 2497#ifdef CONFIG_MODULES
38f7b870 2498replay:
8072f085 2499#endif
c21ef3e3 2500 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFLA_MAX, ifla_policy, extack);
38f7b870
PM
2501 if (err < 0)
2502 return err;
2503
2504 if (tb[IFLA_IFNAME])
2505 nla_strlcpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ);
2506 else
2507 ifname[0] = '\0';
2508
2509 ifm = nlmsg_data(nlh);
2510 if (ifm->ifi_index > 0)
881d966b 2511 dev = __dev_get_by_index(net, ifm->ifi_index);
e7ed828f
VD
2512 else {
2513 if (ifname[0])
2514 dev = __dev_get_by_name(net, ifname);
e7ed828f
VD
2515 else
2516 dev = NULL;
2517 }
38f7b870 2518
ba7d49b1
JP
2519 if (dev) {
2520 master_dev = netdev_master_upper_dev_get(dev);
2521 if (master_dev)
2522 m_ops = master_dev->rtnl_link_ops;
2523 }
2524
e0d087af
ED
2525 err = validate_linkmsg(dev, tb);
2526 if (err < 0)
1840bb13
TG
2527 return err;
2528
38f7b870
PM
2529 if (tb[IFLA_LINKINFO]) {
2530 err = nla_parse_nested(linkinfo, IFLA_INFO_MAX,
fceb6435
JB
2531 tb[IFLA_LINKINFO], ifla_info_policy,
2532 NULL);
38f7b870
PM
2533 if (err < 0)
2534 return err;
2535 } else
2536 memset(linkinfo, 0, sizeof(linkinfo));
2537
2538 if (linkinfo[IFLA_INFO_KIND]) {
2539 nla_strlcpy(kind, linkinfo[IFLA_INFO_KIND], sizeof(kind));
2540 ops = rtnl_link_ops_get(kind);
2541 } else {
2542 kind[0] = '\0';
2543 ops = NULL;
2544 }
2545
2546 if (1) {
4e10fd5b
SL
2547 struct nlattr *attr[ops ? ops->maxtype + 1 : 1];
2548 struct nlattr *slave_attr[m_ops ? m_ops->slave_maxtype + 1 : 1];
ba7d49b1
JP
2549 struct nlattr **data = NULL;
2550 struct nlattr **slave_data = NULL;
317f4810 2551 struct net *dest_net, *link_net = NULL;
38f7b870
PM
2552
2553 if (ops) {
2554 if (ops->maxtype && linkinfo[IFLA_INFO_DATA]) {
2555 err = nla_parse_nested(attr, ops->maxtype,
2556 linkinfo[IFLA_INFO_DATA],
fceb6435 2557 ops->policy, NULL);
38f7b870
PM
2558 if (err < 0)
2559 return err;
2560 data = attr;
2561 }
2562 if (ops->validate) {
a8b8a889 2563 err = ops->validate(tb, data, extack);
38f7b870
PM
2564 if (err < 0)
2565 return err;
2566 }
2567 }
2568
ba7d49b1
JP
2569 if (m_ops) {
2570 if (m_ops->slave_maxtype &&
2571 linkinfo[IFLA_INFO_SLAVE_DATA]) {
2572 err = nla_parse_nested(slave_attr,
2573 m_ops->slave_maxtype,
2574 linkinfo[IFLA_INFO_SLAVE_DATA],
fceb6435
JB
2575 m_ops->slave_policy,
2576 NULL);
ba7d49b1
JP
2577 if (err < 0)
2578 return err;
2579 slave_data = slave_attr;
2580 }
2581 if (m_ops->slave_validate) {
d116ffc7
MS
2582 err = m_ops->slave_validate(tb, slave_data,
2583 extack);
ba7d49b1
JP
2584 if (err < 0)
2585 return err;
2586 }
2587 }
2588
38f7b870 2589 if (dev) {
90c325e3 2590 int status = 0;
38f7b870
PM
2591
2592 if (nlh->nlmsg_flags & NLM_F_EXCL)
2593 return -EEXIST;
2594 if (nlh->nlmsg_flags & NLM_F_REPLACE)
2595 return -EOPNOTSUPP;
2596
2597 if (linkinfo[IFLA_INFO_DATA]) {
2598 if (!ops || ops != dev->rtnl_link_ops ||
2599 !ops->changelink)
2600 return -EOPNOTSUPP;
2601
ad744b22 2602 err = ops->changelink(dev, tb, data, extack);
38f7b870
PM
2603 if (err < 0)
2604 return err;
ba998906 2605 status |= DO_SETLINK_NOTIFY;
38f7b870
PM
2606 }
2607
ba7d49b1
JP
2608 if (linkinfo[IFLA_INFO_SLAVE_DATA]) {
2609 if (!m_ops || !m_ops->slave_changelink)
2610 return -EOPNOTSUPP;
2611
2612 err = m_ops->slave_changelink(master_dev, dev,
17dd0ec4
MS
2613 tb, slave_data,
2614 extack);
ba7d49b1
JP
2615 if (err < 0)
2616 return err;
ba998906 2617 status |= DO_SETLINK_NOTIFY;
ba7d49b1
JP
2618 }
2619
ddf9f970
JK
2620 return do_setlink(skb, dev, ifm, extack, tb, ifname,
2621 status);
38f7b870
PM
2622 }
2623
ffa934f1
PM
2624 if (!(nlh->nlmsg_flags & NLM_F_CREATE)) {
2625 if (ifm->ifi_index == 0 && tb[IFLA_GROUP])
90f62cf3 2626 return rtnl_group_changelink(skb, net,
ffa934f1 2627 nla_get_u32(tb[IFLA_GROUP]),
ddf9f970 2628 ifm, extack, tb);
38f7b870 2629 return -ENODEV;
ffa934f1 2630 }
38f7b870 2631
160ca014 2632 if (tb[IFLA_MAP] || tb[IFLA_PROTINFO])
38f7b870
PM
2633 return -EOPNOTSUPP;
2634
2635 if (!ops) {
95a5afca 2636#ifdef CONFIG_MODULES
38f7b870
PM
2637 if (kind[0]) {
2638 __rtnl_unlock();
2639 request_module("rtnl-link-%s", kind);
2640 rtnl_lock();
2641 ops = rtnl_link_ops_get(kind);
2642 if (ops)
2643 goto replay;
2644 }
2645#endif
2646 return -EOPNOTSUPP;
2647 }
2648
b0ab2fab
JP
2649 if (!ops->setup)
2650 return -EOPNOTSUPP;
2651
5517750f 2652 if (!ifname[0]) {
38f7b870 2653 snprintf(ifname, IFNAMSIZ, "%s%%d", ops->kind);
5517750f
TG
2654 name_assign_type = NET_NAME_ENUM;
2655 }
e7199288 2656
81adee47 2657 dest_net = rtnl_link_get_net(net, tb);
13ad1774
EB
2658 if (IS_ERR(dest_net))
2659 return PTR_ERR(dest_net);
2660
505ce415
EB
2661 err = -EPERM;
2662 if (!netlink_ns_capable(skb, dest_net->user_ns, CAP_NET_ADMIN))
2663 goto out;
2664
317f4810
ND
2665 if (tb[IFLA_LINK_NETNSID]) {
2666 int id = nla_get_s32(tb[IFLA_LINK_NETNSID]);
2667
2668 link_net = get_net_ns_by_id(dest_net, id);
2669 if (!link_net) {
2670 err = -EINVAL;
2671 goto out;
2672 }
06615bed
EB
2673 err = -EPERM;
2674 if (!netlink_ns_capable(skb, link_net->user_ns, CAP_NET_ADMIN))
2675 goto out;
317f4810
ND
2676 }
2677
2678 dev = rtnl_create_link(link_net ? : dest_net, ifname,
2679 name_assign_type, ops, tb);
9c7dafbf 2680 if (IS_ERR(dev)) {
e7199288 2681 err = PTR_ERR(dev);
9c7dafbf
PE
2682 goto out;
2683 }
2684
2685 dev->ifindex = ifm->ifi_index;
2686
0e0eee24 2687 if (ops->newlink) {
7a3f4a18
MS
2688 err = ops->newlink(link_net ? : net, dev, tb, data,
2689 extack);
0e0eee24 2690 /* Drivers should call free_netdev() in ->destructor
e51fb152
CW
2691 * and unregister it on failure after registration
2692 * so that device could be finally freed in rtnl_unlock.
