OpenCores
URL https://opencores.org/ocsvn/or1k_soc_on_altera_embedded_dev_kit/or1k_soc_on_altera_embedded_dev_kit/trunk

Subversion Repositories or1k_soc_on_altera_embedded_dev_kit

[/] [or1k_soc_on_altera_embedded_dev_kit/] [tags/] [linux-2.6/] [linux-2.6.24_or32_unified_v2.3/] [net/] [ipv4/] [inet_diag.c] - Blame information for rev 8

Details | Compare with Previous | View Log

Line No. Rev Author Line
1 3 xianfeng
/*
2
 * inet_diag.c  Module for monitoring INET transport protocols sockets.
3
 *
4
 * Version:     $Id: inet_diag.c,v 1.3 2002/02/01 22:01:04 davem Exp $
5
 *
6
 * Authors:     Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
7
 *
8
 *      This program is free software; you can redistribute it and/or
9
 *      modify it under the terms of the GNU General Public License
10
 *      as published by the Free Software Foundation; either version
11
 *      2 of the License, or (at your option) any later version.
12
 */
13
 
14
#include <linux/kernel.h>
15
#include <linux/module.h>
16
#include <linux/types.h>
17
#include <linux/fcntl.h>
18
#include <linux/random.h>
19
#include <linux/cache.h>
20
#include <linux/init.h>
21
#include <linux/time.h>
22
 
23
#include <net/icmp.h>
24
#include <net/tcp.h>
25
#include <net/ipv6.h>
26
#include <net/inet_common.h>
27
#include <net/inet_connection_sock.h>
28
#include <net/inet_hashtables.h>
29
#include <net/inet_timewait_sock.h>
30
#include <net/inet6_hashtables.h>
31
#include <net/netlink.h>
32
 
33
#include <linux/inet.h>
34
#include <linux/stddef.h>
35
 
36
#include <linux/inet_diag.h>
37
 
38
static const struct inet_diag_handler **inet_diag_table;
39
 
40
struct inet_diag_entry {
41
        __be32 *saddr;
42
        __be32 *daddr;
43
        u16 sport;
44
        u16 dport;
45
        u16 family;
46
        u16 userlocks;
47
};
48
 
49
static struct sock *idiagnl;
50
 
51
#define INET_DIAG_PUT(skb, attrtype, attrlen) \
52
        RTA_DATA(__RTA_PUT(skb, attrtype, attrlen))
53
 
54
static DEFINE_MUTEX(inet_diag_table_mutex);
55
 
56
static const struct inet_diag_handler *inet_diag_lock_handler(int type)
57
{
58
#ifdef CONFIG_KMOD
59
        if (!inet_diag_table[type])
60
                request_module("net-pf-%d-proto-%d-type-%d", PF_NETLINK,
61
                               NETLINK_INET_DIAG, type);
62
#endif
63
 
64
        mutex_lock(&inet_diag_table_mutex);
65
        if (!inet_diag_table[type])
66
                return ERR_PTR(-ENOENT);
67
 
68
        return inet_diag_table[type];
69
}
70
 
71
static inline void inet_diag_unlock_handler(
72
        const struct inet_diag_handler *handler)
73
{
74
        mutex_unlock(&inet_diag_table_mutex);
75
}
76
 
77
static int inet_csk_diag_fill(struct sock *sk,
78
                              struct sk_buff *skb,
79
                              int ext, u32 pid, u32 seq, u16 nlmsg_flags,
80
                              const struct nlmsghdr *unlh)
81
{
82
        const struct inet_sock *inet = inet_sk(sk);
83
        const struct inet_connection_sock *icsk = inet_csk(sk);
84
        struct inet_diag_msg *r;
85
        struct nlmsghdr  *nlh;
86
        void *info = NULL;
87
        struct inet_diag_meminfo  *minfo = NULL;
88
        unsigned char    *b = skb_tail_pointer(skb);
89
        const struct inet_diag_handler *handler;
90
 
91
        handler = inet_diag_table[unlh->nlmsg_type];
92
        BUG_ON(handler == NULL);
93
 
94
        nlh = NLMSG_PUT(skb, pid, seq, unlh->nlmsg_type, sizeof(*r));
95
        nlh->nlmsg_flags = nlmsg_flags;
96
 
97
        r = NLMSG_DATA(nlh);
98
        BUG_ON(sk->sk_state == TCP_TIME_WAIT);
99
 
100
        if (ext & (1 << (INET_DIAG_MEMINFO - 1)))
101
                minfo = INET_DIAG_PUT(skb, INET_DIAG_MEMINFO, sizeof(*minfo));
102
 
103
        if (ext & (1 << (INET_DIAG_INFO - 1)))
104
                info = INET_DIAG_PUT(skb, INET_DIAG_INFO,
105
                                     handler->idiag_info_size);
106
 
