inet_diag.c revision c0636faa539ec4205ec50e80844a5b0454b4bbaa
1/*
2 * inet_diag.c	Module for monitoring INET transport protocols sockets.
3 *
4 * Authors:	Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
5 *
6 *	This program is free software; you can redistribute it and/or
7 *      modify it under the terms of the GNU General Public License
8 *      as published by the Free Software Foundation; either version
9 *      2 of the License, or (at your option) any later version.
10 */
11
12#include <linux/kernel.h>
13#include <linux/module.h>
14#include <linux/types.h>
15#include <linux/fcntl.h>
16#include <linux/random.h>
17#include <linux/slab.h>
18#include <linux/cache.h>
19#include <linux/init.h>
20#include <linux/time.h>
21
22#include <net/icmp.h>
23#include <net/tcp.h>
24#include <net/ipv6.h>
25#include <net/inet_common.h>
26#include <net/inet_connection_sock.h>
27#include <net/inet_hashtables.h>
28#include <net/inet_timewait_sock.h>
29#include <net/inet6_hashtables.h>
30#include <net/netlink.h>
31
32#include <linux/inet.h>
33#include <linux/stddef.h>
34
35#include <linux/inet_diag.h>
36#include <linux/sock_diag.h>
37
38static const struct inet_diag_handler **inet_diag_table;
39
40struct inet_diag_entry {
41	__be32 *saddr;
42	__be32 *daddr;
43	u16 sport;
44	u16 dport;
45	u16 family;
46	u16 userlocks;
47};
48
49#define INET_DIAG_PUT(skb, attrtype, attrlen) \
50	RTA_DATA(__RTA_PUT(skb, attrtype, attrlen))
51
52static DEFINE_MUTEX(inet_diag_table_mutex);
53
54static const struct inet_diag_handler *inet_diag_lock_handler(int proto)
55{
56	if (!inet_diag_table[proto])
57		request_module("net-pf-%d-proto-%d-type-%d-%d", PF_NETLINK,
58			       NETLINK_SOCK_DIAG, AF_INET, proto);
59
60	mutex_lock(&inet_diag_table_mutex);
61	if (!inet_diag_table[proto])
62		return ERR_PTR(-ENOENT);
63
64	return inet_diag_table[proto];
65}
66
67static inline void inet_diag_unlock_handler(
68	const struct inet_diag_handler *handler)
69{
70	mutex_unlock(&inet_diag_table_mutex);
71}
72
73int inet_sk_diag_fill(struct sock *sk, struct inet_connection_sock *icsk,
74			      struct sk_buff *skb, struct inet_diag_req *req,
75			      u32 pid, u32 seq, u16 nlmsg_flags,
76			      const struct nlmsghdr *unlh)
77{
78	const struct inet_sock *inet = inet_sk(sk);
79	struct inet_diag_msg *r;
80	struct nlmsghdr  *nlh;
81	void *info = NULL;
82	struct inet_diag_meminfo  *minfo = NULL;
83	unsigned char	 *b = skb_tail_pointer(skb);
84	const struct inet_diag_handler *handler;
85	int ext = req->idiag_ext;
86
87	handler = inet_diag_table[req->sdiag_protocol];
88	BUG_ON(handler == NULL);
89
90	nlh = NLMSG_PUT(skb, pid, seq, unlh->nlmsg_type, sizeof(*r));
91	nlh->nlmsg_flags = nlmsg_flags;
92
93	r = NLMSG_DATA(nlh);
94	BUG_ON(sk->sk_state == TCP_TIME_WAIT);
95
96	if (ext & (1 << (INET_DIAG_MEMINFO - 1)))
97		minfo = INET_DIAG_PUT(skb, INET_DIAG_MEMINFO, sizeof(*minfo));
98
99	r->idiag_family = sk->sk_family;
100	r->idiag_state = sk->sk_state;
101	r->idiag_timer = 0;
102	r->idiag_retrans = 0;
103
104	r->id.idiag_if = sk->sk_bound_dev_if;
105	sock_diag_save_cookie(sk, r->id.idiag_cookie);
106
107	r->id.idiag_sport = inet->inet_sport;
108	r->id.idiag_dport = inet->inet_dport;
109	r->id.idiag_src[0] = inet->inet_rcv_saddr;
110	r->id.idiag_dst[0] = inet->inet_daddr;
111
112	/* IPv6 dual-stack sockets use inet->tos for IPv4 connections,
113	 * hence this needs to be included regardless of socket family.