0e0eee24 2693 */
e51fb152
CW
2694 if (err < 0) {
2695 /* If device is not registered at all, free it now */
2696 if (dev->reg_state == NETREG_UNINITIALIZED)
2697 free_netdev(dev);
0e0eee24 2698 goto out;
e51fb152 2699 }
0e0eee24 2700 } else {
2d85cba2 2701 err = register_netdevice(dev);
0e0eee24
CW
2702 if (err < 0) {
2703 free_netdev(dev);
2704 goto out;
2705 }
fce9b9be 2706 }
3729d502 2707 err = rtnl_configure_link(dev, ifm);
43638900
DM
2708 if (err < 0)
2709 goto out_unregister;
bdef279b 2710 if (link_net) {
317f4810 2711 err = dev_change_net_namespace(dev, dest_net, ifname);
bdef279b 2712 if (err < 0)
43638900 2713 goto out_unregister;
bdef279b 2714 }
160ca014
TV
2715 if (tb[IFLA_MASTER]) {
2716 err = do_set_master(dev, nla_get_u32(tb[IFLA_MASTER]));
2717 if (err)
2718 goto out_unregister;
2719 }
3729d502 2720out:
317f4810
ND
2721 if (link_net)
2722 put_net(link_net);
81adee47 2723 put_net(dest_net);
38f7b870 2724 return err;
43638900
DM
2725out_unregister:
2726 if (ops->newlink) {
2727 LIST_HEAD(list_kill);
2728
2729 ops->dellink(dev, &list_kill);
2730 unregister_netdevice_many(&list_kill);
2731 } else {
2732 unregister_netdevice(dev);
2733 }
2734 goto out;
38f7b870
PM
2735 }
2736}
2737
c21ef3e3
DA
2738static int rtnl_getlink(struct sk_buff *skb, struct nlmsghdr *nlh,
2739 struct netlink_ext_ack *extack)
711e2c33 2740{
3b1e0a65 2741 struct net *net = sock_net(skb->sk);
b60c5115 2742 struct ifinfomsg *ifm;
a3d12891 2743 char ifname[IFNAMSIZ];
b60c5115
TG
2744 struct nlattr *tb[IFLA_MAX+1];
2745 struct net_device *dev = NULL;
2746 struct sk_buff *nskb;
339bf98f 2747 int err;
115c9b81 2748 u32 ext_filter_mask = 0;
711e2c33 2749
c21ef3e3 2750 err = nlmsg_parse(nlh, sizeof(*ifm), tb, IFLA_MAX, ifla_policy, extack);
b60c5115 2751 if (err < 0)
9918f230 2752 return err;
b60c5115 2753
a3d12891
ED
2754 if (tb[IFLA_IFNAME])
2755 nla_strlcpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ);
2756
115c9b81
GR
2757 if (tb[IFLA_EXT_MASK])
2758 ext_filter_mask = nla_get_u32(tb[IFLA_EXT_MASK]);
2759
b60c5115 2760 ifm = nlmsg_data(nlh);
a3d12891
ED
2761 if (ifm->ifi_index > 0)
2762 dev = __dev_get_by_index(net, ifm->ifi_index);
2763 else if (tb[IFLA_IFNAME])
2764 dev = __dev_get_by_name(net, ifname);
2765 else
711e2c33 2766 return -EINVAL;
711e2c33 2767
a3d12891
ED
2768 if (dev == NULL)
2769 return -ENODEV;
2770
115c9b81 2771 nskb = nlmsg_new(if_nlmsg_size(dev, ext_filter_mask), GFP_KERNEL);
a3d12891
ED
2772 if (nskb == NULL)
2773 return -ENOBUFS;
b60c5115 2774
15e47304 2775 err = rtnl_fill_ifinfo(nskb, dev, RTM_NEWLINK, NETLINK_CB(skb).portid,
3d3ea5af 2776 nlh->nlmsg_seq, 0, 0, ext_filter_mask, 0);
26932566
PM
2777 if (err < 0) {
2778 /* -EMSGSIZE implies BUG in if_nlmsg_size */
2779 WARN_ON(err == -EMSGSIZE);
2780 kfree_skb(nskb);
a3d12891 2781 } else
15e47304 2782 err = rtnl_unicast(nskb, net, NETLINK_CB(skb).portid);
711e2c33 2783
b60c5115 2784 return err;
711e2c33 2785}
711e2c33 2786
115c9b81 2787static u16 rtnl_calcit(struct sk_buff *skb, struct nlmsghdr *nlh)
c7ac8679 2788{
115c9b81
GR
2789 struct net *net = sock_net(skb->sk);
2790 struct net_device *dev;
2791 struct nlattr *tb[IFLA_MAX+1];
2792 u32 ext_filter_mask = 0;
2793 u16 min_ifinfo_dump_size = 0;
e5eca6d4
MS
2794 int hdrlen;
2795
2796 /* Same kernel<->userspace interface hack as in rtnl_dump_ifinfo. */
2797 hdrlen = nlmsg_len(nlh) < sizeof(struct ifinfomsg) ?
2798 sizeof(struct rtgenmsg) : sizeof(struct ifinfomsg);
115c9b81 2799
fceb6435 2800 if (nlmsg_parse(nlh, hdrlen, tb, IFLA_MAX, ifla_policy, NULL) >= 0) {
a4b64fbe
ED
2801 if (tb[IFLA_EXT_MASK])
2802 ext_filter_mask = nla_get_u32(tb[IFLA_EXT_MASK]);
2803 }
115c9b81
GR
2804
2805 if (!ext_filter_mask)
2806 return NLMSG_GOODSIZE;
2807 /*
2808 * traverse the list of net devices and compute the minimum
2809 * buffer size based upon the filter mask.
2810 */
6853dd48
FW
2811 rcu_read_lock();
2812 for_each_netdev_rcu(net, dev) {
115c9b81
GR
2813 min_ifinfo_dump_size = max_t(u16, min_ifinfo_dump_size,
2814 if_nlmsg_size(dev,
2815 ext_filter_mask));
2816 }
6853dd48 2817 rcu_read_unlock();
115c9b81 2818
93af2056 2819 return nlmsg_total_size(min_ifinfo_dump_size);
c7ac8679
GR
2820}
2821
42bad1da 2822static int rtnl_dump_all(struct sk_buff *skb, struct netlink_callback *cb)
1da177e4
LT
2823{
2824 int idx;
2825 int s_idx = cb->family;
2826
2827 if (s_idx == 0)
2828 s_idx = 1;
6853dd48 2829
25239cee 2830 for (idx = 1; idx <= RTNL_FAMILY_MAX; idx++) {
1da177e4 2831 int type = cb->nlh->nlmsg_type-RTM_BASE;
6853dd48
FW
2832 struct rtnl_link *handlers;
2833 rtnl_dumpit_func dumpit;
2834
1da177e4
LT
2835 if (idx < s_idx || idx == PF_PACKET)
2836 continue;
6853dd48
FW
2837
2838 handlers = rtnl_dereference(rtnl_msg_handlers[idx]);
2839 if (!handlers)
1da177e4 2840 continue;
6853dd48
FW
2841
2842 dumpit = READ_ONCE(handlers[type].dumpit);
2843 if (!dumpit)
2844 continue;
2845
0465277f 2846 if (idx > s_idx) {
1da177e4 2847 memset(&cb->args[0], 0, sizeof(cb->args));
0465277f
ND
2848 cb->prev_seq = 0;
2849 cb->seq = 0;
2850 }
6853dd48 2851 if (dumpit(skb, cb))
1da177e4
LT
2852 break;
2853 }
2854 cb->family = idx;
2855
2856 return skb->len;
2857}
2858
395eea6c 2859struct sk_buff *rtmsg_ifinfo_build_skb(int type, struct net_device *dev,
3d3ea5af
VY
2860 unsigned int change,
2861 u32 event, gfp_t flags)
1da177e4 2862{
c346dca1 2863 struct net *net = dev_net(dev);
1da177e4 2864 struct sk_buff *skb;
0ec6d3f4 2865 int err = -ENOBUFS;
c7ac8679 2866 size_t if_info_size;
1da177e4 2867
7f294054 2868 skb = nlmsg_new((if_info_size = if_nlmsg_size(dev, 0)), flags);
0ec6d3f4
TG
2869 if (skb == NULL)
2870 goto errout;
1da177e4 2871
3d3ea5af 2872 err = rtnl_fill_ifinfo(skb, dev, type, 0, 0, change, 0, 0, event);
26932566
PM
2873 if (err < 0) {
2874 /* -EMSGSIZE implies BUG in if_nlmsg_size() */
2875 WARN_ON(err == -EMSGSIZE);
2876 kfree_skb(skb);
2877 goto errout;
2878 }
395eea6c 2879 return skb;
0ec6d3f4
TG
2880errout:
2881 if (err < 0)
4b3da706 2882 rtnl_set_sk_err(net, RTNLGRP_LINK, err);
395eea6c
MB
2883 return NULL;
2884}
2885
2886void rtmsg_ifinfo_send(struct sk_buff *skb, struct net_device *dev, gfp_t flags)
2887{
2888 struct net *net = dev_net(dev);
2889
2890 rtnl_notify(skb, net, 0, RTNLGRP_LINK, NULL, flags);
2891}
2892
3d3ea5af
VY
2893static void rtmsg_ifinfo_event(int type, struct net_device *dev,
2894 unsigned int change, u32 event,
2895 gfp_t flags)
395eea6c
MB
2896{
2897 struct sk_buff *skb;
2898
ed2a80ab
ND
2899 if (dev->reg_state != NETREG_REGISTERED)
2900 return;
2901
3d3ea5af 2902 skb = rtmsg_ifinfo_build_skb(type, dev, change, event, flags);
395eea6c
MB
2903 if (skb)
2904 rtmsg_ifinfo_send(skb, dev, flags);
1da177e4 2905}
3d3ea5af
VY
2906
2907void rtmsg_ifinfo(int type, struct net_device *dev, unsigned int change,
2908 gfp_t flags)
2909{
8c6c918d 2910 rtmsg_ifinfo_event(type, dev, change, rtnl_get_event(0), flags);
3d3ea5af 2911}
471cb5a3 2912EXPORT_SYMBOL(rtmsg_ifinfo);
1da177e4 2913
d83b0603
JF
2914static int nlmsg_populate_fdb_fill(struct sk_buff *skb,
2915 struct net_device *dev,
1e53d5bb 2916 u8 *addr, u16 vid, u32 pid, u32 seq,
1c104a6b 2917 int type, unsigned int flags,
b3379041 2918 int nlflags, u16 ndm_state)
d83b0603
JF
2919{
2920 struct nlmsghdr *nlh;
2921 struct ndmsg *ndm;
2922
1c104a6b 2923 nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ndm), nlflags);
d83b0603
JF
2924 if (!nlh)
2925 return -EMSGSIZE;
2926
2927 ndm = nlmsg_data(nlh);
2928 ndm->ndm_family = AF_BRIDGE;
2929 ndm->ndm_pad1 = 0;
2930 ndm->ndm_pad2 = 0;
2931 ndm->ndm_flags = flags;
2932 ndm->ndm_type = 0;
2933 ndm->ndm_ifindex = dev->ifindex;
b3379041 2934 ndm->ndm_state = ndm_state;
d83b0603
JF
2935
2936 if (nla_put(skb, NDA_LLADDR, ETH_ALEN, addr))
2937 goto nla_put_failure;
1e53d5bb
HS
2938 if (vid)
2939 if (nla_put(skb, NDA_VLAN, sizeof(u16), &vid))
2940 goto nla_put_failure;
d83b0603 2941
053c095a
JB
2942 nlmsg_end(skb, nlh);
2943 return 0;
d83b0603
JF
2944
2945nla_put_failure:
2946 nlmsg_cancel(skb, nlh);
2947 return -EMSGSIZE;
2948}
2949
3ff661c3
JF
2950static inline size_t rtnl_fdb_nlmsg_size(void)
2951{
f82ef3e1
SD
2952 return NLMSG_ALIGN(sizeof(struct ndmsg)) +
2953 nla_total_size(ETH_ALEN) + /* NDA_LLADDR */
2954 nla_total_size(sizeof(u16)) + /* NDA_VLAN */
2955 0;
3ff661c3
JF
2956}
2957
b3379041
HS
2958static void rtnl_fdb_notify(struct net_device *dev, u8 *addr, u16 vid, int type,
2959 u16 ndm_state)
3ff661c3
JF
2960{
2961 struct net *net = dev_net(dev);
2962 struct sk_buff *skb;
2963 int err = -ENOBUFS;
2964
2965 skb = nlmsg_new(rtnl_fdb_nlmsg_size(), GFP_ATOMIC);
2966 if (!skb)
2967 goto errout;
2968
1e53d5bb 2969 err = nlmsg_populate_fdb_fill(skb, dev, addr, vid,
b3379041 2970 0, 0, type, NTF_SELF, 0, ndm_state);
3ff661c3
JF
2971 if (err < 0) {
2972 kfree_skb(skb);
2973 goto errout;
2974 }
2975
2976 rtnl_notify(skb, net, 0, RTNLGRP_NEIGH, NULL, GFP_ATOMIC);
2977 return;
2978errout:
2979 rtnl_set_sk_err(net, RTNLGRP_NEIGH, err);
2980}
2981
090096bf
VY
2982/**
2983 * ndo_dflt_fdb_add - default netdevice operation to add an FDB entry
2984 */
2985int ndo_dflt_fdb_add(struct ndmsg *ndm,
2986 struct nlattr *tb[],
2987 struct net_device *dev,
f6f6424b 2988 const unsigned char *addr, u16 vid,
090096bf
VY
2989 u16 flags)
2990{
2991 int err = -EINVAL;
2992
2993 /* If aging addresses are supported device will need to
2994 * implement its own handler for this.