107
        if ((ext & (1 << (INET_DIAG_CONG - 1))) && icsk->icsk_ca_ops) {
108
                const size_t len = strlen(icsk->icsk_ca_ops->name);
109
 
110
                strcpy(INET_DIAG_PUT(skb, INET_DIAG_CONG, len + 1),
111
                       icsk->icsk_ca_ops->name);
112
        }
113
 
114
        r->idiag_family = sk->sk_family;
115
        r->idiag_state = sk->sk_state;
116
        r->idiag_timer = 0;
117
        r->idiag_retrans = 0;
118
 
119
        r->id.idiag_if = sk->sk_bound_dev_if;
120
        r->id.idiag_cookie[0] = (u32)(unsigned long)sk;
121
        r->id.idiag_cookie[1] = (u32)(((unsigned long)sk >> 31) >> 1);
122
 
123
        r->id.idiag_sport = inet->sport;
124
        r->id.idiag_dport = inet->dport;
125
        r->id.idiag_src[0] = inet->rcv_saddr;
126
        r->id.idiag_dst[0] = inet->daddr;
127
 
128
#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
129
        if (r->idiag_family == AF_INET6) {
130
                struct ipv6_pinfo *np = inet6_sk(sk);
131
 
132
                ipv6_addr_copy((struct in6_addr *)r->id.idiag_src,
133
                               &np->rcv_saddr);
134
                ipv6_addr_copy((struct in6_addr *)r->id.idiag_dst,
135
                               &np->daddr);
136
        }
137
#endif
138
 
139
#define EXPIRES_IN_MS(tmo)  DIV_ROUND_UP((tmo - jiffies) * 1000, HZ)
140
 
141
        if (icsk->icsk_pending == ICSK_TIME_RETRANS) {
142
                r->idiag_timer = 1;
143
                r->idiag_retrans = icsk->icsk_retransmits;
144
                r->idiag_expires = EXPIRES_IN_MS(icsk->icsk_timeout);
145
        } else if (icsk->icsk_pending == ICSK_TIME_PROBE0) {
146
                r->idiag_timer = 4;
147
                r->idiag_retrans = icsk->icsk_probes_out;
148
                r->idiag_expires = EXPIRES_IN_MS(icsk->icsk_timeout);
149
        } else if (timer_pending(&sk->sk_timer)) {
150
                r->idiag_timer = 2;
151
                r->idiag_retrans = icsk->icsk_probes_out;
152
                r->idiag_expires = EXPIRES_IN_MS(sk->sk_timer.expires);
153
        } else {
154
                r->idiag_timer = 0;
155
                r->idiag_expires = 0;
156
        }
157
#undef EXPIRES_IN_MS
158
 
159
        r->idiag_uid = sock_i_uid(sk);
160
        r->idiag_inode = sock_i_ino(sk);
161
 
162
        if (minfo) {
163
                minfo->idiag_rmem = atomic_read(&sk->sk_rmem_alloc);
164
                minfo->idiag_wmem = sk->sk_wmem_queued;
165
                minfo->idiag_fmem = sk->sk_forward_alloc;
166
                minfo->idiag_tmem = atomic_read(&sk->sk_wmem_alloc);
167
        }
168
 
169
        handler->idiag_get_info(sk, r, info);
170
 
171
        if (sk->sk_state < TCP_TIME_WAIT &&
172
            icsk->icsk_ca_ops && icsk->icsk_ca_ops->get_info)
173
                icsk->icsk_ca_ops->get_info(sk, ext, skb);
174
 
175
        nlh->nlmsg_len = skb_tail_pointer(skb) - b;
176
        return skb->len;
177
 
178
rtattr_failure:
179
nlmsg_failure:
180
        nlmsg_trim(skb, b);
181
        return -EMSGSIZE;
182
}
183
 
184
static int inet_twsk_diag_fill(struct inet_timewait_sock *tw,
185
                               struct sk_buff *skb, int ext, u32 pid,
186
                               u32 seq, u16 nlmsg_flags,
187
                               const struct nlmsghdr *unlh)
188
{
189
        long tmo;
190
        struct inet_diag_msg *r;
191
        const unsigned char *previous_tail = skb_tail_pointer(skb);
192
        struct nlmsghdr *nlh = NLMSG_PUT(skb, pid, seq,
193
                                         unlh->nlmsg_type, sizeof(*r));
194
 
195
        r = NLMSG_DATA(nlh);
196
        BUG_ON(tw->tw_state != TCP_TIME_WAIT);
197
 
198
        nlh->nlmsg_flags = nlmsg_flags;
199
 
200
        tmo = tw->tw_ttd - jiffies;
201
        if (tmo < 0)
202
                tmo = 0;
203
 