114	 */
115	if (ext & (1 << (INET_DIAG_TOS - 1)))
116		RTA_PUT_U8(skb, INET_DIAG_TOS, inet->tos);
117
118#if IS_ENABLED(CONFIG_IPV6)
119	if (r->idiag_family == AF_INET6) {
120		const struct ipv6_pinfo *np = inet6_sk(sk);
121
122		*(struct in6_addr *)r->id.idiag_src = np->rcv_saddr;
123		*(struct in6_addr *)r->id.idiag_dst = np->daddr;
124		if (ext & (1 << (INET_DIAG_TCLASS - 1)))
125			RTA_PUT_U8(skb, INET_DIAG_TCLASS, np->tclass);
126	}
127#endif
128
129	r->idiag_uid = sock_i_uid(sk);
130	r->idiag_inode = sock_i_ino(sk);
131
132	if (minfo) {
133		minfo->idiag_rmem = sk_rmem_alloc_get(sk);
134		minfo->idiag_wmem = sk->sk_wmem_queued;
135		minfo->idiag_fmem = sk->sk_forward_alloc;
136		minfo->idiag_tmem = sk_wmem_alloc_get(sk);
137	}
138
139	if (ext & (1 << (INET_DIAG_SKMEMINFO - 1)))
140		if (sock_diag_put_meminfo(sk, skb, INET_DIAG_SKMEMINFO))
141			goto rtattr_failure;
142
143	if (icsk == NULL) {
144		r->idiag_rqueue = r->idiag_wqueue = 0;
145		goto out;
146	}
147
148#define EXPIRES_IN_MS(tmo)  DIV_ROUND_UP((tmo - jiffies) * 1000, HZ)
149
150	if (icsk->icsk_pending == ICSK_TIME_RETRANS) {
151		r->idiag_timer = 1;
152		r->idiag_retrans = icsk->icsk_retransmits;
153		r->idiag_expires = EXPIRES_IN_MS(icsk->icsk_timeout);
154	} else if (icsk->icsk_pending == ICSK_TIME_PROBE0) {
155		r->idiag_timer = 4;
156		r->idiag_retrans = icsk->icsk_probes_out;
157		r->idiag_expires = EXPIRES_IN_MS(icsk->icsk_timeout);
158	} else if (timer_pending(&sk->sk_timer)) {
159		r->idiag_timer = 2;
160		r->idiag_retrans = icsk->icsk_probes_out;
161		r->idiag_expires = EXPIRES_IN_MS(sk->sk_timer.expires);
162	} else {
163		r->idiag_timer = 0;
164		r->idiag_expires = 0;
165	}
166#undef EXPIRES_IN_MS
167
168	if (ext & (1 << (INET_DIAG_INFO - 1)))
169		info = INET_DIAG_PUT(skb, INET_DIAG_INFO, sizeof(struct tcp_info));
170
171	if ((ext & (1 << (INET_DIAG_CONG - 1))) && icsk->icsk_ca_ops) {
172		const size_t len = strlen(icsk->icsk_ca_ops->name);
173
174		strcpy(INET_DIAG_PUT(skb, INET_DIAG_CONG, len + 1),
175		       icsk->icsk_ca_ops->name);
176	}
177
178	handler->idiag_get_info(sk, r, info);
179
180	if (sk->sk_state < TCP_TIME_WAIT &&
181	    icsk->icsk_ca_ops && icsk->icsk_ca_ops->get_info)
182		icsk->icsk_ca_ops->get_info(sk, ext, skb);
183
184out:
185	nlh->nlmsg_len = skb_tail_pointer(skb) - b;
186	return skb->len;
187
188rtattr_failure:
189nlmsg_failure:
190	nlmsg_trim(skb, b);
191	return -EMSGSIZE;
192}
193EXPORT_SYMBOL_GPL(inet_sk_diag_fill);
194
195static int inet_csk_diag_fill(struct sock *sk,
196			      struct sk_buff *skb, struct inet_diag_req *req,
197			      u32 pid, u32 seq, u16 nlmsg_flags,
198			      const struct nlmsghdr *unlh)
199{
200	return inet_sk_diag_fill(sk, inet_csk(sk),
201			skb, req, pid, seq, nlmsg_flags, unlh);
202}
203
204static int inet_twsk_diag_fill(struct inet_timewait_sock *tw,
205			       struct sk_buff *skb, struct inet_diag_req *req,
206			       u32 pid, u32 seq, u16 nlmsg_flags,
207			       const struct nlmsghdr *unlh)
208{
209	long tmo;
210	struct inet_diag_msg *r;
211	const unsigned char *previous_tail = skb_tail_pointer(skb);
212	struct nlmsghdr *nlh = NLMSG_PUT(skb, pid, seq,
213					 unlh->nlmsg_type, sizeof(*r));
214
215	r = NLMSG_DATA(nlh);
216	BUG_ON(tw->tw_state != TCP_TIME_WAIT);
217
218	nlh->nlmsg_flags = nlmsg_flags;
219
220	tmo = tw->tw_ttd - jiffies;
221	if (tmo < 0)
222		tmo = 0;
223
224	r->idiag_family	      = tw->tw_family;
225	r->idiag_retrans      = 0;
226	r->id.idiag_if	      = tw->tw_bound_dev_if;
227	sock_diag_save_cookie(tw, r->id.idiag_cookie);
228	r->id.idiag_sport     = tw->tw_sport;
229	r->id.idiag_dport     = tw->tw_dport;
230	r->id.idiag_src[0]    = tw->tw_rcv_saddr;
231	r->id.idiag_dst[0]    = tw->tw_daddr;
232	r->idiag_state	      = tw->tw_substate;
233	r->idiag_timer	      = 3;
234	r->idiag_expires      = DIV_ROUND_UP(tmo * 1000, HZ);
235	r->idiag_rqueue	      = 0;
236	r->idiag_wqueue	      = 0;
237	r->idiag_uid	      = 0;
238	r->idiag_inode	      = 0;
239#if IS_ENABLED(CONFIG_IPV6)
240	if (tw->tw_family == AF_INET6) {
241		const struct inet6_timewait_sock *tw6 =
242						inet6_twsk((struct sock *)tw);
243
244		*(struct in6_addr *)r->id.idiag_src = tw6->tw_v6_rcv_saddr;
245		*(struct in6_addr *)r->id.idiag_dst = tw6->tw_v6_daddr;
246	}
247#endif