2995 */
2996 if (ndm->ndm_state && !(ndm->ndm_state & NUD_PERMANENT)) {
2997 pr_info("%s: FDB only supports static addresses\n", dev->name);
2998 return err;
2999 }
3000
65891fea
OG
3001 if (vid) {
3002 pr_info("%s: vlans aren't supported yet for dev_uc|mc_add()\n", dev->name);
3003 return err;
3004 }
3005
090096bf
VY
3006 if (is_unicast_ether_addr(addr) || is_link_local_ether_addr(addr))
3007 err = dev_uc_add_excl(dev, addr);
3008 else if (is_multicast_ether_addr(addr))
3009 err = dev_mc_add_excl(dev, addr);
3010
3011 /* Only return duplicate errors if NLM_F_EXCL is set */
3012 if (err == -EEXIST && !(flags & NLM_F_EXCL))
3013 err = 0;
3014
3015 return err;
3016}
3017EXPORT_SYMBOL(ndo_dflt_fdb_add);
3018
f6f6424b
JP
3019static int fdb_vid_parse(struct nlattr *vlan_attr, u16 *p_vid)
3020{
3021 u16 vid = 0;
3022
3023 if (vlan_attr) {
3024 if (nla_len(vlan_attr) != sizeof(u16)) {
3025 pr_info("PF_BRIDGE: RTM_NEWNEIGH with invalid vlan\n");
3026 return -EINVAL;
3027 }
3028
3029 vid = nla_get_u16(vlan_attr);
3030
3031 if (!vid || vid >= VLAN_VID_MASK) {
3032 pr_info("PF_BRIDGE: RTM_NEWNEIGH with invalid vlan id %d\n",
3033 vid);
3034 return -EINVAL;
3035 }
3036 }
3037 *p_vid = vid;
3038 return 0;
3039}
3040
c21ef3e3
DA
3041static int rtnl_fdb_add(struct sk_buff *skb, struct nlmsghdr *nlh,
3042 struct netlink_ext_ack *extack)
77162022
JF
3043{
3044 struct net *net = sock_net(skb->sk);
77162022
JF
3045 struct ndmsg *ndm;
3046 struct nlattr *tb[NDA_MAX+1];
3047 struct net_device *dev;
3048 u8 *addr;
f6f6424b 3049 u16 vid;
77162022
JF
3050 int err;
3051
c21ef3e3 3052 err = nlmsg_parse(nlh, sizeof(*ndm), tb, NDA_MAX, NULL, extack);
77162022
JF
3053 if (err < 0)
3054 return err;
3055
3056 ndm = nlmsg_data(nlh);
3057 if (ndm->ndm_ifindex == 0) {
3058 pr_info("PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex\n");
3059 return -EINVAL;
3060 }
3061
3062 dev = __dev_get_by_index(net, ndm->ndm_ifindex);
3063 if (dev == NULL) {
3064 pr_info("PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex\n");
3065 return -ENODEV;
3066 }
3067
3068 if (!tb[NDA_LLADDR] || nla_len(tb[NDA_LLADDR]) != ETH_ALEN) {
3069 pr_info("PF_BRIDGE: RTM_NEWNEIGH with invalid address\n");
3070 return -EINVAL;
3071 }
3072
3073 addr = nla_data(tb[NDA_LLADDR]);
77162022 3074
f6f6424b
JP
3075 err = fdb_vid_parse(tb[NDA_VLAN], &vid);
3076 if (err)
3077 return err;
3078
77162022
JF
3079 err = -EOPNOTSUPP;
3080
3081 /* Support fdb on master device the net/bridge default case */
3082 if ((!ndm->ndm_flags || ndm->ndm_flags & NTF_MASTER) &&
3083 (dev->priv_flags & IFF_BRIDGE_PORT)) {
898e5061
JP
3084 struct net_device *br_dev = netdev_master_upper_dev_get(dev);
3085 const struct net_device_ops *ops = br_dev->netdev_ops;
3086
f6f6424b
JP
3087 err = ops->ndo_fdb_add(ndm, tb, dev, addr, vid,
3088 nlh->nlmsg_flags);
77162022
JF
3089 if (err)
3090 goto out;
3091 else
3092 ndm->ndm_flags &= ~NTF_MASTER;
3093 }
3094
3095 /* Embedded bridge, macvlan, and any other device support */
090096bf
VY
3096 if ((ndm->ndm_flags & NTF_SELF)) {
3097 if (dev->netdev_ops->ndo_fdb_add)
3098 err = dev->netdev_ops->ndo_fdb_add(ndm, tb, dev, addr,
f6f6424b 3099 vid,
090096bf
VY
3100 nlh->nlmsg_flags);
3101 else
f6f6424b 3102 err = ndo_dflt_fdb_add(ndm, tb, dev, addr, vid,
090096bf 3103 nlh->nlmsg_flags);
77162022 3104
3ff661c3 3105 if (!err) {
b3379041
HS
3106 rtnl_fdb_notify(dev, addr, vid, RTM_NEWNEIGH,
3107 ndm->ndm_state);
77162022 3108 ndm->ndm_flags &= ~NTF_SELF;
3ff661c3 3109 }
77162022
JF
3110 }
3111out:
3112 return err;
3113}
3114
090096bf
VY
3115/**
3116 * ndo_dflt_fdb_del - default netdevice operation to delete an FDB entry
3117 */
3118int ndo_dflt_fdb_del(struct ndmsg *ndm,
3119 struct nlattr *tb[],
3120 struct net_device *dev,
f6f6424b 3121 const unsigned char *addr, u16 vid)
090096bf 3122{
c8a89c4a 3123 int err = -EINVAL;
090096bf
VY
3124
3125 /* If aging addresses are supported device will need to
3126 * implement its own handler for this.
3127 */
64535993 3128 if (!(ndm->ndm_state & NUD_PERMANENT)) {
090096bf 3129 pr_info("%s: FDB only supports static addresses\n", dev->name);
c8a89c4a 3130 return err;
090096bf
VY
3131 }
3132
3133 if (is_unicast_ether_addr(addr) || is_link_local_ether_addr(addr))
3134 err = dev_uc_del(dev, addr);
3135 else if (is_multicast_ether_addr(addr))
3136 err = dev_mc_del(dev, addr);
090096bf
VY
3137
3138 return err;
3139}
3140EXPORT_SYMBOL(ndo_dflt_fdb_del);
3141
c21ef3e3
DA
3142static int rtnl_fdb_del(struct sk_buff *skb, struct nlmsghdr *nlh,
3143 struct netlink_ext_ack *extack)
77162022
JF
3144{
3145 struct net *net = sock_net(skb->sk);
3146 struct ndmsg *ndm;
1690be63 3147 struct nlattr *tb[NDA_MAX+1];
77162022
JF
3148 struct net_device *dev;
3149 int err = -EINVAL;
3150 __u8 *addr;
f6f6424b 3151 u16 vid;
77162022 3152
90f62cf3 3153 if (!netlink_capable(skb, CAP_NET_ADMIN))
1690be63
VY
3154 return -EPERM;
3155
c21ef3e3 3156 err = nlmsg_parse(nlh, sizeof(*ndm), tb, NDA_MAX, NULL, extack);
1690be63
VY
3157 if (err < 0)
3158 return err;
77162022
JF
3159
3160 ndm = nlmsg_data(nlh);
3161 if (ndm->ndm_ifindex == 0) {
3162 pr_info("PF_BRIDGE: RTM_DELNEIGH with invalid ifindex\n");
3163 return -EINVAL;
3164 }
3165
3166 dev = __dev_get_by_index(net, ndm->ndm_ifindex);
3167 if (dev == NULL) {
3168 pr_info("PF_BRIDGE: RTM_DELNEIGH with unknown ifindex\n");
3169 return -ENODEV;
3170 }
3171
1690be63
VY
3172 if (!tb[NDA_LLADDR] || nla_len(tb[NDA_LLADDR]) != ETH_ALEN) {
3173 pr_info("PF_BRIDGE: RTM_DELNEIGH with invalid address\n");
3174 return -EINVAL;
3175 }
3176
3177 addr = nla_data(tb[NDA_LLADDR]);
77162022 3178
f6f6424b
JP
3179 err = fdb_vid_parse(tb[NDA_VLAN], &vid);
3180 if (err)
3181 return err;
3182
77162022
JF
3183 err = -EOPNOTSUPP;
3184
3185 /* Support fdb on master device the net/bridge default case */
3186 if ((!ndm->ndm_flags || ndm->ndm_flags & NTF_MASTER) &&
3187 (dev->priv_flags & IFF_BRIDGE_PORT)) {
898e5061
JP
3188 struct net_device *br_dev = netdev_master_upper_dev_get(dev);
3189 const struct net_device_ops *ops = br_dev->netdev_ops;
77162022 3190
898e5061 3191 if (ops->ndo_fdb_del)
f6f6424b 3192 err = ops->ndo_fdb_del(ndm, tb, dev, addr, vid);
77162022
JF
3193
3194 if (err)
3195 goto out;
3196 else
3197 ndm->ndm_flags &= ~NTF_MASTER;
3198 }
3199
3200 /* Embedded bridge, macvlan, and any other device support */
090096bf
VY
3201 if (ndm->ndm_flags & NTF_SELF) {
3202 if (dev->netdev_ops->ndo_fdb_del)
f6f6424b
JP
3203 err = dev->netdev_ops->ndo_fdb_del(ndm, tb, dev, addr,
3204 vid);
090096bf 3205 else
f6f6424b 3206 err = ndo_dflt_fdb_del(ndm, tb, dev, addr, vid);
77162022 3207
3ff661c3 3208 if (!err) {
b3379041
HS
3209 rtnl_fdb_notify(dev, addr, vid, RTM_DELNEIGH,
3210 ndm->ndm_state);
77162022 3211 ndm->ndm_flags &= ~NTF_SELF;
3ff661c3 3212 }
77162022
JF
3213 }
3214out:
3215 return err;
3216}
3217
d83b0603
JF
3218static int nlmsg_populate_fdb(struct sk_buff *skb,
3219 struct netlink_callback *cb,
3220 struct net_device *dev,
3221 int *idx,
3222 struct netdev_hw_addr_list *list)
3223{
3224 struct netdev_hw_addr *ha;
3225 int err;
15e47304 3226 u32 portid, seq;
d83b0603 3227
15e47304 3228 portid = NETLINK_CB(cb->skb).portid;
d83b0603
JF
3229 seq = cb->nlh->nlmsg_seq;
3230
3231 list_for_each_entry(ha, &list->list, list) {
d297653d 3232 if (*idx < cb->args[2])
d83b0603
JF
3233 goto skip;
3234
1e53d5bb 3235 err = nlmsg_populate_fdb_fill(skb, dev, ha->addr, 0,
a7a558fe 3236 portid, seq,
1c104a6b 3237 RTM_NEWNEIGH, NTF_SELF,
b3379041 3238 NLM_F_MULTI, NUD_PERMANENT);
d83b0603
JF
3239 if (err < 0)
3240 return err;
3241skip:
3242 *idx += 1;
3243 }
3244 return 0;
3245}
3246
3247/**
2c53040f 3248 * ndo_dflt_fdb_dump - default netdevice operation to dump an FDB table.
