]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - net/netlink/genetlink.c
net: Add variants of capable for use on netlink messages
[mirror_ubuntu-zesty-kernel.git] / net / netlink / genetlink.c
CommitLineData
482a8524
TG
1/*
2 * NETLINK Generic Netlink Family
3 *
4 * Authors: Jamal Hadi Salim
5 * Thomas Graf <tgraf@suug.ch>
2dbba6f7 6 * Johannes Berg <johannes@sipsolutions.net>
482a8524
TG
7 */
8
482a8524
TG
9#include <linux/module.h>
10#include <linux/kernel.h>
5a0e3ad6 11#include <linux/slab.h>
482a8524
TG
12#include <linux/errno.h>
13#include <linux/types.h>
14#include <linux/socket.h>
15#include <linux/string.h>
16#include <linux/skbuff.h>
14cc3e2b 17#include <linux/mutex.h>
2dbba6f7 18#include <linux/bitmap.h>
def31174 19#include <linux/rwsem.h>
482a8524
TG
20#include <net/sock.h>
21#include <net/genetlink.h>
22
14cc3e2b 23static DEFINE_MUTEX(genl_mutex); /* serialization of message processing */
def31174 24static DECLARE_RWSEM(cb_lock);
482a8524 25
f408e0ce 26void genl_lock(void)
482a8524 27{
14cc3e2b 28 mutex_lock(&genl_mutex);
482a8524 29}
f408e0ce 30EXPORT_SYMBOL(genl_lock);
482a8524 31
f408e0ce 32void genl_unlock(void)
482a8524 33{
14cc3e2b 34 mutex_unlock(&genl_mutex);
482a8524 35}
f408e0ce 36EXPORT_SYMBOL(genl_unlock);
482a8524 37
320f5ea0 38#ifdef CONFIG_LOCKDEP
86b1309c
PS
39int lockdep_genl_is_held(void)
40{
41 return lockdep_is_held(&genl_mutex);
42}
43EXPORT_SYMBOL(lockdep_genl_is_held);
44#endif
45
def31174
PS
46static void genl_lock_all(void)
47{
48 down_write(&cb_lock);
49 genl_lock();
50}
51
52static void genl_unlock_all(void)
53{
54 genl_unlock();
55 up_write(&cb_lock);
56}
57
482a8524
TG
58#define GENL_FAM_TAB_SIZE 16
59#define GENL_FAM_TAB_MASK (GENL_FAM_TAB_SIZE - 1)
60
61static struct list_head family_ht[GENL_FAM_TAB_SIZE];
2dbba6f7
JB
62/*
63 * Bitmap of multicast groups that are currently in use.
64 *
65 * To avoid an allocation at boot of just one unsigned long,
66 * declare it global instead.
67 * Bit 0 is marked as already used since group 0 is invalid.
e5dcecba
JB
68 * Bit 1 is marked as already used since the drop-monitor code
69 * abuses the API and thinks it can statically use group 1.
70 * That group will typically conflict with other groups that
71 * any proper users use.
2a94fe48
JB
72 * Bit 16 is marked as used since it's used for generic netlink
73 * and the code no longer marks pre-reserved IDs as used.
2ecf7536
JB
74 * Bit 17 is marked as already used since the VFS quota code
75 * also abused this API and relied on family == group ID, we
76 * cater to that by giving it a static family and group ID.
5e53e689
JB
77 * Bit 18 is marked as already used since the PMCRAID driver
78 * did the same thing as the VFS quota code (maybe copied?)
