From patchwork Wed Jan 16 05:23:50 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 1025648 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=netronome.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=netronome-com.20150623.gappssmtp.com header.i=@netronome-com.20150623.gappssmtp.com header.b="U4wXCnqO"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 43fbHY3mX5z9sD9 for ; Wed, 16 Jan 2019 16:24:41 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726362AbfAPFYh (ORCPT ); Wed, 16 Jan 2019 00:24:37 -0500 Received: from mail-qk1-f193.google.com ([209.85.222.193]:34031 "EHLO mail-qk1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726166AbfAPFYh (ORCPT ); Wed, 16 Jan 2019 00:24:37 -0500 Received: by mail-qk1-f193.google.com with SMTP id q8so3085087qke.1 for ; Tue, 15 Jan 2019 21:24:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netronome-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=4atIWB0BOXLk+6zUKQdhNUIF8Jp7Ydvw5h6PBsKKHh4=; b=U4wXCnqOfo6bDCn2G9SHcmM47XnY4TX8sqCXSOKcr5wNkCBQHfyL4dVokp1cAvdtMR O2rj6JAy7wgjyUN9qqlnhIPvXdDGf7erCuNSPMdVHLg+lqXIOFump5toTTpNstH8U6R7 VMvUxsNFgsDa4t6noldmGTdva9mItDDXAjuYNGsCmvJMlkkAfq8dehZmFDVKioSZoOFs rs/TdIeWe74TjIn6miJhPDtIttbuOi84xYCZkSzKAVY3PXL4JmnARk3/KBJ8zA0ZWLbU RqXcf3KPsz+xfJJQ9sTfzvkWb9zTrzSWRDnAzdAqz8hTzG2VUMqM/InOoqYCG8A++iCn Scng== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=4atIWB0BOXLk+6zUKQdhNUIF8Jp7Ydvw5h6PBsKKHh4=; b=cG+awJE4h6M/cDoCKdSKOifEFgbJ9aw52xIKnbOoniEG9hIqg4lrH9ZOQyHzgM+u2M tYag5lHuBc3vxLdu9rWUS+CuP1PPfmVFbEmjcOTe31+XKgB7AcRYjO0mBeMYJ0mrHtko GjVAmdPMYS9ZGiqQO7x5Lpty2oMbILOsbhJo6kO853fwijq4yvoL3YkZJfhybAFovx3/ hXWgeOUkzXtoszF80ckD+DqA1WEcAOW4eBFO4KuflUabcY6h1GLUFB4FBH+N0pk7Ku+P WFhtQkZ97qfO0Hvnl5eNUprv2JPmZS1flrNRlPv5y13TFRi4SpsdrJBmGZaesFF7APy3 cYUw== X-Gm-Message-State: AJcUukcPxkA0Otf+WHJ8EpHolm8x0eL+nFIYCdX2PLVvJT+aKbKtaSZx dozG7S9dinIjwL7HO31K5FrSVw== X-Google-Smtp-Source: ALg8bN4ru7iKC55iRgShcSW8ETdplTM0nwcVkR6gRJZCGBw5l+Hc47MHN24Jyo0gGiwwote8E1w+aQ== X-Received: by 2002:a37:8b84:: with SMTP id n126mr5118218qkd.355.1547616275990; Tue, 15 Jan 2019 21:24:35 -0800 (PST) Received: from jkicinski-Precision-T1700.netronome.com ([66.60.152.14]) by smtp.gmail.com with ESMTPSA id n71sm57803913qkh.59.2019.01.15.21.24.33 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 15 Jan 2019 21:24:35 -0800 (PST) From: Jakub Kicinski To: davem@davemloft.net Cc: netdev@vger.kernel.org, jiri@resnulli.us, f.fainelli@gmail.com, andrew@lunn.ch, mkubecek@suse.cz, eugenem@fb.com, jonathan.lemon@gmail.com, oss-drivers@netronome.com, Jakub Kicinski Subject: [RFC net-next v2 1/6] devlink: add device information API Date: Tue, 15 Jan 2019 21:23:50 -0800 Message-Id: <20190116052356.18086-2-jakub.kicinski@netronome.com> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20190116052356.18086-1-jakub.kicinski@netronome.com> References: <20190116052356.18086-1-jakub.kicinski@netronome.com> MIME-Version: 1.