248	nlh->nlmsg_len = skb_tail_pointer(skb) - previous_tail;
249	return skb->len;
250nlmsg_failure:
251	nlmsg_trim(skb, previous_tail);
252	return -EMSGSIZE;
253}
254
255static int sk_diag_fill(struct sock *sk, struct sk_buff *skb,
256			struct inet_diag_req *r, u32 pid, u32 seq, u16 nlmsg_flags,
257			const struct nlmsghdr *unlh)
258{
259	if (sk->sk_state == TCP_TIME_WAIT)
260		return inet_twsk_diag_fill((struct inet_timewait_sock *)sk,
261					   skb, r, pid, seq, nlmsg_flags,
262					   unlh);
263	return inet_csk_diag_fill(sk, skb, r, pid, seq, nlmsg_flags, unlh);
264}
265
266int inet_diag_dump_one_icsk(struct inet_hashinfo *hashinfo, struct sk_buff *in_skb,
267		const struct nlmsghdr *nlh, struct inet_diag_req *req)
268{
269	int err;
270	struct sock *sk;
271	struct sk_buff *rep;
272
273	err = -EINVAL;
274	if (req->sdiag_family == AF_INET) {
275		sk = inet_lookup(&init_net, hashinfo, req->id.idiag_dst[0],
276				 req->id.idiag_dport, req->id.idiag_src[0],
277				 req->id.idiag_sport, req->id.idiag_if);
278	}
279#if IS_ENABLED(CONFIG_IPV6)
280	else if (req->sdiag_family == AF_INET6) {
281		sk = inet6_lookup(&init_net, hashinfo,
282				  (struct in6_addr *)req->id.idiag_dst,
283				  req->id.idiag_dport,
284				  (struct in6_addr *)req->id.idiag_src,
285				  req->id.idiag_sport,
286				  req->id.idiag_if);
287	}
288#endif
289	else {
290		goto out_nosk;
291	}
292
293	err = -ENOENT;
294	if (sk == NULL)
295		goto out_nosk;
296
297	err = sock_diag_check_cookie(sk, req->id.idiag_cookie);
298	if (err)
299		goto out;
300
301	err = -ENOMEM;
302	rep = alloc_skb(NLMSG_SPACE((sizeof(struct inet_diag_msg) +
303				     sizeof(struct inet_diag_meminfo) +
304				     sizeof(struct tcp_info) + 64)),
305			GFP_KERNEL);
306	if (!rep)
307		goto out;
308
309	err = sk_diag_fill(sk, rep, req,
310			   NETLINK_CB(in_skb).pid,
311			   nlh->nlmsg_seq, 0, nlh);
312	if (err < 0) {
313		WARN_ON(err == -EMSGSIZE);
314		kfree_skb(rep);
315		goto out;
316	}
317	err = netlink_unicast(sock_diag_nlsk, rep, NETLINK_CB(in_skb).pid,
318			      MSG_DONTWAIT);
319	if (err > 0)
320		err = 0;
321
322out:
323	if (sk) {
324		if (sk->sk_state == TCP_TIME_WAIT)
325			inet_twsk_put((struct inet_timewait_sock *)sk);
326		else
327			sock_put(sk);
328	}
329out_nosk:
330	return err;
331}
332EXPORT_SYMBOL_GPL(inet_diag_dump_one_icsk);
333
334static int inet_diag_get_exact(struct sk_buff *in_skb,
335			       const struct nlmsghdr *nlh,
336			       struct inet_diag_req *req)
337{
338	const struct inet_diag_handler *handler;
339	int err;
340
341	handler = inet_diag_lock_handler(req->sdiag_protocol);
342	if (IS_ERR(handler))
343		err = PTR_ERR(handler);
344	else
345		err = handler->dump_one(in_skb, nlh, req);
346	inet_diag_unlock_handler(handler);
347
348	return err;
349}
350
351static int bitstring_match(const __be32 *a1, const __be32 *a2, int bits)
352{
353	int words = bits >> 5;
354
355	bits &= 0x1f;
356
357	if (words) {
358		if (memcmp(a1, a2, words << 2))
359			return 0;
360	}
361	if (bits) {
362		__be32 w1, w2;
363		__be32 mask;
364
365		w1 = a1[words];
366		w2 = a2[words];
367
368		mask = htonl((0xffffffff) << (32 - bits));
369
370		if ((w1 ^ w2) & mask)
371			return 0;
372	}
373
374	return 1;
375}
376
377
378static int inet_diag_bc_run(const struct nlattr *_bc,
379		const struct inet_diag_entry *entry)
380{
381	const void *bc = nla_data(_bc);
382	int len = nla_len(_bc);
383
384	while (len > 0) {
385		int yes = 1;
386		const struct inet_diag_bc_op *op = bc;
387
388		switch (op->code) {
389		case INET_DIAG_BC_NOP:
390			break;
391		case INET_DIAG_BC_JMP:
392			yes = 0;
393			break;
394		case INET_DIAG_BC_S_GE:
395			yes = entry->sport >= op[1].no;
396			break;
397		case INET_DIAG_BC_S_LE:
398			yes = entry->sport <= op[1].no;
399			break;
400		case INET_DIAG_BC_D_GE:
401			yes = entry->dport >= op[1].no;
402			break;
403		case INET_DIAG_BC_D_LE:
404			yes = entry->dport <= op[1].no;
405			break;
406		case INET_DIAG_BC_AUTO:
407			yes = !(entry->userlocks & SOCK_BINDPORT_LOCK);
408			break;
409		case INET_DIAG_BC_S_COND:
410		case INET_DIAG_BC_D_COND: {
411			struct inet_diag_hostcond *cond;
412			__be32 *addr;
413
414			cond = (struct inet_diag_hostcond *)(op + 1);
415			if (cond->port != -1 &&
416			    cond->port != (op->code == INET_DIAG_BC_S_COND ?