2dbba6f7 79 */
2a94fe48 80static unsigned long mc_group_start = 0x3 | BIT(GENL_ID_CTRL) |
5e53e689
JB
81 BIT(GENL_ID_VFS_DQUOT) |
82 BIT(GENL_ID_PMCRAID);
2dbba6f7
JB
83static unsigned long *mc_groups = &mc_group_start;
84static unsigned long mc_groups_longs = 1;
482a8524 85
c2ebb908 86static int genl_ctrl_event(int event, struct genl_family *family,
2a94fe48
JB
87 const struct genl_multicast_group *grp,
88 int grp_id);
482a8524
TG
89
90static inline unsigned int genl_family_hash(unsigned int id)
91{
92 return id & GENL_FAM_TAB_MASK;
93}
94
95static inline struct list_head *genl_family_chain(unsigned int id)
96{
97 return &family_ht[genl_family_hash(id)];
98}
99
100static struct genl_family *genl_family_find_byid(unsigned int id)
101{
102 struct genl_family *f;
103
104 list_for_each_entry(f, genl_family_chain(id), family_list)
105 if (f->id == id)
106 return f;
107
108 return NULL;
109}
110
111static struct genl_family *genl_family_find_byname(char *name)
112{
113 struct genl_family *f;
114 int i;
115
116 for (i = 0; i < GENL_FAM_TAB_SIZE; i++)
117 list_for_each_entry(f, genl_family_chain(i), family_list)
118 if (strcmp(f->name, name) == 0)
119 return f;
120
121 return NULL;
122}
123
f84f771d 124static const struct genl_ops *genl_get_cmd(u8 cmd, struct genl_family *family)
482a8524 125{
d91824c0 126 int i;
482a8524 127
d91824c0
JB
128 for (i = 0; i < family->n_ops; i++)
129 if (family->ops[i].cmd == cmd)
130 return &family->ops[i];
482a8524
TG
131
132 return NULL;
133}
134
135/* Of course we are going to have problems once we hit
136 * 2^16 alive types, but that can only happen by year 2K
137*/
b57ef81f 138static u16 genl_generate_id(void)
482a8524 139{
988ade6b
KK
140 static u16 id_gen_idx = GENL_MIN_ID;
141 int i;
482a8524 142
988ade6b 143 for (i = 0; i <= GENL_MAX_ID - GENL_MIN_ID; i++) {
2ecf7536 144 if (id_gen_idx != GENL_ID_VFS_DQUOT &&
5e53e689 145 id_gen_idx != GENL_ID_PMCRAID &&
2ecf7536 146 !genl_family_find_byid(id_gen_idx))
988ade6b
KK
147 return id_gen_idx;
148 if (++id_gen_idx > GENL_MAX_ID)
482a8524 149 id_gen_idx = GENL_MIN_ID;
988ade6b 150 }
482a8524 151
988ade6b 152 return 0;
482a8524
TG
153}
154
2a94fe48 155static int genl_allocate_reserve_groups(int n_groups, int *first_id)
2dbba6f7 156{
2dbba6f7 157 unsigned long *new_groups;
2a94fe48
JB
158 int start = 0;
159 int i;
160 int id;
161 bool fits;
162
163 do {
164 if (start == 0)
165 id = find_first_zero_bit(mc_groups,
166 mc_groups_longs *
167 BITS_PER_LONG);
168 else
169 id = find_next_zero_bit(mc_groups,
170 mc_groups_longs * BITS_PER_LONG,
171 start);
172
173 fits = true;
174 for (i = id;
175 i < min_t(int, id + n_groups,
176 mc_groups_longs * BITS_PER_LONG);
177 i++) {
178 if (test_bit(i, mc_groups)) {
179 start = i;
180 fits = false;
181 break;
182 }
183 }
2dbba6f7 184
2a94fe48
JB
185 if (id >= mc_groups_longs * BITS_PER_LONG) {
186 unsigned long new_longs = mc_groups_longs +
187 BITS_TO_LONGS(n_groups);
188 size_t nlen = new_longs * sizeof(unsigned long);
189
190 if (mc_groups == &mc_group_start) {
191 new_groups = kzalloc(nlen, GFP_KERNEL);
192 if (!new_groups)
193 return -ENOMEM;
194 mc_groups = new_groups;
195 *mc_groups = mc_group_start;
196 } else {
197 new_groups = krealloc(mc_groups, nlen,
198 GFP_KERNEL);
199 if (!new_groups)
200 return -ENOMEM;
201 mc_groups = new_groups;
202 for (i = 0; i < BITS_TO_LONGS(n_groups); i++)
203 mc_groups[mc_groups_longs + i] = 0;
204 }
205 mc_groups_longs = new_longs;
206 }
207 } while (!fits);
2dbba6f7 208
2a94fe48
JB
209 for (i = id; i < id + n_groups; i++)
210 set_bit(i, mc_groups);
211 *first_id = id;
212 return 0;
213}
214
215static struct genl_family genl_ctrl;
216
217static int genl_validate_assign_mc_groups(struct genl_family *family)
218{
219 int first_id;
220 int n_groups = family->n_mcgrps;
0f0e2159 221 int err = 0, i;
2a94fe48
JB
222 bool groups_allocated = false;
223