d83b0603
JF
3249 * @nlh: netlink message header
3250 * @dev: netdevice
3251 *
3252 * Default netdevice operation to dump the existing unicast address list.
91f3e7b1 3253 * Returns number of addresses from list put in skb.
d83b0603
JF
3254 */
3255int ndo_dflt_fdb_dump(struct sk_buff *skb,
3256 struct netlink_callback *cb,
3257 struct net_device *dev,
5d5eacb3 3258 struct net_device *filter_dev,
d297653d 3259 int *idx)
d83b0603
JF
3260{
3261 int err;
3262
3263 netif_addr_lock_bh(dev);
d297653d 3264 err = nlmsg_populate_fdb(skb, cb, dev, idx, &dev->uc);
d83b0603
JF
3265 if (err)
3266 goto out;
2934c9db 3267 err = nlmsg_populate_fdb(skb, cb, dev, idx, &dev->mc);
d83b0603
JF
3268out:
3269 netif_addr_unlock_bh(dev);
d297653d 3270 return err;
d83b0603
JF
3271}
3272EXPORT_SYMBOL(ndo_dflt_fdb_dump);
3273
77162022
JF
3274static int rtnl_fdb_dump(struct sk_buff *skb, struct netlink_callback *cb)
3275{
77162022 3276 struct net_device *dev;
5e6d2435 3277 struct nlattr *tb[IFLA_MAX+1];
5e6d2435
JHS
3278 struct net_device *br_dev = NULL;
3279 const struct net_device_ops *ops = NULL;
3280 const struct net_device_ops *cops = NULL;
3281 struct ifinfomsg *ifm = nlmsg_data(cb->nlh);
3282 struct net *net = sock_net(skb->sk);
d297653d 3283 struct hlist_head *head;
5e6d2435
JHS
3284 int brport_idx = 0;
3285 int br_idx = 0;
d297653d
RP
3286 int h, s_h;
3287 int idx = 0, s_idx;
3288 int err = 0;
3289 int fidx = 0;
5e6d2435 3290
0ff50e83
AP
3291 err = nlmsg_parse(cb->nlh, sizeof(struct ifinfomsg), tb,
3292 IFLA_MAX, ifla_policy, NULL);
3293 if (err < 0) {
3294 return -EINVAL;
3295 } else if (err == 0) {
5e6d2435
JHS
3296 if (tb[IFLA_MASTER])
3297 br_idx = nla_get_u32(tb[IFLA_MASTER]);
3298 }
3299
3300 brport_idx = ifm->ifi_index;
3301
3302 if (br_idx) {
3303 br_dev = __dev_get_by_index(net, br_idx);
3304 if (!br_dev)
3305 return -ENODEV;
3306
3307 ops = br_dev->netdev_ops;
5e6d2435
JHS
3308 }
3309
d297653d
RP
3310 s_h = cb->args[0];
3311 s_idx = cb->args[1];
5e6d2435 3312
d297653d
RP
3313 for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
3314 idx = 0;
3315 head = &net->dev_index_head[h];
3316 hlist_for_each_entry(dev, head, index_hlist) {
5e6d2435 3317
d297653d 3318 if (brport_idx && (dev->ifindex != brport_idx))
5e6d2435
JHS
3319 continue;
3320
d297653d
RP
3321 if (!br_idx) { /* user did not specify a specific bridge */
3322 if (dev->priv_flags & IFF_BRIDGE_PORT) {
3323 br_dev = netdev_master_upper_dev_get(dev);
3324 cops = br_dev->netdev_ops;
3325 }
3326 } else {
3327 if (dev != br_dev &&
3328 !(dev->priv_flags & IFF_BRIDGE_PORT))
3329 continue;
5e6d2435 3330
d297653d
RP
3331 if (br_dev != netdev_master_upper_dev_get(dev) &&
3332 !(dev->priv_flags & IFF_EBRIDGE))
3333 continue;
3334 cops = ops;
3335 }
77162022 3336
d297653d
RP
3337 if (idx < s_idx)
3338 goto cont;
77162022 3339
d297653d
RP
3340 if (dev->priv_flags & IFF_BRIDGE_PORT) {
3341 if (cops && cops->ndo_fdb_dump) {
3342 err = cops->ndo_fdb_dump(skb, cb,
3343 br_dev, dev,
3344 &fidx);
3345 if (err == -EMSGSIZE)
3346 goto out;
3347 }
3348 }
5e6d2435 3349
d297653d
RP
3350 if (dev->netdev_ops->ndo_fdb_dump)
3351 err = dev->netdev_ops->ndo_fdb_dump(skb, cb,
3352 dev, NULL,
3353 &fidx);
3354 else
3355 err = ndo_dflt_fdb_dump(skb, cb, dev, NULL,
3356 &fidx);
3357 if (err == -EMSGSIZE)
3358 goto out;
3359
3360 cops = NULL;
3361
3362 /* reset fdb offset to 0 for rest of the interfaces */
3363 cb->args[2] = 0;
3364 fidx = 0;
3365cont:
3366 idx++;
3367 }
77162022 3368 }
77162022 3369
d297653d
RP
3370out:
3371 cb->args[0] = h;
3372 cb->args[1] = idx;
3373 cb->args[2] = fidx;
3374
77162022
JF
3375 return skb->len;
3376}
3377
2c3c031c
SF
3378static int brport_nla_put_flag(struct sk_buff *skb, u32 flags, u32 mask,
3379 unsigned int attrnum, unsigned int flag)
3380{
3381 if (mask & flag)
3382 return nla_put_u8(skb, attrnum, !!(flags & flag));
3383 return 0;
3384}
3385
815cccbf 3386int ndo_dflt_bridge_getlink(struct sk_buff *skb, u32 pid, u32 seq,
2c3c031c 3387 struct net_device *dev, u16 mode,
7d4f8d87
SF
3388 u32 flags, u32 mask, int nlflags,
3389 u32 filter_mask,
3390 int (*vlan_fill)(struct sk_buff *skb,
3391 struct net_device *dev,
3392 u32 filter_mask))
815cccbf
JF
3393{
3394 struct nlmsghdr *nlh;
3395 struct ifinfomsg *ifm;
3396 struct nlattr *br_afspec;
2c3c031c 3397 struct nlattr *protinfo;
815cccbf 3398 u8 operstate = netif_running(dev) ? dev->operstate : IF_OPER_DOWN;
898e5061 3399 struct net_device *br_dev = netdev_master_upper_dev_get(dev);
7d4f8d87 3400 int err = 0;
815cccbf 3401
46c264da 3402 nlh = nlmsg_put(skb, pid, seq, RTM_NEWLINK, sizeof(*ifm), nlflags);
815cccbf
JF
3403 if (nlh == NULL)
3404 return -EMSGSIZE;
3405
3406 ifm = nlmsg_data(nlh);
3407 ifm->ifi_family = AF_BRIDGE;
3408 ifm->__ifi_pad = 0;
3409 ifm->ifi_type = dev->type;
3410 ifm->ifi_index = dev->ifindex;
3411 ifm->ifi_flags = dev_get_flags(dev);
3412 ifm->ifi_change = 0;
3413
3414
3415 if (nla_put_string(skb, IFLA_IFNAME, dev->name) ||
3416 nla_put_u32(skb, IFLA_MTU, dev->mtu) ||
3417 nla_put_u8(skb, IFLA_OPERSTATE, operstate) ||
898e5061
JP
3418 (br_dev &&
3419 nla_put_u32(skb, IFLA_MASTER, br_dev->ifindex)) ||
815cccbf
JF
3420 (dev->addr_len &&
3421 nla_put(skb, IFLA_ADDRESS, dev->addr_len, dev->dev_addr)) ||
a54acb3a
ND
3422 (dev->ifindex != dev_get_iflink(dev) &&
3423 nla_put_u32(skb, IFLA_LINK, dev_get_iflink(dev))))
815cccbf
JF
3424 goto nla_put_failure;
3425
3426 br_afspec = nla_nest_start(skb, IFLA_AF_SPEC);
3427 if (!br_afspec)
3428 goto nla_put_failure;
3429
1d460b98 3430 if (nla_put_u16(skb, IFLA_BRIDGE_FLAGS, BRIDGE_FLAGS_SELF)) {
815cccbf
JF
3431 nla_nest_cancel(skb, br_afspec);
3432 goto nla_put_failure;
3433 }
1d460b98
RP
3434
3435 if (mode != BRIDGE_MODE_UNDEF) {
3436 if (nla_put_u16(skb, IFLA_BRIDGE_MODE, mode)) {
3437 nla_nest_cancel(skb, br_afspec);
3438 goto nla_put_failure;
3439 }
3440 }
7d4f8d87
SF
3441 if (vlan_fill) {
3442 err = vlan_fill(skb, dev, filter_mask);
3443 if (err) {
3444 nla_nest_cancel(skb, br_afspec);
3445 goto nla_put_failure;
3446 }
3447 }
815cccbf
JF
3448 nla_nest_end(skb, br_afspec);
3449
2c3c031c
SF
3450 protinfo = nla_nest_start(skb, IFLA_PROTINFO | NLA_F_NESTED);
3451 if (!protinfo)
3452 goto nla_put_failure;
3453
3454 if (brport_nla_put_flag(skb, flags, mask,
3455 IFLA_BRPORT_MODE, BR_HAIRPIN_MODE) ||
3456 brport_nla_put_flag(skb, flags, mask,
3457 IFLA_BRPORT_GUARD, BR_BPDU_GUARD) ||
3458 brport_nla_put_flag(skb, flags, mask,
3459 IFLA_BRPORT_FAST_LEAVE,
3460 BR_MULTICAST_FAST_LEAVE) ||
3461 brport_nla_put_flag(skb, flags, mask,
3462 IFLA_BRPORT_PROTECT, BR_ROOT_BLOCK) ||
3463 brport_nla_put_flag(skb, flags, mask,