417					     entry->sport : entry->dport)) {
418				yes = 0;
419				break;
420			}
421
422			if (cond->prefix_len == 0)
423				break;
424
425			if (op->code == INET_DIAG_BC_S_COND)
426				addr = entry->saddr;
427			else
428				addr = entry->daddr;
429
430			if (bitstring_match(addr, cond->addr,
431					    cond->prefix_len))
432				break;
433			if (entry->family == AF_INET6 &&
434			    cond->family == AF_INET) {
435				if (addr[0] == 0 && addr[1] == 0 &&
436				    addr[2] == htonl(0xffff) &&
437				    bitstring_match(addr + 3, cond->addr,
438						    cond->prefix_len))
439					break;
440			}
441			yes = 0;
442			break;
443		}
444		}
445
446		if (yes) {
447			len -= op->yes;
448			bc += op->yes;
449		} else {
450			len -= op->no;
451			bc += op->no;
452		}
453	}
454	return len == 0;
455}
456
457int inet_diag_bc_sk(const struct nlattr *bc, struct sock *sk)
458{
459	struct inet_diag_entry entry;
460	struct inet_sock *inet = inet_sk(sk);
461
462	if (bc == NULL)
463		return 1;
464
465	entry.family = sk->sk_family;
466#if IS_ENABLED(CONFIG_IPV6)
467	if (entry.family == AF_INET6) {
468		struct ipv6_pinfo *np = inet6_sk(sk);
469
470		entry.saddr = np->rcv_saddr.s6_addr32;
471		entry.daddr = np->daddr.s6_addr32;
472	} else
473#endif
474	{
475		entry.saddr = &inet->inet_rcv_saddr;
476		entry.daddr = &inet->inet_daddr;
477	}
478	entry.sport = inet->inet_num;
479	entry.dport = ntohs(inet->inet_dport);
480	entry.userlocks = sk->sk_userlocks;
481
482	return inet_diag_bc_run(bc, &entry);
483}
484EXPORT_SYMBOL_GPL(inet_diag_bc_sk);
485
486static int valid_cc(const void *bc, int len, int cc)
487{
488	while (len >= 0) {
489		const struct inet_diag_bc_op *op = bc;
490
491		if (cc > len)
492			return 0;
493		if (cc == len)
494			return 1;
495		if (op->yes < 4 || op->yes & 3)
496			return 0;
497		len -= op->yes;
498		bc  += op->yes;
499	}
500	return 0;
501}
502
503static int inet_diag_bc_audit(const void *bytecode, int bytecode_len)
504{
505	const void *bc = bytecode;
506	int  len = bytecode_len;
507
508	while (len > 0) {
509		const struct inet_diag_bc_op *op = bc;
510
511//printk("BC: %d %d %d {%d} / %d\n", op->code, op->yes, op->no, op[1].no, len);
512		switch (op->code) {
513		case INET_DIAG_BC_AUTO:
514		case INET_DIAG_BC_S_COND:
515		case INET_DIAG_BC_D_COND:
516		case INET_DIAG_BC_S_GE:
517		case INET_DIAG_BC_S_LE:
518		case INET_DIAG_BC_D_GE:
519		case INET_DIAG_BC_D_LE:
520		case INET_DIAG_BC_JMP:
521			if (op->no < 4 || op->no > len + 4 || op->no & 3)
522				return -EINVAL;
523			if (op->no < len &&
524			    !valid_cc(bytecode, bytecode_len, len - op->no))
525				return -EINVAL;
526			break;
527		case INET_DIAG_BC_NOP:
528			break;
529		default:
530			return -EINVAL;
531		}
532		if (op->yes < 4 || op->yes > len + 4 || op->yes & 3)
533			return -EINVAL;
534		bc  += op->yes;
535		len -= op->yes;
536	}
537	return len == 0 ? 0 : -EINVAL;
538}
539
540static int inet_csk_diag_dump(struct sock *sk,
541			      struct sk_buff *skb,
542			      struct netlink_callback *cb,
543			      struct inet_diag_req *r,
544			      const struct nlattr *bc)
545{
546	if (!inet_diag_bc_sk(bc, sk))
547		return 0;
548
549	return inet_csk_diag_fill(sk, skb, r,
550				  NETLINK_CB(cb->skb).pid,
551				  cb->nlh->nlmsg_seq, NLM_F_MULTI, cb->nlh);
552}
553
554static int inet_twsk_diag_dump(struct inet_timewait_sock *tw,
555			       struct sk_buff *skb,
556			       struct netlink_callback *cb,
557			       struct inet_diag_req *r,
558			       const struct nlattr *bc)
559{
560	if (bc != NULL) {
561		struct inet_diag_entry entry;