224 if (!n_groups)
225 return 0;
226
227 for (i = 0; i < n_groups; i++) {
228 const struct genl_multicast_group *grp = &family->mcgrps[i];
229
230 if (WARN_ON(grp->name[0] == '\0'))
231 return -EINVAL;
232 if (WARN_ON(memchr(grp->name, '\0', GENL_NAMSIZ) == NULL))
233 return -EINVAL;
234 }
2dbba6f7 235
e5dcecba 236 /* special-case our own group and hacks */
2a94fe48
JB
237 if (family == &genl_ctrl) {
238 first_id = GENL_ID_CTRL;
239 BUG_ON(n_groups != 1);
240 } else if (strcmp(family->name, "NET_DM") == 0) {
241 first_id = 1;
242 BUG_ON(n_groups != 1);
5e53e689 243 } else if (family->id == GENL_ID_VFS_DQUOT) {
2a94fe48
JB
244 first_id = GENL_ID_VFS_DQUOT;
245 BUG_ON(n_groups != 1);
5e53e689
JB
246 } else if (family->id == GENL_ID_PMCRAID) {
247 first_id = GENL_ID_PMCRAID;
248 BUG_ON(n_groups != 1);
2a94fe48
JB
249 } else {
250 groups_allocated = true;
251 err = genl_allocate_reserve_groups(n_groups, &first_id);
252 if (err)
253 return err;
2dbba6f7
JB
254 }
255
2a94fe48
JB
256 family->mcgrp_offset = first_id;
257
258 /* if still initializing, can't and don't need to to realloc bitmaps */
259 if (!init_net.genl_sock)
260 return 0;
261
134e6375
JB
262 if (family->netnsok) {
263 struct net *net;
264
d136f1bd 265 netlink_table_grab();
134e6375
JB
266 rcu_read_lock();
267 for_each_net_rcu(net) {
d136f1bd 268 err = __netlink_change_ngroups(net->genl_sock,
134e6375
JB
269 mc_groups_longs * BITS_PER_LONG);
270 if (err) {
271 /*
272 * No need to roll back, can only fail if
273 * memory allocation fails and then the
274 * number of _possible_ groups has been
275 * increased on some sockets which is ok.
276 */
2a94fe48 277 break;
134e6375
JB
278 }
279 }
280 rcu_read_unlock();
d136f1bd 281 netlink_table_ungrab();
134e6375
JB
282 } else {
283 err = netlink_change_ngroups(init_net.genl_sock,
284 mc_groups_longs * BITS_PER_LONG);
134e6375 285 }
2dbba6f7 286
2a94fe48
JB
287 if (groups_allocated && err) {
288 for (i = 0; i < family->n_mcgrps; i++)
289 clear_bit(family->mcgrp_offset + i, mc_groups);
290 }
2dbba6f7 291
79d310d0 292 return err;
2dbba6f7 293}
2dbba6f7 294
2a94fe48 295static void genl_unregister_mc_groups(struct genl_family *family)
79dc4386 296{
134e6375 297 struct net *net;
2a94fe48 298 int i;
134e6375 299
b8273570 300 netlink_table_grab();
134e6375 301 rcu_read_lock();
2a94fe48
JB
302 for_each_net_rcu(net) {
303 for (i = 0; i < family->n_mcgrps; i++)
304 __netlink_clear_multicast_users(
305 net->genl_sock, family->mcgrp_offset + i);
306 }
134e6375 307 rcu_read_unlock();
b8273570 308 netlink_table_ungrab();
134e6375 309
2a94fe48
JB
310 for (i = 0; i < family->n_mcgrps; i++) {
311 int grp_id = family->mcgrp_offset + i;
2dbba6f7 312
2a94fe48
JB
313 if (grp_id != 1)
314 clear_bit(grp_id, mc_groups);
315 genl_ctrl_event(CTRL_CMD_DELMCAST_GRP, family,
316 &family->mcgrps[i], grp_id);
317 }
2dbba6f7
JB
318}
319
568508aa 320static int genl_validate_ops(struct genl_family *family)
482a8524 321{
568508aa
JB
322 const struct genl_ops *ops = family->ops;
323 unsigned int n_ops = family->n_ops;
d91824c0
JB
324 int i, j;
325
568508aa
JB
326 if (WARN_ON(n_ops && !ops))
327 return -EINVAL;
328
329 if (!n_ops)
330 return 0;
331
d91824c0
JB
332 for (i = 0; i < n_ops; i++) {
333 if (ops[i].dumpit == NULL && ops[i].doit == NULL)
334 return -EINVAL;
335 for (j = i + 1; j < n_ops; j++)
336 if (ops[i].cmd == ops[j].cmd)
337 return -EINVAL;
482a8524
TG
338 }
339
d91824c0
JB
340 /* family is not registered yet, so no locking needed */
341 family->ops = ops;
342 family->n_ops = n_ops;
482a8524 343
d91824c0 344 return 0;
482a8524 345}
482a8524
TG
346
347/**
33c6b1f6 348 * __genl_register_family - register a generic netlink family
482a8524
TG
349 * @family: generic netlink family
350 *
351 * Registers the specified family after validating it first. Only one
352 * family may be registered with the same family name or identifier.
