1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * Management Component Transport Protocol (MCTP) - routing
4 * implementation.
5 *
6 * This is currently based on a simple routing table, with no dst cache. The
7 * number of routes should stay fairly small, so the lookup cost is small.
8 *
9 * Copyright (c) 2021 Code Construct
10 * Copyright (c) 2021 Google
11 */
12
13 #include <linux/idr.h>
14 #include <linux/kconfig.h>
15 #include <linux/mctp.h>
16 #include <linux/netdevice.h>
17 #include <linux/rtnetlink.h>
18 #include <linux/skbuff.h>
19
20 #include <uapi/linux/if_arp.h>
21
22 #include <net/mctp.h>
23 #include <net/mctpdevice.h>
24 #include <net/netlink.h>
25 #include <net/sock.h>
26
27 #include <trace/events/mctp.h>
28
29 static const unsigned int mctp_message_maxlen = 64 * 1024;
30 static const unsigned long mctp_key_lifetime = 6 * CONFIG_HZ;
31
32 static void mctp_flow_prepare_output(struct sk_buff *skb, struct mctp_dev *dev);
33
34 /* route output callbacks */
mctp_route_discard(struct mctp_route * route,struct sk_buff * skb)35 static int mctp_route_discard(struct mctp_route *route, struct sk_buff *skb)
36 {
37 kfree_skb(skb);
38 return 0;
39 }
40
mctp_lookup_bind(struct net * net,struct sk_buff * skb)41 static struct mctp_sock *mctp_lookup_bind(struct net *net, struct sk_buff *skb)
42 {
43 struct mctp_skb_cb *cb = mctp_cb(skb);
44 struct mctp_hdr *mh;
45 struct sock *sk;
46 u8 type;
47
48 WARN_ON(!rcu_read_lock_held());
49
50 /* TODO: look up in skb->cb? */
51 mh = mctp_hdr(skb);
52
53 if (!skb_headlen(skb))
54 return NULL;
55
56 type = (*(u8 *)skb->data) & 0x7f;
57
58 sk_for_each_rcu(sk, &net->mctp.binds) {
59 struct mctp_sock *msk = container_of(sk, struct mctp_sock, sk);
60
61 if (msk->bind_net != MCTP_NET_ANY && msk->bind_net != cb->net)
62 continue;
63
64 if (msk->bind_type != type)
65 continue;
66
67 if (!mctp_address_matches(msk->bind_addr, mh->dest))
68 continue;
69
70 return msk;
71 }
72
73 return NULL;
74 }
75
76 /* A note on the key allocations.
77 *
78 * struct net->mctp.keys contains our set of currently-allocated keys for
79 * MCTP tag management. The lookup tuple for these is the peer EID,
80 * local EID and MCTP tag.
81 *
82 * In some cases, the peer EID may be MCTP_EID_ANY: for example, when a
83 * broadcast message is sent, we may receive responses from any peer EID.
84 * Because the broadcast dest address is equivalent to ANY, we create
85 * a key with (local = local-eid, peer = ANY). This allows a match on the
86 * incoming broadcast responses from any peer.
87 *
88 * We perform lookups when packets are received, and when tags are allocated
89 * in two scenarios:
90 *
91 * - when a packet is sent, with a locally-owned tag: we need to find an
92 * unused tag value for the (local, peer) EID pair.
93 *
94 * - when a tag is manually allocated: we need to find an unused tag value
95 * for the peer EID, but don't have a specific local EID at that stage.
96 *
97 * in the latter case, on successful allocation, we end up with a tag with
98 * (local = ANY, peer = peer-eid).
99 *
100 * So, the key set allows both a local EID of ANY, as well as a peer EID of
101 * ANY in the lookup tuple. Both may be ANY if we prealloc for a broadcast.
102 * The matching (in mctp_key_match()) during lookup allows the match value to
103 * be ANY in either the dest or source addresses.
104 *
105 * When allocating (+ inserting) a tag, we need to check for conflicts amongst
106 * the existing tag set. This requires macthing either exactly on the local
107 * and peer addresses, or either being ANY.
108 */
109
mctp_key_match(struct mctp_sk_key * key,unsigned int net,mctp_eid_t local,mctp_eid_t peer,u8 tag)110 static bool mctp_key_match(struct mctp_sk_key *key, unsigned int net,
111 mctp_eid_t local, mctp_eid_t peer, u8 tag)
112 {
113 if (key->net != net)
114 return false;
115
116 if (!mctp_address_matches(key->local_addr, local))
117 return false;
118
119 if (!mctp_address_matches(key->peer_addr, peer))
120 return false;
121
122 if (key->tag != tag)
123 return false;
124
125 return true;
126 }
127
128 /* returns a key (with key->lock held, and refcounted), or NULL if no such
129 * key exists.
130 */
mctp_lookup_key(struct net * net,struct sk_buff * skb,unsigned int netid,mctp_eid_t peer,unsigned long * irqflags)131 static struct mctp_sk_key *mctp_lookup_key(struct net *net, struct sk_buff *skb,
132 unsigned int netid, mctp_eid_t peer,
133 unsigned long *irqflags)
134 __acquires(&key->lock)
135 {
136 struct mctp_sk_key *key, *ret;
137 unsigned long flags;
138 struct mctp_hdr *mh;
139 u8 tag;
140
141 mh = mctp_hdr(skb);
142 tag = mh->flags_seq_tag & (MCTP_HDR_TAG_MASK | MCTP_HDR_FLAG_TO);
143
144 ret = NULL;
145 spin_lock_irqsave(&net->mctp.keys_lock, flags);
146
147 hlist_for_each_entry(key, &net->mctp.keys, hlist) {
148 if (!mctp_key_match(key, netid, mh->dest, peer, tag))
149 continue;
150
151 spin_lock(&key->lock);
152 if (key->valid) {
153 refcount_inc(&key->refs);
154 ret = key;
155 break;
156 }
157 spin_unlock(&key->lock);
158 }
159
160 if (ret) {
161 spin_unlock(&net->mctp.keys_lock);
162 *irqflags = flags;
163 } else {
164 spin_unlock_irqrestore(&net->mctp.keys_lock, flags);
165 }
166
167 return ret;
168 }
169
mctp_key_alloc(struct mctp_sock * msk,unsigned int net,mctp_eid_t local,mctp_eid_t peer,u8 tag,gfp_t gfp)170 static struct mctp_sk_key *mctp_key_alloc(struct mctp_sock *msk,
171 unsigned int net,
172 mctp_eid_t local, mctp_eid_t peer,
173 u8 tag, gfp_t gfp)
174 {
175 struct mctp_sk_key *key;
176
177 key = kzalloc(sizeof(*key), gfp);
178 if (!key)
179 return NULL;
180
181 key->net = net;
182 key->peer_addr = peer;
183 key->local_addr = local;
184 key->tag = tag;
185 key->sk = &msk->sk;
186 key->valid = true;
187 spin_lock_init(&key->lock);
188 refcount_set(&key->refs, 1);
189 sock_hold(key->sk);
190
191 return key;
192 }
193
mctp_key_unref(struct mctp_sk_key * key)194 void mctp_key_unref(struct mctp_sk_key *key)
195 {
196 unsigned long flags;
197
198 if (!refcount_dec_and_test(&key->refs))
199 return;
200
201 /* even though no refs exist here, the lock allows us to stay
202 * consistent with the locking requirement of mctp_dev_release_key
203 */
204 spin_lock_irqsave(&key->lock, flags);
205 mctp_dev_release_key(key->dev, key);
206 spin_unlock_irqrestore(&key->lock, flags);
207
208 sock_put(key->sk);
209 kfree(key);
210 }
211
mctp_key_add(struct mctp_sk_key * key,struct mctp_sock * msk)212 static int mctp_key_add(struct mctp_sk_key *key, struct mctp_sock *msk)
213 {
214 struct net *net = sock_net(&msk->sk);
215 struct mctp_sk_key *tmp;
216 unsigned long flags;
217 int rc = 0;
218
219 spin_lock_irqsave(&net->mctp.keys_lock, flags);
220
221 if (sock_flag(&msk->sk, SOCK_DEAD)) {
222 rc = -EINVAL;
223 goto out_unlock;
224 }
225
226 hlist_for_each_entry(tmp, &net->mctp.keys, hlist) {
227 if (mctp_key_match(tmp, key->net, key->local_addr,
228 key->peer_addr, key->tag)) {
229 spin_lock(&tmp->lock);
230 if (tmp->valid)
231 rc = -EEXIST;
232 spin_unlock(&tmp->lock);
233 if (rc)
234 break;
235 }
236 }
237
238 if (!rc) {
239 refcount_inc(&key->refs);
240 key->expiry = jiffies + mctp_key_lifetime;
241 timer_reduce(&msk->key_expiry, key->expiry);
242
243 hlist_add_head(&key->hlist, &net->mctp.keys);
244 hlist_add_head(&key->sklist, &msk->keys);
245 }
246
247 out_unlock:
248 spin_unlock_irqrestore(&net->mctp.keys_lock, flags);
249
250 return rc;
251 }
252
253 /* Helper for mctp_route_input().
