blob: 83943307f4d7d05cfff92ef36c1adab09307f159 [file] [log] [blame]
Thomas Graf44d36242007-09-15 01:28:01 +02001/*
2 * lib/attr.c Netlink Attributes
3 *
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation version 2.1
7 * of the License.
8 *
Thomas Grafdbcdf912008-01-30 13:16:48 +01009 * Copyright (c) 2003-2008 Thomas Graf <tgraf@suug.ch>
Thomas Graf44d36242007-09-15 01:28:01 +020010 */
11
12#include <netlink-local.h>
13#include <netlink/netlink.h>
14#include <netlink/utils.h>
15#include <netlink/addr.h>
16#include <netlink/attr.h>
17#include <netlink/msg.h>
18#include <linux/socket.h>
19
20/**
21 * @ingroup msg
22 * @defgroup attr Attributes
23 * Netlink Attributes Construction/Parsing Interface
Thomas Grafdbcdf912008-01-30 13:16:48 +010024 *
25 * \section attr_sec Netlink Attributes
26 * Netlink attributes allow for data chunks of arbitary length to be
27 * attached to a netlink message. Each attribute is encoded with a
28 * type and length field, both 16 bits, stored in the attribute header
29 * preceding the attribute data. The main advantage of using attributes
30 * over packing everything into the family header is that the interface
31 * stays extendable as new attributes can supersede old attributes while
32 * remaining backwards compatible. Also attributes can be defined optional
33 * thus avoiding the transmission of unnecessary empty data blocks.
34 * Special nested attributes allow for more complex data structures to
35 * be transmitted, e.g. trees, lists, etc.
36 *
37 * While not required, netlink attributes typically follow the family
38 * header of a netlink message and must be properly aligned to NLA_ALIGNTO:
Thomas Graf44d36242007-09-15 01:28:01 +020039 * @code
Thomas Grafdbcdf912008-01-30 13:16:48 +010040 * +----------------+- - -+---------------+- - -+------------+- - -+
41 * | Netlink Header | Pad | Family Header | Pad | Attributes | Pad |
42 * +----------------+- - -+---------------+- - -+------------+- - -+
Thomas Graf44d36242007-09-15 01:28:01 +020043 * @endcode
44 *
Thomas Grafdbcdf912008-01-30 13:16:48 +010045 * The actual attributes are chained together each separately aligned to
46 * NLA_ALIGNTO. The position of an attribute is defined based on the
47 * length field of the preceding attributes:
48 * @code
49 * +-------------+- - -+-------------+- - -+------
50 * | Attribute 1 | Pad | Attribute 2 | Pad | ...
51 * +-------------+- - -+-------------+- - -+------
52 * nla_next(attr1)------^
53 * @endcode
54 *
55 * The attribute itself consists of the attribute header followed by
56 * the actual payload also aligned to NLA_ALIGNTO. The function nla_data()
57 * returns a pointer to the start of the payload while nla_len() returns
58 * the length of the payload in bytes.
59 *
60 * \b Note: Be aware, NLA_ALIGNTO equals to 4 bytes, therefore it is not
61 * safe to dereference any 64 bit data types directly.
62 *
63 * @code
64 * <----------- nla_total_size(payload) ----------->
65 * <-------- nla_attr_size(payload) --------->
66 * +------------------+- - -+- - - - - - - - - +- - -+
67 * | Attribute Header | Pad | Payload | Pad |
68 * +------------------+- - -+- - - - - - - - - +- - -+
69 * nla_data(nla)-------------^
70 * <- nla_len(nla) ->
71 * @endcode
72 *
73 * @subsection attr_datatypes Attribute Data Types
74 * A number of basic data types are supported to simplify access and
75 * validation of netlink attributes. This data type information is
76 * not encoded in the attribute, both the kernel and userspace part
77 * are required to share this information on their own.
78 *
79 * One of the major advantages of these basic types is the automatic
80 * validation of each attribute based on an attribute policy. The
81 * validation covers most of the checks required to safely use
82 * attributes and thus keeps the individual sanity check to a minimum.
83 *
84 * Never access attribute payload without ensuring basic validation
85 * first, attributes may:
86 * - not be present even though required
87 * - contain less actual payload than expected
88 * - fake a attribute length which exceeds the end of the message
89 * - contain unterminated character strings
90 *
91 * Policies are defined as array of the struct nla_policy. The array is
92 * indexed with the attribute type, therefore the array must be sized
93 * accordingly.
94 * @code
95 * static struct nla_policy my_policy[ATTR_MAX+1] = {
96 * [ATTR_FOO] = { .type = ..., .minlen = ..., .maxlen = ... },
97 * };
98 *
99 * err = nla_validate(attrs, attrlen, ATTR_MAX, &my_policy);
100 * @endcode
101 *
102 * Some basic validations are performed on every attribute, regardless of type.
103 * - If the attribute type exceeds the maximum attribute type specified or
104 * the attribute type is lesser-or-equal than zero, the attribute will
105 * be silently ignored.
106 * - If the payload length falls below the \a minlen value the attribute
107 * will be rejected.
108 * - If \a maxlen is non-zero and the payload length exceeds the \a maxlen
109 * value the attribute will be rejected.
110 *
111 *
112 * @par Unspecific Attribute (NLA_UNSPEC)
113 * This is the standard type if no type is specified. It is used for
114 * binary data of arbitary length. Typically this attribute carries
115 * a binary structure or a stream of bytes.
Thomas Graf44d36242007-09-15 01:28:01 +0200116 * @par
Thomas Graf44d36242007-09-15 01:28:01 +0200117 * @code
Thomas Grafdbcdf912008-01-30 13:16:48 +0100118 * // In this example, we will assume a binary structure requires to
119 * // be transmitted. The definition of the structure will typically
120 * // go into a header file available to both the kernel and userspace
121 * // side.
122 * //
123 * // Note: Be careful when putting 64 bit data types into a structure.
124 * // The attribute payload is only aligned to 4 bytes, dereferencing
125 * // the member may fail.
126 * struct my_struct {
127 * int a;
128 * int b;
129 * };
130 *
131 * // The validation function will not enforce an exact length match to
132 * // allow structures to grow as required. Note: While it is allowed
133 * // to add members to the end of the structure, changing the order or
134 * // inserting members in the middle of the structure will break your
135 * // binary interface.
