net: replace NIPQUAD() in net/ipv4/ net/ipv6/
[deliverable/linux.git] / net / ipv4 / inet_diag.c
CommitLineData
1da177e4 1/*
73c1f4a0 2 * inet_diag.c Module for monitoring INET transport protocols sockets.
1da177e4 3 *
1da177e4
LT
4 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 */
11
172589cc 12#include <linux/kernel.h>
1da177e4
LT
13#include <linux/module.h>
14#include <linux/types.h>
15#include <linux/fcntl.h>
16#include <linux/random.h>
17#include <linux/cache.h>
18#include <linux/init.h>
19#include <linux/time.h>
20
21#include <net/icmp.h>
22#include <net/tcp.h>
23#include <net/ipv6.h>
24#include <net/inet_common.h>
505cbfc5
ACM
25#include <net/inet_connection_sock.h>
26#include <net/inet_hashtables.h>
27#include <net/inet_timewait_sock.h>
28#include <net/inet6_hashtables.h>
dc5fc579 29#include <net/netlink.h>
1da177e4
LT
30
31#include <linux/inet.h>
32#include <linux/stddef.h>
33
a8c2190e 34#include <linux/inet_diag.h>
1da177e4 35
4f5736c4
ACM
36static const struct inet_diag_handler **inet_diag_table;
37
73c1f4a0 38struct inet_diag_entry {
9f855299
AV
39 __be32 *saddr;
40 __be32 *daddr;
1da177e4
LT
41 u16 sport;
42 u16 dport;
43 u16 family;
44 u16 userlocks;
45};
46
73c1f4a0 47static struct sock *idiagnl;
1da177e4 48
73c1f4a0 49#define INET_DIAG_PUT(skb, attrtype, attrlen) \
7c99c909 50 RTA_DATA(__RTA_PUT(skb, attrtype, attrlen))
1da177e4 51
d523a328
HX
52static DEFINE_MUTEX(inet_diag_table_mutex);
53
54static const struct inet_diag_handler *inet_diag_lock_handler(int type)
55{
d523a328
HX
56 if (!inet_diag_table[type])
57 request_module("net-pf-%d-proto-%d-type-%d", PF_NETLINK,
58 NETLINK_INET_DIAG, type);
d523a328
HX
59
60 mutex_lock(&inet_diag_table_mutex);
61 if (!inet_diag_table[type])
62 return ERR_PTR(-ENOENT);
63
64 return inet_diag_table[type];
65}
66
67static inline void inet_diag_unlock_handler(
68 const struct inet_diag_handler *handler)
69{
70 mutex_unlock(&inet_diag_table_mutex);
71}
72
dff2c035
ACM
73static int inet_csk_diag_fill(struct sock *sk,
74 struct sk_buff *skb,
75 int ext, u32 pid, u32 seq, u16 nlmsg_flags,
76 const struct nlmsghdr *unlh)
1da177e4 77{
463c84b9 78 const struct inet_sock *inet = inet_sk(sk);
463c84b9 79 const struct inet_connection_sock *icsk = inet_csk(sk);
73c1f4a0 80 struct inet_diag_msg *r;
1da177e4 81 struct nlmsghdr *nlh;
4f5736c4 82 void *info = NULL;
73c1f4a0 83 struct inet_diag_meminfo *minfo = NULL;
27a884dc 84 unsigned char *b = skb_tail_pointer(skb);
4f5736c4
ACM
85 const struct inet_diag_handler *handler;
86
87 handler = inet_diag_table[unlh->nlmsg_type];
88 BUG_ON(handler == NULL);
1da177e4 89
540722ff 90 nlh = NLMSG_PUT(skb, pid, seq, unlh->nlmsg_type, sizeof(*r));
1da177e4 91 nlh->nlmsg_flags = nlmsg_flags;
4f5736c4 92
1da177e4 93 r = NLMSG_DATA(nlh);
c7d58aab
ACM
94 BUG_ON(sk->sk_state == TCP_TIME_WAIT);
95
96 if (ext & (1 << (INET_DIAG_MEMINFO - 1)))
97 minfo = INET_DIAG_PUT(skb, INET_DIAG_MEMINFO, sizeof(*minfo));
98
99 if (ext & (1 << (INET_DIAG_INFO - 1)))
100 info = INET_DIAG_PUT(skb, INET_DIAG_INFO,
101 handler->idiag_info_size);
102
103 if ((ext & (1 << (INET_DIAG_CONG - 1))) && icsk->icsk_ca_ops) {
104 const size_t len = strlen(icsk->icsk_ca_ops->name);
105
106 strcpy(INET_DIAG_PUT(skb, INET_DIAG_CONG, len + 1),
107 icsk->icsk_ca_ops->name);
1da177e4 108 }
c7d58aab 109
73c1f4a0
ACM
110 r->idiag_family = sk->sk_family;
111 r->idiag_state = sk->sk_state;
112 r->idiag_timer = 0;
113 r->idiag_retrans = 0;