254 * We're done with the key; unlock and unref the key.
255 * For the usual case of automatic expiry we remove the key from lists.
256 * In the case that manual allocation is set on a key we release the lock
257 * and local ref, reset reassembly, but don't remove from lists.
258 */
__mctp_key_done_in(struct mctp_sk_key * key,struct net * net,unsigned long flags,unsigned long reason)259 static void __mctp_key_done_in(struct mctp_sk_key *key, struct net *net,
260 unsigned long flags, unsigned long reason)
261 __releases(&key->lock)
262 {
263 struct sk_buff *skb;
264
265 trace_mctp_key_release(key, reason);
266 skb = key->reasm_head;
267 key->reasm_head = NULL;
268
269 if (!key->manual_alloc) {
270 key->reasm_dead = true;
271 key->valid = false;
272 mctp_dev_release_key(key->dev, key);
273 }
274 spin_unlock_irqrestore(&key->lock, flags);
275
276 if (!key->manual_alloc) {
277 spin_lock_irqsave(&net->mctp.keys_lock, flags);
278 if (!hlist_unhashed(&key->hlist)) {
279 hlist_del_init(&key->hlist);
280 hlist_del_init(&key->sklist);
281 mctp_key_unref(key);
282 }
283 spin_unlock_irqrestore(&net->mctp.keys_lock, flags);
284 }
285
286 /* and one for the local reference */
287 mctp_key_unref(key);
288
289 kfree_skb(skb);
290 }
291
292 #ifdef CONFIG_MCTP_FLOWS
mctp_skb_set_flow(struct sk_buff * skb,struct mctp_sk_key * key)293 static void mctp_skb_set_flow(struct sk_buff *skb, struct mctp_sk_key *key)
294 {
295 struct mctp_flow *flow;
296
297 flow = skb_ext_add(skb, SKB_EXT_MCTP);
298 if (!flow)
299 return;
300
301 refcount_inc(&key->refs);
302 flow->key = key;
303 }
304
mctp_flow_prepare_output(struct sk_buff * skb,struct mctp_dev * dev)305 static void mctp_flow_prepare_output(struct sk_buff *skb, struct mctp_dev *dev)
306 {
307 struct mctp_sk_key *key;
308 struct mctp_flow *flow;
309
310 flow = skb_ext_find(skb, SKB_EXT_MCTP);
311 if (!flow)
312 return;
313
314 key = flow->key;
315
316 if (key->dev) {
317 WARN_ON(key->dev != dev);
318 return;
319 }
320
321 mctp_dev_set_key(dev, key);
322 }
323 #else
mctp_skb_set_flow(struct sk_buff * skb,struct mctp_sk_key * key)324 static void mctp_skb_set_flow(struct sk_buff *skb, struct mctp_sk_key *key) {}
mctp_flow_prepare_output(struct sk_buff * skb,struct mctp_dev * dev)325 static void mctp_flow_prepare_output(struct sk_buff *skb, struct mctp_dev *dev) {}
326 #endif
327
328 /* takes ownership of skb, both in success and failure cases */
mctp_frag_queue(struct mctp_sk_key * key,struct sk_buff * skb)329 static int mctp_frag_queue(struct mctp_sk_key *key, struct sk_buff *skb)
330 {
331 struct mctp_hdr *hdr = mctp_hdr(skb);
332 u8 exp_seq, this_seq;
333
334 this_seq = (hdr->flags_seq_tag >> MCTP_HDR_SEQ_SHIFT)
335 & MCTP_HDR_SEQ_MASK;
336
337 if (!key->reasm_head) {
338 /* Since we're manipulating the shared frag_list, ensure it
339 * isn't shared with any other SKBs. In the cloned case,
340 * this will free the skb; callers can no longer access it
341 * safely.
342 */
343 key->reasm_head = skb_unshare(skb, GFP_ATOMIC);
344 if (!key->reasm_head)
345 return -ENOMEM;
346
347 key->reasm_tailp = &(skb_shinfo(key->reasm_head)->frag_list);
348 key->last_seq = this_seq;
349 return 0;
350 }
351
352 exp_seq = (key->last_seq + 1) & MCTP_HDR_SEQ_MASK;
353
354 if (this_seq != exp_seq)
355 goto err_free;
356
357 if (key->reasm_head->len + skb->len > mctp_message_maxlen)
358 goto err_free;
359
360 skb->next = NULL;
361 skb->sk = NULL;
362 *key->reasm_tailp = skb;
363 key->reasm_tailp = &skb->next;
364
365 key->last_seq = this_seq;
366
367 key->reasm_head->data_len += skb->len;
368 key->reasm_head->len += skb->len;
369 key->reasm_head->truesize += skb->truesize;
370
371 return 0;
372
373 err_free:
374 kfree_skb(skb);
375 return -EINVAL;
376 }
377
mctp_route_input(struct mctp_route * route,struct sk_buff * skb)378 static int mctp_route_input(struct mctp_route *route, struct sk_buff *skb)
379 {
380 struct mctp_sk_key *key, *any_key = NULL;
381 struct net *net = dev_net(skb->dev);
382 struct mctp_sock *msk;
383 struct mctp_hdr *mh;
384 unsigned int netid;
385 unsigned long f;
386 u8 tag, flags;
387 int rc;
388
389 msk = NULL;
390 rc = -EINVAL;
391
392 /* We may be receiving a locally-routed packet; drop source sk
393 * accounting.