136 * static struct nla_policy my_policy[ATTR_MAX+1] = {
137 * [ATTR_MY_STRICT] = { .type = NLA_UNSPEC,
138 * .minlen = sizeof(struct my_struct) },
139 *
140 * // The binary structure is appened to the message using nla_put()
141 * struct my_struct foo = { .a = 1, .b = 2 };
142 * nla_put(msg, ATTR_MY_STRUCT, sizeof(foo), &foo);
143 *
144 * // On the receiving side, a pointer to the structure pointing inside
145 * // the message payload is returned by nla_get().
146 * if (attrs[ATTR_MY_STRUCT])
147 * struct my_struct *foo = nla_get(attrs[ATTR_MY_STRUCT]);
Thomas Graf44d36242007-09-15 01:28:01 +0200148 * @endcode
149 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100150 * @par Integers (NLA_U8, NLA_U16, NLA_U32, NLA_U64)
151 * Integers come in different sizes from 8 bit to 64 bit. However, since the
152 * payload length is aligned to 4 bytes, integers smaller than 32 bit are
153 * only useful to enforce the maximum range of values.
154 * @par
155 * \b Note: There is no difference made between signed and unsigned integers.
156 * The validation only enforces the minimal payload length required to store
157 * an integer of specified type.
158 * @par
Thomas Graf44d36242007-09-15 01:28:01 +0200159 * @code
Thomas Grafdbcdf912008-01-30 13:16:48 +0100160 * // Even though possible, it does not make sense to specify .minlen or
161 * // .maxlen for integer types. The data types implies the corresponding
162 * // minimal payload length.
163 * static struct nla_policy my_policy[ATTR_MAX+1] = {
164 * [ATTR_FOO] = { .type = NLA_U32 },
Thomas Graf75a26f32008-01-14 16:46:17 +0100165 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100166 * // Numeric values can be appended directly using the respective
167 * // nla_put_uxxx() function
168 * nla_put_u32(msg, ATTR_FOO, 123);
169 *
170 * // Same for the receiving side.
171 * if (attrs[ATTR_FOO])
172 * uint32_t foo = nla_get_u32(attrs[ATTR_FOO]);
Thomas Graf44d36242007-09-15 01:28:01 +0200173 * @endcode
174 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100175 * @par Character string (NLA_STRING)
176 * This data type represents a NUL terminated character string of variable
177 * length. For binary data streams the type NLA_UNSPEC is recommended.
178 * @par
Thomas Graf44d36242007-09-15 01:28:01 +0200179 * @code
Thomas Grafdbcdf912008-01-30 13:16:48 +0100180 * // Enforce a NUL terminated character string of at most 4 characters
181 * // including the NUL termination.
182 * static struct nla_policy my_policy[ATTR_MAX+1] = {
183 * [ATTR_BAR] = { .type = NLA_STRING, maxlen = 4 },
184 *
185 * // nla_put_string() creates a string attribute of the necessary length
186 * // and appends it to the message including the NUL termination.
187 * nla_put_string(msg, ATTR_BAR, "some text");
188 *
189 * // It is safe to use the returned character string directly if the
190 * // attribute has been validated as the validation enforces the proper
191 * // termination of the string.
192 * if (attrs[ATTR_BAR])
193 * char *text = nla_get_string(attrs[ATTR_BAR]);
194 * @endcode
195 *
196 * @par Flag (NLA_FLAG)
197 * This attribute type may be used to indicate the presence of a flag. The
198 * attribute is only valid if the payload length is zero. The presence of
199 * the attribute header indicates the presence of the flag.
200 * @par
201 * @code
202 * // This attribute type is special as .minlen and .maxlen have no effect.
203 * static struct nla_policy my_policy[ATTR_MAX+1] = {
204 * [ATTR_FLAG] = { .type = NLA_FLAG },
205 *
206 * // nla_put_flag() appends a zero sized attribute to the message.
207 * nla_put_flag(msg, ATTR_FLAG);
208 *
209 * // There is no need for a receival function, the presence is the value.
210 * if (attrs[ATTR_FLAG])
211 * // flag is present
212 * @endcode
213 *
214 * @par Micro Seconds (NLA_MSECS)
215 *
216 * @par Nested Attribute (NLA_NESTED)
217 * Attributes can be nested and put into a container to create groups, lists
218 * or to construct trees of attributes. Nested attributes are often used to
219 * pass attributes to a subsystem where the top layer has no knowledge of the
220 * configuration possibilities of each subsystem.
221 * @par
222 * \b Note: When validating the attributes using nlmsg_validate() or
223 * nlmsg_parse() it will only affect the top level attributes. Each
224 * level of nested attributes must be validated seperately using
225 * nla_parse_nested() or nla_validate().
226 * @par
227 * @code
228 * // The minimal length policy may be used to enforce the presence of at
229 * // least one attribute.
230 * static struct nla_policy my_policy[ATTR_MAX+1] = {
231 * [ATTR_OPTS] = { .type = NLA_NESTED, minlen = NLA_HDRLEN },
232 *
233 * // Nested attributes are constructed by enclosing the attributes
234 * // to be nested with calls to nla_nest_start() respetively nla_nest_end().
235 * struct nlattr *opts = nla_nest_start(msg, ATTR_OPTS);
236 * nla_put_u32(msg, ATTR_FOO, 123);
237 * nla_put_string(msg, ATTR_BAR, "some text");
238 * nla_nest_end(msg, opts);
239 *
240 * // Various methods exist to parse nested attributes, the easiest being
241 * // nla_parse_nested() which also allows validation in the same step.
242 * if (attrs[ATTR_OPTS]) {
243 * struct nlattr *nested[ATTR_MAX+1];
244 *
245 * nla_parse_nested(nested, ATTR_MAX, attrs[ATTR_OPTS], &policy);
246 *
247 * if (nested[ATTR_FOO])
248 * uint32_t foo = nla_get_u32(nested[ATTR_FOO]);
Thomas Graf44d36242007-09-15 01:28:01 +0200249 * }
Thomas Graf44d36242007-09-15 01:28:01 +0200250 * @endcode
Thomas Grafdbcdf912008-01-30 13:16:48 +0100251 *
252 * @subsection attr_exceptions Exception Based Attribute Construction
253 * Often a large number of attributes are added to a message in a single
254 * function. In order to simplify error handling, a second set of
255 * construction functions exist which jump to a error label when they
256 * fail instead of returning an error code. This second set consists
257 * of macros which are named after their error code based counterpart
258 * except that the name is written all uppercase.