1da177e4 114
73c1f4a0
ACM
115 r->id.idiag_if = sk->sk_bound_dev_if;
116 r->id.idiag_cookie[0] = (u32)(unsigned long)sk;
117 r->id.idiag_cookie[1] = (u32)(((unsigned long)sk >> 31) >> 1);
1da177e4 118
73c1f4a0
ACM
119 r->id.idiag_sport = inet->sport;
120 r->id.idiag_dport = inet->dport;
121 r->id.idiag_src[0] = inet->rcv_saddr;
122 r->id.idiag_dst[0] = inet->daddr;
1da177e4 123
505cbfc5 124#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
73c1f4a0 125 if (r->idiag_family == AF_INET6) {
1da177e4
LT
126 struct ipv6_pinfo *np = inet6_sk(sk);
127
73c1f4a0 128 ipv6_addr_copy((struct in6_addr *)r->id.idiag_src,
1da177e4 129 &np->rcv_saddr);
73c1f4a0 130 ipv6_addr_copy((struct in6_addr *)r->id.idiag_dst,
1da177e4
LT
131 &np->daddr);
132 }
133#endif
134
172589cc 135#define EXPIRES_IN_MS(tmo) DIV_ROUND_UP((tmo - jiffies) * 1000, HZ)
1da177e4 136
463c84b9 137 if (icsk->icsk_pending == ICSK_TIME_RETRANS) {
73c1f4a0
ACM
138 r->idiag_timer = 1;
139 r->idiag_retrans = icsk->icsk_retransmits;
140 r->idiag_expires = EXPIRES_IN_MS(icsk->icsk_timeout);
463c84b9 141 } else if (icsk->icsk_pending == ICSK_TIME_PROBE0) {
73c1f4a0
ACM
142 r->idiag_timer = 4;
143 r->idiag_retrans = icsk->icsk_probes_out;
144 r->idiag_expires = EXPIRES_IN_MS(icsk->icsk_timeout);
1da177e4 145 } else if (timer_pending(&sk->sk_timer)) {
73c1f4a0
ACM
146 r->idiag_timer = 2;
147 r->idiag_retrans = icsk->icsk_probes_out;
148 r->idiag_expires = EXPIRES_IN_MS(sk->sk_timer.expires);
1da177e4 149 } else {
73c1f4a0
ACM
150 r->idiag_timer = 0;
151 r->idiag_expires = 0;
1da177e4
LT
152 }
153#undef EXPIRES_IN_MS
540722ff 154
73c1f4a0
ACM
155 r->idiag_uid = sock_i_uid(sk);
156 r->idiag_inode = sock_i_ino(sk);
1da177e4
LT
157
158 if (minfo) {
73c1f4a0
ACM
159 minfo->idiag_rmem = atomic_read(&sk->sk_rmem_alloc);
160 minfo->idiag_wmem = sk->sk_wmem_queued;
161 minfo->idiag_fmem = sk->sk_forward_alloc;
162 minfo->idiag_tmem = atomic_read(&sk->sk_wmem_alloc);
1da177e4
LT
163 }
164
4f5736c4 165 handler->idiag_get_info(sk, r, info);
1da177e4 166
6687e988
ACM
167 if (sk->sk_state < TCP_TIME_WAIT &&
168 icsk->icsk_ca_ops && icsk->icsk_ca_ops->get_info)
169 icsk->icsk_ca_ops->get_info(sk, ext, skb);
1da177e4 170
27a884dc 171 nlh->nlmsg_len = skb_tail_pointer(skb) - b;
1da177e4
LT
172 return skb->len;
173
7c99c909 174rtattr_failure:
1da177e4 175nlmsg_failure:
dc5fc579 176 nlmsg_trim(skb, b);
26932566 177 return -EMSGSIZE;
1da177e4
LT
178}
179
c7d58aab
ACM
180static int inet_twsk_diag_fill(struct inet_timewait_sock *tw,
181 struct sk_buff *skb, int ext, u32 pid,
182 u32 seq, u16 nlmsg_flags,
183 const struct nlmsghdr *unlh)
184{
185 long tmo;
186 struct inet_diag_msg *r;
27a884dc 187 const unsigned char *previous_tail = skb_tail_pointer(skb);
c7d58aab
ACM
188 struct nlmsghdr *nlh = NLMSG_PUT(skb, pid, seq,
189 unlh->nlmsg_type, sizeof(*r));
190
191 r = NLMSG_DATA(nlh);
192 BUG_ON(tw->tw_state != TCP_TIME_WAIT);
193
194 nlh->nlmsg_flags = nlmsg_flags;
195
196 tmo = tw->tw_ttd - jiffies;
197 if (tmo < 0)
198 tmo = 0;
199
200 r->idiag_family = tw->tw_family;
201 r->idiag_state = tw->tw_state;
202 r->idiag_timer = 0;
203 r->idiag_retrans = 0;
204 r->id.idiag_if = tw->tw_bound_dev_if;
205 r->id.idiag_cookie[0] = (u32)(unsigned long)tw;
206 r->id.idiag_cookie[1] = (u32)(((unsigned long)tw >> 31) >> 1);
207 r->id.idiag_sport = tw->tw_sport;
208 r->id.idiag_dport = tw->tw_dport;
209 r->id.idiag_src[0] = tw->tw_rcv_saddr;
210 r->id.idiag_dst[0] = tw->tw_daddr;