394 *
395 * From here, we will either queue the skb - either to a frag_queue, or
396 * to a receiving socket. When that succeeds, we clear the skb pointer;
397 * a non-NULL skb on exit will be otherwise unowned, and hence
398 * kfree_skb()-ed.
399 */
400 skb_orphan(skb);
401
402 /* ensure we have enough data for a header and a type */
403 if (skb->len < sizeof(struct mctp_hdr) + 1)
404 goto out;
405
406 /* grab header, advance data ptr */
407 mh = mctp_hdr(skb);
408 netid = mctp_cb(skb)->net;
409 skb_pull(skb, sizeof(struct mctp_hdr));
410
411 if (mh->ver != 1)
412 goto out;
413
414 flags = mh->flags_seq_tag & (MCTP_HDR_FLAG_SOM | MCTP_HDR_FLAG_EOM);
415 tag = mh->flags_seq_tag & (MCTP_HDR_TAG_MASK | MCTP_HDR_FLAG_TO);
416
417 rcu_read_lock();
418
419 /* lookup socket / reasm context, exactly matching (src,dest,tag).
420 * we hold a ref on the key, and key->lock held.
421 */
422 key = mctp_lookup_key(net, skb, netid, mh->src, &f);
423
424 if (flags & MCTP_HDR_FLAG_SOM) {
425 if (key) {
426 msk = container_of(key->sk, struct mctp_sock, sk);
427 } else {
428 /* first response to a broadcast? do a more general
429 * key lookup to find the socket, but don't use this
430 * key for reassembly - we'll create a more specific
431 * one for future packets if required (ie, !EOM).
432 *
433 * this lookup requires key->peer to be MCTP_ADDR_ANY,
434 * it doesn't match just any key->peer.
435 */
436 any_key = mctp_lookup_key(net, skb, netid,
437 MCTP_ADDR_ANY, &f);
438 if (any_key) {
439 msk = container_of(any_key->sk,
440 struct mctp_sock, sk);
441 spin_unlock_irqrestore(&any_key->lock, f);
442 }
443 }
444
445 if (!key && !msk && (tag & MCTP_HDR_FLAG_TO))
446 msk = mctp_lookup_bind(net, skb);
447
448 if (!msk) {
449 rc = -ENOENT;
450 goto out_unlock;
451 }
452
453 /* single-packet message? deliver to socket, clean up any
454 * pending key.
455 */
456 if (flags & MCTP_HDR_FLAG_EOM) {
457 rc = sock_queue_rcv_skb(&msk->sk, skb);
458 if (!rc)
459 skb = NULL;
460 if (key) {
461 /* we've hit a pending reassembly; not much we
462 * can do but drop it
463 */
464 __mctp_key_done_in(key, net, f,
465 MCTP_TRACE_KEY_REPLIED);
466 key = NULL;
467 }
468 goto out_unlock;
469 }
470
471 /* broadcast response or a bind() - create a key for further
472 * packets for this message
473 */
474 if (!key) {
475 key = mctp_key_alloc(msk, netid, mh->dest, mh->src,
476 tag, GFP_ATOMIC);
477 if (!key) {
478 rc = -ENOMEM;
479 goto out_unlock;
480 }
481
482 /* we can queue without the key lock here, as the
483 * key isn't observable yet
484 */
485 mctp_frag_queue(key, skb);
486 skb = NULL;
487
488 /* if the key_add fails, we've raced with another
489 * SOM packet with the same src, dest and tag. There's
490 * no way to distinguish future packets, so all we
491 * can do is drop.
492 */
493 rc = mctp_key_add(key, msk);
494 if (!rc)
495 trace_mctp_key_acquire(key);
496
497 /* we don't need to release key->lock on exit, so
498 * clean up here and suppress the unlock via
499 * setting to NULL
500 */
501 mctp_key_unref(key);
502 key = NULL;
503
504 } else {
505 if (key->reasm_head || key->reasm_dead) {
506 /* duplicate start? drop everything */
507 __mctp_key_done_in(key, net, f,
508 MCTP_TRACE_KEY_INVALIDATED);
509 rc = -EEXIST;
510 key = NULL;
511 } else {
512 rc = mctp_frag_queue(key, skb);
513 skb = NULL;
514 }
515 }
516
517 } else if (key) {
518 /* this packet continues a previous message; reassemble
519 * using the message-specific key
520 */
521
522 /* we need to be continuing an existing reassembly... */
523 if (!key->reasm_head) {
524 rc = -EINVAL;
525 } else {
526 rc = mctp_frag_queue(key, skb);
527 skb = NULL;
528 }
529
530 if (rc)
531 goto out_unlock;
532
533 /* end of message? deliver to socket, and we're done with
534 * the reassembly/response key
535 */
536 if (flags & MCTP_HDR_FLAG_EOM) {
537 rc = sock_queue_rcv_skb(key->sk, key->reasm_head);
538 if (!rc)
539 key->reasm_head = NULL;
540 __mctp_key_done_in(key, net, f, MCTP_TRACE_KEY_REPLIED);
541 key = NULL;
542 }
543
544 } else {
545 /* not a start, no matching key */
546 rc = -ENOENT;
547 }
548
549 out_unlock:
550 rcu_read_unlock();
551 if (key) {
552 spin_unlock_irqrestore(&key->lock, f);
553 mctp_key_unref(key);
554 }
555 if (any_key)
556 mctp_key_unref(any_key);
557 out:
558 kfree_skb(skb);
559 return rc;
560 }
561
mctp_route_mtu(struct mctp_route * rt)562 static unsigned int mctp_route_mtu(struct mctp_route *rt)
563 {
564 return rt->mtu ?: READ_ONCE(rt->dev->dev->mtu);
565 }
566
mctp_route_output(struct mctp_route * route,struct sk_buff * skb)567 static int mctp_route_output(struct mctp_route *route, struct sk_buff *skb)
568 {
569 struct mctp_skb_cb *cb = mctp_cb(skb);
570 struct mctp_hdr *hdr = mctp_hdr(skb);
571 char daddr_buf[MAX_ADDR_LEN];
572 char *daddr = NULL;
573 unsigned int mtu;
574 int rc;
575
576 skb->protocol = htons(ETH_P_MCTP);
577
578 mtu = READ_ONCE(skb->dev->mtu);
579 if (skb->len > mtu) {
580 kfree_skb(skb);
581 return -EMSGSIZE;
582 }
583
584 if (cb->ifindex) {
585 /* direct route; use the hwaddr we stashed in sendmsg */
586 if (cb->halen != skb->dev->addr_len) {
587 /* sanity check, sendmsg should have already caught this */
588 kfree_skb(skb);
589 return -EMSGSIZE;
590 }
591 daddr = cb->haddr;