3464 IFLA_BRPORT_LEARNING, BR_LEARNING) ||
3465 brport_nla_put_flag(skb, flags, mask,
3466 IFLA_BRPORT_LEARNING_SYNC, BR_LEARNING_SYNC) ||
3467 brport_nla_put_flag(skb, flags, mask,
3468 IFLA_BRPORT_UNICAST_FLOOD, BR_FLOOD) ||
3469 brport_nla_put_flag(skb, flags, mask,
3470 IFLA_BRPORT_PROXYARP, BR_PROXYARP)) {
3471 nla_nest_cancel(skb, protinfo);
3472 goto nla_put_failure;
3473 }
3474
3475 nla_nest_end(skb, protinfo);
3476
053c095a
JB
3477 nlmsg_end(skb, nlh);
3478 return 0;
815cccbf
JF
3479nla_put_failure:
3480 nlmsg_cancel(skb, nlh);
7d4f8d87 3481 return err ? err : -EMSGSIZE;
815cccbf 3482}
7d4f8d87 3483EXPORT_SYMBOL_GPL(ndo_dflt_bridge_getlink);
815cccbf 3484
e5a55a89
JF
3485static int rtnl_bridge_getlink(struct sk_buff *skb, struct netlink_callback *cb)
3486{
3487 struct net *net = sock_net(skb->sk);
3488 struct net_device *dev;
3489 int idx = 0;
3490 u32 portid = NETLINK_CB(cb->skb).portid;
3491 u32 seq = cb->nlh->nlmsg_seq;
6cbdceeb 3492 u32 filter_mask = 0;
d64f69b0 3493 int err;
6cbdceeb 3494
aa68c20f
TG
3495 if (nlmsg_len(cb->nlh) > sizeof(struct ifinfomsg)) {
3496 struct nlattr *extfilt;
3497
3498 extfilt = nlmsg_find_attr(cb->nlh, sizeof(struct ifinfomsg),
3499 IFLA_EXT_MASK);
3500 if (extfilt) {
3501 if (nla_len(extfilt) < sizeof(filter_mask))
3502 return -EINVAL;
3503
3504 filter_mask = nla_get_u32(extfilt);
3505 }
3506 }
e5a55a89
JF
3507
3508 rcu_read_lock();
3509 for_each_netdev_rcu(net, dev) {
3510 const struct net_device_ops *ops = dev->netdev_ops;
898e5061 3511 struct net_device *br_dev = netdev_master_upper_dev_get(dev);
e5a55a89 3512
898e5061 3513 if (br_dev && br_dev->netdev_ops->ndo_bridge_getlink) {
d64f69b0
RP
3514 if (idx >= cb->args[0]) {
3515 err = br_dev->netdev_ops->ndo_bridge_getlink(
3516 skb, portid, seq, dev,
3517 filter_mask, NLM_F_MULTI);
f6c5775f
DA
3518 if (err < 0 && err != -EOPNOTSUPP) {
3519 if (likely(skb->len))
3520 break;
3521
3522 goto out_err;
3523 }
d64f69b0 3524 }
25b1e679 3525 idx++;
e5a55a89
JF
3526 }
3527
3528 if (ops->ndo_bridge_getlink) {
d64f69b0
RP
3529 if (idx >= cb->args[0]) {
3530 err = ops->ndo_bridge_getlink(skb, portid,
3531 seq, dev,
3532 filter_mask,
3533 NLM_F_MULTI);
f6c5775f
DA
3534 if (err < 0 && err != -EOPNOTSUPP) {
3535 if (likely(skb->len))
3536 break;
3537
3538 goto out_err;
3539 }
d64f69b0 3540 }
25b1e679 3541 idx++;
e5a55a89
JF
3542 }
3543 }
f6c5775f
DA
3544 err = skb->len;
3545out_err:
e5a55a89
JF
3546 rcu_read_unlock();
3547 cb->args[0] = idx;
3548
f6c5775f 3549 return err;
e5a55a89
JF
3550}
3551
2469ffd7
JF
3552static inline size_t bridge_nlmsg_size(void)
3553{
3554 return NLMSG_ALIGN(sizeof(struct ifinfomsg))
3555 + nla_total_size(IFNAMSIZ) /* IFLA_IFNAME */
3556 + nla_total_size(MAX_ADDR_LEN) /* IFLA_ADDRESS */
3557 + nla_total_size(sizeof(u32)) /* IFLA_MASTER */
3558 + nla_total_size(sizeof(u32)) /* IFLA_MTU */
3559 + nla_total_size(sizeof(u32)) /* IFLA_LINK */
3560 + nla_total_size(sizeof(u32)) /* IFLA_OPERSTATE */
3561 + nla_total_size(sizeof(u8)) /* IFLA_PROTINFO */
3562 + nla_total_size(sizeof(struct nlattr)) /* IFLA_AF_SPEC */
3563 + nla_total_size(sizeof(u16)) /* IFLA_BRIDGE_FLAGS */
3564 + nla_total_size(sizeof(u16)); /* IFLA_BRIDGE_MODE */
3565}
3566
02dba438 3567static int rtnl_bridge_notify(struct net_device *dev)
2469ffd7
JF
3568{
3569 struct net *net = dev_net(dev);
2469ffd7
JF
3570 struct sk_buff *skb;
3571 int err = -EOPNOTSUPP;
3572
02dba438
RP
3573 if (!dev->netdev_ops->ndo_bridge_getlink)
3574 return 0;
3575
2469ffd7
JF
3576 skb = nlmsg_new(bridge_nlmsg_size(), GFP_ATOMIC);
3577 if (!skb) {
3578 err = -ENOMEM;
3579 goto errout;
3580 }
3581
46c264da 3582 err = dev->netdev_ops->ndo_bridge_getlink(skb, 0, 0, dev, 0, 0);
02dba438
RP
3583 if (err < 0)
3584 goto errout;
2469ffd7 3585
59ccaaaa
RP
3586 if (!skb->len)
3587 goto errout;
3588
2469ffd7
JF
3589 rtnl_notify(skb, net, 0, RTNLGRP_LINK, NULL, GFP_ATOMIC);
3590 return 0;
3591errout:
3592 WARN_ON(err == -EMSGSIZE);
3593 kfree_skb(skb);
59ccaaaa
RP
3594 if (err)
3595 rtnl_set_sk_err(net, RTNLGRP_LINK, err);
2469ffd7
JF
3596 return err;
3597}
3598
c21ef3e3
DA
3599static int rtnl_bridge_setlink(struct sk_buff *skb, struct nlmsghdr *nlh,
3600 struct netlink_ext_ack *extack)
e5a55a89
JF
3601{
3602 struct net *net = sock_net(skb->sk);
3603 struct ifinfomsg *ifm;
3604 struct net_device *dev;
2469ffd7
JF
3605 struct nlattr *br_spec, *attr = NULL;
3606 int rem, err = -EOPNOTSUPP;
4de8b413 3607 u16 flags = 0;
c38e01b8 3608 bool have_flags = false;
e5a55a89
JF
3609
3610 if (nlmsg_len(nlh) < sizeof(*ifm))
3611 return -EINVAL;
3612
3613 ifm = nlmsg_data(nlh);
3614 if (ifm->ifi_family != AF_BRIDGE)
3615 return -EPFNOSUPPORT;
3616
3617 dev = __dev_get_by_index(net, ifm->ifi_index);
3618 if (!dev) {
3619 pr_info("PF_BRIDGE: RTM_SETLINK with unknown ifindex\n");
3620 return -ENODEV;
3621 }
3622
2469ffd7
JF
3623 br_spec = nlmsg_find_attr(nlh, sizeof(struct ifinfomsg), IFLA_AF_SPEC);
3624 if (br_spec) {
3625 nla_for_each_nested(attr, br_spec, rem) {
3626 if (nla_type(attr) == IFLA_BRIDGE_FLAGS) {
6e8d1c55
TG
3627 if (nla_len(attr) < sizeof(flags))
3628 return -EINVAL;
3629
c38e01b8 3630 have_flags = true;
2469ffd7
JF
3631 flags = nla_get_u16(attr);
3632 break;
3633 }
3634 }
3635 }
3636
3637 if (!flags || (flags & BRIDGE_FLAGS_MASTER)) {
898e5061
JP
3638 struct net_device *br_dev = netdev_master_upper_dev_get(dev);
3639
3640 if (!br_dev || !br_dev->netdev_ops->ndo_bridge_setlink) {
2469ffd7
JF
3641 err = -EOPNOTSUPP;
3642 goto out;
3643 }
3644
add511b3 3645 err = br_dev->netdev_ops->ndo_bridge_setlink(dev, nlh, flags);
e5a55a89
JF
3646 if (err)
3647 goto out;
2469ffd7
JF
3648
3649 flags &= ~BRIDGE_FLAGS_MASTER;
e5a55a89
JF
3650 }
3651
2469ffd7
JF
3652 if ((flags & BRIDGE_FLAGS_SELF)) {
3653 if (!dev->netdev_ops->ndo_bridge_setlink)
3654 err = -EOPNOTSUPP;
3655 else
add511b3
RP
3656 err = dev->netdev_ops->ndo_bridge_setlink(dev, nlh,
3657 flags);
02dba438 3658 if (!err) {
2469ffd7 3659 flags &= ~BRIDGE_FLAGS_SELF;
02dba438
RP
3660
3661 /* Generate event to notify upper layer of bridge
3662 * change
3663 */
3664 err = rtnl_bridge_notify(dev);
3665 }
2469ffd7 3666 }
e5a55a89 3667
c38e01b8 3668 if (have_flags)
2469ffd7 3669 memcpy(nla_data(attr), &flags, sizeof(flags));
e5a55a89
JF
3670out:
3671 return err;
3672}
3673
c21ef3e3
DA
3674static int rtnl_bridge_dellink(struct sk_buff *skb, struct nlmsghdr *nlh,
3675 struct netlink_ext_ack *extack)
407af329
VY
3676{
3677 struct net *net = sock_net(skb->sk);
3678 struct ifinfomsg *ifm;
3679 struct net_device *dev;
3680 struct nlattr *br_spec, *attr = NULL;
3681 int rem, err = -EOPNOTSUPP;
4de8b413 3682 u16 flags = 0;
407af329
VY
