sock_diag.c 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169
  1. #include <linux/mutex.h>
  2. #include <linux/socket.h>
  3. #include <linux/skbuff.h>
  4. #include <net/netlink.h>
  5. #include <net/net_namespace.h>
  6. #include <linux/module.h>
  7. #include <linux/inet_diag.h>
  8. #include <linux/sock_diag.h>
  9. static struct sock_diag_handler *sock_diag_handlers[AF_MAX];
  10. static int (*inet_rcv_compat)(struct sk_buff *skb, struct nlmsghdr *nlh);
  11. static DEFINE_MUTEX(sock_diag_table_mutex);
  12. int sock_diag_check_cookie(void *sk, __u32 *cookie)
  13. {
  14. if ((cookie[0] != INET_DIAG_NOCOOKIE ||
  15. cookie[1] != INET_DIAG_NOCOOKIE) &&
  16. ((u32)(unsigned long)sk != cookie[0] ||
  17. (u32)((((unsigned long)sk) >> 31) >> 1) != cookie[1]))
  18. return -ESTALE;
  19. else
  20. return 0;
  21. }
  22. EXPORT_SYMBOL_GPL(sock_diag_check_cookie);
  23. void sock_diag_save_cookie(void *sk, __u32 *cookie)
  24. {
  25. cookie[0] = (u32)(unsigned long)sk;
  26. cookie[1] = (u32)(((unsigned long)sk >> 31) >> 1);
  27. }
  28. EXPORT_SYMBOL_GPL(sock_diag_save_cookie);
  29. void sock_diag_register_inet_compat(int (*fn)(struct sk_buff *skb, struct nlmsghdr *nlh))
  30. {
  31. mutex_lock(&sock_diag_table_mutex);
  32. inet_rcv_compat = fn;
  33. mutex_unlock(&sock_diag_table_mutex);
  34. }
  35. EXPORT_SYMBOL_GPL(sock_diag_register_inet_compat);
  36. void sock_diag_unregister_inet_compat(int (*fn)(struct sk_buff *skb, struct nlmsghdr *nlh))
  37. {
  38. mutex_lock(&sock_diag_table_mutex);
  39. inet_rcv_compat = NULL;
  40. mutex_unlock(&sock_diag_table_mutex);
  41. }
  42. EXPORT_SYMBOL_GPL(sock_diag_unregister_inet_compat);
  43. int sock_diag_register(struct sock_diag_handler *hndl)
  44. {
  45. int err = 0;
  46. if (hndl->family >= AF_MAX)
  47. return -EINVAL;
  48. mutex_lock(&sock_diag_table_mutex);
  49. if (sock_diag_handlers[hndl->family])
  50. err = -EBUSY;
  51. else
  52. sock_diag_handlers[hndl->family] = hndl;
  53. mutex_unlock(&sock_diag_table_mutex);
  54. return err;
  55. }
  56. EXPORT_SYMBOL_GPL(sock_diag_register);
  57. void sock_diag_unregister(struct sock_diag_handler *hnld)
  58. {
  59. int family = hnld->family;
  60. if (family >= AF_MAX)
  61. return;
  62. mutex_lock(&sock_diag_table_mutex);
  63. BUG_ON(sock_diag_handlers[family] != hnld);
  64. sock_diag_handlers[family] = NULL;
  65. mutex_unlock(&sock_diag_table_mutex);
  66. }
  67. EXPORT_SYMBOL_GPL(sock_diag_unregister);
  68. static inline struct sock_diag_handler *sock_diag_lock_handler(int family)
  69. {
  70. if (sock_diag_handlers[family] == NULL)
  71. request_module("net-pf-%d-proto-%d-type-%d", PF_NETLINK,
  72. NETLINK_SOCK_DIAG, family);
  73. mutex_lock(&sock_diag_table_mutex);
  74. return sock_diag_handlers[family];
  75. }
  76. static inline void sock_diag_unlock_handler(struct sock_diag_handler *h)
  77. {
  78. mutex_unlock(&sock_diag_table_mutex);
  79. }
  80. static int __sock_diag_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
  81. {
  82. int err;
  83. struct sock_diag_req *req = NLMSG_DATA(nlh);
  84. struct sock_diag_handler *hndl;
  85. if (nlmsg_len(nlh) < sizeof(*req))
  86. return -EINVAL;
  87. hndl = sock_diag_lock_handler(req->sdiag_family);
  88. if (hndl == NULL)
  89. err = -ENOENT;
  90. else
  91. err = hndl->dump(skb, nlh);
  92. sock_diag_unlock_handler(hndl);
  93. return err;
  94. }
  95. static int sock_diag_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
  96. {
  97. int ret;
  98. switch (nlh->nlmsg_type) {
  99. case TCPDIAG_GETSOCK:
  100. case DCCPDIAG_GETSOCK:
  101. if (inet_rcv_compat == NULL)
  102. request_module("net-pf-%d-proto-%d-type-%d", PF_NETLINK,
  103. NETLINK_SOCK_DIAG, AF_INET);
  104. mutex_lock(&sock_diag_table_mutex);
  105. if (inet_rcv_compat != NULL)
  106. ret = inet_rcv_compat(skb, nlh);
  107. else
  108. ret = -EOPNOTSUPP;
  109. mutex_unlock(&sock_diag_table_mutex);
  110. return ret;
  111. case SOCK_DIAG_BY_FAMILY:
  112. return __sock_diag_rcv_msg(skb, nlh);
  113. default:
  114. return -EINVAL;
  115. }
  116. }
  117. static DEFINE_MUTEX(sock_diag_mutex);
  118. static void sock_diag_rcv(struct sk_buff *skb)
  119. {
  120. mutex_lock(&sock_diag_mutex);
  121. netlink_rcv_skb(skb, &sock_diag_rcv_msg);
  122. mutex_unlock(&sock_diag_mutex);
  123. }
  124. struct sock *sock_diag_nlsk;
  125. EXPORT_SYMBOL_GPL(sock_diag_nlsk);
  126. static int __init sock_diag_init(void)
  127. {
  128. sock_diag_nlsk = netlink_kernel_create(&init_net, NETLINK_SOCK_DIAG, 0,
  129. sock_diag_rcv, NULL, THIS_MODULE);
  130. return sock_diag_nlsk == NULL ? -ENOMEM : 0;
  131. }
  132. static void __exit sock_diag_exit(void)
  133. {
  134. netlink_kernel_release(sock_diag_nlsk);
  135. }
  136. module_init(sock_diag_init);
  137. module_exit(sock_diag_exit);
  138. MODULE_LICENSE("GPL");
  139. MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_SOCK_DIAG);