]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blob - net/tipc/config.c
tipc: Remove prototype code for supporting multiple clusters
[mirror_ubuntu-zesty-kernel.git] / net / tipc / config.c
1 /*
2 * net/tipc/config.c: TIPC configuration management code
3 *
4 * Copyright (c) 2002-2006, Ericsson AB
5 * Copyright (c) 2004-2007, Wind River Systems
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are met:
10 *
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
34 * POSSIBILITY OF SUCH DAMAGE.
35 */
36
37 #include "core.h"
38 #include "port.h"
39 #include "link.h"
40 #include "name_table.h"
41 #include "user_reg.h"
42 #include "config.h"
43
44 struct manager {
45 u32 user_ref;
46 u32 port_ref;
47 };
48
49 static struct manager mng = { 0};
50
51 static DEFINE_SPINLOCK(config_lock);
52
53 static const void *req_tlv_area; /* request message TLV area */
54 static int req_tlv_space; /* request message TLV area size */
55 static int rep_headroom; /* reply message headroom to use */
56
57
58 struct sk_buff *tipc_cfg_reply_alloc(int payload_size)
59 {
60 struct sk_buff *buf;
61
62 buf = alloc_skb(rep_headroom + payload_size, GFP_ATOMIC);
63 if (buf)
64 skb_reserve(buf, rep_headroom);
65 return buf;
66 }
67
68 int tipc_cfg_append_tlv(struct sk_buff *buf, int tlv_type,
69 void *tlv_data, int tlv_data_size)
70 {
71 struct tlv_desc *tlv = (struct tlv_desc *)skb_tail_pointer(buf);
72 int new_tlv_space = TLV_SPACE(tlv_data_size);
73
74 if (skb_tailroom(buf) < new_tlv_space) {
75 dbg("tipc_cfg_append_tlv unable to append TLV\n");
76 return 0;
77 }
78 skb_put(buf, new_tlv_space);
79 tlv->tlv_type = htons(tlv_type);
80 tlv->tlv_len = htons(TLV_LENGTH(tlv_data_size));
81 if (tlv_data_size && tlv_data)
82 memcpy(TLV_DATA(tlv), tlv_data, tlv_data_size);
83 return 1;
84 }
85
86 static struct sk_buff *tipc_cfg_reply_unsigned_type(u16 tlv_type, u32 value)
87 {
88 struct sk_buff *buf;
89 __be32 value_net;
90
91 buf = tipc_cfg_reply_alloc(TLV_SPACE(sizeof(value)));
92 if (buf) {
93 value_net = htonl(value);
94 tipc_cfg_append_tlv(buf, tlv_type, &value_net,
95 sizeof(value_net));
96 }
97 return buf;
98 }
99
100 static struct sk_buff *tipc_cfg_reply_unsigned(u32 value)
101 {
102 return tipc_cfg_reply_unsigned_type(TIPC_TLV_UNSIGNED, value);
103 }
104
105 struct sk_buff *tipc_cfg_reply_string_type(u16 tlv_type, char *string)
106 {
107 struct sk_buff *buf;
108 int string_len = strlen(string) + 1;
109
110 buf = tipc_cfg_reply_alloc(TLV_SPACE(string_len));
111 if (buf)
112 tipc_cfg_append_tlv(buf, tlv_type, string, string_len);
113 return buf;
114 }
115
116 #define MAX_STATS_INFO 2000
117
118 static struct sk_buff *tipc_show_stats(void)
119 {
120 struct sk_buff *buf;
121 struct tlv_desc *rep_tlv;
122 struct print_buf pb;
123 int str_len;
124 u32 value;
125
126 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_UNSIGNED))
127 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
128
129 value = ntohl(*(u32 *)TLV_DATA(req_tlv_area));
130 if (value != 0)
131 return tipc_cfg_reply_error_string("unsupported argument");
132
133 buf = tipc_cfg_reply_alloc(TLV_SPACE(MAX_STATS_INFO));
134 if (buf == NULL)
135 return NULL;