204
        r->idiag_family       = tw->tw_family;
205
        r->idiag_state        = tw->tw_state;
206
        r->idiag_timer        = 0;
207
        r->idiag_retrans      = 0;
208
        r->id.idiag_if        = tw->tw_bound_dev_if;
209
        r->id.idiag_cookie[0] = (u32)(unsigned long)tw;
210
        r->id.idiag_cookie[1] = (u32)(((unsigned long)tw >> 31) >> 1);
211
        r->id.idiag_sport     = tw->tw_sport;
212
        r->id.idiag_dport     = tw->tw_dport;
213
        r->id.idiag_src[0]    = tw->tw_rcv_saddr;
214
        r->id.idiag_dst[0]    = tw->tw_daddr;
215
        r->idiag_state        = tw->tw_substate;
216
        r->idiag_timer        = 3;
217
        r->idiag_expires      = DIV_ROUND_UP(tmo * 1000, HZ);
218
        r->idiag_rqueue       = 0;
219
        r->idiag_wqueue       = 0;
220
        r->idiag_uid          = 0;
221
        r->idiag_inode        = 0;
222
#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
223
        if (tw->tw_family == AF_INET6) {
224
                const struct inet6_timewait_sock *tw6 =
225
                                                inet6_twsk((struct sock *)tw);
226
 
227
                ipv6_addr_copy((struct in6_addr *)r->id.idiag_src,
228
                               &tw6->tw_v6_rcv_saddr);
229
                ipv6_addr_copy((struct in6_addr *)r->id.idiag_dst,
230
                               &tw6->tw_v6_daddr);
231
        }
232
#endif
233
        nlh->nlmsg_len = skb_tail_pointer(skb) - previous_tail;
234
        return skb->len;
235
nlmsg_failure:
236
        nlmsg_trim(skb, previous_tail);
237
        return -EMSGSIZE;
238
}
239
 
240
static int sk_diag_fill(struct sock *sk, struct sk_buff *skb,
241
                        int ext, u32 pid, u32 seq, u16 nlmsg_flags,
242
                        const struct nlmsghdr *unlh)
243
{
244
        if (sk->sk_state == TCP_TIME_WAIT)
245
                return inet_twsk_diag_fill((struct inet_timewait_sock *)sk,
246
                                           skb, ext, pid, seq, nlmsg_flags,
247
                                           unlh);
248
        return inet_csk_diag_fill(sk, skb, ext, pid, seq, nlmsg_flags, unlh);
249
}
250
 
251
static int inet_diag_get_exact(struct sk_buff *in_skb,
252
                               const struct nlmsghdr *nlh)
253
{
254
        int err;
255
        struct sock *sk;
256
        struct inet_diag_req *req = NLMSG_DATA(nlh);
257
        struct sk_buff *rep;
258
        struct inet_hashinfo *hashinfo;
259
        const struct inet_diag_handler *handler;
260
 
261
        handler = inet_diag_lock_handler(nlh->nlmsg_type);
262
        if (!handler)
263
                return -ENOENT;
264
 
265
        hashinfo = handler->idiag_hashinfo;
266
        err = -EINVAL;
267
 
268
        if (req->idiag_family == AF_INET) {
269
                sk = inet_lookup(hashinfo, req->id.idiag_dst[0],
270
                                 req->id.idiag_dport, req->id.idiag_src[0],
271
                                 req->id.idiag_sport, req->id.idiag_if);
272
        }
273
#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
274
        else if (req->idiag_family == AF_INET6) {
275
                sk = inet6_lookup(hashinfo,
276
                                  (struct in6_addr *)req->id.idiag_dst,
277
                                  req->id.idiag_dport,
278
                                  (struct in6_addr *)req->id.idiag_src,
279
                                  req->id.idiag_sport,
280
                                  req->id.idiag_if);
281
        }
282
#endif
283
        else {
284
                goto unlock;
285
        }
286
 
287
        err = -ENOENT;
288
        if (sk == NULL)
289
                goto unlock;
290
 
291
        err = -ESTALE;
292
        if ((req->id.idiag_cookie[0] != INET_DIAG_NOCOOKIE ||
293
             req->id.idiag_cookie[1] != INET_DIAG_NOCOOKIE) &&
294
            ((u32)(unsigned long)sk != req->id.idiag_cookie[0] ||
295
             (u32)((((unsigned long)sk) >> 31) >> 1) != req->id.idiag_cookie[1]))
296
                goto out;
297
 
298
        err = -ENOMEM;
299
        rep = alloc_skb(NLMSG_SPACE((sizeof(struct inet_diag_msg) +
300
                                     sizeof(struct inet_diag_meminfo) +
301
                                     handler->idiag_info_size + 64)),
302
                        GFP_KERNEL);
303
        if (!rep)
304
                goto out;
305
 