211 r->idiag_state = tw->tw_substate;
212 r->idiag_timer = 3;
172589cc 213 r->idiag_expires = DIV_ROUND_UP(tmo * 1000, HZ);
c7d58aab
ACM
214 r->idiag_rqueue = 0;
215 r->idiag_wqueue = 0;
216 r->idiag_uid = 0;
217 r->idiag_inode = 0;
218#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
219 if (tw->tw_family == AF_INET6) {
220 const struct inet6_timewait_sock *tw6 =
221 inet6_twsk((struct sock *)tw);
222
223 ipv6_addr_copy((struct in6_addr *)r->id.idiag_src,
224 &tw6->tw_v6_rcv_saddr);
225 ipv6_addr_copy((struct in6_addr *)r->id.idiag_dst,
226 &tw6->tw_v6_daddr);
227 }
228#endif
27a884dc 229 nlh->nlmsg_len = skb_tail_pointer(skb) - previous_tail;
c7d58aab
ACM
230 return skb->len;
231nlmsg_failure:
dc5fc579 232 nlmsg_trim(skb, previous_tail);
26932566 233 return -EMSGSIZE;
c7d58aab
ACM
234}
235
dff2c035
ACM
236static int sk_diag_fill(struct sock *sk, struct sk_buff *skb,
237 int ext, u32 pid, u32 seq, u16 nlmsg_flags,
238 const struct nlmsghdr *unlh)
239{
240 if (sk->sk_state == TCP_TIME_WAIT)
241 return inet_twsk_diag_fill((struct inet_timewait_sock *)sk,
242 skb, ext, pid, seq, nlmsg_flags,
243 unlh);
244 return inet_csk_diag_fill(sk, skb, ext, pid, seq, nlmsg_flags, unlh);
245}
246
4e852c02
ACM
247static int inet_diag_get_exact(struct sk_buff *in_skb,
248 const struct nlmsghdr *nlh)
1da177e4
LT
249{
250 int err;
251 struct sock *sk;
73c1f4a0 252 struct inet_diag_req *req = NLMSG_DATA(nlh);
1da177e4 253 struct sk_buff *rep;
4f5736c4
ACM
254 struct inet_hashinfo *hashinfo;
255 const struct inet_diag_handler *handler;
256
d523a328 257 handler = inet_diag_lock_handler(nlh->nlmsg_type);
8cf8e5a6
ACM
258 if (IS_ERR(handler)) {
259 err = PTR_ERR(handler);
260 goto unlock;
261 }
d523a328 262
4f5736c4 263 hashinfo = handler->idiag_hashinfo;
d523a328 264 err = -EINVAL;
4f5736c4 265
73c1f4a0 266 if (req->idiag_family == AF_INET) {
c67499c0 267 sk = inet_lookup(&init_net, hashinfo, req->id.idiag_dst[0],
73c1f4a0
ACM
268 req->id.idiag_dport, req->id.idiag_src[0],
269 req->id.idiag_sport, req->id.idiag_if);
1da177e4 270 }
505cbfc5 271#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
73c1f4a0 272 else if (req->idiag_family == AF_INET6) {
d86e0dac 273 sk = inet6_lookup(&init_net, hashinfo,
73c1f4a0
ACM
274 (struct in6_addr *)req->id.idiag_dst,
275 req->id.idiag_dport,
276 (struct in6_addr *)req->id.idiag_src,
277 req->id.idiag_sport,
278 req->id.idiag_if);
1da177e4
LT
279 }
280#endif
281 else {
d523a328 282 goto unlock;
1da177e4
LT
283 }
284
d523a328 285 err = -ENOENT;
1da177e4 286 if (sk == NULL)
d523a328 287 goto unlock;
1da177e4
LT
288
289 err = -ESTALE;
73c1f4a0
ACM
290 if ((req->id.idiag_cookie[0] != INET_DIAG_NOCOOKIE ||
291 req->id.idiag_cookie[1] != INET_DIAG_NOCOOKIE) &&
292 ((u32)(unsigned long)sk != req->id.idiag_cookie[0] ||
293 (u32)((((unsigned long)sk) >> 31) >> 1) != req->id.idiag_cookie[1]))
1da177e4
LT
294 goto out;
295
296 err = -ENOMEM;
73c1f4a0
ACM
297 rep = alloc_skb(NLMSG_SPACE((sizeof(struct inet_diag_msg) +
298 sizeof(struct inet_diag_meminfo) +
4f5736c4
ACM
299 handler->idiag_info_size + 64)),
300 GFP_KERNEL);
1da177e4
LT
301 if (!rep)
302 goto out;
303
26932566
PM
304 err = sk_diag_fill(sk, rep, req->idiag_ext,
305 NETLINK_CB(in_skb).pid,
306 nlh->nlmsg_seq, 0, nlh);
307 if (err < 0) {
308 WARN_ON(err == -EMSGSIZE);
309 kfree_skb(rep);
310 goto out;
311 }
73c1f4a0
ACM
312 err = netlink_unicast(idiagnl, rep, NETLINK_CB(in_skb).pid,
313 MSG_DONTWAIT);
1da177e4
