2 * net/tipc/config.c: TIPC configuration management code
4 * Copyright (c) 2002-2006, Ericsson AB
5 * Copyright (c) 2004-2007, 2010-2012, Wind River Systems
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
20 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
34 * POSSIBILITY OF SUCH DAMAGE.
39 #include "name_table.h"
42 #define REPLY_TRUNCATED "<truncated>\n"
44 static u32 config_port_ref
;
46 static DEFINE_SPINLOCK(config_lock
);
48 static const void *req_tlv_area
; /* request message TLV area */
49 static int req_tlv_space
; /* request message TLV area size */
50 static int rep_headroom
; /* reply message headroom to use */
53 struct sk_buff
*tipc_cfg_reply_alloc(int payload_size
)
57 buf
= alloc_skb(rep_headroom
+ payload_size
, GFP_ATOMIC
);
59 skb_reserve(buf
, rep_headroom
);
63 int tipc_cfg_append_tlv(struct sk_buff
*buf
, int tlv_type
,
64 void *tlv_data
, int tlv_data_size
)
66 struct tlv_desc
*tlv
= (struct tlv_desc
*)skb_tail_pointer(buf
);
67 int new_tlv_space
= TLV_SPACE(tlv_data_size
);
69 if (skb_tailroom(buf
) < new_tlv_space
)
71 skb_put(buf
, new_tlv_space
);
72 tlv
->tlv_type
= htons(tlv_type
);
73 tlv
->tlv_len
= htons(TLV_LENGTH(tlv_data_size
));
74 if (tlv_data_size
&& tlv_data
)
75 memcpy(TLV_DATA(tlv
), tlv_data
, tlv_data_size
);
79 static struct sk_buff
*tipc_cfg_reply_unsigned_type(u16 tlv_type
, u32 value
)
84 buf
= tipc_cfg_reply_alloc(TLV_SPACE(sizeof(value
)));
86 value_net
= htonl(value
);
87 tipc_cfg_append_tlv(buf
, tlv_type
, &value_net
,
93 static struct sk_buff
*tipc_cfg_reply_unsigned(u32 value
)
95 return tipc_cfg_reply_unsigned_type(TIPC_TLV_UNSIGNED
, value
);
98 struct sk_buff
*tipc_cfg_reply_string_type(u16 tlv_type
, char *string
)
101 int string_len
= strlen(string
) + 1;
103 buf
= tipc_cfg_reply_alloc(TLV_SPACE(string_len
));
105 tipc_cfg_append_tlv(buf
, tlv_type
, string
, string_len
);
109 static struct sk_buff
*tipc_show_stats(void)
112 struct tlv_desc
*rep_tlv
;
118 if (!TLV_CHECK(req_tlv_area
, req_tlv_space
, TIPC_TLV_UNSIGNED
))
119 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR
);
121 value
= ntohl(*(u32
*)TLV_DATA(req_tlv_area
));
123 return tipc_cfg_reply_error_string("unsupported argument");
125 buf
= tipc_cfg_reply_alloc(TLV_SPACE(ULTRA_STRING_MAX_LEN
));
129 rep_tlv
= (struct tlv_desc
*)buf
->data
;
130 pb
= TLV_DATA(rep_tlv
);
131 pb_len
= ULTRA_STRING_MAX_LEN
;
133 str_len
= tipc_snprintf(pb
, pb_len
, "TIPC version " TIPC_MOD_VER
"\n");
134 str_len
+= 1; /* for "\0" */
135 skb_put(buf
, TLV_SPACE(str_len
));
136 TLV_SET(rep_tlv
, TIPC_TLV_ULTRA_STRING
, NULL
, str_len
);
141 static struct sk_buff
*cfg_enable_bearer(void)
143 struct tipc_bearer_config
*args
;
145 if (!TLV_CHECK(req_tlv_area
, req_tlv_space
, TIPC_TLV_BEARER_CONFIG
))
146 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR
);
148 args
= (struct tipc_bearer_config
*)TLV_DATA(req_tlv_area
);
149 if (tipc_enable_bearer(args
->name
,
150 ntohl(args
->disc_domain
),
151 ntohl(args
->priority
)))
152 return tipc_cfg_reply_error_string("unable to enable bearer");
154 return tipc_cfg_reply_none();
157 static struct sk_buff
*cfg_disable_bearer(void)
159 if (!TLV_CHECK(req_tlv_area
, req_tlv_space
, TIPC_TLV_BEARER_NAME
))
160 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR
);
162 if (tipc_disable_bearer((char *)TLV_DATA(req_tlv_area
)))
163 return tipc_cfg_reply_error_string("unable to disable bearer");
165 return tipc_cfg_reply_none();
168 static struct sk_buff
*cfg_set_own_addr(void)
172 if (!TLV_CHECK(req_tlv_area
, req_tlv_space
, TIPC_TLV_NET_ADDR
))
173 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR
);
175 addr
= ntohl(*(__be32
*)TLV_DATA(req_tlv_area
));
176 if (addr
== tipc_own_addr
)
177 return tipc_cfg_reply_none();
178 if (!tipc_addr_node_valid(addr
))
179 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
182 return tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
183 " (cannot change node address once assigned)");
186 * Must temporarily release configuration spinlock while switching into
187 * networking mode as it calls tipc_eth_media_start(), which may sleep.