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org ethtool -i has served us well for a long time, but its showing its limitations more and more. The device information should also be reported per device not per-netdev. Lay foundation for a simple devlink-based way of reading device info. Add driver name and device serial number as initial pieces of information exposed via this new API. RFC v2: - wrap the skb into an opaque structure (Jiri); - allow the serial number of be any length (Jiri & Andrew); - add driver name (Jonathan). Signed-off-by: Jakub Kicinski --- include/net/devlink.h | 18 ++++++ include/uapi/linux/devlink.h | 5 ++ net/core/devlink.c | 114 +++++++++++++++++++++++++++++++++++ 3 files changed, 137 insertions(+) diff --git a/include/net/devlink.h b/include/net/devlink.h index 67f4293bc970..d8d425028d55 100644 --- a/include/net/devlink.h +++ b/include/net/devlink.h @@ -420,6 +420,7 @@ enum devlink_param_generic_id { } struct devlink_region; +struct devlink_info_req; typedef void devlink_snapshot_data_dest_t(const void *data); @@ -475,6 +476,8 @@ struct devlink_ops { int (*eswitch_encap_mode_get)(struct devlink *devlink, u8 *p_encap_mode); int (*eswitch_encap_mode_set)(struct devlink *devlink, u8 encap_mode, struct netlink_ext_ack *extack); + int (*info_get)(struct devlink *devlink, struct devlink_info_req *req, + struct netlink_ext_ack *extack); }; static inline void *devlink_priv(struct devlink *devlink) @@ -583,6 +586,10 @@ u32 devlink_region_shapshot_id_get(struct devlink *devlink); int devlink_region_snapshot_create(struct devlink_region *region, u64 data_len, u8 *data, u32 snapshot_id, devlink_snapshot_data_dest_t *data_destructor); +int devlink_info_report_serial_number(struct devlink_info_req *req, + const char *sn); +int devlink_info_report_driver_name(struct devlink_info_req *req, + const char *name); #else @@ -844,6 +851,17 @@ devlink_region_snapshot_create(struct devlink_region *region, u64 data_len, return 0; } +static inline int +devlink_info_report_driver_name(struct devlink_info_req *req, const char *name) +{ + return 0; +} + +static inline int +devlink_info_report_serial_number(struct devlink_info_req *req, const char *sn) +{ + return 0; +} #endif #endif /* _NET_DEVLINK_H_ */ diff --git a/include/uapi/linux/devlink.h b/include/uapi/linux/devlink.h index 6e52d3660654..c4b5d923f59f 100644 --- a/include/uapi/linux/devlink.h +++ b/include/uapi/linux/devlink.h @@ -89,6 +89,8 @@ enum devlink_command { DEVLINK_CMD_REGION_DEL, DEVLINK_CMD_REGION_READ, + DEVLINK_CMD_INFO_GET, + /* add new commands above here */ __DEVLINK_CMD_MAX, DEVLINK_CMD_MAX = __DEVLINK_CMD_MAX - 1 @@ -285,6 +287,9 @@ enum devlink_attr { DEVLINK_ATTR_REGION_CHUNK_ADDR, /* u64 */ DEVLINK_ATTR_REGION_CHUNK_LEN, /* u64 */ + DEVLINK_ATTR_INFO_DRV_NAME, /* string */ + DEVLINK_ATTR_INFO_SERIAL_NUMBER, /* string */ + /* add new attributes above here, update the policy in devlink.c */ __DEVLINK_ATTR_MAX, diff --git a/net/core/devlink.c b/net/core/devlink.c index abb0da9d7b4b..844e086ff038 100644 --- a/net/core/devlink.c +++ b/net/core/devlink.c @@ -3597,6 +3597,112 @@ static int devlink_nl_cmd_region_read_dumpit(struct sk_buff *skb, return 0; } +struct devlink_info_req { + struct sk_buff *msg; +}; + +int devlink_info_report_driver_name(struct devlink_info_req *req, + const char *name) +{ + return nla_put_string(req->msg, DEVLINK_ATTR_INFO_DRV_NAME, name); +} +EXPORT_SYMBOL_GPL(devlink_info_report_driver_name); + +int devlink_info_report_serial_number(struct devlink_info_req *req, + const char *sn) +{ + return nla_put_string(req->msg, DEVLINK_ATTR_INFO_SERIAL_NUMBER, sn); +} +EXPORT_SYMBOL_GPL(devlink_info_report_serial_number); + +static int +devlink_nl_info_fill(struct sk_buff *msg, struct devlink *devlink, + enum devlink_command cmd, u32 portid, + u32 seq, int flags, struct netlink_ext_ack *extack) +{ + struct devlink_info_req req; + void *hdr; + int err; + + hdr = genlmsg_put(msg, portid, seq, &devlink_nl_family, flags, cmd); + if (!hdr) + return -EMSGSIZE; + + err = -EMSGSIZE; + if (devlink_nl_put_handle(msg, devlink)) + goto err_cancel_msg; + + req.msg = msg; + err = devlink->ops->info_get(devlink, &req, extack); + if (err) + goto err_cancel_msg; + + genlmsg_end(msg, hdr); + return 0; + +err_cancel_msg: + genlmsg_cancel(msg, hdr); + return err; +} + +static int devlink_nl_cmd_info_get_doit(struct sk_buff *skb, + struct genl_info *info) +{ + struct devlink *devlink = info->user_ptr[0]; + struct sk_buff *msg; + int err; + + if (!devlink->ops || !devlink->ops->info_get) + return -EOPNOTSUPP; + + msg = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL); + if (!msg) + return -ENOMEM; + + err = devlink_nl_info_fill(msg, devlink, DEVLINK_CMD_INFO_GET, + info->snd_portid, info->snd_seq, 0, + info->extack); + if (err) { + nlmsg_free(msg); + return err; + } + + return genlmsg_reply(msg, info); +} + +static int devlink_nl_cmd_info_get_dumpit(struct sk_buff *msg, + struct netlink_callback *cb) +{ + struct devlink *devlink; + int start = cb->args[0]; + int idx = 0; + int err; + + mutex_lock(&devlink_mutex); + list_for_each_entry(devlink, &devlink_list, list) { + if (!net_eq(devlink_net(devlink), sock_net(msg->sk))) + continue; + if (idx < start) { + idx++; + continue; + } + + mutex_lock(&devlink->lock); + err = devlink_nl_info_fill(msg, devlink, DEVLINK_CMD_INFO_GET, + NETLINK_CB(cb->skb).portid, + cb->nlh->nlmsg_seq, NLM_F_MULTI, + cb->extack); + mutex_unlock(&devlink->lock); + if (err) + break; + idx++; + } + mutex_unlock(&devlink_mutex); + + cb->args[0] = idx; + return msg->len; +} + static const struct nla_policy devlink_nl_policy[DEVLINK_ATTR_MAX + 1] = { [DEVLINK_ATTR_BUS_NAME] = { .type = NLA_NUL_STRING }, [DEVLINK_ATTR_DEV_NAME] = { .type = NLA_NUL_STRING }, @@ -3842,6 +3948,14 @@ static const struct genl_ops devlink_nl_ops[] = { .flags = GENL_ADMIN_PERM, .internal_flags = DEVLINK_NL_FLAG_NEED_DEVLINK, }, + { + .cmd = DEVLINK_CMD_INFO_GET, + .doit = devlink_nl_cmd_info_get_doit, + .dumpit = devlink_nl_cmd_info_get_dumpit, + .policy = devlink_nl_policy, + .internal_flags = DEVLINK_NL_FLAG_NEED_DEVLINK, + /* can be retrieved by unprivileged users */ + }, }; static struct genl_family devlink_nl_family __ro_after_init = {