259 *
260 * All of the macros jump to the target \c nla_put_failure if they fail.
261 * @code
262 * void my_func(struct nl_msg *msg)
263 * {
264 * NLA_PUT_U32(msg, ATTR_FOO, 10);
265 * NLA_PUT_STRING(msg, ATTR_BAR, "bar");
266 *
267 * return 0;
268 *
269 * nla_put_failure:
Thomas Graf8a3efff2008-05-14 17:49:44 +0200270 * return -NLE_NOMEM;
Thomas Grafdbcdf912008-01-30 13:16:48 +0100271 * }
272 * @endcode
273 *
274 * @subsection attr_examples Examples
275 * @par Example 1.1 Constructing a netlink message with attributes.
276 * @code
277 * struct nl_msg *build_msg(int ifindex, struct nl_addr *lladdr, int mtu)
278 * {
279 * struct nl_msg *msg;
280 * struct nlattr *info, *vlan;
281 * struct ifinfomsg ifi = {
282 * .ifi_family = AF_INET,
283 * .ifi_index = ifindex,
284 * };
285 *
286 * // Allocate a new netlink message, type=RTM_SETLINK, flags=NLM_F_ECHO
287 * if (!(msg = nlmsg_alloc_simple(RTM_SETLINK, NLM_F_ECHO)))
288 * return NULL;
289 *
290 * // Append the family specific header (struct ifinfomsg)
291 * if (nlmsg_append(msg, &ifi, sizeof(ifi), NLMSG_ALIGNTO) < 0)
292 * goto nla_put_failure
293 *
294 * // Append a 32 bit integer attribute to carry the MTU
295 * NLA_PUT_U32(msg, IFLA_MTU, mtu);
296 *
297 * // Append a unspecific attribute to carry the link layer address
298 * NLA_PUT_ADDR(msg, IFLA_ADDRESS, lladdr);
299 *
300 * // Append a container for nested attributes to carry link information
301 * if (!(info = nla_nest_start(msg, IFLA_LINKINFO)))
302 * goto nla_put_failure;
303 *
304 * // Put a string attribute into the container
305 * NLA_PUT_STRING(msg, IFLA_INFO_KIND, "vlan");
306 *
307 * // Append another container inside the open container to carry
308 * // vlan specific attributes
309 * if (!(vlan = nla_nest_start(msg, IFLA_INFO_DATA)))
310 * goto nla_put_failure;
311 *
312 * // add vlan specific info attributes here...
313 *
314 * // Finish nesting the vlan attributes and close the second container.
315 * nla_nest_end(msg, vlan);
316 *
317 * // Finish nesting the link info attribute and close the first container.
318 * nla_nest_end(msg, info);
319 *
320 * return msg;
321 *
322 * // If any of the construction macros fails, we end up here.
323 * nla_put_failure:
324 * nlmsg_free(msg);
325 * return NULL;
326 * }
327 * @endcode
328 *
329 * @par Example 2.1 Parsing a netlink message with attributes.
330 * @code
331 * int parse_message(struct nl_msg *msg)
332 * {
333 * // The policy defines two attributes: a 32 bit integer and a container
334 * // for nested attributes.
335 * struct nla_policy attr_policy[ATTR_MAX+1] = {
336 * [ATTR_FOO] = { .type = NLA_U32 },
337 * [ATTR_BAR] = { .type = NLA_NESTED },
338 * };
339 * struct nlattr *attrs[ATTR_MAX+1];
340 * int err;
341 *
342 * // The nlmsg_parse() function will make sure that the message contains
343 * // enough payload to hold the header (struct my_hdr), validates any
344 * // attributes attached to the messages and stores a pointer to each
345 * // attribute in the attrs[] array accessable by attribute type.
346 * if ((err = nlmsg_parse(nlmsg_hdr(msg), sizeof(struct my_hdr), attrs,
347 * ATTR_MAX, attr_policy)) < 0)
348 * goto errout;
349 *
350 * if (attrs[ATTR_FOO]) {
351 * // It is safe to directly access the attribute payload without
352 * // any further checks since nlmsg_parse() enforced the policy.
353 * uint32_t foo = nla_get_u32(attrs[ATTR_FOO]);
354 * }
355 *
356 * if (attrs[ATTR_BAR]) {
357 * struct nlattr *nested[NESTED_MAX+1];
358 *
359 * // Attributes nested in a container can be parsed the same way
360 * // as top level attributes.
361 * if ((err = nla_parse_nested(nested, NESTED_MAX, attrs[ATTR_BAR],
362 * nested_policy)) < 0)
363 * goto errout;
364 *
365 * // Process nested attributes here.
366 * }
367 *
368 * err = 0;
369 * errout:
370 * return err;
371 * }
372 * @endcode
373 *
Thomas Graf44d36242007-09-15 01:28:01 +0200374 * @{
375 */
376
377/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100378 * @name Attribute Size Calculation
Thomas Graf44d36242007-09-15 01:28:01 +0200379 * @{
380 */
381
382/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100383 * Return size of attribute whithout padding.
384 * @arg payload Payload length of attribute.
385 *
386 * @code
387 * <-------- nla_attr_size(payload) --------->
388 * +------------------+- - -+- - - - - - - - - +- - -+
389 * | Attribute Header | Pad | Payload | Pad |
390 * +------------------+- - -+- - - - - - - - - +- - -+
391 * @endcode
392 *
393 * @return Size of attribute in bytes without padding.
Thomas Graf44d36242007-09-15 01:28:01 +0200394 */
395int nla_attr_size(int payload)
396{
397 return NLA_HDRLEN + payload;
398}
399
400/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100401 * Return size of attribute including padding.
402 * @arg payload Payload length of attribute.
403 *
404 * @code
405 * <----------- nla_total_size(payload) ----------->
406 * +------------------+- - -+- - - - - - - - - +- - -+
407 * | Attribute Header | Pad | Payload | Pad |
408 * +------------------+- - -+- - - - - - - - - +- - -+
409 * @endcode
410 *
411 * @return Size of attribute in bytes.