562
563		entry.family = tw->tw_family;
564#if IS_ENABLED(CONFIG_IPV6)
565		if (tw->tw_family == AF_INET6) {
566			struct inet6_timewait_sock *tw6 =
567						inet6_twsk((struct sock *)tw);
568			entry.saddr = tw6->tw_v6_rcv_saddr.s6_addr32;
569			entry.daddr = tw6->tw_v6_daddr.s6_addr32;
570		} else
571#endif
572		{
573			entry.saddr = &tw->tw_rcv_saddr;
574			entry.daddr = &tw->tw_daddr;
575		}
576		entry.sport = tw->tw_num;
577		entry.dport = ntohs(tw->tw_dport);
578		entry.userlocks = 0;
579
580		if (!inet_diag_bc_run(bc, &entry))
581			return 0;
582	}
583
584	return inet_twsk_diag_fill(tw, skb, r,
585				   NETLINK_CB(cb->skb).pid,
586				   cb->nlh->nlmsg_seq, NLM_F_MULTI, cb->nlh);
587}
588
589static int inet_diag_fill_req(struct sk_buff *skb, struct sock *sk,
590			      struct request_sock *req, u32 pid, u32 seq,
591			      const struct nlmsghdr *unlh)
592{
593	const struct inet_request_sock *ireq = inet_rsk(req);
594	struct inet_sock *inet = inet_sk(sk);
595	unsigned char *b = skb_tail_pointer(skb);
596	struct inet_diag_msg *r;
597	struct nlmsghdr *nlh;
598	long tmo;
599
600	nlh = NLMSG_PUT(skb, pid, seq, unlh->nlmsg_type, sizeof(*r));
601	nlh->nlmsg_flags = NLM_F_MULTI;
602	r = NLMSG_DATA(nlh);
603
604	r->idiag_family = sk->sk_family;
605	r->idiag_state = TCP_SYN_RECV;
606	r->idiag_timer = 1;
607	r->idiag_retrans = req->retrans;
608
609	r->id.idiag_if = sk->sk_bound_dev_if;
610	sock_diag_save_cookie(req, r->id.idiag_cookie);
611
612	tmo = req->expires - jiffies;
613	if (tmo < 0)
614		tmo = 0;
615
616	r->id.idiag_sport = inet->inet_sport;
617	r->id.idiag_dport = ireq->rmt_port;
618	r->id.idiag_src[0] = ireq->loc_addr;
619	r->id.idiag_dst[0] = ireq->rmt_addr;
620	r->idiag_expires = jiffies_to_msecs(tmo);
621	r->idiag_rqueue = 0;
622	r->idiag_wqueue = 0;
623	r->idiag_uid = sock_i_uid(sk);
624	r->idiag_inode = 0;
625#if IS_ENABLED(CONFIG_IPV6)
626	if (r->idiag_family == AF_INET6) {
627		*(struct in6_addr *)r->id.idiag_src = inet6_rsk(req)->loc_addr;
628		*(struct in6_addr *)r->id.idiag_dst = inet6_rsk(req)->rmt_addr;
629	}
630#endif
631	nlh->nlmsg_len = skb_tail_pointer(skb) - b;
632
633	return skb->len;
634
635nlmsg_failure:
636	nlmsg_trim(skb, b);
637	return -1;
638}
639
640static int inet_diag_dump_reqs(struct sk_buff *skb, struct sock *sk,
641			       struct netlink_callback *cb,
642			       struct inet_diag_req *r,
643			       const struct nlattr *bc)
644{
645	struct inet_diag_entry entry;
646	struct inet_connection_sock *icsk = inet_csk(sk);
647	struct listen_sock *lopt;
648	struct inet_sock *inet = inet_sk(sk);
649	int j, s_j;
650	int reqnum, s_reqnum;
651	int err = 0;
652
653	s_j = cb->args[3];
654	s_reqnum = cb->args[4];
655
656	if (s_j > 0)
657		s_j--;
658
659	entry.family = sk->sk_family;
660
661	read_lock_bh(&icsk->icsk_accept_queue.syn_wait_lock);
662
663	lopt = icsk->icsk_accept_queue.listen_opt;
664	if (!lopt || !lopt->qlen)
665		goto out;
666
667	if (bc != NULL) {
668		entry.sport = inet->inet_num;
669		entry.userlocks = sk->sk_userlocks;
670	}
671
672	for (j = s_j; j < lopt->nr_table_entries; j++) {
673		struct request_sock *req, *head = lopt->syn_table[j];
674
675		reqnum = 0;
676		for (req = head; req; reqnum++, req = req->dl_next) {
677			struct inet_request_sock *ireq = inet_rsk(req);
678
679			if (reqnum < s_reqnum)
680				continue;
681			if (r->id.idiag_dport != ireq->rmt_port &&
682			    r->id.idiag_dport)
683				continue;
684
685			if (bc) {
686				entry.saddr =
687#if IS_ENABLED(CONFIG_IPV6)
688					(entry.family == AF_INET6) ?