LT
314 if (err > 0)
315 err = 0;
316
317out:
318 if (sk) {
319 if (sk->sk_state == TCP_TIME_WAIT)
8feaf0c0 320 inet_twsk_put((struct inet_timewait_sock *)sk);
1da177e4
LT
321 else
322 sock_put(sk);
323 }
d523a328
HX
324unlock:
325 inet_diag_unlock_handler(handler);
1da177e4
LT
326 return err;
327}
328
9f855299 329static int bitstring_match(const __be32 *a1, const __be32 *a2, int bits)
1da177e4
LT
330{
331 int words = bits >> 5;
332
333 bits &= 0x1f;
334
335 if (words) {
336 if (memcmp(a1, a2, words << 2))
337 return 0;
338 }
339 if (bits) {
9f855299
AV
340 __be32 w1, w2;
341 __be32 mask;
1da177e4
LT
342
343 w1 = a1[words];
344 w2 = a2[words];
345
346 mask = htonl((0xffffffff) << (32 - bits));
347
348 if ((w1 ^ w2) & mask)
349 return 0;
350 }
351
352 return 1;
353}
354
355
73c1f4a0 356static int inet_diag_bc_run(const void *bc, int len,
4e852c02 357 const struct inet_diag_entry *entry)
1da177e4
LT
358{
359 while (len > 0) {
360 int yes = 1;
73c1f4a0 361 const struct inet_diag_bc_op *op = bc;
1da177e4
LT
362
363 switch (op->code) {
73c1f4a0 364 case INET_DIAG_BC_NOP:
1da177e4 365 break;
73c1f4a0 366 case INET_DIAG_BC_JMP:
1da177e4
LT
367 yes = 0;
368 break;
73c1f4a0 369 case INET_DIAG_BC_S_GE:
1da177e4
LT
370 yes = entry->sport >= op[1].no;
371 break;
73c1f4a0 372 case INET_DIAG_BC_S_LE:
1da177e4
LT
373 yes = entry->dport <= op[1].no;
374 break;
73c1f4a0 375 case INET_DIAG_BC_D_GE:
1da177e4
LT
376 yes = entry->dport >= op[1].no;
377 break;
73c1f4a0 378 case INET_DIAG_BC_D_LE:
1da177e4
LT
379 yes = entry->dport <= op[1].no;
380 break;
73c1f4a0 381 case INET_DIAG_BC_AUTO:
1da177e4
LT
382 yes = !(entry->userlocks & SOCK_BINDPORT_LOCK);
383 break;
73c1f4a0 384 case INET_DIAG_BC_S_COND:
a8c2190e
ACM
385 case INET_DIAG_BC_D_COND: {
386 struct inet_diag_hostcond *cond;
9f855299 387 __be32 *addr;
1da177e4 388
a8c2190e 389 cond = (struct inet_diag_hostcond *)(op + 1);
1da177e4 390 if (cond->port != -1 &&
73c1f4a0 391 cond->port != (op->code == INET_DIAG_BC_S_COND ?
1da177e4
LT
392 entry->sport : entry->dport)) {
393 yes = 0;
394 break;
395 }
4e852c02 396
1da177e4
LT
397 if (cond->prefix_len == 0)
398 break;
399
73c1f4a0 400 if (op->code == INET_DIAG_BC_S_COND)
1da177e4
LT
401 addr = entry->saddr;
402 else
403 addr = entry->daddr;
404
4e852c02
ACM
405 if (bitstring_match(addr, cond->addr,
406 cond->prefix_len))
1da177e4
LT
407 break;
408 if (entry->family == AF_INET6 &&
409 cond->family == AF_INET) {
410 if (addr[0] == 0 && addr[1] == 0 &&
411 addr[2] == htonl(0xffff) &&
a8c2190e 412 bitstring_match(addr + 3, cond->addr,
e905a9ed 413 cond->prefix_len))
1da177e4
LT
414 break;
415 }
416 yes = 0;
417 break;
418 }
419 }
420
4e852c02 421 if (yes) {
1da177e4
LT
422 len -= op->yes;
423 bc += op->yes;
424 } else {
425 len -= op->no;
426 bc += op->no;
427 }
428 }
429 return (len == 0);
430}
431
432static int valid_cc(const void *bc, int len, int cc)
433{
434 while (len >= 0) {
73c1f4a0 435 const struct inet_diag_bc_op *op = bc;
1da177e4
LT
436
437 if (cc > len)
438 return 0;
439 if (cc == len)
440 return 1;
441 if (op->yes < 4)
442 return 0;
443 len -= op->yes;
444 bc += op->yes;
445 }
446 return 0;
447}
448
73c1f4a0 449static int inet_diag_bc_audit(const void *bytecode, int bytecode_len)
1da177e4
LT
450{
451 const unsigned char *bc = bytecode;
452 int len = bytecode_len;
453
454 while (len > 0) {
a8c2190e 455 struct inet_diag_bc_op *op = (struct inet_diag_bc_op *)bc;
1da177e4
LT
456