592 } else {
593 /* If lookup fails let the device handle daddr==NULL */
594 if (mctp_neigh_lookup(route->dev, hdr->dest, daddr_buf) == 0)
595 daddr = daddr_buf;
596 }
597
598 rc = dev_hard_header(skb, skb->dev, ntohs(skb->protocol),
599 daddr, skb->dev->dev_addr, skb->len);
600 if (rc < 0) {
601 kfree_skb(skb);
602 return -EHOSTUNREACH;
603 }
604
605 mctp_flow_prepare_output(skb, route->dev);
606
607 rc = dev_queue_xmit(skb);
608 if (rc)
609 rc = net_xmit_errno(rc);
610
611 return rc;
612 }
613
614 /* route alloc/release */
mctp_route_release(struct mctp_route * rt)615 static void mctp_route_release(struct mctp_route *rt)
616 {
617 if (refcount_dec_and_test(&rt->refs)) {
618 mctp_dev_put(rt->dev);
619 kfree_rcu(rt, rcu);
620 }
621 }
622
623 /* returns a route with the refcount at 1 */
mctp_route_alloc(void)624 static struct mctp_route *mctp_route_alloc(void)
625 {
626 struct mctp_route *rt;
627
628 rt = kzalloc(sizeof(*rt), GFP_KERNEL);
629 if (!rt)
630 return NULL;
631
632 INIT_LIST_HEAD(&rt->list);
633 refcount_set(&rt->refs, 1);
634 rt->output = mctp_route_discard;
635
636 return rt;
637 }
638
mctp_default_net(struct net * net)639 unsigned int mctp_default_net(struct net *net)
640 {
641 return READ_ONCE(net->mctp.default_net);
642 }
643
mctp_default_net_set(struct net * net,unsigned int index)644 int mctp_default_net_set(struct net *net, unsigned int index)
645 {
646 if (index == 0)
647 return -EINVAL;
648 WRITE_ONCE(net->mctp.default_net, index);
649 return 0;
650 }
651
652 /* tag management */
mctp_reserve_tag(struct net * net,struct mctp_sk_key * key,struct mctp_sock * msk)653 static void mctp_reserve_tag(struct net *net, struct mctp_sk_key *key,
654 struct mctp_sock *msk)
655 {
656 struct netns_mctp *mns = &net->mctp;
657
658 lockdep_assert_held(&mns->keys_lock);
659
660 key->expiry = jiffies + mctp_key_lifetime;
661 timer_reduce(&msk->key_expiry, key->expiry);
662
663 /* we hold the net->key_lock here, allowing updates to both
664 * then net and sk
665 */
666 hlist_add_head_rcu(&key->hlist, &mns->keys);
667 hlist_add_head_rcu(&key->sklist, &msk->keys);
668 refcount_inc(&key->refs);
669 }
670
671 /* Allocate a locally-owned tag value for (local, peer), and reserve
672 * it for the socket msk
673 */
mctp_alloc_local_tag(struct mctp_sock * msk,unsigned int netid,mctp_eid_t local,mctp_eid_t peer,bool manual,u8 * tagp)674 struct mctp_sk_key *mctp_alloc_local_tag(struct mctp_sock *msk,
675 unsigned int netid,
676 mctp_eid_t local, mctp_eid_t peer,
677 bool manual, u8 *tagp)
678 {
679 struct net *net = sock_net(&msk->sk);
680 struct netns_mctp *mns = &net->mctp;
681 struct mctp_sk_key *key, *tmp;
682 unsigned long flags;
683 u8 tagbits;
684
685 /* for NULL destination EIDs, we may get a response from any peer */
686 if (peer == MCTP_ADDR_NULL)
687 peer = MCTP_ADDR_ANY;
688
689 /* be optimistic, alloc now */
690 key = mctp_key_alloc(msk, netid, local, peer, 0, GFP_KERNEL);
691 if (!key)
692 return ERR_PTR(-ENOMEM);
693
694 /* 8 possible tag values */
695 tagbits = 0xff;
696
697 spin_lock_irqsave(&mns->keys_lock, flags);
698
699 /* Walk through the existing keys, looking for potential conflicting
700 * tags. If we find a conflict, clear that bit from tagbits
701 */
702 hlist_for_each_entry(tmp, &mns->keys, hlist) {
703 /* We can check the lookup fields (*_addr, tag) without the
704 * lock held, they don't change over the lifetime of the key.
705 */
706
707 /* tags are net-specific */
708 if (tmp->net != netid)
709 continue;
710
711 /* if we don't own the tag, it can't conflict */
712 if (tmp->tag & MCTP_HDR_FLAG_TO)
713 continue;
714
715 /* Since we're avoiding conflicting entries, match peer and
716 * local addresses, including with a wildcard on ANY. See
717 * 'A note on key allocations' for background.
718 */
719 if (peer != MCTP_ADDR_ANY &&
720 !mctp_address_matches(tmp->peer_addr, peer))
721 continue;
722
723 if (local != MCTP_ADDR_ANY &&
724 !mctp_address_matches(tmp->local_addr, local))
725 continue;
726
727 spin_lock(&tmp->lock);
728 /* key must still be valid. If we find a match, clear the
729 * potential tag value
730 */
731 if (tmp->valid)
732 tagbits &= ~(1 << tmp->tag);
733 spin_unlock(&tmp->lock);
734
735 if (!tagbits)
736 break;
737 }
738
739 if (tagbits) {
740 key->tag = __ffs(tagbits);
741 mctp_reserve_tag(net, key, msk);
742 trace_mctp_key_acquire(key);
743
744 key->manual_alloc = manual;
745 *tagp = key->tag;
746 }
747
748 spin_unlock_irqrestore(&mns->keys_lock, flags);
749
750 if (!tagbits) {
751 mctp_key_unref(key);
752 return ERR_PTR(-EBUSY);
753 }
754
755 return key;
756 }
757
mctp_lookup_prealloc_tag(struct mctp_sock * msk,unsigned int netid,mctp_eid_t daddr,u8 req_tag,u8 * tagp)758 static struct mctp_sk_key *mctp_lookup_prealloc_tag(struct mctp_sock *msk,
759 unsigned int netid,
760 mctp_eid_t daddr,
761 u8 req_tag, u8 *tagp)
762 {
763 struct net *net = sock_net(&msk->sk);
764 struct netns_mctp *mns = &net->mctp;
765 struct mctp_sk_key *key, *tmp;
766 unsigned long flags;
767
768 req_tag &= ~(MCTP_TAG_PREALLOC | MCTP_TAG_OWNER);
769 key = NULL;
770
771 spin_lock_irqsave(&mns->keys_lock, flags);
772
773 hlist_for_each_entry(tmp, &mns->keys, hlist) {
774 if (tmp->net != netid)
775 continue;
776
