Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v4.16-rc4 339 lines 8.1 kB view raw
1/* License: GPL */ 2 3#include <linux/mutex.h> 4#include <linux/socket.h> 5#include <linux/skbuff.h> 6#include <net/netlink.h> 7#include <net/net_namespace.h> 8#include <linux/module.h> 9#include <net/sock.h> 10#include <linux/kernel.h> 11#include <linux/tcp.h> 12#include <linux/workqueue.h> 13 14#include <linux/inet_diag.h> 15#include <linux/sock_diag.h> 16 17static const struct sock_diag_handler *sock_diag_handlers[AF_MAX]; 18static int (*inet_rcv_compat)(struct sk_buff *skb, struct nlmsghdr *nlh); 19static DEFINE_MUTEX(sock_diag_table_mutex); 20static struct workqueue_struct *broadcast_wq; 21 22u64 sock_gen_cookie(struct sock *sk) 23{ 24 while (1) { 25 u64 res = atomic64_read(&sk->sk_cookie); 26 27 if (res) 28 return res; 29 res = atomic64_inc_return(&sock_net(sk)->cookie_gen); 30 atomic64_cmpxchg(&sk->sk_cookie, 0, res); 31 } 32} 33 34int sock_diag_check_cookie(struct sock *sk, const __u32 *cookie) 35{ 36 u64 res; 37 38 if (cookie[0] == INET_DIAG_NOCOOKIE && cookie[1] == INET_DIAG_NOCOOKIE) 39 return 0; 40 41 res = sock_gen_cookie(sk); 42 if ((u32)res != cookie[0] || (u32)(res >> 32) != cookie[1]) 43 return -ESTALE; 44 45 return 0; 46} 47EXPORT_SYMBOL_GPL(sock_diag_check_cookie); 48 49void sock_diag_save_cookie(struct sock *sk, __u32 *cookie) 50{ 51 u64 res = sock_gen_cookie(sk); 52 53 cookie[0] = (u32)res; 54 cookie[1] = (u32)(res >> 32); 55} 56EXPORT_SYMBOL_GPL(sock_diag_save_cookie); 57 58int sock_diag_put_meminfo(struct sock *sk, struct sk_buff *skb, int attrtype) 59{ 60 u32 mem[SK_MEMINFO_VARS]; 61 62 sk_get_meminfo(sk, mem); 63 64 return nla_put(skb, attrtype, sizeof(mem), &mem); 65} 66EXPORT_SYMBOL_GPL(sock_diag_put_meminfo); 67 68int sock_diag_put_filterinfo(bool may_report_filterinfo, struct sock *sk, 69 struct sk_buff *skb, int attrtype) 70{ 71 struct sock_fprog_kern *fprog; 72 struct sk_filter *filter; 73 struct nlattr *attr; 74 unsigned int flen; 75 int err = 0; 76 77 if (!may_report_filterinfo) { 78 nla_reserve(skb, attrtype, 0); 79 return 0; 80 } 81 82 rcu_read_lock(); 83 filter = rcu_dereference(sk->sk_filter); 84 if (!filter) 85 goto out; 86 87 fprog = filter->prog->orig_prog; 88 if (!fprog) 89 goto out; 90 91 flen = bpf_classic_proglen(fprog); 92 93 attr = nla_reserve(skb, attrtype, flen); 94 if (attr == NULL) { 95 err = -EMSGSIZE; 96 goto out; 97 } 98 99 memcpy(nla_data(attr), fprog->filter, flen); 100out: 101 rcu_read_unlock(); 102 return err; 103} 104EXPORT_SYMBOL(sock_diag_put_filterinfo); 105 106struct broadcast_sk { 107 struct sock *sk; 108 struct work_struct work; 109}; 110 111static size_t sock_diag_nlmsg_size(void) 112{ 113 return NLMSG_ALIGN(sizeof(struct inet_diag_msg) 114 + nla_total_size(sizeof(u8)) /* INET_DIAG_PROTOCOL */ 115 + nla_total_size_64bit(sizeof(struct tcp_info))); /* INET_DIAG_INFO */ 116} 117 118static void sock_diag_broadcast_destroy_work(struct work_struct *work) 119{ 120 struct broadcast_sk *bsk = 121 container_of(work, struct broadcast_sk, work); 122 struct sock *sk = bsk->sk; 123 const struct sock_diag_handler *hndl; 124 struct sk_buff *skb; 125 const enum sknetlink_groups group = sock_diag_destroy_group(sk); 126 int err = -1; 127 128 WARN_ON(group == SKNLGRP_NONE); 129 130 skb = nlmsg_new(sock_diag_nlmsg_size(), GFP_KERNEL); 131 if (!skb) 132 goto out; 133 134 mutex_lock(&sock_diag_table_mutex); 135 hndl = sock_diag_handlers[sk->sk_family]; 136 if (hndl && hndl->get_info) 137 err = hndl->get_info(skb, sk); 138 mutex_unlock(&sock_diag_table_mutex); 139 140 if (!err) 141 nlmsg_multicast(sock_net(sk)->diag_nlsk, skb, 0, group, 142 GFP_KERNEL); 143 else 144 kfree_skb(skb); 145out: 146 sk_destruct(sk); 147 kfree(bsk); 148} 149 150void sock_diag_broadcast_destroy(struct sock *sk) 151{ 152 /* Note, this function is often called from an interrupt context. */ 153 struct broadcast_sk *bsk = 154 kmalloc(sizeof(struct broadcast_sk), GFP_ATOMIC); 155 if (!bsk) 156 return sk_destruct(sk); 157 bsk->sk = sk; 158 INIT_WORK(&bsk->work, sock_diag_broadcast_destroy_work); 159 queue_work(broadcast_wq, &bsk->work); 160} 161 162void sock_diag_register_inet_compat(int (*fn)(struct sk_buff *skb, struct nlmsghdr *nlh)) 163{ 164 mutex_lock(&sock_diag_table_mutex); 165 inet_rcv_compat = fn; 166 mutex_unlock(&sock_diag_table_mutex); 167} 168EXPORT_SYMBOL_GPL(sock_diag_register_inet_compat); 169 170void sock_diag_unregister_inet_compat(int (*fn)(struct sk_buff *skb, struct nlmsghdr *nlh)) 171{ 172 mutex_lock(&sock_diag_table_mutex); 173 inet_rcv_compat = NULL; 174 mutex_unlock(&sock_diag_table_mutex); 175} 176EXPORT_SYMBOL_GPL(sock_diag_unregister_inet_compat); 177 178int sock_diag_register(const struct sock_diag_handler *hndl) 179{ 180 int err = 0; 181 182 if (hndl->family >= AF_MAX) 183 return -EINVAL; 184 185 mutex_lock(&sock_diag_table_mutex); 186 if (sock_diag_handlers[hndl->family]) 187 err = -EBUSY; 188 else 189 sock_diag_handlers[hndl->family] = hndl; 190 mutex_unlock(&sock_diag_table_mutex); 191 192 return err; 193} 194EXPORT_SYMBOL_GPL(sock_diag_register); 195 196void sock_diag_unregister(const struct sock_diag_handler *hnld) 197{ 198 int family = hnld->family; 199 200 if (family >= AF_MAX) 201 return; 202 203 mutex_lock(&sock_diag_table_mutex); 204 BUG_ON(sock_diag_handlers[family] != hnld); 205 sock_diag_handlers[family] = NULL; 206 mutex_unlock(&sock_diag_table_mutex); 207} 208EXPORT_SYMBOL_GPL(sock_diag_unregister); 209 210static int __sock_diag_cmd(struct sk_buff *skb, struct nlmsghdr *nlh) 211{ 212 int err; 213 struct sock_diag_req *req = nlmsg_data(nlh); 214 const struct sock_diag_handler *hndl; 215 216 if (nlmsg_len(nlh) < sizeof(*req)) 217 return -EINVAL; 218 219 if (req->sdiag_family >= AF_MAX) 220 return -EINVAL; 221 222 if (sock_diag_handlers[req->sdiag_family] == NULL) 223 request_module("net-pf-%d-proto-%d-type-%d", PF_NETLINK, 224 NETLINK_SOCK_DIAG, req->sdiag_family); 225 226 mutex_lock(&sock_diag_table_mutex); 227 