457//printk("BC: %d %d %d {%d} / %d\n", op->code, op->yes, op->no, op[1].no, len);
458 switch (op->code) {
73c1f4a0
ACM
459 case INET_DIAG_BC_AUTO:
460 case INET_DIAG_BC_S_COND:
461 case INET_DIAG_BC_D_COND:
462 case INET_DIAG_BC_S_GE:
463 case INET_DIAG_BC_S_LE:
464 case INET_DIAG_BC_D_GE:
465 case INET_DIAG_BC_D_LE:
a8c2190e 466 if (op->yes < 4 || op->yes > len + 4)
1da177e4 467 return -EINVAL;
73c1f4a0 468 case INET_DIAG_BC_JMP:
a8c2190e 469 if (op->no < 4 || op->no > len + 4)
1da177e4
LT
470 return -EINVAL;
471 if (op->no < len &&
a8c2190e 472 !valid_cc(bytecode, bytecode_len, len - op->no))
1da177e4
LT
473 return -EINVAL;
474 break;
73c1f4a0 475 case INET_DIAG_BC_NOP:
a8c2190e 476 if (op->yes < 4 || op->yes > len + 4)
1da177e4
LT
477 return -EINVAL;
478 break;
479 default:
480 return -EINVAL;
481 }
4e852c02 482 bc += op->yes;
1da177e4
LT
483 len -= op->yes;
484 }
485 return len == 0 ? 0 : -EINVAL;
486}
487
dff2c035
ACM
488static int inet_csk_diag_dump(struct sock *sk,
489 struct sk_buff *skb,
490 struct netlink_callback *cb)
1da177e4 491{
73c1f4a0 492 struct inet_diag_req *r = NLMSG_DATA(cb->nlh);
1da177e4
LT
493
494 if (cb->nlh->nlmsg_len > 4 + NLMSG_SPACE(sizeof(*r))) {
73c1f4a0 495 struct inet_diag_entry entry;
1da177e4
LT
496 struct rtattr *bc = (struct rtattr *)(r + 1);
497 struct inet_sock *inet = inet_sk(sk);
498
499 entry.family = sk->sk_family;
505cbfc5 500#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
1da177e4
LT
501 if (entry.family == AF_INET6) {
502 struct ipv6_pinfo *np = inet6_sk(sk);
503
504 entry.saddr = np->rcv_saddr.s6_addr32;
505 entry.daddr = np->daddr.s6_addr32;
506 } else
507#endif
508 {
509 entry.saddr = &inet->rcv_saddr;
510 entry.daddr = &inet->daddr;
511 }
512 entry.sport = inet->num;
513 entry.dport = ntohs(inet->dport);
514 entry.userlocks = sk->sk_userlocks;
515
73c1f4a0 516 if (!inet_diag_bc_run(RTA_DATA(bc), RTA_PAYLOAD(bc), &entry))
1da177e4
LT
517 return 0;
518 }
519
dff2c035
ACM
520 return inet_csk_diag_fill(sk, skb, r->idiag_ext,
521 NETLINK_CB(cb->skb).pid,
522 cb->nlh->nlmsg_seq, NLM_F_MULTI, cb->nlh);
1da177e4
LT
523}
524
c7d58aab
ACM
525static int inet_twsk_diag_dump(struct inet_timewait_sock *tw,
526 struct sk_buff *skb,
527 struct netlink_callback *cb)
528{
529 struct inet_diag_req *r = NLMSG_DATA(cb->nlh);
530
531 if (cb->nlh->nlmsg_len > 4 + NLMSG_SPACE(sizeof(*r))) {
532 struct inet_diag_entry entry;
533 struct rtattr *bc = (struct rtattr *)(r + 1);
534
535 entry.family = tw->tw_family;
536#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
537 if (tw->tw_family == AF_INET6) {
538 struct inet6_timewait_sock *tw6 =
539 inet6_twsk((struct sock *)tw);
540 entry.saddr = tw6->tw_v6_rcv_saddr.s6_addr32;
541 entry.daddr = tw6->tw_v6_daddr.s6_addr32;
542 } else
543#endif
544 {
545 entry.saddr = &tw->tw_rcv_saddr;
546 entry.daddr = &tw->tw_daddr;
547 }
548 entry.sport = tw->tw_num;
549 entry.dport = ntohs(tw->tw_dport);
e905a9ed 550 entry.userlocks = 0;
c7d58aab
ACM
551
552 if (!inet_diag_bc_run(RTA_DATA(bc), RTA_PAYLOAD(bc), &entry))
553 return 0;
554 }
555
556 return inet_twsk_diag_fill(tw, skb, r->idiag_ext,
557 NETLINK_CB(cb->skb).pid,
558 cb->nlh->nlmsg_seq, NLM_F_MULTI, cb->nlh);
559}
560
73c1f4a0 561static int inet_diag_fill_req(struct sk_buff *skb, struct sock *sk,
4e852c02
ACM
562 struct request_sock *req, u32 pid, u32 seq,
563 const struct nlmsghdr *unlh)
1da177e4 564{
2e6599cb 565 const struct inet_request_sock *ireq = inet_rsk(req);