777 if (tmp->tag != req_tag)
778 continue;
779
780 if (!mctp_address_matches(tmp->peer_addr, daddr))
781 continue;
782
783 if (!tmp->manual_alloc)
784 continue;
785
786 spin_lock(&tmp->lock);
787 if (tmp->valid) {
788 key = tmp;
789 refcount_inc(&key->refs);
790 spin_unlock(&tmp->lock);
791 break;
792 }
793 spin_unlock(&tmp->lock);
794 }
795 spin_unlock_irqrestore(&mns->keys_lock, flags);
796
797 if (!key)
798 return ERR_PTR(-ENOENT);
799
800 if (tagp)
801 *tagp = key->tag;
802
803 return key;
804 }
805
806 /* routing lookups */
mctp_rt_match_eid(struct mctp_route * rt,unsigned int net,mctp_eid_t eid)807 static bool mctp_rt_match_eid(struct mctp_route *rt,
808 unsigned int net, mctp_eid_t eid)
809 {
810 return READ_ONCE(rt->dev->net) == net &&
811 rt->min <= eid && rt->max >= eid;
812 }
813
814 /* compares match, used for duplicate prevention */
mctp_rt_compare_exact(struct mctp_route * rt1,struct mctp_route * rt2)815 static bool mctp_rt_compare_exact(struct mctp_route *rt1,
816 struct mctp_route *rt2)
817 {
818 ASSERT_RTNL();
819 return rt1->dev->net == rt2->dev->net &&
820 rt1->min == rt2->min &&
821 rt1->max == rt2->max;
822 }
823
mctp_route_lookup(struct net * net,unsigned int dnet,mctp_eid_t daddr)824 struct mctp_route *mctp_route_lookup(struct net *net, unsigned int dnet,
825 mctp_eid_t daddr)
826 {
827 struct mctp_route *tmp, *rt = NULL;
828
829 rcu_read_lock();
830
831 list_for_each_entry_rcu(tmp, &net->mctp.routes, list) {
832 /* TODO: add metrics */
833 if (mctp_rt_match_eid(tmp, dnet, daddr)) {
834 if (refcount_inc_not_zero(&tmp->refs)) {
835 rt = tmp;
836 break;
837 }
838 }
839 }
840
841 rcu_read_unlock();
842
843 return rt;
844 }
845
mctp_route_lookup_null(struct net * net,struct net_device * dev)846 static struct mctp_route *mctp_route_lookup_null(struct net *net,
847 struct net_device *dev)
848 {
849 struct mctp_route *tmp, *rt = NULL;
850
851 rcu_read_lock();
852
853 list_for_each_entry_rcu(tmp, &net->mctp.routes, list) {
854 if (tmp->dev->dev == dev && tmp->type == RTN_LOCAL &&
855 refcount_inc_not_zero(&tmp->refs)) {
856 rt = tmp;
857 break;
858 }
859 }
860
861 rcu_read_unlock();
862
863 return rt;
864 }
865
mctp_do_fragment_route(struct mctp_route * rt,struct sk_buff * skb,unsigned int mtu,u8 tag)866 static int mctp_do_fragment_route(struct mctp_route *rt, struct sk_buff *skb,
867 unsigned int mtu, u8 tag)
868 {
869 const unsigned int hlen = sizeof(struct mctp_hdr);
870 struct mctp_hdr *hdr, *hdr2;
871 unsigned int pos, size, headroom;
872 struct sk_buff *skb2;
873 int rc;
874 u8 seq;
875
876 hdr = mctp_hdr(skb);
877 seq = 0;
878 rc = 0;
879
880 if (mtu < hlen + 1) {
881 kfree_skb(skb);
882 return -EMSGSIZE;
883 }
884
885 /* keep same headroom as the original skb */
886 headroom = skb_headroom(skb);
887
888 /* we've got the header */
889 skb_pull(skb, hlen);
890
891 for (pos = 0; pos < skb->len;) {
892 /* size of message payload */
893 size = min(mtu - hlen, skb->len - pos);
894
895 skb2 = alloc_skb(headroom + hlen + size, GFP_KERNEL);
896 if (!skb2) {
897 rc = -ENOMEM;
898 break;
899 }
900
901 /* generic skb copy */
902 skb2->protocol = skb->protocol;
903 skb2->priority = skb->priority;
904 skb2->dev = skb->dev;
905 memcpy(skb2->cb, skb->cb, sizeof(skb2->cb));
906
907 if (skb->sk)
908 skb_set_owner_w(skb2, skb->sk);
909
910 /* establish packet */
911 skb_reserve(skb2, headroom);
912 skb_reset_network_header(skb2);
913 skb_put(skb2, hlen + size);
914 skb2->transport_header = skb2->network_header + hlen;
915
916 /* copy header fields, calculate SOM/EOM flags & seq */
917 hdr2 = mctp_hdr(skb2);
918 hdr2->ver = hdr->ver;
919 hdr2->dest = hdr->dest;
920 hdr2->src = hdr->src;
921 hdr2->flags_seq_tag = tag &
922 (MCTP_HDR_TAG_MASK | MCTP_HDR_FLAG_TO);
923
924 if (pos == 0)
925 hdr2->flags_seq_tag |= MCTP_HDR_FLAG_SOM;
926
927 if (pos + size == skb->len)
928 hdr2->flags_seq_tag |= MCTP_HDR_FLAG_EOM;
929
930 hdr2->flags_seq_tag |= seq << MCTP_HDR_SEQ_SHIFT;
931
932 /* copy message payload */
933 skb_copy_bits(skb, pos, skb_transport_header(skb2), size);
934
935 /* we need to copy the extensions, for MCTP flow data */
936 skb_ext_copy(skb2, skb);
937
938 /* do route */
939 rc = rt->output(rt, skb2);
940 if (rc)
941 break;
942
943 seq = (seq + 1) & MCTP_HDR_SEQ_MASK;
944 pos += size;
945 }
946
947 consume_skb(skb);
948 return rc;
949 }
950
mctp_local_output(struct sock * sk,struct mctp_route * rt,struct sk_buff * skb,mctp_eid_t daddr,u8 req_tag)951 int mctp_local_output(struct sock *sk, struct mctp_route *rt,
952 struct sk_buff *skb, mctp_eid_t daddr, u8 req_tag)
953 {
954 struct mctp_sock *msk = container_of(sk, struct mctp_sock, sk);
955 struct mctp_skb_cb *cb = mctp_cb(skb);
956 struct mctp_route tmp_rt = {0};
957 struct mctp_sk_key *key;
958 struct mctp_hdr *hdr;
959 unsigned long flags;
960 unsigned int netid;
961 unsigned int mtu;
962 mctp_eid_t saddr;
963 bool ext_rt;
964 int rc;
965 u8 tag;
966
967 rc = -ENODEV;
968
969 if (rt) {
970 ext_rt = false;
971 if (WARN_ON(!rt->dev))
972 goto out_release;
973
974 } else if (cb->ifindex) {
975 struct net_device *dev;
976
977 ext_rt = true;
978 rt = &tmp_rt;
979
980 rcu_read_lock();
981 dev = dev_get_by_index_rcu(sock_net(sk), cb->ifindex);
982 if (!dev) {
983 rcu_read_unlock();