136
137 rep_tlv = (struct tlv_desc *)buf->data;
138 tipc_printbuf_init(&pb, (char *)TLV_DATA(rep_tlv), MAX_STATS_INFO);
139
140 tipc_printf(&pb, "TIPC version " TIPC_MOD_VER "\n");
141
142 /* Use additional tipc_printf()'s to return more info ... */
143
144 str_len = tipc_printbuf_validate(&pb);
145 skb_put(buf, TLV_SPACE(str_len));
146 TLV_SET(rep_tlv, TIPC_TLV_ULTRA_STRING, NULL, str_len);
147
148 return buf;
149 }
150
151 static struct sk_buff *cfg_enable_bearer(void)
152 {
153 struct tipc_bearer_config *args;
154
155 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_BEARER_CONFIG))
156 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
157
158 args = (struct tipc_bearer_config *)TLV_DATA(req_tlv_area);
159 if (tipc_enable_bearer(args->name,
160 ntohl(args->detect_scope),
161 ntohl(args->priority)))
162 return tipc_cfg_reply_error_string("unable to enable bearer");
163
164 return tipc_cfg_reply_none();
165 }
166
167 static struct sk_buff *cfg_disable_bearer(void)
168 {
169 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_BEARER_NAME))
170 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
171
172 if (tipc_disable_bearer((char *)TLV_DATA(req_tlv_area)))
173 return tipc_cfg_reply_error_string("unable to disable bearer");
174
175 return tipc_cfg_reply_none();
176 }
177
178 static struct sk_buff *cfg_set_own_addr(void)
179 {
180 u32 addr;
181
182 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_NET_ADDR))
183 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
184
185 addr = ntohl(*(__be32 *)TLV_DATA(req_tlv_area));
186 if (addr == tipc_own_addr)
187 return tipc_cfg_reply_none();
188 if (!tipc_addr_node_valid(addr))
189 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
190 " (node address)");
191 if (tipc_mode == TIPC_NET_MODE)
192 return tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
193 " (cannot change node address once assigned)");
194
195 /*
196 * Must release all spinlocks before calling start_net() because
197 * Linux version of TIPC calls eth_media_start() which calls
198 * register_netdevice_notifier() which may block!
199 *
200 * Temporarily releasing the lock should be harmless for non-Linux TIPC,
201 * but Linux version of eth_media_start() should really be reworked
202 * so that it can be called with spinlocks held.
203 */
204
205 spin_unlock_bh(&config_lock);
206 tipc_core_start_net(addr);
207 spin_lock_bh(&config_lock);
208 return tipc_cfg_reply_none();
209 }
210
211 static struct sk_buff *cfg_set_remote_mng(void)
212 {
213 u32 value;
214
215 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_UNSIGNED))
216 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
217
218 value = ntohl(*(__be32 *)TLV_DATA(req_tlv_area));
219 tipc_remote_management = (value != 0);
220 return tipc_cfg_reply_none();
221 }
222
223 static struct sk_buff *cfg_set_max_publications(void)
224 {
225 u32 value;
226
227 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_UNSIGNED))
228 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
229
230 value = ntohl(*(__be32 *)TLV_DATA(req_tlv_area));
231 if (value != delimit(value, 1, 65535))
232 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