1da177e4 566 struct inet_sock *inet = inet_sk(sk);
27a884dc 567 unsigned char *b = skb_tail_pointer(skb);
73c1f4a0 568 struct inet_diag_msg *r;
1da177e4
LT
569 struct nlmsghdr *nlh;
570 long tmo;
571
540722ff 572 nlh = NLMSG_PUT(skb, pid, seq, unlh->nlmsg_type, sizeof(*r));
1da177e4
LT
573 nlh->nlmsg_flags = NLM_F_MULTI;
574 r = NLMSG_DATA(nlh);
575
73c1f4a0
ACM
576 r->idiag_family = sk->sk_family;
577 r->idiag_state = TCP_SYN_RECV;
578 r->idiag_timer = 1;
579 r->idiag_retrans = req->retrans;
1da177e4 580
73c1f4a0
ACM
581 r->id.idiag_if = sk->sk_bound_dev_if;
582 r->id.idiag_cookie[0] = (u32)(unsigned long)req;
583 r->id.idiag_cookie[1] = (u32)(((unsigned long)req >> 31) >> 1);
1da177e4
LT
584
585 tmo = req->expires - jiffies;
586 if (tmo < 0)
587 tmo = 0;
588
73c1f4a0
ACM
589 r->id.idiag_sport = inet->sport;
590 r->id.idiag_dport = ireq->rmt_port;
591 r->id.idiag_src[0] = ireq->loc_addr;
592 r->id.idiag_dst[0] = ireq->rmt_addr;
593 r->idiag_expires = jiffies_to_msecs(tmo);
594 r->idiag_rqueue = 0;
595 r->idiag_wqueue = 0;
596 r->idiag_uid = sock_i_uid(sk);
597 r->idiag_inode = 0;
505cbfc5 598#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
73c1f4a0
ACM
599 if (r->idiag_family == AF_INET6) {
600 ipv6_addr_copy((struct in6_addr *)r->id.idiag_src,
ca304b61 601 &inet6_rsk(req)->loc_addr);
73c1f4a0 602 ipv6_addr_copy((struct in6_addr *)r->id.idiag_dst,
ca304b61 603 &inet6_rsk(req)->rmt_addr);
1da177e4
LT
604 }
605#endif
27a884dc 606 nlh->nlmsg_len = skb_tail_pointer(skb) - b;
1da177e4
LT
607
608 return skb->len;
609
610nlmsg_failure:
dc5fc579 611 nlmsg_trim(skb, b);
1da177e4
LT
612 return -1;
613}
614
73c1f4a0 615static int inet_diag_dump_reqs(struct sk_buff *skb, struct sock *sk,
4e852c02 616 struct netlink_callback *cb)
1da177e4 617{
73c1f4a0
ACM
618 struct inet_diag_entry entry;
619 struct inet_diag_req *r = NLMSG_DATA(cb->nlh);
463c84b9 620 struct inet_connection_sock *icsk = inet_csk(sk);
2ad69c55 621 struct listen_sock *lopt;
1da177e4
LT
622 struct rtattr *bc = NULL;
623 struct inet_sock *inet = inet_sk(sk);
624 int j, s_j;
625 int reqnum, s_reqnum;
626 int err = 0;
627
628 s_j = cb->args[3];
629 s_reqnum = cb->args[4];
630
631 if (s_j > 0)
632 s_j--;
633
634 entry.family = sk->sk_family;
635
463c84b9 636 read_lock_bh(&icsk->icsk_accept_queue.syn_wait_lock);
1da177e4 637
463c84b9 638 lopt = icsk->icsk_accept_queue.listen_opt;
1da177e4
LT
639 if (!lopt || !lopt->qlen)
640 goto out;
641
642 if (cb->nlh->nlmsg_len > 4 + NLMSG_SPACE(sizeof(*r))) {
643 bc = (struct rtattr *)(r + 1);
644 entry.sport = inet->num;
645 entry.userlocks = sk->sk_userlocks;
646 }
647
540722ff 648 for (j = s_j; j < lopt->nr_table_entries; j++) {
60236fdd 649 struct request_sock *req, *head = lopt->syn_table[j];
1da177e4
LT
650
651 reqnum = 0;
652 for (req = head; req; reqnum++, req = req->dl_next) {
2e6599cb
ACM
653 struct inet_request_sock *ireq = inet_rsk(req);
654
1da177e4
LT
655 if (reqnum < s_reqnum)
656 continue;
73c1f4a0
ACM
657 if (r->id.idiag_dport != ireq->rmt_port &&
658 r->id.idiag_dport)
1da177e4
LT
659 continue;
660
661 if (bc) {
662 entry.saddr =
505cbfc5 663#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
1da177e4 664 (entry.family == AF_INET6) ?
ca304b61 665 inet6_rsk(req)->loc_addr.s6_addr32 :
1da177e4 666#endif
2e6599cb 667 &ireq->loc_addr;
4e852c02 668 entry.daddr =
505cbfc5 669#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
1da177e4 670 (entry.family == AF_INET6) ?
