]>
Commit | Line | Data |
---|---|---|
2874c5fd | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
17b085ea ACM |
2 | /* |
3 | * tcp_diag.c Module for monitoring TCP transport protocols sockets. | |
4 | * | |
17b085ea | 5 | * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> |
17b085ea ACM |
6 | */ |
7 | ||
17b085ea | 8 | #include <linux/module.h> |
c1e64e29 LC |
9 | #include <linux/net.h> |
10 | #include <linux/sock_diag.h> | |
17b085ea ACM |
11 | #include <linux/inet_diag.h> |
12 | ||
13 | #include <linux/tcp.h> | |
14 | ||
c03fa9bc | 15 | #include <net/netlink.h> |
17b085ea ACM |
16 | #include <net/tcp.h> |
17 | ||
18 | static void tcp_diag_get_info(struct sock *sk, struct inet_diag_msg *r, | |
19 | void *_info) | |
20 | { | |
17b085ea ACM |
21 | struct tcp_info *info = _info; |
22 | ||
986ffdfd | 23 | if (inet_sk_state_load(sk) == TCP_LISTEN) { |
288efe86 | 24 | r->idiag_rqueue = READ_ONCE(sk->sk_ack_backlog); |
099ecf59 | 25 | r->idiag_wqueue = READ_ONCE(sk->sk_max_ack_backlog); |
35ac838a CG |
26 | } else if (sk->sk_type == SOCK_STREAM) { |
27 | const struct tcp_sock *tp = tcp_sk(sk); | |
28 | ||
7db48e98 ED |
29 | r->idiag_rqueue = max_t(int, READ_ONCE(tp->rcv_nxt) - |
30 | READ_ONCE(tp->copied_seq), 0); | |
0f317464 | 31 | r->idiag_wqueue = READ_ONCE(tp->write_seq) - tp->snd_una; |
5ee3afba | 32 | } |
00db4124 | 33 | if (info) |
17b085ea ACM |
34 | tcp_get_info(sk, info); |
35 | } | |
36 | ||
c03fa9bc ID |
37 | #ifdef CONFIG_TCP_MD5SIG |
38 | static void tcp_diag_md5sig_fill(struct tcp_diag_md5sig *info, | |
39 | const struct tcp_md5sig_key *key) | |
40 | { | |
41 | info->tcpm_family = key->family; | |
42 | info->tcpm_prefixlen = key->prefixlen; | |
43 | info->tcpm_keylen = key->keylen; | |
44 | memcpy(info->tcpm_key, key->key, key->keylen); | |
45 | ||
46 | if (key->family == AF_INET) | |
47 | info->tcpm_addr[0] = key->addr.a4.s_addr; | |
48 | #if IS_ENABLED(CONFIG_IPV6) | |
49 | else if (key->family == AF_INET6) | |
50 | memcpy(&info->tcpm_addr, &key->addr.a6, | |
51 | sizeof(info->tcpm_addr)); | |
52 | #endif | |
53 | } | |
54 | ||
55 | static int tcp_diag_put_md5sig(struct sk_buff *skb, | |
56 | const struct tcp_md5sig_info *md5sig) | |
57 | { | |
58 | const struct tcp_md5sig_key *key; | |
59 | struct tcp_diag_md5sig *info; | |
60 | struct nlattr *attr; | |
61 | int md5sig_count = 0; | |
62 | ||
63 | hlist_for_each_entry_rcu(key, &md5sig->head, node) | |
64 | md5sig_count++; | |
65 | if (md5sig_count == 0) | |
66 | return 0; | |
67 | ||
68 | attr = nla_reserve(skb, INET_DIAG_MD5SIG, | |
69 | md5sig_count * sizeof(struct tcp_diag_md5sig)); | |
70 | if (!attr) | |
71 | return -EMSGSIZE; | |
72 | ||
73 | info = nla_data(attr); | |