233 " (max publications must be 1-65535)");
234 tipc_max_publications = value;
235 return tipc_cfg_reply_none();
236 }
237
238 static struct sk_buff *cfg_set_max_subscriptions(void)
239 {
240 u32 value;
241
242 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_UNSIGNED))
243 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
244
245 value = ntohl(*(__be32 *)TLV_DATA(req_tlv_area));
246 if (value != delimit(value, 1, 65535))
247 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
248 " (max subscriptions must be 1-65535");
249 tipc_max_subscriptions = value;
250 return tipc_cfg_reply_none();
251 }
252
253 static struct sk_buff *cfg_set_max_ports(void)
254 {
255 u32 value;
256
257 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_UNSIGNED))
258 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
259 value = ntohl(*(__be32 *)TLV_DATA(req_tlv_area));
260 if (value == tipc_max_ports)
261 return tipc_cfg_reply_none();
262 if (value != delimit(value, 127, 65535))
263 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
264 " (max ports must be 127-65535)");
265 if (tipc_mode != TIPC_NOT_RUNNING)
266 return tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
267 " (cannot change max ports while TIPC is active)");
268 tipc_max_ports = value;
269 return tipc_cfg_reply_none();
270 }
271
272 static struct sk_buff *cfg_set_max_nodes(void)
273 {
274 u32 value;
275
276 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_UNSIGNED))
277 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
278 value = ntohl(*(__be32 *)TLV_DATA(req_tlv_area));
279 if (value == tipc_max_nodes)
280 return tipc_cfg_reply_none();
281 if (value != delimit(value, 8, 2047))
282 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
283 " (max nodes must be 8-2047)");
284 if (tipc_mode == TIPC_NET_MODE)
285 return tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
286 " (cannot change max nodes once TIPC has joined a network)");
287 tipc_max_nodes = value;
288 return tipc_cfg_reply_none();
289 }
290
291 static struct sk_buff *cfg_set_netid(void)
292 {
293 u32 value;
294
295 if (!TLV_CHECK(req_tlv_area, req_tlv_space, TIPC_TLV_UNSIGNED))
296 return tipc_cfg_reply_error_string(TIPC_CFG_TLV_ERROR);
297 value = ntohl(*(__be32 *)TLV_DATA(req_tlv_area));
298 if (value == tipc_net_id)
299 return tipc_cfg_reply_none();
300 if (value != delimit(value, 1, 9999))
301 return tipc_cfg_reply_error_string(TIPC_CFG_INVALID_VALUE
302 " (network id must be 1-9999)");
303 if (tipc_mode == TIPC_NET_MODE)
304 return tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
305 " (cannot change network id once TIPC has joined a network)");
306 tipc_net_id = value;
307 return tipc_cfg_reply_none();
308 }
309
310 struct sk_buff *tipc_cfg_do_cmd(u32 orig_node, u16 cmd, const void *request_area,
311 int request_space, int reply_headroom)
312 {
313 struct sk_buff *rep_tlv_buf;
314
315 spin_lock_bh(&config_lock);
316
317 /* Save request and reply details in a well-known location */
318
319 req_tlv_area = request_area;
320 req_tlv_space = request_space;
321 rep_headroom = reply_headroom;
322
323 /* Check command authorization */
