2 * NETLINK Netlink attributes
4 * Authors: Thomas Graf <tgraf@suug.ch>
5 * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
8 #include <linux/config.h>
9 #include <linux/module.h>
10 #include <linux/kernel.h>
11 #include <linux/errno.h>
12 #include <linux/jiffies.h>
13 #include <linux/netdevice.h>
14 #include <linux/skbuff.h>
15 #include <linux/string.h>
16 #include <linux/types.h>
17 #include <net/netlink.h>
19 static u16 nla_attr_minlen
[NLA_TYPE_MAX
+1] __read_mostly
= {
20 [NLA_U8
] = sizeof(u8
),
21 [NLA_U16
] = sizeof(u16
),
22 [NLA_U32
] = sizeof(u32
),
23 [NLA_U64
] = sizeof(u64
),
25 [NLA_NESTED
] = NLA_HDRLEN
,
28 static int validate_nla(struct nlattr
*nla
, int maxtype
,
29 struct nla_policy
*policy
)
31 struct nla_policy
*pt
;
34 if (nla
->nla_type
<= 0 || nla
->nla_type
> maxtype
)
37 pt
= &policy
[nla
->nla_type
];
39 BUG_ON(pt
->type
> NLA_TYPE_MAX
);
43 else if (pt
->type
!= NLA_UNSPEC
)
44 minlen
= nla_attr_minlen
[pt
->type
];
46 if (pt
->type
== NLA_FLAG
&& nla_len(nla
) > 0)
49 if (nla_len(nla
) < minlen
)
56 * nla_validate - Validate a stream of attributes
57 * @head: head of attribute stream
58 * @len: length of attribute stream
59 * @maxtype: maximum attribute type to be expected
60 * @policy: validation policy
62 * Validates all attributes in the specified attribute stream against the
63 * specified policy. Attributes with a type exceeding maxtype will be
64 * ignored. See documenation of struct nla_policy for more details.
66 * Returns 0 on success or a negative error code.
68 int nla_validate(struct nlattr
*head
, int len
, int maxtype
,
69 struct nla_policy
*policy
)
74 nla_for_each_attr(nla
, head
, len
, rem
) {
75 err
= validate_nla(nla
, maxtype
, policy
);
86 * nla_parse - Parse a stream of attributes into a tb buffer
87 * @tb: destination array with maxtype+1 elements
88 * @maxtype: maximum attribute type to be expected
89 * @head: head of attribute stream
90 * @len: length of attribute stream
92 * Parses a stream of attributes and stores a pointer to each attribute in
93 * the tb array accessable via the attribute type. Attributes with a type
94 * exceeding maxtype will be silently ignored for backwards compatibility
95 * reasons. policy may be set to NULL if no validation is required.
97 * Returns 0 on success or a negative error code.
99 int nla_parse(struct nlattr
*tb
[], int maxtype
, struct nlattr
*head
, int len
,
100 struct nla_policy
*policy
)
105 memset(tb
, 0, sizeof(struct nlattr
*) * (maxtype
+ 1));
107 nla_for_each_attr(nla
, head
, len
, rem
) {
108 u16 type
= nla
->nla_type
;
110 if (type
> 0 && type
<= maxtype
) {
112 err
= validate_nla(nla
, maxtype
, policy
);
121 if (unlikely(rem
> 0))
122 printk(KERN_WARNING
"netlink: %d bytes leftover after parsing "
123 "attributes.\n", rem
);
131 * nla_find - Find a specific attribute in a stream of attributes
132 * @head: head of attribute stream
133 * @len: length of attribute stream
134 * @attrtype: type of attribute to look for
136 * Returns the first attribute in the stream matching the specified type.
138 struct nlattr
*nla_find(struct nlattr
*head
, int len
, int attrtype
)
143 nla_for_each_attr(nla
, head
, len
, rem
)
144 if (nla
->nla_type
== attrtype
)
151 * nla_strlcpy - Copy string attribute payload into a sized buffer
152 * @dst: where to copy the string to
153 * @src: attribute to copy the string from
154 * @dstsize: size of destination buffer
156 * Copies at most dstsize - 1 bytes into the destination buffer.
157 * The result is always a valid NUL-terminated string. Unlike
158 * strlcpy the destination buffer is always padded out.
160 * Returns the length of the source buffer.