3683 bool have_flags = false;
3684
3685 if (nlmsg_len(nlh) < sizeof(*ifm))
3686 return -EINVAL;
3687
3688 ifm = nlmsg_data(nlh);
3689 if (ifm->ifi_family != AF_BRIDGE)
3690 return -EPFNOSUPPORT;
3691
3692 dev = __dev_get_by_index(net, ifm->ifi_index);
3693 if (!dev) {
3694 pr_info("PF_BRIDGE: RTM_SETLINK with unknown ifindex\n");
3695 return -ENODEV;
3696 }
3697
3698 br_spec = nlmsg_find_attr(nlh, sizeof(struct ifinfomsg), IFLA_AF_SPEC);
3699 if (br_spec) {
3700 nla_for_each_nested(attr, br_spec, rem) {
3701 if (nla_type(attr) == IFLA_BRIDGE_FLAGS) {
6e8d1c55
TG
3702 if (nla_len(attr) < sizeof(flags))
3703 return -EINVAL;
3704
407af329
VY
3705 have_flags = true;
3706 flags = nla_get_u16(attr);
3707 break;
3708 }
3709 }
3710 }
3711
407af329
VY
3712 if (!flags || (flags & BRIDGE_FLAGS_MASTER)) {
3713 struct net_device *br_dev = netdev_master_upper_dev_get(dev);
3714
3715 if (!br_dev || !br_dev->netdev_ops->ndo_bridge_dellink) {
3716 err = -EOPNOTSUPP;
3717 goto out;
3718 }
3719
add511b3 3720 err = br_dev->netdev_ops->ndo_bridge_dellink(dev, nlh, flags);
407af329
VY
3721 if (err)
3722 goto out;
3723
3724 flags &= ~BRIDGE_FLAGS_MASTER;
3725 }
3726
3727 if ((flags & BRIDGE_FLAGS_SELF)) {
3728 if (!dev->netdev_ops->ndo_bridge_dellink)
3729 err = -EOPNOTSUPP;
3730 else
add511b3
RP
3731 err = dev->netdev_ops->ndo_bridge_dellink(dev, nlh,
3732 flags);
407af329 3733
02dba438 3734 if (!err) {
407af329 3735 flags &= ~BRIDGE_FLAGS_SELF;
02dba438
RP
3736
3737 /* Generate event to notify upper layer of bridge
3738 * change
3739 */
3740 err = rtnl_bridge_notify(dev);
3741 }
407af329
VY
3742 }
3743
3744 if (have_flags)
3745 memcpy(nla_data(attr), &flags, sizeof(flags));
407af329
VY
3746out:
3747 return err;
3748}
3749
e8872a25
NA
3750static bool stats_attr_valid(unsigned int mask, int attrid, int idxattr)
3751{
3752 return (mask & IFLA_STATS_FILTER_BIT(attrid)) &&
3753 (!idxattr || idxattr == attrid);
3754}
3755
69ae6ad2
NF
3756#define IFLA_OFFLOAD_XSTATS_FIRST (IFLA_OFFLOAD_XSTATS_UNSPEC + 1)
3757static int rtnl_get_offload_stats_attr_size(int attr_id)
3758{
3759 switch (attr_id) {
3760 case IFLA_OFFLOAD_XSTATS_CPU_HIT:
3761 return sizeof(struct rtnl_link_stats64);
3762 }
3763
3764 return 0;
3765}
3766
3767static int rtnl_get_offload_stats(struct sk_buff *skb, struct net_device *dev,
3768 int *prividx)
3769{
3770 struct nlattr *attr = NULL;
3771 int attr_id, size;
3772 void *attr_data;
3773 int err;
3774
3775 if (!(dev->netdev_ops && dev->netdev_ops->ndo_has_offload_stats &&
3776 dev->netdev_ops->ndo_get_offload_stats))
3777 return -ENODATA;
3778
3779 for (attr_id = IFLA_OFFLOAD_XSTATS_FIRST;
3780 attr_id <= IFLA_OFFLOAD_XSTATS_MAX; attr_id++) {
3781 if (attr_id < *prividx)
3782 continue;
3783
3784 size = rtnl_get_offload_stats_attr_size(attr_id);
3785 if (!size)
3786 continue;
3787
3df5b3c6 3788 if (!dev->netdev_ops->ndo_has_offload_stats(dev, attr_id))
69ae6ad2
NF
3789 continue;
3790
3791 attr = nla_reserve_64bit(skb, attr_id, size,
3792 IFLA_OFFLOAD_XSTATS_UNSPEC);
3793 if (!attr)
3794 goto nla_put_failure;
3795
3796 attr_data = nla_data(attr);
3797 memset(attr_data, 0, size);
3798 err = dev->netdev_ops->ndo_get_offload_stats(attr_id, dev,
3799 attr_data);
3800 if (err)
3801 goto get_offload_stats_failure;
3802 }
3803
3804 if (!attr)
3805 return -ENODATA;
3806
3807 *prividx = 0;
3808 return 0;
3809
3810nla_put_failure:
3811 err = -EMSGSIZE;
3812get_offload_stats_failure:
3813 *prividx = attr_id;
3814 return err;
3815}
3816
3817static int rtnl_get_offload_stats_size(const struct net_device *dev)
3818{
3819 int nla_size = 0;
3820 int attr_id;
3821 int size;
3822
3823 if (!(dev->netdev_ops && dev->netdev_ops->ndo_has_offload_stats &&
3824 dev->netdev_ops->ndo_get_offload_stats))
3825 return 0;
3826
3827 for (attr_id = IFLA_OFFLOAD_XSTATS_FIRST;
3828 attr_id <= IFLA_OFFLOAD_XSTATS_MAX; attr_id++) {
3df5b3c6 3829 if (!dev->netdev_ops->ndo_has_offload_stats(dev, attr_id))
69ae6ad2
NF
3830 continue;
3831 size = rtnl_get_offload_stats_attr_size(attr_id);
3832 nla_size += nla_total_size_64bit(size);
3833 }
3834
3835 if (nla_size != 0)
3836 nla_size += nla_total_size(0);
3837
3838 return nla_size;
3839}
3840
10c9ead9
RP
3841static int rtnl_fill_statsinfo(struct sk_buff *skb, struct net_device *dev,
3842 int type, u32 pid, u32 seq, u32 change,
e8872a25
NA
3843 unsigned int flags, unsigned int filter_mask,
3844 int *idxattr, int *prividx)
10c9ead9
RP
3845{
3846 struct if_stats_msg *ifsm;
3847 struct nlmsghdr *nlh;
3848 struct nlattr *attr;
e8872a25 3849 int s_prividx = *prividx;
69ae6ad2 3850 int err;
10c9ead9
RP
3851
3852 ASSERT_RTNL();
3853
3854 nlh = nlmsg_put(skb, pid, seq, type, sizeof(*ifsm), flags);
3855 if (!nlh)
3856 return -EMSGSIZE;
3857
3858 ifsm = nlmsg_data(nlh);
3859 ifsm->ifindex = dev->ifindex;
3860 ifsm->filter_mask = filter_mask;
3861
e8872a25 3862 if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_64, *idxattr)) {
10c9ead9 3863 struct rtnl_link_stats64 *sp;
10c9ead9 3864
58414d32
ND
3865 attr = nla_reserve_64bit(skb, IFLA_STATS_LINK_64,
3866 sizeof(struct rtnl_link_stats64),
3867 IFLA_STATS_UNSPEC);
10c9ead9
RP
3868 if (!attr)
3869 goto nla_put_failure;
3870
3871 sp = nla_data(attr);
3872 dev_get_stats(dev, sp);
3873 }
3874
97a47fac
NA
3875 if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_XSTATS, *idxattr)) {
3876 const struct rtnl_link_ops *ops = dev->rtnl_link_ops;
3877
3878 if (ops && ops->fill_linkxstats) {
97a47fac
NA
3879 *idxattr = IFLA_STATS_LINK_XSTATS;
3880 attr = nla_nest_start(skb,
3881 IFLA_STATS_LINK_XSTATS);
3882 if (!attr)
3883 goto nla_put_failure;
3884
80e73cc5
NA
3885 err = ops->fill_linkxstats(skb, dev, prividx, *idxattr);
3886 nla_nest_end(skb, attr);
3887 if (err)
3888 goto nla_put_failure;
3889 *idxattr = 0;
3890 }
3891 }
3892
3893 if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_XSTATS_SLAVE,
3894 *idxattr)) {
3895 const struct rtnl_link_ops *ops = NULL;
3896 const struct net_device *master;
3897
3898 master = netdev_master_upper_dev_get(dev);
3899 if (master)
3900 ops = master->rtnl_link_ops;
3901 if (ops && ops->fill_linkxstats) {
80e73cc5
NA
3902 *idxattr = IFLA_STATS_LINK_XSTATS_SLAVE;
3903 attr = nla_nest_start(skb,
3904 IFLA_STATS_LINK_XSTATS_SLAVE);
3905 if (!attr)
3906 goto nla_put_failure;
3907
3908 err = ops->fill_linkxstats(skb, dev, prividx, *idxattr);
97a47fac
NA
3909 nla_nest_end(skb, attr);
3910 if (err)
3911 goto nla_put_failure;
3912 *idxattr = 0;
3913 }
3914 }
3915
69ae6ad2
NF
3916 if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_OFFLOAD_XSTATS,
3917 *idxattr)) {
3918 *idxattr = IFLA_STATS_LINK_OFFLOAD_XSTATS;