984 goto out_free;
985 }
986 rt->dev = __mctp_dev_get(dev);
987 rcu_read_unlock();
988
989 if (!rt->dev)
990 goto out_release;
991
992 /* establish temporary route - we set up enough to keep
993 * mctp_route_output happy
994 */
995 rt->output = mctp_route_output;
996 rt->mtu = 0;
997
998 } else {
999 rc = -EINVAL;
1000 goto out_free;
1001 }
1002
1003 spin_lock_irqsave(&rt->dev->addrs_lock, flags);
1004 if (rt->dev->num_addrs == 0) {
1005 rc = -EHOSTUNREACH;
1006 } else {
1007 /* use the outbound interface's first address as our source */
1008 saddr = rt->dev->addrs[0];
1009 rc = 0;
1010 }
1011 spin_unlock_irqrestore(&rt->dev->addrs_lock, flags);
1012 netid = READ_ONCE(rt->dev->net);
1013
1014 if (rc)
1015 goto out_release;
1016
1017 if (req_tag & MCTP_TAG_OWNER) {
1018 if (req_tag & MCTP_TAG_PREALLOC)
1019 key = mctp_lookup_prealloc_tag(msk, netid, daddr,
1020 req_tag, &tag);
1021 else
1022 key = mctp_alloc_local_tag(msk, netid, saddr, daddr,
1023 false, &tag);
1024
1025 if (IS_ERR(key)) {
1026 rc = PTR_ERR(key);
1027 goto out_release;
1028 }
1029 mctp_skb_set_flow(skb, key);
1030 /* done with the key in this scope */
1031 mctp_key_unref(key);
1032 tag |= MCTP_HDR_FLAG_TO;
1033 } else {
1034 key = NULL;
1035 tag = req_tag & MCTP_TAG_MASK;
1036 }
1037
1038 skb->protocol = htons(ETH_P_MCTP);
1039 skb->priority = 0;
1040 skb_reset_transport_header(skb);
1041 skb_push(skb, sizeof(struct mctp_hdr));
1042 skb_reset_network_header(skb);
1043 skb->dev = rt->dev->dev;
1044
1045 /* cb->net will have been set on initial ingress */
1046 cb->src = saddr;
1047
1048 /* set up common header fields */
1049 hdr = mctp_hdr(skb);
1050 hdr->ver = 1;
1051 hdr->dest = daddr;
1052 hdr->src = saddr;
1053
1054 mtu = mctp_route_mtu(rt);
1055
1056 if (skb->len + sizeof(struct mctp_hdr) <= mtu) {
1057 hdr->flags_seq_tag = MCTP_HDR_FLAG_SOM |
1058 MCTP_HDR_FLAG_EOM | tag;
1059 rc = rt->output(rt, skb);
1060 } else {
1061 rc = mctp_do_fragment_route(rt, skb, mtu, tag);
1062 }
1063
1064 /* route output functions consume the skb, even on error */
1065 skb = NULL;
1066
1067 out_release:
1068 if (!ext_rt)
1069 mctp_route_release(rt);
1070
1071 mctp_dev_put(tmp_rt.dev);
1072
1073 out_free:
1074 kfree_skb(skb);
1075 return rc;
1076 }
1077
1078 /* route management */
mctp_route_add(struct mctp_dev * mdev,mctp_eid_t daddr_start,unsigned int daddr_extent,unsigned int mtu,unsigned char type)1079 static int mctp_route_add(struct mctp_dev *mdev, mctp_eid_t daddr_start,
1080 unsigned int daddr_extent, unsigned int mtu,
1081 unsigned char type)
1082 {
1083 int (*rtfn)(struct mctp_route *rt, struct sk_buff *skb);
1084 struct net *net = dev_net(mdev->dev);
1085 struct mctp_route *rt, *ert;
1086
1087 if (!mctp_address_unicast(daddr_start))
1088 return -EINVAL;
1089
1090 if (daddr_extent > 0xff || daddr_start + daddr_extent >= 255)
1091 return -EINVAL;
1092
1093 switch (type) {
1094 case RTN_LOCAL:
1095 rtfn = mctp_route_input;
1096 break;
1097 case RTN_UNICAST:
1098 rtfn = mctp_route_output;
1099 break;
1100 default:
1101 return -EINVAL;
1102 }
1103
1104 rt = mctp_route_alloc();
1105 if (!rt)
1106 return -ENOMEM;
1107
1108 rt->min = daddr_start;
1109 rt->max = daddr_start + daddr_extent;
1110 rt->mtu = mtu;
1111 rt->dev = mdev;
1112 mctp_dev_hold(rt->dev);
1113 rt->type = type;
1114 rt->output = rtfn;
1115
1116 ASSERT_RTNL();
1117 /* Prevent duplicate identical routes. */
1118 list_for_each_entry(ert, &net->mctp.routes, list) {
1119 if (mctp_rt_compare_exact(rt, ert)) {
1120 mctp_route_release(rt);
1121 return -EEXIST;
1122 }
1123 }
1124
1125 list_add_rcu(&rt->list, &net->mctp.routes);
1126
1127 return 0;
1128 }
1129
mctp_route_remove(struct mctp_dev * mdev,mctp_eid_t daddr_start,unsigned int daddr_extent,unsigned char type)1130 static int mctp_route_remove(struct mctp_dev *mdev, mctp_eid_t daddr_start,
1131 unsigned int daddr_extent, unsigned char type)
1132 {
1133 struct net *net = dev_net(mdev->dev);
1134 struct mctp_route *rt, *tmp;
1135 mctp_eid_t daddr_end;
1136 bool dropped;
1137
1138 if (daddr_extent > 0xff || daddr_start + daddr_extent >= 255)
1139 return -EINVAL;
1140
1141 daddr_end = daddr_start + daddr_extent;
1142 dropped = false;
1143
1144 ASSERT_RTNL();
1145
1146 list_for_each_entry_safe(rt, tmp, &net->mctp.routes, list) {
1147 if (rt->dev == mdev &&
1148 rt->min == daddr_start && rt->max == daddr_end &&
1149 rt->type == type) {
1150 list_del_rcu(&rt->list);
1151 /* TODO: immediate RTM_DELROUTE */
1152 mctp_route_release(rt);
1153 dropped = true;
1154 }
1155 }
1156
1157 return dropped ? 0 : -ENOENT;
1158 }
1159
mctp_route_add_local(struct mctp_dev * mdev,mctp_eid_t addr)1160 int mctp_route_add_local(struct mctp_dev *mdev, mctp_eid_t addr)
1161 {
1162 return mctp_route_add(mdev, addr, 0, 0, RTN_LOCAL);
1163 }
1164
mctp_route_remove_local(struct mctp_dev * mdev,mctp_eid_t addr)1165 int mctp_route_remove_local(struct mctp_dev *mdev, mctp_eid_t addr)
1166 {
1167 return mctp_route_remove(mdev, addr, 0, RTN_LOCAL);
1168 }
1169
1170 /* removes all entries for a given device */
mctp_route_remove_dev(struct mctp_dev * mdev)1171 void mctp_route_remove_dev(struct mctp_dev *mdev)
1172 {
1173 struct net *net = dev_net(mdev->dev);
1174 struct mctp_route *rt, *tmp;
1175
1176 ASSERT_RTNL();