162 size_t nla_strlcpy(char *dst
, const struct nlattr
*nla
, size_t dstsize
)
164 size_t srclen
= nla_len(nla
);
165 char *src
= nla_data(nla
);
167 if (srclen
> 0 && src
[srclen
- 1] == '\0')
171 size_t len
= (srclen
>= dstsize
) ? dstsize
- 1 : srclen
;
173 memset(dst
, 0, dstsize
);
174 memcpy(dst
, src
, len
);
181 * nla_memcpy - Copy a netlink attribute into another memory area
182 * @dest: where to copy to memcpy
183 * @src: netlink attribute to copy from
184 * @count: size of the destination area
186 * Note: The number of bytes copied is limited by the length of
187 * attribute's payload. memcpy
189 * Returns the number of bytes copied.
191 int nla_memcpy(void *dest
, struct nlattr
*src
, int count
)
193 int minlen
= min_t(int, count
, nla_len(src
));
195 memcpy(dest
, nla_data(src
), minlen
);
201 * nla_memcmp - Compare an attribute with sized memory area
202 * @nla: netlink attribute
204 * @size: size of memory area
206 int nla_memcmp(const struct nlattr
*nla
, const void *data
,
209 int d
= nla_len(nla
) - size
;
212 d
= memcmp(nla_data(nla
), data
, size
);
218 * nla_strcmp - Compare a string attribute against a string
219 * @nla: netlink string attribute
220 * @str: another string
222 int nla_strcmp(const struct nlattr
*nla
, const char *str
)
224 int len
= strlen(str
) + 1;
225 int d
= nla_len(nla
) - len
;
228 d
= memcmp(nla_data(nla
), str
, len
);
234 * __nla_reserve - reserve room for attribute on the skb
235 * @skb: socket buffer to reserve room on
236 * @attrtype: attribute type
237 * @attrlen: length of attribute payload
239 * Adds a netlink attribute header to a socket buffer and reserves
240 * room for the payload but does not copy it.
242 * The caller is responsible to ensure that the skb provides enough
243 * tailroom for the attribute header and payload.
245 struct nlattr
*__nla_reserve(struct sk_buff
*skb
, int attrtype
, int attrlen
)
249 nla
= (struct nlattr
*) skb_put(skb
, nla_total_size(attrlen
));
250 nla
->nla_type
= attrtype
;
251 nla
->nla_len
= nla_attr_size(attrlen
);
253 memset((unsigned char *) nla
+ nla
->nla_len
, 0, nla_padlen(attrlen
));
259 * nla_reserve - reserve room for attribute on the skb
260 * @skb: socket buffer to reserve room on
261 * @attrtype: attribute type
262 * @attrlen: length of attribute payload
264 * Adds a netlink attribute header to a socket buffer and reserves
265 * room for the payload but does not copy it.
267 * Returns NULL if the tailroom of the skb is insufficient to store
268 * the attribute header and payload.
270 struct nlattr
*nla_reserve(struct sk_buff
*skb
, int attrtype
, int attrlen
)
272 if (unlikely(skb_tailroom(skb
) < nla_total_size(attrlen
)))
275 return __nla_reserve(skb
, attrtype
, attrlen
);
279 * __nla_put - Add a netlink attribute to a socket buffer
280 * @skb: socket buffer to add attribute to
281 * @attrtype: attribute type
282 * @attrlen: length of attribute payload
283 * @data: head of attribute payload
285 * The caller is responsible to ensure that the skb provides enough
286 * tailroom for the attribute header and payload.
288 void __nla_put(struct sk_buff
*skb
, int attrtype
, int attrlen
,
293 nla
= __nla_reserve(skb
, attrtype
, attrlen
);
294 memcpy(nla_data(nla
), data
, attrlen
);
299 * nla_put - Add a netlink attribute to a socket buffer
300 * @skb: socket buffer to add attribute to
301 * @attrtype: attribute type
302 * @attrlen: length of attribute payload
303 * @data: head of attribute payload
305 * Returns -1 if the tailroom of the skb is insufficient to store
306 * the attribute header and payload.
308 int nla_put(struct sk_buff
*skb
, int attrtype
, int attrlen
, const void *data
)
310 if (unlikely(skb_tailroom(skb
) < nla_total_size(attrlen
)))
313 __nla_put(skb
, attrtype
, attrlen
, data
);
318 EXPORT_SYMBOL(nla_validate
);
319 EXPORT_SYMBOL(nla_parse
);
320 EXPORT_SYMBOL(nla_find
);
321 EXPORT_SYMBOL(nla_strlcpy
);
322 EXPORT_SYMBOL(__nla_reserve
);
323 EXPORT_SYMBOL(nla_reserve
);
324 EXPORT_SYMBOL(__nla_put
);
325 EXPORT_SYMBOL(nla_put
);
326 EXPORT_SYMBOL(nla_memcpy
);
327 EXPORT_SYMBOL(nla_memcmp
);
328 EXPORT_SYMBOL(nla_strcmp
);