188 * Releasing the lock is harmless as other locally-issued configuration
189 * commands won't occur until this one completes, and remotely-issued
190 * configuration commands can't be received until a local configuration
191 * command to enable the first bearer is received and processed.
193 spin_unlock_bh(&config_lock
);
194 tipc_core_start_net(addr
);
195 spin_lock_bh(&config_lock
);
196 return tipc_cfg_reply_none();
199 static struct sk_buff
*cfg_set_remote_mng(void)
203 if (!TLV_CHECK(req_tlv_area
, req_tlv_space
, TIPC_TLV_UNSIGNED
))
204 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR
);
206 value
= ntohl(*(__be32
*)TLV_DATA(req_tlv_area
));
207 tipc_remote_management
= (value
!= 0);
208 return tipc_cfg_reply_none();
211 static struct sk_buff
*cfg_set_max_ports(void)
215 if (!TLV_CHECK(req_tlv_area
, req_tlv_space
, TIPC_TLV_UNSIGNED
))
216 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR
);
217 value
= ntohl(*(__be32
*)TLV_DATA(req_tlv_area
));
218 if (value
== tipc_max_ports
)
219 return tipc_cfg_reply_none();
220 if (value
< 127 || value
> 65535)
221 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
222 " (max ports must be 127-65535)");
223 return tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
224 " (cannot change max ports while TIPC is active)");
227 static struct sk_buff
*cfg_set_netid(void)
231 if (!TLV_CHECK(req_tlv_area
, req_tlv_space
, TIPC_TLV_UNSIGNED
))
232 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR
);
233 value
= ntohl(*(__be32
*)TLV_DATA(req_tlv_area
));
234 if (value
== tipc_net_id
)
235 return tipc_cfg_reply_none();
236 if (value
< 1 || value
> 9999)
237 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
238 " (network id must be 1-9999)");
240 return tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
241 " (cannot change network id once TIPC has joined a network)");
243 return tipc_cfg_reply_none();
246 struct sk_buff
*tipc_cfg_do_cmd(u32 orig_node
, u16 cmd
, const void *request_area
,
247 int request_space
, int reply_headroom
)
249 struct sk_buff
*rep_tlv_buf
;
251 spin_lock_bh(&config_lock
);
253 /* Save request and reply details in a well-known location */
254 req_tlv_area
= request_area
;
255 req_tlv_space
= request_space
;
256 rep_headroom
= reply_headroom
;
258 /* Check command authorization */
259 if (likely(in_own_node(orig_node
))) {
260 /* command is permitted */
261 } else if (cmd
>= 0x8000) {
262 rep_tlv_buf
= tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
263 " (cannot be done remotely)");
265 } else if (!tipc_remote_management
) {
266 rep_tlv_buf
= tipc_cfg_reply_error_string(TIPC_CFG_NO_REMOTE