353 * The family id may equal GENL_ID_GENERATE causing an unique id to
354 * be automatically generated and assigned.
355 *
568508aa
JB
356 * The family's ops array must already be assigned, you can use the
357 * genl_register_family_with_ops() helper function.
358 *
482a8524
TG
359 * Return 0 on success or a negative error code.
360 */
33c6b1f6 361int __genl_register_family(struct genl_family *family)
482a8524 362{
2a94fe48 363 int err = -EINVAL, i;
482a8524
TG
364
365 if (family->id && family->id < GENL_MIN_ID)
366 goto errout;
367
368 if (family->id > GENL_MAX_ID)
369 goto errout;
370
568508aa
JB
371 err = genl_validate_ops(family);
372 if (err)
373 return err;
374
def31174 375 genl_lock_all();
482a8524
TG
376
377 if (genl_family_find_byname(family->name)) {
378 err = -EEXIST;
379 goto errout_locked;
380 }
381
482a8524
TG
382 if (family->id == GENL_ID_GENERATE) {
383 u16 newid = genl_generate_id();
384
385 if (!newid) {
386 err = -ENOMEM;
387 goto errout_locked;
388 }
389
390 family->id = newid;
93860b08
KK
391 } else if (genl_family_find_byid(family->id)) {
392 err = -EEXIST;
393 goto errout_locked;
482a8524
TG
394 }
395
def31174 396 if (family->maxattr && !family->parallel_ops) {
482a8524
TG
397 family->attrbuf = kmalloc((family->maxattr+1) *
398 sizeof(struct nlattr *), GFP_KERNEL);
399 if (family->attrbuf == NULL) {
400 err = -ENOMEM;
e200bd80 401 goto errout_locked;
482a8524
TG
402 }
403 } else
404 family->attrbuf = NULL;
405
2a94fe48
JB
406 err = genl_validate_assign_mc_groups(family);
407 if (err)
408 goto errout_locked;
409
482a8524 410 list_add_tail(&family->family_list, genl_family_chain(family->id));
def31174 411 genl_unlock_all();
482a8524 412
2a94fe48
JB
413 /* send all events */
414 genl_ctrl_event(CTRL_CMD_NEWFAMILY, family, NULL, 0);
415 for (i = 0; i < family->n_mcgrps; i++)
416 genl_ctrl_event(CTRL_CMD_NEWMCAST_GRP, family,
417 &family->mcgrps[i], family->mcgrp_offset + i);
482a8524
TG
418
419 return 0;
420
421errout_locked:
def31174 422 genl_unlock_all();
482a8524
TG
423errout:
424 return err;
425}
33c6b1f6 426EXPORT_SYMBOL(__genl_register_family);
482a8524
TG
427
428/**
429 * genl_unregister_family - unregister generic netlink family
430 * @family: generic netlink family
431 *
432 * Unregisters the specified family.
433 *
434 * Returns 0 on success or a negative error code.