306
        err = sk_diag_fill(sk, rep, req->idiag_ext,
307
                           NETLINK_CB(in_skb).pid,
308
                           nlh->nlmsg_seq, 0, nlh);
309
        if (err < 0) {
310
                WARN_ON(err == -EMSGSIZE);
311
                kfree_skb(rep);
312
                goto out;
313
        }
314
        err = netlink_unicast(idiagnl, rep, NETLINK_CB(in_skb).pid,
315
                              MSG_DONTWAIT);
316
        if (err > 0)
317
                err = 0;
318
 
319
out:
320
        if (sk) {
321
                if (sk->sk_state == TCP_TIME_WAIT)
322
                        inet_twsk_put((struct inet_timewait_sock *)sk);
323
                else
324
                        sock_put(sk);
325
        }
326
unlock:
327
        inet_diag_unlock_handler(handler);
328
        return err;
329
}
330
 
331
static int bitstring_match(const __be32 *a1, const __be32 *a2, int bits)
332
{
333
        int words = bits >> 5;
334
 
335
        bits &= 0x1f;
336
 
337
        if (words) {
338
                if (memcmp(a1, a2, words << 2))
339
                        return 0;
340
        }
341
        if (bits) {
342
                __be32 w1, w2;
343
                __be32 mask;
344
 
345
                w1 = a1[words];
346
                w2 = a2[words];
347
 
348
                mask = htonl((0xffffffff) << (32 - bits));
349
 
350
                if ((w1 ^ w2) & mask)
351
                        return 0;
352
        }
353
 
354
        return 1;
355
}
356
 
357
 
358
static int inet_diag_bc_run(const void *bc, int len,
359
                            const struct inet_diag_entry *entry)
360
{
361
        while (len > 0) {
362
                int yes = 1;
363
                const struct inet_diag_bc_op *op = bc;
364
 
365
                switch (op->code) {
366
                case INET_DIAG_BC_NOP:
367
                        break;
368
                case INET_DIAG_BC_JMP:
369
                        yes = 0;
370
                        break;
371
                case INET_DIAG_BC_S_GE:
372
                        yes = entry->sport >= op[1].no;
373
                        break;
374
                case INET_DIAG_BC_S_LE:
375
                        yes = entry->dport <= op[1].no;
376
                        break;
377
                case INET_DIAG_BC_D_GE:
378
                        yes = entry->dport >= op[1].no;
379
                        break;
380
                case INET_DIAG_BC_D_LE:
381
                        yes = entry->dport <= op[1].no;
382
                        break;
383
                case INET_DIAG_BC_AUTO:
384
                        yes = !(entry->userlocks & SOCK_BINDPORT_LOCK);
385
                        break;
386
                case INET_DIAG_BC_S_COND:
387
                case INET_DIAG_BC_D_COND: {
388
                        struct inet_diag_hostcond *cond;
389
                        __be32 *addr;
390
 
391
                        cond = (struct inet_diag_hostcond *)(op + 1);
392
                        if (cond->port != -1 &&
393
                            cond->port != (op->code == INET_DIAG_BC_S_COND ?
394
                                             entry->sport : entry->dport)) {
395
                                yes = 0;
396
                                break;
397
                        }
398
 
399
                        if (cond->prefix_len == 0)
400
                                break;
401
 
402
                        if (op->code == INET_DIAG_BC_S_COND)
403
                                addr = entry->saddr;
404
                        else
405
                                addr = entry->daddr;
406
 
407
                        if (bitstring_match(addr, cond->addr,
408
                                            cond->prefix_len))
409
                                break;
410
                        if (entry->family == AF_INET6 &&
411
                            cond->family == AF_INET) {
412
                                if (addr[0] == 0 && addr[1] == 0 &&
413
                                    addr[2] == htonl(0xffff) &&
414
                                    bitstring_match(addr + 3, cond->addr,
415
                                                    cond->prefix_len))
416
                                        break;
417
                        }
418
                        yes = 0;
419
                        break;
420
                }
421
                }
422
 
423
                if (yes) {
424
                        len -= op->yes;
425
                        bc += op->yes;
426
                } else {
427
                        len -= op->no;
428
                        bc += op->no;
429
                }
430
        }
431
        return (len == 0);
432
}
433
 
434
static int valid_cc(const void *bc, int len, int cc)
435
{
436
        while (len >= 0) {
437
                const struct inet_diag_bc_op *op = bc;
438
 
439
                if (cc > len)
440
                        return 0;
441
                if (cc == len)
442
                        return 1;
443
                if (op->yes < 4)
444
                        return 0;
445
                len -= op->yes;
446
                bc  += op->yes;
447
        }
448
        return 0;
449
}
450
 
451
static int inet_diag_bc_audit(const void *bytecode, int bytecode_len)
452
{
453
        const unsigned char *bc = bytecode;
454
        int  len = bytecode_len;
455
 
456
        while (len > 0) {
457
                struct inet_diag_bc_op *op = (struct inet_diag_bc_op *)bc;
458
 