);
268 } else if (cmd
>= 0x4000) {
271 if ((tipc_nametbl_translate(TIPC_ZM_SRV
, 0, &domain
) == 0) ||
272 (domain
!= orig_node
)) {
273 rep_tlv_buf
= tipc_cfg_reply_error_string(TIPC_CFG_NOT_ZONE_MSTR
);
278 /* Call appropriate processing routine */
281 rep_tlv_buf
= tipc_cfg_reply_none();
283 case TIPC_CMD_GET_NODES
:
284 rep_tlv_buf
= tipc_node_get_nodes(req_tlv_area
, req_tlv_space
);
286 case TIPC_CMD_GET_LINKS
:
287 rep_tlv_buf
= tipc_node_get_links(req_tlv_area
, req_tlv_space
);
289 case TIPC_CMD_SHOW_LINK_STATS
:
290 rep_tlv_buf
= tipc_link_cmd_show_stats(req_tlv_area
, req_tlv_space
);
292 case TIPC_CMD_RESET_LINK_STATS
:
293 rep_tlv_buf
= tipc_link_cmd_reset_stats(req_tlv_area
, req_tlv_space
);
295 case TIPC_CMD_SHOW_NAME_TABLE
:
296 rep_tlv_buf
= tipc_nametbl_get(req_tlv_area
, req_tlv_space
);
298 case TIPC_CMD_GET_BEARER_NAMES
:
299 rep_tlv_buf
= tipc_bearer_get_names();
301 case TIPC_CMD_GET_MEDIA_NAMES
:
302 rep_tlv_buf
= tipc_media_get_names();
304 case TIPC_CMD_SHOW_PORTS
:
305 rep_tlv_buf
= tipc_port_get_ports();
307 case TIPC_CMD_SHOW_STATS
:
308 rep_tlv_buf
= tipc_show_stats();
310 case TIPC_CMD_SET_LINK_TOL
:
311 case TIPC_CMD_SET_LINK_PRI
:
312 case TIPC_CMD_SET_LINK_WINDOW
:
313 rep_tlv_buf
= tipc_link_cmd_config(req_tlv_area
, req_tlv_space
, cmd
);
315 case TIPC_CMD_ENABLE_BEARER
:
316 rep_tlv_buf
= cfg_enable_bearer();
318 case TIPC_CMD_DISABLE_BEARER
:
319 rep_tlv_buf
= cfg_disable_bearer();
321 case TIPC_CMD_SET_NODE_ADDR
:
322 rep_tlv_buf
= cfg_set_own_addr();
324 case TIPC_CMD_SET_REMOTE_MNG
:
325 rep_tlv_buf
= cfg_set_remote_mng();
327 case TIPC_CMD_SET_MAX_PORTS
:
328 rep_tlv_buf
= cfg_set_max_ports();
330 case TIPC_CMD_SET_NETID
:
331 rep_tlv_buf
= cfg_set_netid();
333 case TIPC_CMD_GET_REMOTE_MNG
:
334 rep_tlv_buf
= tipc_cfg_reply_unsigned(tipc_remote_management
);
336 case TIPC_CMD_GET_MAX_PORTS
:
337 rep_tlv_buf
= tipc_cfg_reply_unsigned(tipc_max_ports
);
339 case TIPC_CMD_GET_NETID
:
340 rep_tlv_buf
= tipc_cfg_reply_unsigned(tipc_net_id
);
342 case TIPC_CMD_NOT_NET_ADMIN
:
344 tipc_cfg_reply_error_string(TIPC_CFG_NOT_NET_ADMIN
);
346 case TIPC_CMD_SET_MAX_ZONES
:
347 case TIPC_CMD_GET_MAX_ZONES
:
348 case TIPC_CMD_SET_MAX_SLAVES
:
349 case TIPC_CMD_GET_MAX_SLAVES
:
350 case TIPC_CMD_SET_MAX_CLUSTERS
:
351 case TIPC_CMD_GET_MAX_CLUSTERS
:
352 case TIPC_CMD_SET_MAX_NODES
:
353 case TIPC_CMD_GET_MAX_NODES
:
354 case TIPC_CMD_SET_MAX_SUBSCR
:
355 case TIPC_CMD_GET_MAX_SUBSCR
:
356 case TIPC_CMD_SET_MAX_PUBL
:
357 case TIPC_CMD_GET_MAX_PUBL
:
358 case TIPC_CMD_SET_LOG_SIZE
:
359 case TIPC_CMD_DUMP_LOG
:
360 rep_tlv_buf
= tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