324
325 if (likely(orig_node == tipc_own_addr)) {
326 /* command is permitted */
327 } else if (cmd >= 0x8000) {
328 rep_tlv_buf = tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
329 " (cannot be done remotely)");
330 goto exit;
331 } else if (!tipc_remote_management) {
332 rep_tlv_buf = tipc_cfg_reply_error_string(TIPC_CFG_NO_REMOTE);
333 goto exit;
334 }
335 else if (cmd >= 0x4000) {
336 u32 domain = 0;
337
338 if ((tipc_nametbl_translate(TIPC_ZM_SRV, 0, &domain) == 0) ||
339 (domain != orig_node)) {
340 rep_tlv_buf = tipc_cfg_reply_error_string(TIPC_CFG_NOT_ZONE_MSTR);
341 goto exit;
342 }
343 }
344
345 /* Call appropriate processing routine */
346
347 switch (cmd) {
348 case TIPC_CMD_NOOP:
349 rep_tlv_buf = tipc_cfg_reply_none();
350 break;
351 case TIPC_CMD_GET_NODES:
352 rep_tlv_buf = tipc_node_get_nodes(req_tlv_area, req_tlv_space);
353 break;
354 case TIPC_CMD_GET_LINKS:
355 rep_tlv_buf = tipc_node_get_links(req_tlv_area, req_tlv_space);
356 break;
357 case TIPC_CMD_SHOW_LINK_STATS:
358 rep_tlv_buf = tipc_link_cmd_show_stats(req_tlv_area, req_tlv_space);
359 break;
360 case TIPC_CMD_RESET_LINK_STATS:
361 rep_tlv_buf = tipc_link_cmd_reset_stats(req_tlv_area, req_tlv_space);
362 break;
363 case TIPC_CMD_SHOW_NAME_TABLE:
364 rep_tlv_buf = tipc_nametbl_get(req_tlv_area, req_tlv_space);
365 break;
366 case TIPC_CMD_GET_BEARER_NAMES:
367 rep_tlv_buf = tipc_bearer_get_names();
368 break;
369 case TIPC_CMD_GET_MEDIA_NAMES:
370 rep_tlv_buf = tipc_media_get_names();
371 break;
372 case TIPC_CMD_SHOW_PORTS:
373 rep_tlv_buf = tipc_port_get_ports();
374 break;
375 case TIPC_CMD_SET_LOG_SIZE:
376 rep_tlv_buf = tipc_log_resize_cmd(req_tlv_area, req_tlv_space);
377 break;
378 case TIPC_CMD_DUMP_LOG:
379 rep_tlv_buf = tipc_log_dump();
380 break;
381 case TIPC_CMD_SHOW_STATS:
382 rep_tlv_buf = tipc_show_stats();
383 break;
384 case TIPC_CMD_SET_LINK_TOL:
385 case TIPC_CMD_SET_LINK_PRI:
386 case TIPC_CMD_SET_LINK_WINDOW:
387 rep_tlv_buf = tipc_link_cmd_config(req_tlv_area, req_tlv_space, cmd);
388 break;
389 case TIPC_CMD_ENABLE_BEARER:
390 rep_tlv_buf = cfg_enable_bearer();
391 break;
392 case TIPC_CMD_DISABLE_BEARER:
393 rep_tlv_buf = cfg_disable_bearer();
394 break;
395 case TIPC_CMD_SET_NODE_ADDR:
396 rep_tlv_buf = cfg_set_own_addr();
397 break;
398 case TIPC_CMD_SET_REMOTE_MNG:
399 rep_tlv_buf = cfg_set_remote_mng();
400 break;
401 case TIPC_CMD_SET_MAX_PORTS:
402 rep_tlv_buf = cfg_set_max_ports();
403 break;
404 case TIPC_CMD_SET_MAX_PUBL:
405 rep_tlv_buf = cfg_set_max_publications();
406 break;
407 case TIPC_CMD_SET_MAX_SUBSCR:
408 rep_tlv_buf = cfg_set_max_subscriptions();
409 break;
410 case TIPC_CMD_SET_MAX_NODES:
411 rep_tlv_buf = cfg_set_max_nodes();
412 break;
413 case TIPC_CMD_SET_NETID:
414 rep_tlv_buf = cfg_set_netid();
415 break;
416 case TIPC_CMD_GET_REMOTE_MNG:
417 rep_tlv_buf = tipc_cfg_reply_unsigned(tipc_remote_management);
418 break;
419 case TIPC_CMD_GET_MAX_PORTS:
420 rep_tlv_buf = tipc_cfg_reply_unsigned(tipc_max_ports);
421 break;
422 case TIPC_CMD_GET_MAX_PUBL:
423 rep_tlv_buf = tipc_cfg_reply_unsigned(tipc_max_publications);
424 break;
425 case TIPC_CMD_GET_MAX_SUBSCR:
426 rep_tlv_buf = tipc_cfg_reply_unsigned(tipc_max_subscriptions);
427 break;
428 case TIPC_CMD_GET_MAX_NODES:
429 rep_tlv_buf = tipc_cfg_reply_unsigned(tipc_max_nodes);
430 break;
431 case TIPC_CMD_GET_NETID:
432 rep_tlv_buf = tipc_cfg_reply_unsigned(tipc_net_id);
433 break;
434 case TIPC_CMD_NOT_NET_ADMIN:
435 rep_tlv_buf =
436 tipc_cfg_reply_error_string(TIPC_CFG_NOT_NET_ADMIN);
437 break;
438 case TIPC_CMD_SET_MAX_ZONES:
439 case TIPC_CMD_GET_MAX_ZONES:
440 case TIPC_CMD_SET_MAX_SLAVES:
441 case TIPC_CMD_GET_MAX_SLAVES:
442 case TIPC_CMD_SET_MAX_CLUSTERS:
443 case TIPC_CMD_GET_MAX_CLUSTERS:
444 rep_tlv_buf = tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
445 " (obsolete command)");
446 break;
447 default:
448 rep_tlv_buf = tipc_cfg_reply_error_string(TIPC_CFG_NOT_SUPPORTED
449 " (unknown command)");
450 break;
451 }
452
453 /* Return reply buffer */
454 exit:
455 spin_unlock_bh(&config_lock);
456 return rep_tlv_buf;
457 }
458
459 static void cfg_named_msg_event(void *userdata,
460 u32 port_ref,
461 struct sk_buff **buf,
462 const unchar *msg,
463 u32 size,
464 u32 importance,
465 struct tipc_portid const *orig,
466 struct tipc_name_seq const *dest)
467 {
468 struct tipc_cfg_msg_hdr *req_hdr;
469 struct tipc_cfg_msg_hdr *rep_hdr;
470 struct sk_buff *rep_buf;
471
472 /* Validate configuration message header (ignore invalid message) */
473
474 req_hdr = (struct tipc_cfg_msg_hdr *)msg;
475 if ((size < sizeof(*req_hdr)) ||
476 (size != TCM_ALIGN(ntohl(req_hdr->tcm_len))) ||
477 (ntohs(req_hdr->tcm_flags) != TCM_F_REQUEST)) {
478 warn("Invalid configuration message discarded\n");
479 return;
480 }
481
482 /* Generate reply for request (if can't, return request) */
483
484 rep_buf = tipc_cfg_do_cmd(orig->node,
485 ntohs(req_hdr->tcm_type),
486 msg + sizeof(*req_hdr),
487 size - sizeof(*req_hdr),
488 BUF_HEADROOM + MAX_H_SIZE + sizeof(*rep_hdr));
489 if (rep_buf) {
490 skb_push(rep_buf, sizeof(*rep_hdr));
491 rep_hdr = (struct tipc_cfg_msg_hdr *)rep_buf->data;
492 memcpy(rep_hdr, req_hdr, sizeof(*rep_hdr));
493 rep_hdr->tcm_len = htonl(rep_buf->len);
494 rep_hdr->tcm_flags &= htons(~TCM_F_REQUEST);
495 } else {
496 rep_buf = *buf;
497 *buf = NULL;
498 }
499
500 /* NEED TO ADD CODE TO HANDLE FAILED SEND (SUCH AS CONGESTION) */
501 tipc_send_buf2port(port_ref, orig, rep_buf, rep_buf->len);
502 }
503
504 int tipc_cfg_init(void)
505 {
506 struct tipc_name_seq seq;
507 int res;
508
509 res = tipc_attach(&mng.user_ref);
510 if (res)
511 goto failed;
512
513 res = tipc_createport(mng.user_ref, NULL, TIPC_CRITICAL_IMPORTANCE,
514 NULL, NULL, NULL,
515 NULL, cfg_named_msg_event, NULL,
516 NULL, &mng.port_ref);
517 if (res)
518 goto failed;
519
520 seq.type = TIPC_CFG_SRV;
521 seq.lower = seq.upper = tipc_own_addr;
522 res = tipc_nametbl_publish_rsv(mng.port_ref, TIPC_ZONE_SCOPE, &seq);
523 if (res)
524 goto failed;
525
526 return 0;
527
528 failed:
529 err("Unable to create configuration service\n");
530 tipc_detach(mng.user_ref);
531 mng.user_ref = 0;
532 return res;
533 }
534
535 void tipc_cfg_stop(void)
536 {
537 if (mng.user_ref) {
538 tipc_detach(mng.user_ref);
539 mng.user_ref = 0;
540 }
541 }