459
//printk("BC: %d %d %d {%d} / %d\n", op->code, op->yes, op->no, op[1].no, len);
460
                switch (op->code) {
461
                case INET_DIAG_BC_AUTO:
462
                case INET_DIAG_BC_S_COND:
463
                case INET_DIAG_BC_D_COND:
464
                case INET_DIAG_BC_S_GE:
465
                case INET_DIAG_BC_S_LE:
466
                case INET_DIAG_BC_D_GE:
467
                case INET_DIAG_BC_D_LE:
468
                        if (op->yes < 4 || op->yes > len + 4)
469
                                return -EINVAL;
470
                case INET_DIAG_BC_JMP:
471
                        if (op->no < 4 || op->no > len + 4)
472
                                return -EINVAL;
473
                        if (op->no < len &&
474
                            !valid_cc(bytecode, bytecode_len, len - op->no))
475
                                return -EINVAL;
476
                        break;
477
                case INET_DIAG_BC_NOP:
478
                        if (op->yes < 4 || op->yes > len + 4)
479
                                return -EINVAL;
480
                        break;
481
                default:
482
                        return -EINVAL;
483
                }
484
                bc  += op->yes;
485
                len -= op->yes;
486
        }
487
        return len == 0 ? 0 : -EINVAL;
488
}
489
 
490
static int inet_csk_diag_dump(struct sock *sk,
491
                              struct sk_buff *skb,
492
                              struct netlink_callback *cb)
493
{
494
        struct inet_diag_req *r = NLMSG_DATA(cb->nlh);
495
 
496
        if (cb->nlh->nlmsg_len > 4 + NLMSG_SPACE(sizeof(*r))) {
497
                struct inet_diag_entry entry;
498
                struct rtattr *bc = (struct rtattr *)(r + 1);
499
                struct inet_sock *inet = inet_sk(sk);
500
 
501
                entry.family = sk->sk_family;
502
#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
503
                if (entry.family == AF_INET6) {
504
                        struct ipv6_pinfo *np = inet6_sk(sk);
505
 
506
                        entry.saddr = np->rcv_saddr.s6_addr32;
507
                        entry.daddr = np->daddr.s6_addr32;
508
                } else
509
#endif
510
                {
511
                        entry.saddr = &inet->rcv_saddr;
512
                        entry.daddr = &inet->daddr;
513
                }
514
                entry.sport = inet->num;
515
                entry.dport = ntohs(inet->dport);
516
                entry.userlocks = sk->sk_userlocks;
517
 
518
                if (!inet_diag_bc_run(RTA_DATA(bc), RTA_PAYLOAD(bc), &entry))
519
                        return 0;
520
        }
521
 
522
        return inet_csk_diag_fill(sk, skb, r->idiag_ext,
523
                                  NETLINK_CB(cb->skb).pid,
524
                                  cb->nlh->nlmsg_seq, NLM_F_MULTI, cb->nlh);
525
}
526
 
527
static int inet_twsk_diag_dump(struct inet_timewait_sock *tw,
528
                               struct sk_buff *skb,
529
                               struct netlink_callback *cb)
530
{
531
        struct inet_diag_req *r = NLMSG_DATA(cb->nlh);
532
 
533
        if (cb->nlh->nlmsg_len > 4 + NLMSG_SPACE(sizeof(*r))) {
534
                struct inet_diag_entry entry;
535
                struct rtattr *bc = (struct rtattr *)(r + 1);
536
 
537
                entry.family = tw->tw_family;
538
#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
539
                if (tw->tw_family == AF_INET6) {
540
                        struct inet6_timewait_sock *tw6 =
541
                                                inet6_twsk((struct sock *)tw);
542
                        entry.saddr = tw6->tw_v6_rcv_saddr.s6_addr32;
543
                        entry.daddr = tw6->tw_v6_daddr.s6_addr32;
544
                } else
545
#endif
546
                {
547
                        entry.saddr = &tw->tw_rcv_saddr;
548
                        entry.daddr = &tw->tw_daddr;
549
                }
550
                entry.sport = tw->tw_num;
551
                entry.dport = ntohs(tw->tw_dport);
552
                entry.userlocks = 0;
553
 
554
                if (!inet_diag_bc_run(RTA_DATA(bc), RTA_PAYLOAD(bc), &entry))
555
                        return 0;
556
        }
557
 
558
        return inet_twsk_diag_fill(tw, skb, r->idiag_ext,
559
                                   NETLINK_CB(cb->skb).pid,
560
                                   cb->nlh->nlmsg_seq, NLM_F_MULTI, cb->nlh);
561
}
562
 
563
static int inet_diag_fill_req(struct sk_buff *skb, struct sock *sk,
564
                              struct request_sock *req, u32 pid, u32 seq,
565
                              const struct nlmsghdr *unlh)
566
{
567
        const struct inet_request_sock *ireq = inet_rsk(req);
568
        struct inet_sock *inet = inet_sk(sk);
569
        unsigned char *b = skb_tail_pointer(skb);
570
        struct inet_diag_msg *r;
571
        struct nlmsghdr *nlh;
572
        long tmo;
573
 