hndl = sock_diag_handlers[req->sdiag_family]; 228 if (hndl == NULL) 229 err = -ENOENT; 230 else if (nlh->nlmsg_type == SOCK_DIAG_BY_FAMILY) 231 err = hndl->dump(skb, nlh); 232 else if (nlh->nlmsg_type == SOCK_DESTROY && hndl->destroy) 233 err = hndl->destroy(skb, nlh); 234 else 235 err = -EOPNOTSUPP; 236 mutex_unlock(&sock_diag_table_mutex); 237 238 return err; 239} 240 241static int sock_diag_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh, 242 struct netlink_ext_ack *extack) 243{ 244 int ret; 245 246 switch (nlh->nlmsg_type) { 247 case TCPDIAG_GETSOCK: 248 case DCCPDIAG_GETSOCK: 249 if (inet_rcv_compat == NULL) 250 request_module("net-pf-%d-proto-%d-type-%d", PF_NETLINK, 251 NETLINK_SOCK_DIAG, AF_INET); 252 253 mutex_lock(&sock_diag_table_mutex); 254 if (inet_rcv_compat != NULL) 255 ret = inet_rcv_compat(skb, nlh); 256 else 257 ret = -EOPNOTSUPP; 258 mutex_unlock(&sock_diag_table_mutex); 259 260 return ret; 261 case SOCK_DIAG_BY_FAMILY: 262 case SOCK_DESTROY: 263 return __sock_diag_cmd(skb, nlh); 264 default: 265 return -EINVAL; 266 } 267} 268 269static DEFINE_MUTEX(sock_diag_mutex); 270 271static void sock_diag_rcv(struct sk_buff *skb) 272{ 273 mutex_lock(&sock_diag_mutex); 274 netlink_rcv_skb(skb, &sock_diag_rcv_msg); 275 mutex_unlock(&sock_diag_mutex); 276} 277 278static int sock_diag_bind(struct net *net, int group) 279{ 280 switch (group) { 281 case SKNLGRP_INET_TCP_DESTROY: 282 case SKNLGRP_INET_UDP_DESTROY: 283 if (!sock_diag_handlers[AF_INET]) 284 request_module("net-pf-%d-proto-%d-type-%d", PF_NETLINK, 285 NETLINK_SOCK_DIAG, AF_INET); 286 break; 287 case SKNLGRP_INET6_TCP_DESTROY: 288 case SKNLGRP_INET6_UDP_DESTROY: 289 if (!sock_diag_handlers[AF_INET6]) 290 request_module("net-pf-%d-proto-%d-type-%d", PF_NETLINK, 291 NETLINK_SOCK_DIAG, AF_INET6); 292 break; 293 } 294 return 0; 295} 296 297int sock_diag_destroy(struct sock *sk, int err) 298{ 299 if (!ns_capable(sock_net(sk)->user_ns, CAP_NET_ADMIN)) 300 return -EPERM; 301 302 if (!sk->sk_prot->diag_destroy) 303 return -EOPNOTSUPP; 304 305 return sk->sk_prot->diag_destroy(sk, err); 306} 307EXPORT_SYMBOL_GPL(sock_diag_destroy); 308 309static int __net_init diag_net_init(struct net *net) 310{ 311 struct netlink_kernel_cfg cfg = { 312 .groups = SKNLGRP_MAX, 313 .input = sock_diag_rcv, 314 .bind = sock_diag_bind, 315 .flags = NL_CFG_F_NONROOT_RECV, 316 }; 317 318 net->diag_nlsk = netlink_kernel_create(net, NETLINK_SOCK_DIAG, &cfg); 319 return net->diag_nlsk == NULL ? -ENOMEM : 0; 320} 321 322static void __net_exit diag_net_exit(struct net *net) 323{ 324 netlink_kernel_release(net->diag_nlsk); 325 net->diag_nlsk = NULL; 326} 327 328static struct pernet_operations diag_net_ops = { 329 .init = diag_net_init, 330 .exit = diag_net_exit, 331}; 332 333static int __init sock_diag_init(void) 334{ 335 broadcast_wq = alloc_workqueue("sock_diag_events", 0, 0); 336 BUG_ON(!broadcast_wq); 337 return register_pernet_subsys(&diag_net_ops); 338} 339device_initcall(sock_diag_init);