Thomas Graf44d36242007-09-15 01:28:01 +0200412 */
413int nla_total_size(int payload)
414{
415 return NLA_ALIGN(nla_attr_size(payload));
416}
417
418/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100419 * Return length of padding at the tail of the attribute.
420 * @arg payload Payload length of attribute.
421 *
422 * @code
423 * +------------------+- - -+- - - - - - - - - +- - -+
424 * | Attribute Header | Pad | Payload | Pad |
425 * +------------------+- - -+- - - - - - - - - +- - -+
426 * <--->
427 * @endcode
428 *
429 * @return Length of padding in bytes.
Thomas Graf44d36242007-09-15 01:28:01 +0200430 */
431int nla_padlen(int payload)
432{
433 return nla_total_size(payload) - nla_attr_size(payload);
434}
435
436/** @} */
437
438/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100439 * @name Parsing Attributes
Thomas Graf44d36242007-09-15 01:28:01 +0200440 * @{
441 */
442
443/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100444 * Return type of the attribute.
445 * @arg nla Attribute.
446 *
447 * @return Type of attribute.
Thomas Graf44d36242007-09-15 01:28:01 +0200448 */
449int nla_type(const struct nlattr *nla)
450{
451 return nla->nla_type & NLA_TYPE_MASK;
452}
453
454/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100455 * Return pointer to the payload section.
456 * @arg nla Attribute.
457 *
458 * @return Pointer to start of payload section.
Thomas Graf44d36242007-09-15 01:28:01 +0200459 */
460void *nla_data(const struct nlattr *nla)
461{
462 return (char *) nla + NLA_HDRLEN;
463}
464
465/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100466 * Return length of the payload .
467 * @arg nla Attribute
468 *
469 * @return Length of payload in bytes.
Thomas Graf44d36242007-09-15 01:28:01 +0200470 */
471int nla_len(const struct nlattr *nla)
472{
473 return nla->nla_len - NLA_HDRLEN;
474}
475
Thomas Graf44d36242007-09-15 01:28:01 +0200476/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100477 * Check if the attribute header and payload can be accessed safely.
478 * @arg nla Attribute of any kind.
479 * @arg remaining Number of bytes remaining in attribute stream.
480 *
481 * Verifies that the header and payload do not exceed the number of
482 * bytes left in the attribute stream. This function must be called
483 * before access the attribute header or payload when iterating over
484 * the attribute stream using nla_next().
485 *
486 * @return True if the attribute can be accessed safely, false otherwise.
Thomas Graf44d36242007-09-15 01:28:01 +0200487 */
488int nla_ok(const struct nlattr *nla, int remaining)
489{
490 return remaining >= sizeof(*nla) &&
491 nla->nla_len >= sizeof(*nla) &&
492 nla->nla_len <= remaining;
493}
494
495/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100496 * Return next attribute in a stream of attributes.
497 * @arg nla Attribute of any kind.
498 * @arg remaining Variable to count remaining bytes in stream.
Thomas Graf44d36242007-09-15 01:28:01 +0200499 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100500 * Calculates the offset to the next attribute based on the attribute
501 * given. The attribute provided is assumed to be accessible, the
502 * caller is responsible to use nla_ok() beforehand. The offset (length
503 * of specified attribute including padding) is then subtracted from
504 * the remaining bytes variable and a pointer to the next attribute is
505 * returned.
506 *
507 * nla_next() can be called as long as remainig is >0.
508 *
509 * @return Pointer to next attribute.
Thomas Graf44d36242007-09-15 01:28:01 +0200510 */
511struct nlattr *nla_next(const struct nlattr *nla, int *remaining)
512{
513 int totlen = NLA_ALIGN(nla->nla_len);
514
515 *remaining -= totlen;
516 return (struct nlattr *) ((char *) nla + totlen);
517}
518
519static uint16_t nla_attr_minlen[NLA_TYPE_MAX+1] = {
520 [NLA_U8] = sizeof(uint8_t),
521 [NLA_U16] = sizeof(uint16_t),
522 [NLA_U32] = sizeof(uint32_t),
523 [NLA_U64] = sizeof(uint64_t),
524 [NLA_STRING] = 1,
Thomas Graf44d36242007-09-15 01:28:01 +0200525};
526
527static int validate_nla(struct nlattr *nla, int maxtype,
528 struct nla_policy *policy)
529{
530 struct nla_policy *pt;
531 int minlen = 0, type = nla_type(nla);
532
533 if (type <= 0 || type > maxtype)
534 return 0;
535
536 pt = &policy[type];
537
538 if (pt->type > NLA_TYPE_MAX)
539 BUG();
540
541 if (pt->minlen)
542 minlen = pt->minlen;
543 else if (pt->type != NLA_UNSPEC)
544 minlen = nla_attr_minlen[pt->type];
545
546 if (pt->type == NLA_FLAG && nla_len(nla) > 0)
Thomas Graf8a3efff2008-05-14 17:49:44 +0200547 return -NLE_RANGE;
Thomas Graf44d36242007-09-15 01:28:01 +0200548
549 if (nla_len(nla) < minlen)
Thomas Graf8a3efff2008-05-14 17:49:44 +0200550 return -NLE_RANGE;
Thomas Graf44d36242007-09-15 01:28:01 +0200551
552 if (pt->maxlen && nla_len(nla) > pt->maxlen)
Thomas Graf8a3efff2008-05-14 17:49:44 +0200553 return -NLE_RANGE;
Thomas Graf44d36242007-09-15 01:28:01 +0200554
555 if (pt->type == NLA_STRING) {
556 char *data = nla_data(nla);
557 if (data[nla_len(nla) - 1] != '\0')
Thomas Graf8a3efff2008-05-14 17:49:44 +0200558 return -NLE_INVAL;
Thomas Graf44d36242007-09-15 01:28:01 +0200559 }
560
561 return 0;
562}
563
564
565/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100566 * Create attribute index based on a stream of attributes.
567 * @arg tb Index array to be filled (maxtype+1 elements).
568 * @arg maxtype Maximum attribute type expected and accepted.
569 * @arg head Head of attribute stream.
570 * @arg len Length of attribute stream.
571 * @arg policy Attribute validation policy.