689					inet6_rsk(req)->loc_addr.s6_addr32 :
690#endif
691					&ireq->loc_addr;
692				entry.daddr =
693#if IS_ENABLED(CONFIG_IPV6)
694					(entry.family == AF_INET6) ?
695					inet6_rsk(req)->rmt_addr.s6_addr32 :
696#endif
697					&ireq->rmt_addr;
698				entry.dport = ntohs(ireq->rmt_port);
699
700				if (!inet_diag_bc_run(bc, &entry))
701					continue;
702			}
703
704			err = inet_diag_fill_req(skb, sk, req,
705					       NETLINK_CB(cb->skb).pid,
706					       cb->nlh->nlmsg_seq, cb->nlh);
707			if (err < 0) {
708				cb->args[3] = j + 1;
709				cb->args[4] = reqnum;
710				goto out;
711			}
712		}
713
714		s_reqnum = 0;
715	}
716
717out:
718	read_unlock_bh(&icsk->icsk_accept_queue.syn_wait_lock);
719
720	return err;
721}
722
723void inet_diag_dump_icsk(struct inet_hashinfo *hashinfo, struct sk_buff *skb,
724		struct netlink_callback *cb, struct inet_diag_req *r, struct nlattr *bc)
725{
726	int i, num;
727	int s_i, s_num;
728
729	s_i = cb->args[1];
730	s_num = num = cb->args[2];
731
732	if (cb->args[0] == 0) {
733		if (!(r->idiag_states & (TCPF_LISTEN | TCPF_SYN_RECV)))
734			goto skip_listen_ht;
735
736		for (i = s_i; i < INET_LHTABLE_SIZE; i++) {
737			struct sock *sk;
738			struct hlist_nulls_node *node;
739			struct inet_listen_hashbucket *ilb;
740
741			num = 0;
742			ilb = &hashinfo->listening_hash[i];
743			spin_lock_bh(&ilb->lock);
744			sk_nulls_for_each(sk, node, &ilb->head) {
745				struct inet_sock *inet = inet_sk(sk);
746
747				if (num < s_num) {
748					num++;
749					continue;
750				}
751
752				if (r->sdiag_family != AF_UNSPEC &&
753						sk->sk_family != r->sdiag_family)
754					goto next_listen;
755
756				if (r->id.idiag_sport != inet->inet_sport &&
757				    r->id.idiag_sport)
758					goto next_listen;
759
760				if (!(r->idiag_states & TCPF_LISTEN) ||
761				    r->id.idiag_dport ||
762				    cb->args[3] > 0)
763					goto syn_recv;
764
765				if (inet_csk_diag_dump(sk, skb, cb, r, bc) < 0) {
766					spin_unlock_bh(&ilb->lock);
767					goto done;
768				}
769
770syn_recv:
771				if (!(r->idiag_states & TCPF_SYN_RECV))
772					goto next_listen;
773
774				if (inet_diag_dump_reqs(skb, sk, cb, r, bc) < 0) {
775					spin_unlock_bh(&ilb->lock);
776					goto done;
777				}
778
779next_listen:
780				cb->args[3] = 0;
781				cb->args[4] = 0;
782				++num;
783			}
784			spin_unlock_bh(&ilb->lock);
785
786			s_num = 0;
787			cb->args[3] = 0;
788			cb->args[4] = 0;
789		}
790skip_listen_ht:
791		cb->args[0] = 1;
792		s_i = num = s_num = 0;
793	}
794
795	if (!(r->idiag_states & ~(TCPF_LISTEN | TCPF_SYN_RECV)))
796		goto out;
797
798	for (i = s_i; i <= hashinfo->ehash_mask; i++) {
799		struct inet_ehash_bucket *head = &hashinfo->ehash[i];
800		spinlock_t *lock = inet_ehash_lockp(hashinfo, i);
801		struct sock *sk;
802		struct hlist_nulls_node *node;
803
804		num = 0;
805
806		if (hlist_nulls_empty(&head->chain) &&
807			hlist_nulls_empty(&head->twchain))
808			continue;
809
810		if (i > s_i)
811			s_num = 0;
812
813		spin_lock_bh(lock);
814		sk_nulls_for_each(sk, node, &head->chain) {
815			struct inet_sock *inet = inet_sk(sk);
816
817			if (num < s_num)
818				goto next_normal;
819			if (!(r->idiag_states & (1 << sk->sk_state)))
820				goto next_normal;
821			if (r->sdiag_family != AF_UNSPEC &&
822					sk->sk_family != r->sdiag_family)
823				goto next_normal;
824			if (r->id.idiag_sport != inet->inet_sport &&
825			    r->id.idiag_sport)
826				goto next_normal;
827			if (r->id.idiag_dport != inet->inet_dport &&