574
        nlh = NLMSG_PUT(skb, pid, seq, unlh->nlmsg_type, sizeof(*r));
575
        nlh->nlmsg_flags = NLM_F_MULTI;
576
        r = NLMSG_DATA(nlh);
577
 
578
        r->idiag_family = sk->sk_family;
579
        r->idiag_state = TCP_SYN_RECV;
580
        r->idiag_timer = 1;
581
        r->idiag_retrans = req->retrans;
582
 
583
        r->id.idiag_if = sk->sk_bound_dev_if;
584
        r->id.idiag_cookie[0] = (u32)(unsigned long)req;
585
        r->id.idiag_cookie[1] = (u32)(((unsigned long)req >> 31) >> 1);
586
 
587
        tmo = req->expires - jiffies;
588
        if (tmo < 0)
589
                tmo = 0;
590
 
591
        r->id.idiag_sport = inet->sport;
592
        r->id.idiag_dport = ireq->rmt_port;
593
        r->id.idiag_src[0] = ireq->loc_addr;
594
        r->id.idiag_dst[0] = ireq->rmt_addr;
595
        r->idiag_expires = jiffies_to_msecs(tmo);
596
        r->idiag_rqueue = 0;
597
        r->idiag_wqueue = 0;
598
        r->idiag_uid = sock_i_uid(sk);
599
        r->idiag_inode = 0;
600
#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
601
        if (r->idiag_family == AF_INET6) {
602
                ipv6_addr_copy((struct in6_addr *)r->id.idiag_src,
603
                               &inet6_rsk(req)->loc_addr);
604
                ipv6_addr_copy((struct in6_addr *)r->id.idiag_dst,
605
                               &inet6_rsk(req)->rmt_addr);
606
        }
607
#endif
608
        nlh->nlmsg_len = skb_tail_pointer(skb) - b;
609
 
610
        return skb->len;
611
 
612
nlmsg_failure:
613
        nlmsg_trim(skb, b);
614
        return -1;
615
}
616
 
617
static int inet_diag_dump_reqs(struct sk_buff *skb, struct sock *sk,
618
                               struct netlink_callback *cb)
619
{
620
        struct inet_diag_entry entry;
621
        struct inet_diag_req *r = NLMSG_DATA(cb->nlh);
622
        struct inet_connection_sock *icsk = inet_csk(sk);
623
        struct listen_sock *lopt;
624
        struct rtattr *bc = NULL;
625
        struct inet_sock *inet = inet_sk(sk);
626
        int j, s_j;
627
        int reqnum, s_reqnum;
628
        int err = 0;
629
 
630
        s_j = cb->args[3];
631
        s_reqnum = cb->args[4];
632
 
633
        if (s_j > 0)
634
                s_j--;
635
 
636
        entry.family = sk->sk_family;
637
 
638
        read_lock_bh(&icsk->icsk_accept_queue.syn_wait_lock);
639
 
640
        lopt = icsk->icsk_accept_queue.listen_opt;
641
        if (!lopt || !lopt->qlen)
642
                goto out;
643
 
644
        if (cb->nlh->nlmsg_len > 4 + NLMSG_SPACE(sizeof(*r))) {
645
                bc = (struct rtattr *)(r + 1);
646
                entry.sport = inet->num;
647
                entry.userlocks = sk->sk_userlocks;
648
        }
649
 
650
        for (j = s_j; j < lopt->nr_table_entries; j++) {
651
                struct request_sock *req, *head = lopt->syn_table[j];
652
 
653
                reqnum = 0;
654
                for (req = head; req; reqnum++, req = req->dl_next) {
655
                        struct inet_request_sock *ireq = inet_rsk(req);
656
 
657
                        if (reqnum < s_reqnum)
658
                                continue;
659
                        if (r->id.idiag_dport != ireq->rmt_port &&
660
                            r->id.idiag_dport)
661
                                continue;
662
 
663
                        if (bc) {
664
                                entry.saddr =
665
#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
666
                                        (entry.family == AF_INET6) ?
667
                                        inet6_rsk(req)->loc_addr.s6_addr32 :
668
#endif
669
                                        &ireq->loc_addr;
670
                                entry.daddr =
671
#if defined(CONFIG_IPV6) || defined (CONFIG_IPV6_MODULE)
672
                                        (entry.family == AF_INET6) ?
673
                                        inet6_rsk(req)->rmt_addr.s6_addr32 :
674
#endif
675
                                        &ireq->rmt_addr;
676
                                entry.dport = ntohs(ireq->rmt_port);
677
 