Thomas Graf44d36242007-09-15 01:28:01 +0200572 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100573 * Iterates over the stream of attributes and stores a pointer to each
574 * attribute in the index array using the attribute type as index to
575 * the array. Attribute with a type greater than the maximum type
576 * specified will be silently ignored in order to maintain backwards
577 * compatibility. If \a policy is not NULL, the attribute will be
578 * validated using the specified policy.
Thomas Graf44d36242007-09-15 01:28:01 +0200579 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100580 * @see nla_validate
Thomas Graf44d36242007-09-15 01:28:01 +0200581 * @return 0 on success or a negative error code.
582 */
583int nla_parse(struct nlattr *tb[], int maxtype, struct nlattr *head, int len,
584 struct nla_policy *policy)
585{
586 struct nlattr *nla;
587 int rem, err;
588
589 memset(tb, 0, sizeof(struct nlattr *) * (maxtype + 1));
590
591 nla_for_each_attr(nla, head, len, rem) {
592 int type = nla_type(nla);
593
594 if (type == 0) {
595 fprintf(stderr, "Illegal nla->nla_type == 0\n");
596 continue;
597 }
598
599 if (type <= maxtype) {
600 if (policy) {
601 err = validate_nla(nla, maxtype, policy);
602 if (err < 0)
603 goto errout;
604 }
605
606 tb[type] = nla;
607 }
608 }
609
610 if (rem > 0)
611 fprintf(stderr, "netlink: %d bytes leftover after parsing "
612 "attributes.\n", rem);
613
614 err = 0;
615errout:
616 return err;
617}
618
Thomas Graf44d36242007-09-15 01:28:01 +0200619/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100620 * Validate a stream of attributes.
621 * @arg head Head of attributes stream.
622 * @arg len Length of attributes stream.
623 * @arg maxtype Maximum attribute type expected and accepted.
624 * @arg policy Validation policy.
Thomas Graf44d36242007-09-15 01:28:01 +0200625 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100626 * Iterates over the stream of attributes and validates each attribute
627 * one by one using the specified policy. Attributes with a type greater
628 * than the maximum type specified will be silently ignored in order to
629 * maintain backwards compatibility.
Thomas Graf44d36242007-09-15 01:28:01 +0200630 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100631 * See \ref attr_datatypes for more details on what kind of validation
632 * checks are performed on each attribute data type.
Thomas Graf44d36242007-09-15 01:28:01 +0200633 *
634 * @return 0 on success or a negative error code.
635 */
636int nla_validate(struct nlattr *head, int len, int maxtype,
637 struct nla_policy *policy)
638{
639 struct nlattr *nla;
640 int rem, err;
641
642 nla_for_each_attr(nla, head, len, rem) {
643 err = validate_nla(nla, maxtype, policy);
644 if (err < 0)
645 goto errout;
646 }
647
648 err = 0;
649errout:
650 return err;
651}
652
653/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100654 * Find a single attribute in a stream of attributes.
655 * @arg head Head of attributes stream.
656 * @arg len Length of attributes stream.
657 * @arg attrtype Attribute type to look for.
Thomas Graf44d36242007-09-15 01:28:01 +0200658 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100659 * Iterates over the stream of attributes and compares each type with
660 * the type specified. Returns the first attribute which matches the
661 * type.
662 *
663 * @return Pointer to attribute found or NULL.
Thomas Graf44d36242007-09-15 01:28:01 +0200664 */
665struct nlattr *nla_find(struct nlattr *head, int len, int attrtype)
666{
667 struct nlattr *nla;
668 int rem;
669
670 nla_for_each_attr(nla, head, len, rem)
671 if (nla_type(nla) == attrtype)
672 return nla;
673
674 return NULL;
675}
676
677/** @} */
678
679/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100680 * @name Helper Functions
Thomas Graf44d36242007-09-15 01:28:01 +0200681 * @{
682 */
683
684/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100685 * Copy attribute payload to another memory area.
686 * @arg dest Pointer to destination memory area.
687 * @arg src Attribute
688 * @arg count Number of bytes to copy at most.
Thomas Graf44d36242007-09-15 01:28:01 +0200689 *
690 * Note: The number of bytes copied is limited by the length of
Thomas Grafdbcdf912008-01-30 13:16:48 +0100691 * the attribute payload.
Thomas Graf44d36242007-09-15 01:28:01 +0200692 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100693 * @return The number of bytes copied to dest.
Thomas Graf44d36242007-09-15 01:28:01 +0200694 */
695int nla_memcpy(void *dest, struct nlattr *src, int count)
696{
697 int minlen;
698
699 if (!src)
700 return 0;
701
702 minlen = min_t(int, count, nla_len(src));
703 memcpy(dest, nla_data(src), minlen);
704
705 return minlen;
706}
707
708/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100709 * Copy string attribute payload to a buffer.
710 * @arg dst Pointer to destination buffer.
711 * @arg nla Attribute of type NLA_STRING.
712 * @arg dstsize Size of destination buffer in bytes.
Thomas Graf44d36242007-09-15 01:28:01 +0200713 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100714 * Copies at most dstsize - 1 bytes to the destination buffer.
715 * The result is always a valid NUL terminated string. Unlike
Thomas Graf44d36242007-09-15 01:28:01 +0200716 * strlcpy the destination buffer is always padded out.
717 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100718 * @return The length of string attribute without the terminating NUL.
Thomas Graf44d36242007-09-15 01:28:01 +0200719 */
720size_t nla_strlcpy(char *dst, const struct nlattr *nla, size_t dstsize)
721{
722 size_t srclen = nla_len(nla);
723 char *src = nla_data(nla);
724
725 if (srclen > 0 && src[srclen - 1] == '\0')
726 srclen--;
727
728 if (dstsize > 0) {
729 size_t len = (srclen >= dstsize) ? dstsize - 1 : srclen;
730
731 memset(dst, 0, dstsize);
732 memcpy(dst, src, len);
733 }
734
735 return srclen;
736}
737
738/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100739 * Compare attribute payload with memory area.
740 * @arg nla Attribute.
741 * @arg data Memory area to compare to.
742 * @arg size Number of bytes to compare.
743 *
744 * @see memcmp(3)
745 * @return An integer less than, equal to, or greater than zero.