3919 attr = nla_nest_start(skb, IFLA_STATS_LINK_OFFLOAD_XSTATS);
3920 if (!attr)
3921 goto nla_put_failure;
3922
3923 err = rtnl_get_offload_stats(skb, dev, prividx);
3924 if (err == -ENODATA)
3925 nla_nest_cancel(skb, attr);
3926 else
3927 nla_nest_end(skb, attr);
3928
3929 if (err && err != -ENODATA)
3930 goto nla_put_failure;
3931 *idxattr = 0;
3932 }
3933
aefb4d4a
RS
3934 if (stats_attr_valid(filter_mask, IFLA_STATS_AF_SPEC, *idxattr)) {
3935 struct rtnl_af_ops *af_ops;
3936
3937 *idxattr = IFLA_STATS_AF_SPEC;
3938 attr = nla_nest_start(skb, IFLA_STATS_AF_SPEC);
3939 if (!attr)
3940 goto nla_put_failure;
3941
3942 list_for_each_entry(af_ops, &rtnl_af_ops, list) {
3943 if (af_ops->fill_stats_af) {
3944 struct nlattr *af;
3945 int err;
3946
3947 af = nla_nest_start(skb, af_ops->family);
3948 if (!af)
3949 goto nla_put_failure;
3950
3951 err = af_ops->fill_stats_af(skb, dev);
3952
3953 if (err == -ENODATA)
3954 nla_nest_cancel(skb, af);
3955 else if (err < 0)
3956 goto nla_put_failure;
3957
3958 nla_nest_end(skb, af);
3959 }
3960 }
3961
3962 nla_nest_end(skb, attr);
3963
3964 *idxattr = 0;
3965 }
3966
10c9ead9
RP
3967 nlmsg_end(skb, nlh);
3968
3969 return 0;
3970
3971nla_put_failure:
e8872a25
NA
3972 /* not a multi message or no progress mean a real error */
3973 if (!(flags & NLM_F_MULTI) || s_prividx == *prividx)
3974 nlmsg_cancel(skb, nlh);
3975 else
3976 nlmsg_end(skb, nlh);
10c9ead9
RP
3977
3978 return -EMSGSIZE;
3979}
3980
10c9ead9
RP
3981static size_t if_nlmsg_stats_size(const struct net_device *dev,
3982 u32 filter_mask)
3983{
3984 size_t size = 0;
3985
e8872a25 3986 if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_64, 0))
10c9ead9
RP
3987 size += nla_total_size_64bit(sizeof(struct rtnl_link_stats64));
3988
97a47fac
NA
3989 if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_XSTATS, 0)) {
3990 const struct rtnl_link_ops *ops = dev->rtnl_link_ops;
80e73cc5 3991 int attr = IFLA_STATS_LINK_XSTATS;
97a47fac
NA
3992
3993 if (ops && ops->get_linkxstats_size) {
80e73cc5
NA
3994 size += nla_total_size(ops->get_linkxstats_size(dev,
3995 attr));
97a47fac
NA
3996 /* for IFLA_STATS_LINK_XSTATS */
3997 size += nla_total_size(0);
3998 }
3999 }
4000
80e73cc5
NA
4001 if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_XSTATS_SLAVE, 0)) {
4002 struct net_device *_dev = (struct net_device *)dev;
4003 const struct rtnl_link_ops *ops = NULL;
4004 const struct net_device *master;
4005
4006 /* netdev_master_upper_dev_get can't take const */
4007 master = netdev_master_upper_dev_get(_dev);
4008 if (master)
4009 ops = master->rtnl_link_ops;
4010 if (ops && ops->get_linkxstats_size) {
4011 int attr = IFLA_STATS_LINK_XSTATS_SLAVE;
4012
4013 size += nla_total_size(ops->get_linkxstats_size(dev,
4014 attr));
4015 /* for IFLA_STATS_LINK_XSTATS_SLAVE */
4016 size += nla_total_size(0);
4017 }
4018 }
4019
69ae6ad2
NF
4020 if (stats_attr_valid(filter_mask, IFLA_STATS_LINK_OFFLOAD_XSTATS, 0))
4021 size += rtnl_get_offload_stats_size(dev);
4022
aefb4d4a
RS
4023 if (stats_attr_valid(filter_mask, IFLA_STATS_AF_SPEC, 0)) {
4024 struct rtnl_af_ops *af_ops;
4025
4026 /* for IFLA_STATS_AF_SPEC */
4027 size += nla_total_size(0);
4028
4029 list_for_each_entry(af_ops, &rtnl_af_ops, list) {
4030 if (af_ops->get_stats_af_size) {
4031 size += nla_total_size(
4032 af_ops->get_stats_af_size(dev));
4033
4034 /* for AF_* */
4035 size += nla_total_size(0);
4036 }
4037 }
4038 }
4039
10c9ead9
RP
4040 return size;
4041}
4042
c21ef3e3
DA
4043static int rtnl_stats_get(struct sk_buff *skb, struct nlmsghdr *nlh,
4044 struct netlink_ext_ack *extack)
10c9ead9
RP
4045{
4046 struct net *net = sock_net(skb->sk);
10c9ead9 4047 struct net_device *dev = NULL;
e8872a25
NA
4048 int idxattr = 0, prividx = 0;
4049 struct if_stats_msg *ifsm;
10c9ead9
RP
4050 struct sk_buff *nskb;
4051 u32 filter_mask;
4052 int err;
4053
4775cc1f
MK
4054 if (nlmsg_len(nlh) < sizeof(*ifsm))
4055 return -EINVAL;
4056
10c9ead9
RP
4057 ifsm = nlmsg_data(nlh);
4058 if (ifsm->ifindex > 0)
4059 dev = __dev_get_by_index(net, ifsm->ifindex);
4060 else
4061 return -EINVAL;
4062
4063 if (!dev)
4064 return -ENODEV;
4065
4066 filter_mask = ifsm->filter_mask;
4067 if (!filter_mask)
4068 return -EINVAL;
4069
4070 nskb = nlmsg_new(if_nlmsg_stats_size(dev, filter_mask), GFP_KERNEL);
4071 if (!nskb)
4072 return -ENOBUFS;
4073
4074 err = rtnl_fill_statsinfo(nskb, dev, RTM_NEWSTATS,
4075 NETLINK_CB(skb).portid, nlh->nlmsg_seq, 0,
e8872a25 4076 0, filter_mask, &idxattr, &prividx);
10c9ead9
RP
4077 if (err < 0) {
4078 /* -EMSGSIZE implies BUG in if_nlmsg_stats_size */
4079 WARN_ON(err == -EMSGSIZE);
4080 kfree_skb(nskb);
4081 } else {
4082 err = rtnl_unicast(nskb, net, NETLINK_CB(skb).portid);
4083 }
4084
4085 return err;
4086}
4087
4088static int rtnl_stats_dump(struct sk_buff *skb, struct netlink_callback *cb)
4089{
e8872a25 4090 int h, s_h, err, s_idx, s_idxattr, s_prividx;
10c9ead9 4091 struct net *net = sock_net(skb->sk);
e8872a25 4092 unsigned int flags = NLM_F_MULTI;
10c9ead9 4093 struct if_stats_msg *ifsm;
10c9ead9 4094 struct hlist_head *head;
e8872a25 4095 struct net_device *dev;
10c9ead9 4096 u32 filter_mask = 0;
e8872a25 4097 int idx = 0;
10c9ead9
RP
4098
4099 s_h = cb->args[0];
4100 s_idx = cb->args[1];
e8872a25
NA
4101 s_idxattr = cb->args[2];
4102 s_prividx = cb->args[3];
10c9ead9
RP
4103
4104 cb->seq = net->dev_base_seq;
4105
4775cc1f
MK
4106 if (nlmsg_len(cb->nlh) < sizeof(*ifsm))
4107 return -EINVAL;
4108
10c9ead9
RP
4109 ifsm = nlmsg_data(cb->nlh);
4110 filter_mask = ifsm->filter_mask;
4111 if (!filter_mask)
4112 return -EINVAL;
4113
4114 for (h = s_h; h < NETDEV_HASHENTRIES; h++, s_idx = 0) {
4115 idx = 0;
4116 head = &net->dev_index_head[h];
4117 hlist_for_each_entry(dev, head, index_hlist) {
4118 if (idx < s_idx)
4119 goto cont;
4120 err = rtnl_fill_statsinfo(skb, dev, RTM_NEWSTATS,
4121 NETLINK_CB(cb->skb).portid,
4122 cb->nlh->nlmsg_seq, 0,
e8872a25
NA
4123 flags, filter_mask,
4124 &s_idxattr, &s_prividx);
10c9ead9
RP
4125 /* If we ran out of room on the first message,
4126 * we're in trouble
4127 */
4128 WARN_ON((err == -EMSGSIZE) && (skb->len == 0));
4129
4130 if (err < 0)
4131 goto out;
e8872a25
NA
4132 s_prividx = 0;
4133 s_idxattr = 0;
10c9ead9
RP
4134 nl_dump_check_consistent(cb, nlmsg_hdr(skb));
4135cont:
4136 idx++;
4137 }
4138 }
4139out:
e8872a25
NA
4140 cb->args[3] = s_prividx;
4141 cb->args[2] = s_idxattr;
10c9ead9
RP
4142 cb->args[1] = idx;
4143 cb->args[0] = h;
4144
4145 return skb->len;
4146}
4147
1da177e4
LT
4148/* Process one rtnetlink message. */
4149
2d4bc933
JB
4150static int rtnetlink_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh,