678
                                if (!inet_diag_bc_run(RTA_DATA(bc),
679
                                                    RTA_PAYLOAD(bc), &entry))
680
                                        continue;
681
                        }
682
 
683
                        err = inet_diag_fill_req(skb, sk, req,
684
                                               NETLINK_CB(cb->skb).pid,
685
                                               cb->nlh->nlmsg_seq, cb->nlh);
686
                        if (err < 0) {
687
                                cb->args[3] = j + 1;
688
                                cb->args[4] = reqnum;
689
                                goto out;
690
                        }
691
                }
692
 
693
                s_reqnum = 0;
694
        }
695
 
696
out:
697
        read_unlock_bh(&icsk->icsk_accept_queue.syn_wait_lock);
698
 
699
        return err;
700
}
701
 
702
static int inet_diag_dump(struct sk_buff *skb, struct netlink_callback *cb)
703
{
704
        int i, num;
705
        int s_i, s_num;
706
        struct inet_diag_req *r = NLMSG_DATA(cb->nlh);
707
        const struct inet_diag_handler *handler;
708
        struct inet_hashinfo *hashinfo;
709
 
710
        handler = inet_diag_lock_handler(cb->nlh->nlmsg_type);
711
        if (!handler)
712
                goto no_handler;
713
 
714
        hashinfo = handler->idiag_hashinfo;
715
 
716
        s_i = cb->args[1];
717
        s_num = num = cb->args[2];
718
 
719
        if (cb->args[0] == 0) {
720
                if (!(r->idiag_states & (TCPF_LISTEN | TCPF_SYN_RECV)))
721
                        goto skip_listen_ht;
722
 
723
                inet_listen_lock(hashinfo);
724
                for (i = s_i; i < INET_LHTABLE_SIZE; i++) {
725
                        struct sock *sk;
726
                        struct hlist_node *node;
727
 
728
                        num = 0;
729
                        sk_for_each(sk, node, &hashinfo->listening_hash[i]) {
730
                                struct inet_sock *inet = inet_sk(sk);
731
 
732
                                if (num < s_num) {
733
                                        num++;
734
                                        continue;
735
                                }
736
 
737
                                if (r->id.idiag_sport != inet->sport &&
738
                                    r->id.idiag_sport)
739
                                        goto next_listen;
740
 
741
                                if (!(r->idiag_states & TCPF_LISTEN) ||
742
                                    r->id.idiag_dport ||
743
                                    cb->args[3] > 0)
744
                                        goto syn_recv;
745
 
746
                                if (inet_csk_diag_dump(sk, skb, cb) < 0) {
747
                                        inet_listen_unlock(hashinfo);
748
                                        goto done;
749
                                }
750
 
751
syn_recv:
752
                                if (!(r->idiag_states & TCPF_SYN_RECV))
753
                                        goto next_listen;
754
 
755
                                if (inet_diag_dump_reqs(skb, sk, cb) < 0) {
756
                                        inet_listen_unlock(hashinfo);
757
                                        goto done;
758
                                }
759
 
760
next_listen:
761
                                cb->args[3] = 0;
762
                                cb->args[4] = 0;
763
                                ++num;
764
                        }
765
 
766
                        s_num = 0;
767
                        cb->args[3] = 0;
768
                        cb->args[4] = 0;
769
                }
770
                inet_listen_unlock(hashinfo);
771
skip_listen_ht:
772
                cb->args[0] = 1;
773
                s_i = num = s_num = 0;
774
        }
775
 
776
        if (!(r->idiag_states & ~(TCPF_LISTEN | TCPF_SYN_RECV)))
777
                goto unlock;
778
 
779
        for (i = s_i; i < hashinfo->ehash_size; i++) {
780
                struct inet_ehash_bucket *head = &hashinfo->ehash[i];
781
                rwlock_t *lock = inet_ehash_lockp(hashinfo, i);
782
                struct sock *sk;
783
                struct hlist_node *node;
784
 
785
                if (i > s_i)
786
                        s_num = 0;
787
 
788
                read_lock_bh(lock);
789
                num = 0;
790
                sk_for_each(sk, node, &head->chain) {
791
                        struct inet_sock *inet = inet_sk(sk);
792
 
793
                        if (num < s_num)
794
                                goto next_normal;
795
                        if (!(r->idiag_states & (1 << sk->sk_state)))
796
                                goto next_normal;
797
                        if (r->id.idiag_sport != inet->sport &&
798
                            r->id.idiag_sport)
799
                                goto next_normal;
800
                        if (r->id.idiag_dport != inet->dport &&
801
                            r->id.idiag_dport)
802
                                goto next_normal;
803
                        if (inet_csk_diag_dump(sk, skb, cb) < 0) {
804
                                read_unlock_bh(lock);
805
                                goto done;
806
                        }
807
next_normal:
808
                        ++num;
809
                }
810
 
811
                if (r->idiag_states & TCPF_TIME_WAIT) {
812
                        struct inet_timewait_sock *tw;
813
 