828			    r->id.idiag_dport)
829				goto next_normal;
830			if (inet_csk_diag_dump(sk, skb, cb, r, bc) < 0) {
831				spin_unlock_bh(lock);
832				goto done;
833			}
834next_normal:
835			++num;
836		}
837
838		if (r->idiag_states & TCPF_TIME_WAIT) {
839			struct inet_timewait_sock *tw;
840
841			inet_twsk_for_each(tw, node,
842				    &head->twchain) {
843
844				if (num < s_num)
845					goto next_dying;
846				if (r->sdiag_family != AF_UNSPEC &&
847						tw->tw_family != r->sdiag_family)
848					goto next_dying;
849				if (r->id.idiag_sport != tw->tw_sport &&
850				    r->id.idiag_sport)
851					goto next_dying;
852				if (r->id.idiag_dport != tw->tw_dport &&
853				    r->id.idiag_dport)
854					goto next_dying;
855				if (inet_twsk_diag_dump(tw, skb, cb, r, bc) < 0) {
856					spin_unlock_bh(lock);
857					goto done;
858				}
859next_dying:
860				++num;
861			}
862		}
863		spin_unlock_bh(lock);
864	}
865
866done:
867	cb->args[1] = i;
868	cb->args[2] = num;
869out:
870	;
871}
872EXPORT_SYMBOL_GPL(inet_diag_dump_icsk);
873
874static int __inet_diag_dump(struct sk_buff *skb, struct netlink_callback *cb,
875		struct inet_diag_req *r, struct nlattr *bc)
876{
877	const struct inet_diag_handler *handler;
878
879	handler = inet_diag_lock_handler(r->sdiag_protocol);
880	if (!IS_ERR(handler))
881		handler->dump(skb, cb, r, bc);
882	inet_diag_unlock_handler(handler);
883
884	return skb->len;
885}
886
887static int inet_diag_dump(struct sk_buff *skb, struct netlink_callback *cb)
888{
889	struct nlattr *bc = NULL;
890	int hdrlen = sizeof(struct inet_diag_req);
891
892	if (nlmsg_attrlen(cb->nlh, hdrlen))
893		bc = nlmsg_find_attr(cb->nlh, hdrlen, INET_DIAG_REQ_BYTECODE);
894
895	return __inet_diag_dump(skb, cb, (struct inet_diag_req *)NLMSG_DATA(cb->nlh), bc);
896}
897
898static inline int inet_diag_type2proto(int type)
899{
900	switch (type) {
901	case TCPDIAG_GETSOCK:
902		return IPPROTO_TCP;
903	case DCCPDIAG_GETSOCK:
904		return IPPROTO_DCCP;
905	default:
906		return 0;
907	}
908}
909
910static int inet_diag_dump_compat(struct sk_buff *skb, struct netlink_callback *cb)
911{
912	struct inet_diag_req_compat *rc = NLMSG_DATA(cb->nlh);
913	struct inet_diag_req req;
914	struct nlattr *bc = NULL;
915	int hdrlen = sizeof(struct inet_diag_req_compat);
916
917	req.sdiag_family = AF_UNSPEC; /* compatibility */
918	req.sdiag_protocol = inet_diag_type2proto(cb->nlh->nlmsg_type);
919	req.idiag_ext = rc->idiag_ext;
920	req.idiag_states = rc->idiag_states;
921	req.id = rc->id;
922
923	if (nlmsg_attrlen(cb->nlh, hdrlen))
924		bc = nlmsg_find_attr(cb->nlh, hdrlen, INET_DIAG_REQ_BYTECODE);
925
926	return __inet_diag_dump(skb, cb, &req, bc);
927}
928
929static int inet_diag_get_exact_compat(struct sk_buff *in_skb,
930			       const struct nlmsghdr *nlh)
931{
932	struct inet_diag_req_compat *rc = NLMSG_DATA(nlh);
933	struct inet_diag_req req;
934
935	req.sdiag_family = rc->idiag_family;
936	req.sdiag_protocol = inet_diag_type2proto(nlh->nlmsg_type);
937	req.idiag_ext = rc->idiag_ext;
938	req.idiag_states = rc->idiag_states;
939	req.id = rc->id;
940
941	return inet_diag_get_exact(in_skb, nlh, &req);
942}
943
944static int inet_diag_rcv_msg_compat(struct sk_buff *skb, struct nlmsghdr *nlh)
945{
946	int hdrlen = sizeof(struct inet_diag_req_compat);
947
948	if (nlh->nlmsg_type >= INET_DIAG_GETSOCK_MAX ||
949	    nlmsg_len(nlh) < hdrlen)
950		return -EINVAL;
951
952	if (nlh->nlmsg_flags & NLM_F_DUMP) {
953		if (nlmsg_attrlen(nlh, hdrlen)) {
954			struct nlattr *attr;
955