Thomas Graf44d36242007-09-15 01:28:01 +0200746 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100747int nla_memcmp(const struct nlattr *nla, const void *data, size_t size)
Thomas Graf44d36242007-09-15 01:28:01 +0200748{
749 int d = nla_len(nla) - size;
750
751 if (d == 0)
752 d = memcmp(nla_data(nla), data, size);
753
754 return d;
755}
756
757/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100758 * Compare string attribute payload with string
759 * @arg nla Attribute of type NLA_STRING.
760 * @arg str NUL terminated string.
761 *
762 * @see strcmp(3)
763 * @return An integer less than, equal to, or greater than zero.
Thomas Graf44d36242007-09-15 01:28:01 +0200764 */
765int nla_strcmp(const struct nlattr *nla, const char *str)
766{
767 int len = strlen(str) + 1;
768 int d = nla_len(nla) - len;
769
770 if (d == 0)
771 d = memcmp(nla_data(nla), str, len);
772
773 return d;
774}
775
776/** @} */
777
778/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100779 * @name Unspecific Attribute
Thomas Graf44d36242007-09-15 01:28:01 +0200780 * @{
781 */
782
783/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100784 * Reserve space for a attribute.
785 * @arg msg Netlink Message.
786 * @arg attrtype Attribute Type.
787 * @arg attrlen Length of payload.
Thomas Graf44d36242007-09-15 01:28:01 +0200788 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100789 * Reserves room for a attribute in the specified netlink message and
790 * fills in the attribute header (type, length). Returns NULL if there
791 * is unsuficient space for the attribute.
792 *
793 * Any padding between payload and the start of the next attribute is
794 * zeroed out.
795 *
796 * @return Pointer to start of attribute or NULL on failure.
Thomas Graf44d36242007-09-15 01:28:01 +0200797 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100798struct nlattr *nla_reserve(struct nl_msg *msg, int attrtype, int attrlen)
Thomas Graf44d36242007-09-15 01:28:01 +0200799{
800 struct nlattr *nla;
801 int tlen;
802
Paul Stewart555ca6a2016-10-28 16:31:40 -0700803 if (attrlen < 0)
804 return NULL;
805
Thomas Grafdbcdf912008-01-30 13:16:48 +0100806 tlen = NLMSG_ALIGN(msg->nm_nlh->nlmsg_len) + nla_total_size(attrlen);
Thomas Graf44d36242007-09-15 01:28:01 +0200807
Thomas Graf8a3efff2008-05-14 17:49:44 +0200808 if ((tlen + msg->nm_nlh->nlmsg_len) > msg->nm_size)
Thomas Graf44d36242007-09-15 01:28:01 +0200809 return NULL;
Thomas Graf44d36242007-09-15 01:28:01 +0200810
Thomas Grafdbcdf912008-01-30 13:16:48 +0100811 nla = (struct nlattr *) nlmsg_tail(msg->nm_nlh);
Thomas Graf44d36242007-09-15 01:28:01 +0200812 nla->nla_type = attrtype;
813 nla->nla_len = nla_attr_size(attrlen);
814
815 memset((unsigned char *) nla + nla->nla_len, 0, nla_padlen(attrlen));
Thomas Grafdbcdf912008-01-30 13:16:48 +0100816 msg->nm_nlh->nlmsg_len = tlen;
Thomas Graf44d36242007-09-15 01:28:01 +0200817
Patrick McHardy936c9842007-12-13 12:09:45 +0100818 NL_DBG(2, "msg %p: Reserved %d bytes at offset +%td for attr %d "
Thomas Grafdbcdf912008-01-30 13:16:48 +0100819 "nlmsg_len=%d\n", msg, attrlen,
820 (void *) nla - nlmsg_data(msg->nm_nlh),
821 attrtype, msg->nm_nlh->nlmsg_len);
Thomas Graf44d36242007-09-15 01:28:01 +0200822
823 return nla;
824}
825
826/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100827 * Add a unspecific attribute to netlink message.
828 * @arg msg Netlink message.
829 * @arg attrtype Attribute type.
830 * @arg datalen Length of data to be used as payload.
831 * @arg data Pointer to data to be used as attribute payload.
Thomas Graf44d36242007-09-15 01:28:01 +0200832 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100833 * Reserves room for a unspecific attribute and copies the provided data
834 * into the message as payload of the attribute. Returns an error if there
835 * is insufficient space for the attribute.
836 *
837 * @see nla_reserve
838 * @return 0 on success or a negative error code.
Thomas Graf44d36242007-09-15 01:28:01 +0200839 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100840int nla_put(struct nl_msg *msg, int attrtype, int datalen, const void *data)
Thomas Graf44d36242007-09-15 01:28:01 +0200841{
842 struct nlattr *nla;
843
Paul Stewart555ca6a2016-10-28 16:31:40 -0700844 if (datalen < 0)
845 return -NLE_RANGE;
846
Thomas Grafdbcdf912008-01-30 13:16:48 +0100847 nla = nla_reserve(msg, attrtype, datalen);
Thomas Graf44d36242007-09-15 01:28:01 +0200848 if (!nla)
Thomas Graf8a3efff2008-05-14 17:49:44 +0200849 return -NLE_NOMEM;
Thomas Graf44d36242007-09-15 01:28:01 +0200850
Thomas Grafdbcdf912008-01-30 13:16:48 +0100851 memcpy(nla_data(nla), data, datalen);
Patrick McHardy936c9842007-12-13 12:09:45 +0100852 NL_DBG(2, "msg %p: Wrote %d bytes at offset +%td for attr %d\n",
Thomas Grafdbcdf912008-01-30 13:16:48 +0100853 msg, datalen, (void *) nla - nlmsg_data(msg->nm_nlh), attrtype);
Thomas Graf44d36242007-09-15 01:28:01 +0200854
855 return 0;
856}
857
858/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100859 * Add abstract data as unspecific attribute to netlink message.
860 * @arg msg Netlink message.
861 * @arg attrtype Attribute type.
862 * @arg data Abstract data object.
Thomas Graf44d36242007-09-15 01:28:01 +0200863 *
Thomas Grafdbcdf912008-01-30 13:16:48 +0100864 * Equivalent to nla_put() except that the length of the payload is
865 * derived from the abstract data object.
866 *
867 * @see nla_put
868 * @return 0 on success or a negative error code.