74 | memset(info, 0, md5sig_count * sizeof(struct tcp_diag_md5sig)); | |
75 | hlist_for_each_entry_rcu(key, &md5sig->head, node) { | |
76 | tcp_diag_md5sig_fill(info++, key); | |
77 | if (--md5sig_count == 0) | |
78 | break; | |
79 | } | |
80 | ||
81 | return 0; | |
82 | } | |
83 | #endif | |
84 | ||
61723b39 DC |
85 | static int tcp_diag_put_ulp(struct sk_buff *skb, struct sock *sk, |
86 | const struct tcp_ulp_ops *ulp_ops) | |
87 | { | |
88 | struct nlattr *nest; | |
89 | int err; | |
90 | ||
91 | nest = nla_nest_start_noflag(skb, INET_DIAG_ULP_INFO); | |
92 | if (!nest) | |
93 | return -EMSGSIZE; | |
94 | ||
95 | err = nla_put_string(skb, INET_ULP_INFO_NAME, ulp_ops->name); | |
96 | if (err) | |
97 | goto nla_failure; | |
98 | ||
99 | if (ulp_ops->get_info) | |
100 | err = ulp_ops->get_info(sk, skb); | |
101 | if (err) | |
102 | goto nla_failure; | |
103 | ||
104 | nla_nest_end(skb, nest); | |
105 | return 0; | |
106 | ||
107 | nla_failure: | |
108 | nla_nest_cancel(skb, nest); | |
109 | return err; | |
110 | } | |
111 | ||
c03fa9bc ID |
112 | static int tcp_diag_get_aux(struct sock *sk, bool net_admin, |
113 | struct sk_buff *skb) | |
114 | { | |
61723b39 DC |
115 | struct inet_connection_sock *icsk = inet_csk(sk); |
116 | int err = 0; | |
117 | ||
c03fa9bc ID |
118 | #ifdef CONFIG_TCP_MD5SIG |
119 | if (net_admin) { | |
120 | struct tcp_md5sig_info *md5sig; | |
c03fa9bc ID |
121 | |
122 | rcu_read_lock(); | |
123 | md5sig = rcu_dereference(tcp_sk(sk)->md5sig_info); | |
124 | if (md5sig) | |
125 | err = tcp_diag_put_md5sig(skb, md5sig); | |
126 | rcu_read_unlock(); | |
127 | if (err < 0) | |
128 | return err; | |
129 | } | |
130 | #endif | |
131 | ||
61723b39 DC |
132 | if (net_admin) { |
133 | const struct tcp_ulp_ops *ulp_ops; | |
134 | ||
135 | ulp_ops = icsk->icsk_ulp_ops; | |
136 | if (ulp_ops) | |
137 | err = tcp_diag_put_ulp(skb, sk, ulp_ops); | |
138 | if (err) | |
139 | return err; | |
140 | } | |
c03fa9bc ID |
141 | return 0; |
142 | } | |
143 | ||
144 | static size_t tcp_diag_get_aux_size(struct sock *sk, bool net_admin) | |
145 | { | |
61723b39 | 146 | struct inet_connection_sock *icsk = inet_csk(sk); |
c03fa9bc ID |
147 | size_t size = 0; |
148 | ||
149 | #ifdef CONFIG_TCP_MD5SIG | |
150 | if (net_admin && sk_fullsock(sk)) { | |
151 | const struct tcp_md5sig_info *md5sig; | |
152 | const struct tcp_md5sig_key *key; | |
153 | size_t md5sig_count = 0; | |
154 | ||
155 | rcu_read_lock(); | |
156 | md5sig = rcu_dereference(tcp_sk(sk)->md5sig_info); | |
157 | if (md5sig) { | |
158 | hlist_for_each_entry_rcu(key, &md5sig->head, node) | |
159 | md5sig_count++; | |
160 | } | |
161 | rcu_read_unlock(); | |
162 | size += nla_total_size(md5sig_count * | |