ca304b61 671 inet6_rsk(req)->rmt_addr.s6_addr32 :
1da177e4 672#endif
2e6599cb
ACM
673 &ireq->rmt_addr;
674 entry.dport = ntohs(ireq->rmt_port);
1da177e4 675
73c1f4a0 676 if (!inet_diag_bc_run(RTA_DATA(bc),
1da177e4
LT
677 RTA_PAYLOAD(bc), &entry))
678 continue;
679 }
680
73c1f4a0 681 err = inet_diag_fill_req(skb, sk, req,
1da177e4 682 NETLINK_CB(cb->skb).pid,
540722ff 683 cb->nlh->nlmsg_seq, cb->nlh);
1da177e4
LT
684 if (err < 0) {
685 cb->args[3] = j + 1;
686 cb->args[4] = reqnum;
687 goto out;
688 }
689 }
690
691 s_reqnum = 0;
692 }
693
694out:
463c84b9 695 read_unlock_bh(&icsk->icsk_accept_queue.syn_wait_lock);
1da177e4
LT
696
697 return err;
698}
699
73c1f4a0 700static int inet_diag_dump(struct sk_buff *skb, struct netlink_callback *cb)
1da177e4
LT
701{
702 int i, num;
703 int s_i, s_num;
73c1f4a0 704 struct inet_diag_req *r = NLMSG_DATA(cb->nlh);
4f5736c4 705 const struct inet_diag_handler *handler;
540722ff 706 struct inet_hashinfo *hashinfo;
1da177e4 707
d523a328 708 handler = inet_diag_lock_handler(cb->nlh->nlmsg_type);
8cf8e5a6
ACM
709 if (IS_ERR(handler))
710 goto unlock;
d523a328 711
4f5736c4 712 hashinfo = handler->idiag_hashinfo;
4e852c02 713
1da177e4
LT
714 s_i = cb->args[1];
715 s_num = num = cb->args[2];
4f5736c4 716
1da177e4 717 if (cb->args[0] == 0) {
73c1f4a0 718 if (!(r->idiag_states & (TCPF_LISTEN | TCPF_SYN_RECV)))
1da177e4 719 goto skip_listen_ht;
540722ff
ACM
720
721 inet_listen_lock(hashinfo);
0f7ff927 722 for (i = s_i; i < INET_LHTABLE_SIZE; i++) {
1da177e4
LT
723 struct sock *sk;
724 struct hlist_node *node;
725
726 num = 0;
540722ff 727 sk_for_each(sk, node, &hashinfo->listening_hash[i]) {
1da177e4
LT
728 struct inet_sock *inet = inet_sk(sk);
729
730 if (num < s_num) {
731 num++;
732 continue;
733 }
734
73c1f4a0
ACM
735 if (r->id.idiag_sport != inet->sport &&
736 r->id.idiag_sport)
1da177e4
LT
737 goto next_listen;
738
73c1f4a0
ACM
739 if (!(r->idiag_states & TCPF_LISTEN) ||
740 r->id.idiag_dport ||
1da177e4
LT
741 cb->args[3] > 0)
742 goto syn_recv;
743
dff2c035 744 if (inet_csk_diag_dump(sk, skb, cb) < 0) {
540722ff 745 inet_listen_unlock(hashinfo);
1da177e4
LT
746 goto done;
747 }
748
749syn_recv:
73c1f4a0 750 if (!(r->idiag_states & TCPF_SYN_RECV))
1da177e4
LT
751 goto next_listen;
752
73c1f4a0 753 if (inet_diag_dump_reqs(skb, sk, cb) < 0) {
540722ff 754 inet_listen_unlock(hashinfo);
1da177e4
LT
755 goto done;
756 }
757
758next_listen:
759 cb->args[3] = 0;
760 cb->args[4] = 0;
761 ++num;
762 }
763
764 s_num = 0;
765 cb->args[3] = 0;
766 cb->args[4] = 0;
767 }
540722ff 768 inet_listen_unlock(hashinfo);
1da177e4
LT
769skip_listen_ht:
770 cb->args[0] = 1;
771 s_i = num = s_num = 0;
772 }
773
73c1f4a0 774 if (!(r->idiag_states & ~(TCPF_LISTEN | TCPF_SYN_RECV)))
d523a328 775 goto unlock;
1da177e4 776
540722ff
ACM
777 for (i = s_i; i < hashinfo->ehash_size; i++) {
778 struct inet_ehash_bucket *head = &hashinfo->ehash[i];
230140cf 779 rwlock_t *lock = inet_ehash_lockp(hashinfo, i);
1da177e4
LT
780 struct sock *sk;
781 struct hlist_node *node;
782
6be547a6
AK
783 num = 0;
784
785 if (hlist_empty(&head->chain) && hlist_empty(&head->twchain))
786 continue;
787
1da177e4
LT
788 if (i > s_i)
789 s_num = 0;
790
230140cf 791 read_lock_bh(lock);
1da177e4
LT
792 sk_for_each(sk, node, &head->chain) {
793 struct inet_sock *inet = inet_sk(sk);
794
795 if (num < s_num)
796 goto next_normal;
73c1f4a0 797 if (!(r->idiag_states & (1 << sk->sk_state)))
1da177e4 798 goto next_normal;
73c1f4a0
ACM
799 if (r->id.idiag_sport != inet->sport &&
800 r->id.idiag_sport)
1da177e4 801 goto next_normal;
4e852c02
ACM
802 if (r->id.idiag_dport != inet->dport &&
803 r->id.idiag_dport)
1da177e4 804 goto next_normal;
dff2c035 805 if (inet_csk_diag_dump(sk, skb, cb) < 0) {
230140cf 806 read_unlock_bh(lock);
1da177e4
LT
807 goto done;
808 }
809next_normal:
810 ++num;
811 }
812
73c1f4a0 813 if (r->idiag_states & TCPF_TIME_WAIT) {
c7d58aab
ACM