Thomas Graf44d36242007-09-15 01:28:01 +0200869 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100870int nla_put_data(struct nl_msg *msg, int attrtype, struct nl_data *data)
Thomas Graf44d36242007-09-15 01:28:01 +0200871{
Thomas Grafdbcdf912008-01-30 13:16:48 +0100872 return nla_put(msg, attrtype, nl_data_get_size(data),
873 nl_data_get(data));
874}
875
Thomas Graf44d36242007-09-15 01:28:01 +0200876/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100877 * Add abstract address as unspecific attribute to netlink message.
878 * @arg msg Netlink message.
879 * @arg attrtype Attribute type.
880 * @arg addr Abstract address object.
881 *
882 * @see nla_put
883 * @return 0 on success or a negative error code.
Thomas Graf44d36242007-09-15 01:28:01 +0200884 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100885int nla_put_addr(struct nl_msg *msg, int attrtype, struct nl_addr *addr)
Thomas Graf44d36242007-09-15 01:28:01 +0200886{
Thomas Grafdbcdf912008-01-30 13:16:48 +0100887 return nla_put(msg, attrtype, nl_addr_get_len(addr),
888 nl_addr_get_binary_addr(addr));
889}
890
Thomas Grafdbcdf912008-01-30 13:16:48 +0100891/** @} */
892
893/**
894 * @name Integer Attributes
895 */
896
897/**
898 * Add 8 bit integer attribute to netlink message.
899 * @arg msg Netlink message.
900 * @arg attrtype Attribute type.
901 * @arg value Numeric value to store as payload.
902 *
903 * @see nla_put
904 * @return 0 on success or a negative error code.
905 */
906int nla_put_u8(struct nl_msg *msg, int attrtype, uint8_t value)
907{
908 return nla_put(msg, attrtype, sizeof(uint8_t), &value);
Thomas Graf44d36242007-09-15 01:28:01 +0200909}
910
911/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100912 * Return value of 8 bit integer attribute.
913 * @arg nla 8 bit integer attribute
914 *
915 * @return Payload as 8 bit integer.
Thomas Graf44d36242007-09-15 01:28:01 +0200916 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100917uint8_t nla_get_u8(struct nlattr *nla)
Thomas Graf44d36242007-09-15 01:28:01 +0200918{
Thomas Grafdbcdf912008-01-30 13:16:48 +0100919 return *(uint8_t *) nla_data(nla);
Thomas Graf44d36242007-09-15 01:28:01 +0200920}
921
922/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100923 * Add 16 bit integer attribute to netlink message.
924 * @arg msg Netlink message.
925 * @arg attrtype Attribute type.
926 * @arg value Numeric value to store as payload.
927 *
928 * @see nla_put
929 * @return 0 on success or a negative error code.
Thomas Graf44d36242007-09-15 01:28:01 +0200930 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100931int nla_put_u16(struct nl_msg *msg, int attrtype, uint16_t value)
Thomas Graf44d36242007-09-15 01:28:01 +0200932{
Thomas Grafdbcdf912008-01-30 13:16:48 +0100933 return nla_put(msg, attrtype, sizeof(uint16_t), &value);
Thomas Graf44d36242007-09-15 01:28:01 +0200934}
935
936/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100937 * Return payload of 16 bit integer attribute.
938 * @arg nla 16 bit integer attribute
939 *
940 * @return Payload as 16 bit integer.
Thomas Graf44d36242007-09-15 01:28:01 +0200941 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100942uint16_t nla_get_u16(struct nlattr *nla)
Thomas Graf44d36242007-09-15 01:28:01 +0200943{
Thomas Grafdbcdf912008-01-30 13:16:48 +0100944 return *(uint16_t *) nla_data(nla);
Thomas Graf44d36242007-09-15 01:28:01 +0200945}
946
947/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100948 * Add 32 bit integer attribute to netlink message.
949 * @arg msg Netlink message.
950 * @arg attrtype Attribute type.
951 * @arg value Numeric value to store as payload.
952 *
953 * @see nla_put
954 * @return 0 on success or a negative error code.
Thomas Graf44d36242007-09-15 01:28:01 +0200955 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100956int nla_put_u32(struct nl_msg *msg, int attrtype, uint32_t value)
Thomas Graf44d36242007-09-15 01:28:01 +0200957{
Thomas Grafdbcdf912008-01-30 13:16:48 +0100958 return nla_put(msg, attrtype, sizeof(uint32_t), &value);
Thomas Graf44d36242007-09-15 01:28:01 +0200959}
960
961/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100962 * Return payload of 32 bit integer attribute.
963 * @arg nla 32 bit integer attribute.
964 *
965 * @return Payload as 32 bit integer.
Thomas Graf44d36242007-09-15 01:28:01 +0200966 */
Thomas Grafdbcdf912008-01-30 13:16:48 +0100967uint32_t nla_get_u32(struct nlattr *nla)
Thomas Graf44d36242007-09-15 01:28:01 +0200968{
Thomas Grafdbcdf912008-01-30 13:16:48 +0100969 return *(uint32_t *) nla_data(nla);
Thomas Graf44d36242007-09-15 01:28:01 +0200970}
971
972/**
Thomas Grafdbcdf912008-01-30 13:16:48 +0100973 * Add 64 bit integer attribute to netlink message.
974 * @arg msg Netlink message.
975 * @arg attrtype Attribute type.
976 * @arg value Numeric value to store as payload.
977 *
978 * @see nla_put
979 * @return 0 on success or a negative error code.
980 */
981int nla_put_u64(struct nl_msg *msg, int attrtype, uint64_t value)
982{
983 return nla_put(msg, attrtype, sizeof(uint64_t), &value);
984}
985
986/**
987 * Return payload of u64 attribute
988 * @arg nla u64 netlink attribute
989 *
990 * @return Payload as 64 bit integer.
991 */
992uint64_t nla_get_u64(struct nlattr *nla)
993{
994 uint64_t tmp;
995
996 nla_memcpy(&tmp, nla, sizeof(tmp));
997
998 return tmp;
999}
1000
1001/** @} */
1002
1003/**
1004 * @name String Attribute
1005 */
1006
1007/**
1008 * Add string attribute to netlink message.
1009 * @arg msg Netlink message.
1010 * @arg attrtype Attribute type.
1011 * @arg str NUL terminated string.