163 | sizeof(struct tcp_diag_md5sig)); | |
164 | } | |
165 | #endif | |
166 | ||
b58662a5 | 167 | if (net_admin && sk_fullsock(sk)) { |
61723b39 DC |
168 | const struct tcp_ulp_ops *ulp_ops; |
169 | ||
170 | ulp_ops = icsk->icsk_ulp_ops; | |
171 | if (ulp_ops) { | |
172 | size += nla_total_size(0) + | |
173 | nla_total_size(TCP_ULP_NAME_MAX); | |
174 | if (ulp_ops->get_info_size) | |
175 | size += ulp_ops->get_info_size(sk); | |
176 | } | |
177 | } | |
c03fa9bc ID |
178 | return size; |
179 | } | |
180 | ||
1942c518 | 181 | static void tcp_diag_dump(struct sk_buff *skb, struct netlink_callback *cb, |
0df6d328 | 182 | const struct inet_diag_req_v2 *r) |
1942c518 | 183 | { |
0df6d328 | 184 | inet_diag_dump_icsk(&tcp_hashinfo, skb, cb, r); |
1942c518 PE |
185 | } |
186 | ||
5682d393 | 187 | static int tcp_diag_dump_one(struct netlink_callback *cb, |
34160ea3 | 188 | const struct inet_diag_req_v2 *req) |
1942c518 | 189 | { |
5682d393 | 190 | return inet_diag_dump_one_icsk(&tcp_hashinfo, cb, req); |
1942c518 PE |
191 | } |
192 | ||
c1e64e29 LC |
193 | #ifdef CONFIG_INET_DIAG_DESTROY |
194 | static int tcp_diag_destroy(struct sk_buff *in_skb, | |
195 | const struct inet_diag_req_v2 *req) | |
196 | { | |
197 | struct net *net = sock_net(in_skb->sk); | |
198 | struct sock *sk = inet_diag_find_one_icsk(net, &tcp_hashinfo, req); | |
d7226c7a | 199 | int err; |
c1e64e29 LC |
200 | |
201 | if (IS_ERR(sk)) | |
202 | return PTR_ERR(sk); | |
203 | ||
d7226c7a DA |
204 | err = sock_diag_destroy(sk, ECONNABORTED); |
205 | ||
206 | sock_gen_put(sk); | |
207 | ||
208 | return err; | |
c1e64e29 LC |
209 | } |
210 | #endif | |
211 | ||
a7a0d6a8 | 212 | static const struct inet_diag_handler tcp_diag_handler = { |
c03fa9bc ID |
213 | .dump = tcp_diag_dump, |
214 | .dump_one = tcp_diag_dump_one, | |
215 | .idiag_get_info = tcp_diag_get_info, | |
216 | .idiag_get_aux = tcp_diag_get_aux, | |
217 | .idiag_get_aux_size = tcp_diag_get_aux_size, | |
218 | .idiag_type = IPPROTO_TCP, | |
219 | .idiag_info_size = sizeof(struct tcp_info), | |
c1e64e29 | 220 | #ifdef CONFIG_INET_DIAG_DESTROY |
c03fa9bc | 221 | .destroy = tcp_diag_destroy, |
c1e64e29 | 222 | #endif |
17b085ea ACM |
223 | }; |
224 | ||
225 | static int __init tcp_diag_init(void) | |
226 | { | |
227 | return inet_diag_register(&tcp_diag_handler); | |
228 | } | |
229 | ||
230 | static void __exit tcp_diag_exit(void) | |
231 | { | |
232 | inet_diag_unregister(&tcp_diag_handler); | |
233 | } | |
234 | ||
235 | module_init(tcp_diag_init); | |
236 | module_exit(tcp_diag_exit); | |
237 | MODULE_LICENSE("GPL"); | |
aec8dc62 | 238 | MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_NETLINK, NETLINK_SOCK_DIAG, 2-6 /* AF_INET - IPPROTO_TCP */); |