814 struct inet_timewait_sock *tw;
815
816 inet_twsk_for_each(tw, node,
dbca9b27 817 &head->twchain) {
1da177e4
LT
818
819 if (num < s_num)
820 goto next_dying;
7dbf0755 821 if (r->id.idiag_sport != tw->tw_sport &&
73c1f4a0 822 r->id.idiag_sport)
1da177e4 823 goto next_dying;
7dbf0755 824 if (r->id.idiag_dport != tw->tw_dport &&
73c1f4a0 825 r->id.idiag_dport)
1da177e4 826 goto next_dying;
c7d58aab 827 if (inet_twsk_diag_dump(tw, skb, cb) < 0) {
230140cf 828 read_unlock_bh(lock);
1da177e4
LT
829 goto done;
830 }
831next_dying:
832 ++num;
833 }
834 }
230140cf 835 read_unlock_bh(lock);
1da177e4
LT
836 }
837
838done:
839 cb->args[1] = i;
840 cb->args[2] = num;
d523a328
HX
841unlock:
842 inet_diag_unlock_handler(handler);
1da177e4
LT
843 return skb->len;
844}
845
ead592ba 846static int inet_diag_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
1da177e4 847{
ead592ba 848 int hdrlen = sizeof(struct inet_diag_req);
1da177e4 849
ead592ba
TG
850 if (nlh->nlmsg_type >= INET_DIAG_GETSOCK_MAX ||
851 nlmsg_len(nlh) < hdrlen)
852 return -EINVAL;
1da177e4 853
ead592ba 854 if (nlh->nlmsg_flags & NLM_F_DUMP) {
ead592ba
TG
855 if (nlmsg_attrlen(nlh, hdrlen)) {
856 struct nlattr *attr;
1da177e4 857
ead592ba
TG
858 attr = nlmsg_find_attr(nlh, hdrlen,
859 INET_DIAG_REQ_BYTECODE);
860 if (attr == NULL ||
861 nla_len(attr) < sizeof(struct inet_diag_bc_op) ||
862 inet_diag_bc_audit(nla_data(attr), nla_len(attr)))
863 return -EINVAL;
864 }
1da177e4 865
c702e804
TG
866 return netlink_dump_start(idiagnl, skb, nlh,
867 inet_diag_dump, NULL);
1da177e4 868 }
ead592ba
TG
869
870 return inet_diag_get_exact(skb, nlh);
1da177e4
LT
871}
872
0a9c7301
PM
873static DEFINE_MUTEX(inet_diag_mutex);
874
cd40b7d3 875static void inet_diag_rcv(struct sk_buff *skb)
1da177e4 876{
cd40b7d3
DL
877 mutex_lock(&inet_diag_mutex);
878 netlink_rcv_skb(skb, &inet_diag_rcv_msg);
879 mutex_unlock(&inet_diag_mutex);
1da177e4
LT
880}
881
4f5736c4
ACM
882int inet_diag_register(const struct inet_diag_handler *h)
883{
884 const __u16 type = h->idiag_type;
885 int err = -EINVAL;
886
887 if (type >= INET_DIAG_GETSOCK_MAX)
888 goto out;
889
d523a328 890 mutex_lock(&inet_diag_table_mutex);
4f5736c4
ACM
891 err = -EEXIST;
892 if (inet_diag_table[type] == NULL) {
893 inet_diag_table[type] = h;
894 err = 0;
895 }
d523a328 896 mutex_unlock(&inet_diag_table_mutex);
4f5736c4
ACM
897out:
898 return err;
899}
900EXPORT_SYMBOL_GPL(inet_diag_register);
901
902void inet_diag_unregister(const struct inet_diag_handler *h)
903{
904 const __u16 type = h->idiag_type;
905
906 if (type >= INET_DIAG_GETSOCK_MAX)
907 return;
908
d523a328 909 mutex_lock(&inet_diag_table_mutex);
4f5736c4 910 inet_diag_table[type] = NULL;
d523a328 911 mutex_unlock(&inet_diag_table_mutex);
4f5736c4
ACM
912}
913EXPORT_SYMBOL_GPL(inet_diag_unregister);
914
73c1f4a0 915static int __init inet_diag_init(void)
1da177e4 916{
4f5736c4
ACM
917 const int inet_diag_table_size = (INET_DIAG_GETSOCK_MAX *
918 sizeof(struct inet_diag_handler *));
919 int err = -ENOMEM;
920
0da974f4 921 inet_diag_table = kzalloc(inet_diag_table_size, GFP_KERNEL);
4f5736c4
ACM
922 if (!inet_diag_table)
923 goto out;
924
b4b51029 925 idiagnl = netlink_kernel_create(&init_net, NETLINK_INET_DIAG, 0,
d523a328 926 inet_diag_rcv, NULL, THIS_MODULE);
73c1f4a0 927 if (idiagnl == NULL)
4f5736c4 928 goto out_free_table;
17b085ea 929 err = 0;
4f5736c4
ACM
930out:
931 return err;
4f5736c4
ACM
932out_free_table:
933 kfree(inet_diag_table);
934 goto out;
1da177e4
LT
935}
936
73c1f4a0 937static void __exit inet_diag_exit(void)
1da177e4 938{
b7c6ba6e 939 netlink_kernel_release(idiagnl);
4f5736c4 940 kfree(inet_diag_table);
1da177e4
LT
941}
942
73c1f4a0
ACM
943module_init(inet_diag_init);
944module_exit(inet_diag_exit);
1da177e4 945MODULE_LICENSE("GPL");
305e1e96 946MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_INET_DIAG);
This page took 0.430324 seconds and 5 git commands to generate.