1177 list_for_each_entry_safe(rt, tmp, &net->mctp.routes, list) {
1178 if (rt->dev == mdev) {
1179 list_del_rcu(&rt->list);
1180 /* TODO: immediate RTM_DELROUTE */
1181 mctp_route_release(rt);
1182 }
1183 }
1184 }
1185
1186 /* Incoming packet-handling */
1187
mctp_pkttype_receive(struct sk_buff * skb,struct net_device * dev,struct packet_type * pt,struct net_device * orig_dev)1188 static int mctp_pkttype_receive(struct sk_buff *skb, struct net_device *dev,
1189 struct packet_type *pt,
1190 struct net_device *orig_dev)
1191 {
1192 struct net *net = dev_net(dev);
1193 struct mctp_dev *mdev;
1194 struct mctp_skb_cb *cb;
1195 struct mctp_route *rt;
1196 struct mctp_hdr *mh;
1197
1198 rcu_read_lock();
1199 mdev = __mctp_dev_get(dev);
1200 rcu_read_unlock();
1201 if (!mdev) {
1202 /* basic non-data sanity checks */
1203 goto err_drop;
1204 }
1205
1206 if (!pskb_may_pull(skb, sizeof(struct mctp_hdr)))
1207 goto err_drop;
1208
1209 skb_reset_transport_header(skb);
1210 skb_reset_network_header(skb);
1211
1212 /* We have enough for a header; decode and route */
1213 mh = mctp_hdr(skb);
1214 if (mh->ver < MCTP_VER_MIN || mh->ver > MCTP_VER_MAX)
1215 goto err_drop;
1216
1217 /* source must be valid unicast or null; drop reserved ranges and
1218 * broadcast
1219 */
1220 if (!(mctp_address_unicast(mh->src) || mctp_address_null(mh->src)))
1221 goto err_drop;
1222
1223 /* dest address: as above, but allow broadcast */
1224 if (!(mctp_address_unicast(mh->dest) || mctp_address_null(mh->dest) ||
1225 mctp_address_broadcast(mh->dest)))
1226 goto err_drop;
1227
1228 /* MCTP drivers must populate halen/haddr */
1229 if (dev->type == ARPHRD_MCTP) {
1230 cb = mctp_cb(skb);
1231 } else {
1232 cb = __mctp_cb(skb);
1233 cb->halen = 0;
1234 }
1235 cb->net = READ_ONCE(mdev->net);
1236 cb->ifindex = dev->ifindex;
1237
1238 rt = mctp_route_lookup(net, cb->net, mh->dest);
1239
1240 /* NULL EID, but addressed to our physical address */
1241 if (!rt && mh->dest == MCTP_ADDR_NULL && skb->pkt_type == PACKET_HOST)
1242 rt = mctp_route_lookup_null(net, dev);
1243
1244 if (!rt)
1245 goto err_drop;
1246
1247 rt->output(rt, skb);
1248 mctp_route_release(rt);
1249 mctp_dev_put(mdev);
1250
1251 return NET_RX_SUCCESS;
1252
1253 err_drop:
1254 kfree_skb(skb);
1255 mctp_dev_put(mdev);
1256 return NET_RX_DROP;
1257 }
1258
1259 static struct packet_type mctp_packet_type = {
1260 .type = cpu_to_be16(ETH_P_MCTP),
1261 .func = mctp_pkttype_receive,
1262 };
1263
1264 /* netlink interface */
1265
1266 static const struct nla_policy rta_mctp_policy[RTA_MAX + 1] = {
1267 [RTA_DST] = { .type = NLA_U8 },
1268 [RTA_METRICS] = { .type = NLA_NESTED },
1269 [RTA_OIF] = { .type = NLA_U32 },
1270 };
1271
1272 /* Common part for RTM_NEWROUTE and RTM_DELROUTE parsing.
1273 * tb must hold RTA_MAX+1 elements.
1274 */
mctp_route_nlparse(struct sk_buff * skb,struct nlmsghdr * nlh,struct netlink_ext_ack * extack,struct nlattr ** tb,struct rtmsg ** rtm,struct mctp_dev ** mdev,mctp_eid_t * daddr_start)1275 static int mctp_route_nlparse(struct sk_buff *skb, struct nlmsghdr *nlh,
1276 struct netlink_ext_ack *extack,
1277 struct nlattr **tb, struct rtmsg **rtm,
1278 struct mctp_dev **mdev, mctp_eid_t *daddr_start)
1279 {
1280 struct net *net = sock_net(skb->sk);
1281 struct net_device *dev;
1282 unsigned int ifindex;
1283 int rc;
1284
1285 rc = nlmsg_parse(nlh, sizeof(struct rtmsg), tb, RTA_MAX,
1286 rta_mctp_policy, extack);
1287 if (rc < 0) {
1288 NL_SET_ERR_MSG(extack, "incorrect format");
1289 return rc;
1290 }
1291
1292 if (!tb[RTA_DST]) {
1293 NL_SET_ERR_MSG(extack, "dst EID missing");
1294 return -EINVAL;
1295 }
1296 *daddr_start = nla_get_u8(tb[RTA_DST]);
1297
1298 if (!tb[RTA_OIF]) {
1299 NL_SET_ERR_MSG(extack, "ifindex missing");
1300 return -EINVAL;
1301 }
1302 ifindex = nla_get_u32(tb[RTA_OIF]);
1303
1304 *rtm = nlmsg_data(nlh);
1305 if ((*rtm)->rtm_family != AF_MCTP) {
1306 NL_SET_ERR_MSG(extack, "route family must be AF_MCTP");
1307 return -EINVAL;
1308 }
1309
1310 dev = __dev_get_by_index(net, ifindex);
1311 if (!dev) {
1312 NL_SET_ERR_MSG(extack, "bad ifindex");
1313 return -ENODEV;
1314 }
1315 *mdev = mctp_dev_get_rtnl(dev);
1316 if (!*mdev)
1317 return -ENODEV;
1318
1319 if (dev->flags & IFF_LOOPBACK) {
1320 NL_SET_ERR_MSG(extack, "no routes to loopback");
1321 return -EINVAL;
1322 }
1323
1324 return 0;
1325 }
1326
1327 static const struct nla_policy rta_metrics_policy[RTAX_MAX + 1] = {
1328 [RTAX_MTU] = { .type = NLA_U32 },
1329 };
1330
mctp_newroute(struct sk_buff * skb,struct nlmsghdr * nlh,struct netlink_ext_ack * extack)1331 static int mctp_newroute(struct sk_buff *skb, struct nlmsghdr *nlh,
1332 struct netlink_ext_ack *extack)
1333 {
1334 struct nlattr *tb[RTA_MAX + 1];
1335 struct nlattr *tbx[RTAX_MAX + 1];
1336 mctp_eid_t daddr_start;
1337 struct mctp_dev *mdev;
1338 struct rtmsg *rtm;
1339 unsigned int mtu;
1340 int rc;
1341
1342 rc = mctp_route_nlparse(skb, nlh, extack, tb,
1343 &rtm, &mdev, &daddr_start);
1344 if (rc < 0)
1345 return rc;
1346
1347 if (rtm->rtm_type != RTN_UNICAST) {
1348 NL_SET_ERR_MSG(extack, "rtm_type must be RTN_UNICAST");
1349 return -EINVAL;
1350 }
1351
1352 mtu = 0;
1353 if (tb[RTA_METRICS]) {
1354 rc = nla_parse_nested(tbx, RTAX_MAX, tb[RTA_METRICS],