361 " (obsolete command)");
364 rep_tlv_buf
= tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
365 " (unknown command)");
369 WARN_ON(rep_tlv_buf
->len
> TLV_SPACE(ULTRA_STRING_MAX_LEN
));
371 /* Append an error message if we cannot return all requested data */
372 if (rep_tlv_buf
->len
== TLV_SPACE(ULTRA_STRING_MAX_LEN
)) {
373 if (*(rep_tlv_buf
->data
+ ULTRA_STRING_MAX_LEN
) != '\0')
374 sprintf(rep_tlv_buf
->data
+ rep_tlv_buf
->len
-
375 sizeof(REPLY_TRUNCATED
) - 1, REPLY_TRUNCATED
);
378 /* Return reply buffer */
380 spin_unlock_bh(&config_lock
);
384 static void cfg_named_msg_event(void *userdata
,
386 struct sk_buff
**buf
,
390 struct tipc_portid
const *orig
,
391 struct tipc_name_seq
const *dest
)
393 struct tipc_cfg_msg_hdr
*req_hdr
;
394 struct tipc_cfg_msg_hdr
*rep_hdr
;
395 struct sk_buff
*rep_buf
;
397 /* Validate configuration message header (ignore invalid message) */
398 req_hdr
= (struct tipc_cfg_msg_hdr
*)msg
;
399 if ((size
< sizeof(*req_hdr
)) ||
400 (size
!= TCM_ALIGN(ntohl(req_hdr
->tcm_len
))) ||
401 (ntohs(req_hdr
->tcm_flags
) != TCM_F_REQUEST
)) {
402 pr_warn("Invalid configuration message discarded\n");
406 /* Generate reply for request (if can't, return request) */
407 rep_buf
= tipc_cfg_do_cmd(orig
->node
,
408 ntohs(req_hdr
->tcm_type
),
409 msg
+ sizeof(*req_hdr
),
410 size
- sizeof(*req_hdr
),
411 BUF_HEADROOM
+ MAX_H_SIZE
+ sizeof(*rep_hdr
));
413 skb_push(rep_buf
, sizeof(*rep_hdr
));
414 rep_hdr
= (struct tipc_cfg_msg_hdr
*)rep_buf
->data
;
415 memcpy(rep_hdr
, req_hdr
, sizeof(*rep_hdr
));
416 rep_hdr
->tcm_len
= htonl(rep_buf
->len
);
417 rep_hdr
->tcm_flags
&= htons(~TCM_F_REQUEST
);
423 /* NEED TO ADD CODE TO HANDLE FAILED SEND (SUCH AS CONGESTION) */
424 tipc_send_buf2port(port_ref
, orig
, rep_buf
, rep_buf
->len
);
427 int tipc_cfg_init(void)
429 struct tipc_name_seq seq
;
432 res
= tipc_createport(NULL
, TIPC_CRITICAL_IMPORTANCE
,
434 NULL
, cfg_named_msg_event
, NULL
,
435 NULL
, &config_port_ref
);
439 seq
.type
= TIPC_CFG_SRV
;
440 seq
.lower
= seq
.upper
= tipc_own_addr
;
441 res
= tipc_publish(config_port_ref
, TIPC_ZONE_SCOPE
, &seq
);
448 pr_err("Unable to create configuration service\n");
452 void tipc_cfg_reinit(void)
454 struct tipc_name_seq seq
;
457 seq
.type
= TIPC_CFG_SRV
;
458 seq
.lower
= seq
.upper
= 0;
459 tipc_withdraw(config_port_ref
, TIPC_ZONE_SCOPE
, &seq
);
461 seq
.lower
= seq
.upper
= tipc_own_addr
;
462 res
= tipc_publish(config_port_ref
, TIPC_ZONE_SCOPE
, &seq
);
464 pr_err("Unable to reinitialize configuration service\n");
467 void tipc_cfg_stop(void)
469 tipc_deleteport(config_port_ref
);