4151 struct netlink_ext_ack *extack)
1da177e4 4152{
3b1e0a65 4153 struct net *net = sock_net(skb->sk);
6853dd48
FW
4154 struct rtnl_link *handlers;
4155 int err = -EOPNOTSUPP;
e2849863 4156 rtnl_doit_func doit;
62256f98 4157 unsigned int flags;
617cfc75 4158 int kind;
1da177e4
LT
4159 int family;
4160 int type;
1da177e4 4161
1da177e4 4162 type = nlh->nlmsg_type;
1da177e4 4163 if (type > RTM_MAX)
038890fe 4164 return -EOPNOTSUPP;
1da177e4
LT
4165
4166 type -= RTM_BASE;
4167
4168 /* All the messages must have at least 1 byte length */
573ce260 4169 if (nlmsg_len(nlh) < sizeof(struct rtgenmsg))
1da177e4
LT
4170 return 0;
4171
573ce260 4172 family = ((struct rtgenmsg *)nlmsg_data(nlh))->rtgen_family;
1da177e4
LT
4173 kind = type&3;
4174
90f62cf3 4175 if (kind != 2 && !netlink_net_capable(skb, CAP_NET_ADMIN))
1d00a4eb 4176 return -EPERM;
1da177e4 4177
5c2bb9b6 4178 if (family >= ARRAY_SIZE(rtnl_msg_handlers))
6853dd48
FW
4179 family = PF_UNSPEC;
4180
4181 rcu_read_lock();
4182 handlers = rcu_dereference(rtnl_msg_handlers[family]);
4183 if (!handlers) {
4184 family = PF_UNSPEC;
4185 handlers = rcu_dereference(rtnl_msg_handlers[family]);
4186 }
4187
b8f3ab42 4188 if (kind == 2 && nlh->nlmsg_flags&NLM_F_DUMP) {
97c53cac 4189 struct sock *rtnl;
e2849863 4190 rtnl_dumpit_func dumpit;
c7ac8679 4191 u16 min_dump_alloc = 0;
1da177e4 4192
6853dd48
FW
4193 dumpit = READ_ONCE(handlers[type].dumpit);
4194 if (!dumpit) {
4195 family = PF_UNSPEC;
4196 handlers = rcu_dereference(rtnl_msg_handlers[PF_UNSPEC]);
4197 if (!handlers)
4198 goto err_unlock;
0cc09020 4199
6853dd48
FW
4200 dumpit = READ_ONCE(handlers[type].dumpit);
4201 if (!dumpit)
4202 goto err_unlock;
4203 }
e1fa6d21 4204
019a3169
FW
4205 refcount_inc(&rtnl_msg_handlers_ref[family]);
4206
5c2bb9b6 4207 if (type == RTM_GETLINK - RTM_BASE)
e1fa6d21 4208 min_dump_alloc = rtnl_calcit(skb, nlh);
9ac4a169 4209
6853dd48
FW
4210 rcu_read_unlock();
4211
97c53cac 4212 rtnl = net->rtnl;
80d326fa
PNA
4213 {
4214 struct netlink_dump_control c = {
4215 .dump = dumpit,
4216 .min_dump_alloc = min_dump_alloc,
4217 };
4218 err = netlink_dump_start(rtnl, skb, nlh, &c);
4219 }
019a3169 4220 refcount_dec(&rtnl_msg_handlers_ref[family]);
2907c35f 4221 return err;
1da177e4
LT
4222 }
4223
62256f98
FW
4224 flags = READ_ONCE(handlers[type].flags);
4225 if (flags & RTNL_FLAG_DOIT_UNLOCKED) {
4226 refcount_inc(&rtnl_msg_handlers_ref[family]);
4227 doit = READ_ONCE(handlers[type].doit);
4228 rcu_read_unlock();
4229 if (doit)
4230 err = doit(skb, nlh, extack);
4231 refcount_dec(&rtnl_msg_handlers_ref[family]);
4232 return err;
4233 }
4234
6853dd48 4235 rcu_read_unlock();
1da177e4 4236
6853dd48
FW
4237 rtnl_lock();
4238 handlers = rtnl_dereference(rtnl_msg_handlers[family]);
4239 if (handlers) {
4240 doit = READ_ONCE(handlers[type].doit);
4241 if (doit)
4242 err = doit(skb, nlh, extack);
4243 }
0cc09020 4244 rtnl_unlock();
0cc09020
FW
4245 return err;
4246
4247err_unlock:
6853dd48 4248 rcu_read_unlock();
0cc09020 4249 return -EOPNOTSUPP;
1da177e4
LT
4250}
4251
cd40b7d3 4252static void rtnetlink_rcv(struct sk_buff *skb)
1da177e4 4253{
cd40b7d3 4254 netlink_rcv_skb(skb, &rtnetlink_rcv_msg);
1da177e4
LT
4255}
4256
5f729eaa
JG
4257static int rtnetlink_bind(struct net *net, int group)
4258{
4259 switch (group) {
4260 case RTNLGRP_IPV4_MROUTE_R:
4261 case RTNLGRP_IPV6_MROUTE_R:
4262 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
4263 return -EPERM;
4264 break;
4265 }
4266 return 0;
4267}
4268
1da177e4
LT
4269static int rtnetlink_event(struct notifier_block *this, unsigned long event, void *ptr)
4270{
351638e7 4271 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
e9dc8653 4272
1da177e4 4273 switch (event) {
5138e86f 4274 case NETDEV_REBOOT:
3753654e 4275 case NETDEV_CHANGEADDR:
5138e86f
VY
4276 case NETDEV_CHANGENAME:
4277 case NETDEV_FEAT_CHANGE:
4278 case NETDEV_BONDING_FAILOVER:
5138e86f 4279 case NETDEV_NOTIFY_PEERS:
5138e86f 4280 case NETDEV_RESEND_IGMP:
5138e86f 4281 case NETDEV_CHANGEINFODATA:
3d3ea5af
VY
4282 rtmsg_ifinfo_event(RTM_NEWLINK, dev, 0, rtnl_get_event(event),
4283 GFP_KERNEL);
1da177e4
LT
4284 break;
4285 default:
1da177e4
LT
4286 break;
4287 }
4288 return NOTIFY_DONE;
4289}
4290
4291static struct notifier_block rtnetlink_dev_notifier = {
4292 .notifier_call = rtnetlink_event,
4293};
4294
97c53cac 4295
2c8c1e72 4296static int __net_init rtnetlink_net_init(struct net *net)
97c53cac
DL
4297{
4298 struct sock *sk;
a31f2d17
PNA
4299 struct netlink_kernel_cfg cfg = {
4300 .groups = RTNLGRP_MAX,
4301 .input = rtnetlink_rcv,
4302 .cb_mutex = &rtnl_mutex,
9785e10a 4303 .flags = NL_CFG_F_NONROOT_RECV,
5f729eaa 4304 .bind = rtnetlink_bind,
a31f2d17
PNA
4305 };
4306
9f00d977 4307 sk = netlink_kernel_create(net, NETLINK_ROUTE, &cfg);
97c53cac
DL
4308 if (!sk)
4309 return -ENOMEM;
97c53cac
DL
4310 net->rtnl = sk;
4311 return 0;
4312}
4313
2c8c1e72 4314static void __net_exit rtnetlink_net_exit(struct net *net)
97c53cac 4315{
775516bf
DL
4316 netlink_kernel_release(net->rtnl);
4317 net->rtnl = NULL;
97c53cac
DL
4318}
4319
4320static struct pernet_operations rtnetlink_net_ops = {
4321 .init = rtnetlink_net_init,
4322 .exit = rtnetlink_net_exit,
4323};
4324
1da177e4
LT
4325void __init rtnetlink_init(void)
4326{
97c53cac 4327 if (register_pernet_subsys(&rtnetlink_net_ops))
1da177e4 4328 panic("rtnetlink_init: cannot initialize rtnetlink\n");
97c53cac 4329
1da177e4 4330 register_netdevice_notifier(&rtnetlink_dev_notifier);
340d17fc 4331
c7ac8679 4332 rtnl_register(PF_UNSPEC, RTM_GETLINK, rtnl_getlink,
b97bac64
FW
4333 rtnl_dump_ifinfo, 0);
4334 rtnl_register(PF_UNSPEC, RTM_SETLINK, rtnl_setlink, NULL, 0);
4335 rtnl_register(PF_UNSPEC, RTM_NEWLINK, rtnl_newlink, NULL, 0);
4336 rtnl_register(PF_UNSPEC, RTM_DELLINK, rtnl_dellink, NULL, 0);
687ad8cc 4337
b97bac64
FW
4338 rtnl_register(PF_UNSPEC, RTM_GETADDR, NULL, rtnl_dump_all, 0);
4339 rtnl_register(PF_UNSPEC, RTM_GETROUTE, NULL, rtnl_dump_all, 0);
4340 rtnl_register(PF_UNSPEC, RTM_GETNETCONF, NULL, rtnl_dump_all, 0);
77162022 4341
b97bac64
FW
4342 rtnl_register(PF_BRIDGE, RTM_NEWNEIGH, rtnl_fdb_add, NULL, 0);
4343 rtnl_register(PF_BRIDGE, RTM_DELNEIGH, rtnl_fdb_del, NULL, 0);
4344 rtnl_register(PF_BRIDGE, RTM_GETNEIGH, NULL, rtnl_fdb_dump, 0);
e5a55a89 4345
b97bac64
FW
4346 rtnl_register(PF_BRIDGE, RTM_GETLINK, NULL, rtnl_bridge_getlink, 0);
4347 rtnl_register(PF_BRIDGE, RTM_DELLINK, rtnl_bridge_dellink, NULL, 0);
4348 rtnl_register(PF_BRIDGE, RTM_SETLINK, rtnl_bridge_setlink, NULL, 0);
10c9ead9
RP
4349
4350 rtnl_register(PF_UNSPEC, RTM_GETSTATS, rtnl_stats_get, rtnl_stats_dump,
b97bac64 4351 0);
1da177e4 4352}