814
                        inet_twsk_for_each(tw, node,
815
                                    &head->twchain) {
816
 
817
                                if (num < s_num)
818
                                        goto next_dying;
819
                                if (r->id.idiag_sport != tw->tw_sport &&
820
                                    r->id.idiag_sport)
821
                                        goto next_dying;
822
                                if (r->id.idiag_dport != tw->tw_dport &&
823
                                    r->id.idiag_dport)
824
                                        goto next_dying;
825
                                if (inet_twsk_diag_dump(tw, skb, cb) < 0) {
826
                                        read_unlock_bh(lock);
827
                                        goto done;
828
                                }
829
next_dying:
830
                                ++num;
831
                        }
832
                }
833
                read_unlock_bh(lock);
834
        }
835
 
836
done:
837
        cb->args[1] = i;
838
        cb->args[2] = num;
839
unlock:
840
        inet_diag_unlock_handler(handler);
841
no_handler:
842
        return skb->len;
843
}
844
 
845
static int inet_diag_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
846
{
847
        int hdrlen = sizeof(struct inet_diag_req);
848
 
849
        if (nlh->nlmsg_type >= INET_DIAG_GETSOCK_MAX ||
850
            nlmsg_len(nlh) < hdrlen)
851
                return -EINVAL;
852
 
853
        if (nlh->nlmsg_flags & NLM_F_DUMP) {
854
                if (nlmsg_attrlen(nlh, hdrlen)) {
855
                        struct nlattr *attr;
856
 
857
                        attr = nlmsg_find_attr(nlh, hdrlen,
858
                                               INET_DIAG_REQ_BYTECODE);
859
                        if (attr == NULL ||
860
                            nla_len(attr) < sizeof(struct inet_diag_bc_op) ||
861
                            inet_diag_bc_audit(nla_data(attr), nla_len(attr)))
862
                                return -EINVAL;
863
                }
864
 
865
                return netlink_dump_start(idiagnl, skb, nlh,
866
                                          inet_diag_dump, NULL);
867
        }
868
 
869
        return inet_diag_get_exact(skb, nlh);
870
}
871
 
872
static DEFINE_MUTEX(inet_diag_mutex);
873
 
874
static void inet_diag_rcv(struct sk_buff *skb)
875
{
876
        mutex_lock(&inet_diag_mutex);
877
        netlink_rcv_skb(skb, &inet_diag_rcv_msg);
878
        mutex_unlock(&inet_diag_mutex);
879
}
880
 
881
int inet_diag_register(const struct inet_diag_handler *h)
882
{
883
        const __u16 type = h->idiag_type;
884
        int err = -EINVAL;
885
 
886
        if (type >= INET_DIAG_GETSOCK_MAX)
887
                goto out;
888
 
889
        mutex_lock(&inet_diag_table_mutex);
890
        err = -EEXIST;
891
        if (inet_diag_table[type] == NULL) {
892
                inet_diag_table[type] = h;
893
                err = 0;
894
        }
895
        mutex_unlock(&inet_diag_table_mutex);
896
out:
897
        return err;
898
}
899
EXPORT_SYMBOL_GPL(inet_diag_register);
900
 
901
void inet_diag_unregister(const struct inet_diag_handler *h)
902
{
903
        const __u16 type = h->idiag_type;
904
 
905
        if (type >= INET_DIAG_GETSOCK_MAX)
906
                return;
907
 
908
        mutex_lock(&inet_diag_table_mutex);
909
        inet_diag_table[type] = NULL;
910
        mutex_unlock(&inet_diag_table_mutex);
911
}
912
EXPORT_SYMBOL_GPL(inet_diag_unregister);
913
 
914
static int __init inet_diag_init(void)
915
{
916
        const int inet_diag_table_size = (INET_DIAG_GETSOCK_MAX *
917
                                          sizeof(struct inet_diag_handler *));
918
        int err = -ENOMEM;
919
 
920
        inet_diag_table = kzalloc(inet_diag_table_size, GFP_KERNEL);
921
        if (!inet_diag_table)
922
                goto out;
923
 
924
        idiagnl = netlink_kernel_create(&init_net, NETLINK_INET_DIAG, 0,
925
                                        inet_diag_rcv, NULL, THIS_MODULE);
926
        if (idiagnl == NULL)
927
                goto out_free_table;
928
        err = 0;
929
out:
930
        return err;
931
out_free_table:
932
        kfree(inet_diag_table);
933
        goto out;
934
}
935
 
936
static void __exit inet_diag_exit(void)
937
{
938
        sock_release(idiagnl->sk_socket);
939
        kfree(inet_diag_table);
940
}
941
 
942
module_init(inet_diag_init);
943
module_exit(inet_diag_exit);
944
MODULE_LICENSE("GPL");
945
MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_INET_DIAG);

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.