1355 rta_metrics_policy, NULL);
1356 if (rc < 0)
1357 return rc;
1358 if (tbx[RTAX_MTU])
1359 mtu = nla_get_u32(tbx[RTAX_MTU]);
1360 }
1361
1362 rc = mctp_route_add(mdev, daddr_start, rtm->rtm_dst_len, mtu,
1363 rtm->rtm_type);
1364 return rc;
1365 }
1366
mctp_delroute(struct sk_buff * skb,struct nlmsghdr * nlh,struct netlink_ext_ack * extack)1367 static int mctp_delroute(struct sk_buff *skb, struct nlmsghdr *nlh,
1368 struct netlink_ext_ack *extack)
1369 {
1370 struct nlattr *tb[RTA_MAX + 1];
1371 mctp_eid_t daddr_start;
1372 struct mctp_dev *mdev;
1373 struct rtmsg *rtm;
1374 int rc;
1375
1376 rc = mctp_route_nlparse(skb, nlh, extack, tb,
1377 &rtm, &mdev, &daddr_start);
1378 if (rc < 0)
1379 return rc;
1380
1381 /* we only have unicast routes */
1382 if (rtm->rtm_type != RTN_UNICAST)
1383 return -EINVAL;
1384
1385 rc = mctp_route_remove(mdev, daddr_start, rtm->rtm_dst_len, RTN_UNICAST);
1386 return rc;
1387 }
1388
mctp_fill_rtinfo(struct sk_buff * skb,struct mctp_route * rt,u32 portid,u32 seq,int event,unsigned int flags)1389 static int mctp_fill_rtinfo(struct sk_buff *skb, struct mctp_route *rt,
1390 u32 portid, u32 seq, int event, unsigned int flags)
1391 {
1392 struct nlmsghdr *nlh;
1393 struct rtmsg *hdr;
1394 void *metrics;
1395
1396 nlh = nlmsg_put(skb, portid, seq, event, sizeof(*hdr), flags);
1397 if (!nlh)
1398 return -EMSGSIZE;
1399
1400 hdr = nlmsg_data(nlh);
1401 hdr->rtm_family = AF_MCTP;
1402
1403 /* we use the _len fields as a number of EIDs, rather than
1404 * a number of bits in the address
1405 */
1406 hdr->rtm_dst_len = rt->max - rt->min;
1407 hdr->rtm_src_len = 0;
1408 hdr->rtm_tos = 0;
1409 hdr->rtm_table = RT_TABLE_DEFAULT;
1410 hdr->rtm_protocol = RTPROT_STATIC; /* everything is user-defined */
1411 hdr->rtm_scope = RT_SCOPE_LINK; /* TODO: scope in mctp_route? */
1412 hdr->rtm_type = rt->type;
1413
1414 if (nla_put_u8(skb, RTA_DST, rt->min))
1415 goto cancel;
1416
1417 metrics = nla_nest_start_noflag(skb, RTA_METRICS);
1418 if (!metrics)
1419 goto cancel;
1420
1421 if (rt->mtu) {
1422 if (nla_put_u32(skb, RTAX_MTU, rt->mtu))
1423 goto cancel;
1424 }
1425
1426 nla_nest_end(skb, metrics);
1427
1428 if (rt->dev) {
1429 if (nla_put_u32(skb, RTA_OIF, rt->dev->dev->ifindex))
1430 goto cancel;
1431 }
1432
1433 /* TODO: conditional neighbour physaddr? */
1434
1435 nlmsg_end(skb, nlh);
1436
1437 return 0;
1438
1439 cancel:
1440 nlmsg_cancel(skb, nlh);
1441 return -EMSGSIZE;
1442 }
1443
mctp_dump_rtinfo(struct sk_buff * skb,struct netlink_callback * cb)1444 static int mctp_dump_rtinfo(struct sk_buff *skb, struct netlink_callback *cb)
1445 {
1446 struct net *net = sock_net(skb->sk);
1447 struct mctp_route *rt;
1448 int s_idx, idx;
1449
1450 /* TODO: allow filtering on route data, possibly under
1451 * cb->strict_check
1452 */
1453
1454 /* TODO: change to struct overlay */
1455 s_idx = cb->args[0];
1456 idx = 0;
1457
1458 rcu_read_lock();
1459 list_for_each_entry_rcu(rt, &net->mctp.routes, list) {
1460 if (idx++ < s_idx)
1461 continue;
1462 if (mctp_fill_rtinfo(skb, rt,
1463 NETLINK_CB(cb->skb).portid,
1464 cb->nlh->nlmsg_seq,
1465 RTM_NEWROUTE, NLM_F_MULTI) < 0)
1466 break;
1467 }
1468
1469 rcu_read_unlock();
1470 cb->args[0] = idx;
1471
1472 return skb->len;
1473 }
1474
1475 /* net namespace implementation */
mctp_routes_net_init(struct net * net)1476 static int __net_init mctp_routes_net_init(struct net *net)
1477 {
1478 struct netns_mctp *ns = &net->mctp;
1479
1480 INIT_LIST_HEAD(&ns->routes);
1481 INIT_HLIST_HEAD(&ns->binds);
1482 mutex_init(&ns->bind_lock);
1483 INIT_HLIST_HEAD(&ns->keys);
1484 spin_lock_init(&ns->keys_lock);
1485 WARN_ON(mctp_default_net_set(net, MCTP_INITIAL_DEFAULT_NET));
1486 return 0;
1487 }
1488
mctp_routes_net_exit(struct net * net)1489 static void __net_exit mctp_routes_net_exit(struct net *net)
1490 {
1491 struct mctp_route *rt;
1492
1493 rcu_read_lock();
1494 list_for_each_entry_rcu(rt, &net->mctp.routes, list)
1495 mctp_route_release(rt);
1496 rcu_read_unlock();
1497 }
1498
1499 static struct pernet_operations mctp_net_ops = {
1500 .init = mctp_routes_net_init,
1501 .exit = mctp_routes_net_exit,
1502 };
1503
1504 static const struct rtnl_msg_handler mctp_route_rtnl_msg_handlers[] = {
1505 {THIS_MODULE, PF_MCTP, RTM_NEWROUTE, mctp_newroute, NULL, 0},
1506 {THIS_MODULE, PF_MCTP, RTM_DELROUTE, mctp_delroute, NULL, 0},
1507 {THIS_MODULE, PF_MCTP, RTM_GETROUTE, NULL, mctp_dump_rtinfo, 0},
1508 };
1509
mctp_routes_init(void)1510 int __init mctp_routes_init(void)
1511 {
1512 int err;
1513
1514 dev_add_pack(&mctp_packet_type);
1515
1516 err = register_pernet_subsys(&mctp_net_ops);
1517 if (err)
1518 goto err_pernet;
1519
1520 err = rtnl_register_many(mctp_route_rtnl_msg_handlers);
1521 if (err)
1522 goto err_rtnl;
1523
1524 return 0;
1525
1526 err_rtnl:
1527 unregister_pernet_subsys(&mctp_net_ops);
1528 err_pernet:
1529 dev_remove_pack(&mctp_packet_type);
1530 return err;
1531 }
1532
mctp_routes_exit(void)1533 void mctp_routes_exit(void)
1534 {
1535 rtnl_unregister_many(mctp_route_rtnl_msg_handlers);
1536 unregister_pernet_subsys(&mctp_net_ops);
1537 dev_remove_pack(&mctp_packet_type);
1538 }
1539
1540 #if IS_ENABLED(CONFIG_MCTP_TEST)
1541 #include "test/route-test.c"
1542 #endif
1543