956			attr = nlmsg_find_attr(nlh, hdrlen,
957					       INET_DIAG_REQ_BYTECODE);
958			if (attr == NULL ||
959			    nla_len(attr) < sizeof(struct inet_diag_bc_op) ||
960			    inet_diag_bc_audit(nla_data(attr), nla_len(attr)))
961				return -EINVAL;
962		}
963
964		return netlink_dump_start(sock_diag_nlsk, skb, nlh,
965					  inet_diag_dump_compat, NULL, 0);
966	}
967
968	return inet_diag_get_exact_compat(skb, nlh);
969}
970
971static int inet_diag_handler_dump(struct sk_buff *skb, struct nlmsghdr *h)
972{
973	int hdrlen = sizeof(struct inet_diag_req);
974
975	if (nlmsg_len(h) < hdrlen)
976		return -EINVAL;
977
978	if (h->nlmsg_flags & NLM_F_DUMP) {
979		if (nlmsg_attrlen(h, hdrlen)) {
980			struct nlattr *attr;
981			attr = nlmsg_find_attr(h, hdrlen,
982					       INET_DIAG_REQ_BYTECODE);
983			if (attr == NULL ||
984			    nla_len(attr) < sizeof(struct inet_diag_bc_op) ||
985			    inet_diag_bc_audit(nla_data(attr), nla_len(attr)))
986				return -EINVAL;
987		}
988
989		return netlink_dump_start(sock_diag_nlsk, skb, h,
990					  inet_diag_dump, NULL, 0);
991	}
992
993	return inet_diag_get_exact(skb, h, (struct inet_diag_req *)NLMSG_DATA(h));
994}
995
996static struct sock_diag_handler inet_diag_handler = {
997	.family = AF_INET,
998	.dump = inet_diag_handler_dump,
999};
1000
1001static struct sock_diag_handler inet6_diag_handler = {
1002	.family = AF_INET6,
1003	.dump = inet_diag_handler_dump,
1004};
1005
1006int inet_diag_register(const struct inet_diag_handler *h)
1007{
1008	const __u16 type = h->idiag_type;
1009	int err = -EINVAL;
1010
1011	if (type >= IPPROTO_MAX)
1012		goto out;
1013
1014	mutex_lock(&inet_diag_table_mutex);
1015	err = -EEXIST;
1016	if (inet_diag_table[type] == NULL) {
1017		inet_diag_table[type] = h;
1018		err = 0;
1019	}
1020	mutex_unlock(&inet_diag_table_mutex);
1021out:
1022	return err;
1023}
1024EXPORT_SYMBOL_GPL(inet_diag_register);
1025
1026void inet_diag_unregister(const struct inet_diag_handler *h)
1027{
1028	const __u16 type = h->idiag_type;
1029
1030	if (type >= IPPROTO_MAX)
1031		return;
1032
1033	mutex_lock(&inet_diag_table_mutex);
1034	inet_diag_table[type] = NULL;
1035	mutex_unlock(&inet_diag_table_mutex);
1036}
1037EXPORT_SYMBOL_GPL(inet_diag_unregister);
1038
1039static int __init inet_diag_init(void)
1040{
1041	const int inet_diag_table_size = (IPPROTO_MAX *
1042					  sizeof(struct inet_diag_handler *));
1043	int err = -ENOMEM;
1044
1045	inet_diag_table = kzalloc(inet_diag_table_size, GFP_KERNEL);
1046	if (!inet_diag_table)
1047		goto out;
1048
1049	err = sock_diag_register(&inet_diag_handler);
1050	if (err)
1051		goto out_free_nl;
1052
1053	err = sock_diag_register(&inet6_diag_handler);
1054	if (err)
1055		goto out_free_inet;
1056
1057	sock_diag_register_inet_compat(inet_diag_rcv_msg_compat);
1058out:
1059	return err;
1060
1061out_free_inet:
1062	sock_diag_unregister(&inet_diag_handler);
1063out_free_nl:
1064	kfree(inet_diag_table);
1065	goto out;
1066}
1067
1068static void __exit inet_diag_exit(void)
1069{
1070	sock_diag_unregister(&inet6_diag_handler);
1071	sock_diag_unregister(&inet_diag_handler);
1072	sock_diag_unregister_inet_compat(inet_diag_rcv_msg_compat);
1073	kfree(inet_diag_table);
1074}
1075
1076module_init(inet_diag_init);
1077module_exit(inet_diag_exit);
1078MODULE_LICENSE("GPL");
1079MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_NETLINK, NETLINK_SOCK_DIAG, 2 /* AF_INET */);
1080MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_NETLINK, NETLINK_SOCK_DIAG, 10 /* AF_INET6 */);
1081