1012 *
1013 * @see nla_put
1014 * @return 0 on success or a negative error code.
1015 */
1016int nla_put_string(struct nl_msg *msg, int attrtype, const char *str)
1017{
1018 return nla_put(msg, attrtype, strlen(str) + 1, str);
1019}
1020
1021/**
1022 * Return payload of string attribute.
1023 * @arg nla String attribute.
1024 *
1025 * @return Pointer to attribute payload.
1026 */
1027char *nla_get_string(struct nlattr *nla)
1028{
1029 return (char *) nla_data(nla);
1030}
1031
Thomas Grafd49018f2008-06-13 16:40:41 +02001032char *nla_strdup(struct nlattr *nla)
1033{
1034 return strdup(nla_get_string(nla));
1035}
1036
Thomas Grafdbcdf912008-01-30 13:16:48 +01001037/** @} */
1038
1039/**
1040 * @name Flag Attribute
1041 */
1042
1043/**
1044 * Add flag netlink attribute to netlink message.
1045 * @arg msg Netlink message.
1046 * @arg attrtype Attribute type.
1047 *
1048 * @see nla_put
1049 * @return 0 on success or a negative error code.
1050 */
1051int nla_put_flag(struct nl_msg *msg, int attrtype)
1052{
1053 return nla_put(msg, attrtype, 0, NULL);
1054}
1055
1056/**
1057 * Return true if flag attribute is set.
1058 * @arg nla Flag netlink attribute.
1059 *
1060 * @return True if flag is set, otherwise false.
1061 */
1062int nla_get_flag(struct nlattr *nla)
1063{
1064 return !!nla;
1065}
1066
1067/** @} */
1068
1069/**
1070 * @name Microseconds Attribute
1071 */
1072
1073/**
Thomas Graf44d36242007-09-15 01:28:01 +02001074 * Add a msecs netlink attribute to a netlink message
1075 * @arg n netlink message
1076 * @arg attrtype attribute type
1077 * @arg msecs number of msecs
1078 */
1079int nla_put_msecs(struct nl_msg *n, int attrtype, unsigned long msecs)
1080{
1081 return nla_put_u64(n, attrtype, msecs);
1082}
1083
1084/**
Thomas Graf44d36242007-09-15 01:28:01 +02001085 * Return payload of msecs attribute
1086 * @arg nla msecs netlink attribute
1087 *
1088 * @return the number of milliseconds.
1089 */
1090unsigned long nla_get_msecs(struct nlattr *nla)
1091{
1092 return nla_get_u64(nla);
1093}
1094
Thomas Grafdbcdf912008-01-30 13:16:48 +01001095/** @} */
1096
Thomas Graf44d36242007-09-15 01:28:01 +02001097/**
Thomas Grafdbcdf912008-01-30 13:16:48 +01001098 * @name Nested Attribute
Thomas Graf44d36242007-09-15 01:28:01 +02001099 */
Thomas Grafdbcdf912008-01-30 13:16:48 +01001100
1101/**
1102 * Add nested attributes to netlink message.
1103 * @arg msg Netlink message.
1104 * @arg attrtype Attribute type.
1105 * @arg nested Message containing attributes to be nested.
1106 *
1107 * Takes the attributes found in the \a nested message and appends them
1108 * to the message \a msg nested in a container of the type \a attrtype.
1109 * The \a nested message may not have a family specific header.
1110 *
1111 * @see nla_put
1112 * @return 0 on success or a negative error code.
1113 */
1114int nla_put_nested(struct nl_msg *msg, int attrtype, struct nl_msg *nested)
Thomas Graf44d36242007-09-15 01:28:01 +02001115{
Thomas Grafdbcdf912008-01-30 13:16:48 +01001116 return nla_put(msg, attrtype, nlmsg_len(nested->nm_nlh),
1117 nlmsg_data(nested->nm_nlh));
1118}
1119
1120
1121/**
1122 * Start a new level of nested attributes.
1123 * @arg msg Netlink message.
1124 * @arg attrtype Attribute type of container.
1125 *
1126 * @return Pointer to container attribute.
1127 */
1128struct nlattr *nla_nest_start(struct nl_msg *msg, int attrtype)
1129{
1130 struct nlattr *start = (struct nlattr *) nlmsg_tail(msg->nm_nlh);
1131
1132 if (nla_put(msg, attrtype, 0, NULL) < 0)
1133 return NULL;
1134
1135 return start;
Thomas Graf44d36242007-09-15 01:28:01 +02001136}
1137
1138/**
Thomas Grafdbcdf912008-01-30 13:16:48 +01001139 * Finalize nesting of attributes.
1140 * @arg msg Netlink message.
1141 * @arg start Container attribute as returned from nla_nest_start().
Thomas Graf44d36242007-09-15 01:28:01 +02001142 *
Thomas Grafdbcdf912008-01-30 13:16:48 +01001143 * Corrects the container attribute header to include the appeneded attributes.
1144 *
1145 * @return 0
Thomas Graf44d36242007-09-15 01:28:01 +02001146 */
Thomas Grafdbcdf912008-01-30 13:16:48 +01001147int nla_nest_end(struct nl_msg *msg, struct nlattr *start)
Thomas Graf44d36242007-09-15 01:28:01 +02001148{
Thomas Grafdbcdf912008-01-30 13:16:48 +01001149 start->nla_len = (unsigned char *) nlmsg_tail(msg->nm_nlh) -
1150 (unsigned char *) start;
1151 return 0;
1152}
1153
1154/**
1155 * Create attribute index based on nested attribute
1156 * @arg tb Index array to be filled (maxtype+1 elements).
1157 * @arg maxtype Maximum attribute type expected and accepted.
1158 * @arg nla Nested Attribute.
1159 * @arg policy Attribute validation policy.
1160 *
1161 * Feeds the stream of attributes nested into the specified attribute
1162 * to nla_parse().
1163 *
1164 * @see nla_parse
1165 * @return 0 on success or a negative error code.
1166 */
1167int nla_parse_nested(struct nlattr *tb[], int maxtype, struct nlattr *nla,
1168 struct nla_policy *policy)
1169{
1170 return nla_parse(tb, maxtype, nla_data(nla), nla_len(nla), policy);
Thomas Graf44d36242007-09-15 01:28:01 +02001171}
1172
1173/** @} */
1174
1175/** @} */