435 */
436int genl_unregister_family(struct genl_family *family)
437{
438 struct genl_family *rc;
439
def31174 440 genl_lock_all();
482a8524 441
910d6c32
PE
442 genl_unregister_mc_groups(family);
443
482a8524
TG
444 list_for_each_entry(rc, genl_family_chain(family->id), family_list) {
445 if (family->id != rc->id || strcmp(rc->name, family->name))
446 continue;
447
448 list_del(&rc->family_list);
d91824c0 449 family->n_ops = 0;
def31174 450 genl_unlock_all();
482a8524 451
482a8524 452 kfree(family->attrbuf);
2a94fe48 453 genl_ctrl_event(CTRL_CMD_DELFAMILY, family, NULL, 0);
482a8524
TG
454 return 0;
455 }
456
def31174 457 genl_unlock_all();
482a8524
TG
458
459 return -ENOENT;
460}
416c2f9c 461EXPORT_SYMBOL(genl_unregister_family);
482a8524 462
bb9b18fb
TG
463/**
464 * genlmsg_new_unicast - Allocate generic netlink message for unicast
465 * @payload: size of the message payload
466 * @info: information on destination
467 * @flags: the type of memory to allocate
468 *
469 * Allocates a new sk_buff large enough to cover the specified payload
470 * plus required Netlink headers. Will check receiving socket for
471 * memory mapped i/o capability and use it if enabled. Will fall back
472 * to non-mapped skb if message size exceeds the frame size of the ring.
473 */
474struct sk_buff *genlmsg_new_unicast(size_t payload, struct genl_info *info,
475 gfp_t flags)
476{
477 size_t len = nlmsg_total_size(genlmsg_total_size(payload));
478
479 return netlink_alloc_skb(info->dst_sk, len, info->snd_portid, flags);
480}
481EXPORT_SYMBOL_GPL(genlmsg_new_unicast);
482
a46621a3
DV
483/**
484 * genlmsg_put - Add generic netlink header to netlink message
485 * @skb: socket buffer holding the message
15e47304 486 * @portid: netlink portid the message is addressed to
a46621a3
DV
487 * @seq: sequence number (usually the one of the sender)
488 * @family: generic netlink family
2c53040f 489 * @flags: netlink message flags
a46621a3
DV
490 * @cmd: generic netlink command
491 *
492 * Returns pointer to user specific header
493 */
15e47304 494void *genlmsg_put(struct sk_buff *skb, u32 portid, u32 seq,
a46621a3
DV
495 struct genl_family *family, int flags, u8 cmd)
496{
497 struct nlmsghdr *nlh;
498 struct genlmsghdr *hdr;
499
15e47304 500 nlh = nlmsg_put(skb, portid, seq, family->id, GENL_HDRLEN +
a46621a3
DV
501 family->hdrsize, flags);
502 if (nlh == NULL)
503 return NULL;
504
505 hdr = nlmsg_data(nlh);
506 hdr->cmd = cmd;
507 hdr->version = family->version;
508 hdr->reserved = 0;
509
510 return (char *) hdr + GENL_HDRLEN;
511}
512EXPORT_SYMBOL(genlmsg_put);
513
9b96309c
PS
514static int genl_lock_dumpit(struct sk_buff *skb, struct netlink_callback *cb)
515{
f84f771d
JB
516 /* our ops are always const - netlink API doesn't propagate that */
517 const struct genl_ops *ops = cb->data;
9b96309c
PS
518 int rc;
519
520 genl_lock();
521 rc = ops->dumpit(skb, cb);
522 genl_unlock();
523 return rc;
524}
525
526static int genl_lock_done(struct netlink_callback *cb)
527{
f84f771d
JB
528 /* our ops are always const - netlink API doesn't propagate that */
529 const struct genl_ops *ops = cb->data;
9b96309c
PS
530 int rc = 0;
531
532 if (ops->done) {
533 genl_lock();
534 rc = ops->done(cb);
535 genl_unlock();
536 }
537 return rc;
538}
539
def31174
PS
540static int genl_family_rcv_msg(struct genl_family *family,
541 struct sk_buff *skb,
542 struct nlmsghdr *nlh)
482a8524 543{
f84f771d 544 const struct genl_ops *ops;
134e6375 545 struct net *net = sock_net(skb->sk);
482a8524
TG
546 struct genl_info info;
547 struct genlmsghdr *hdr = nlmsg_data(nlh);
def31174 548 struct nlattr **attrbuf;
1d00a4eb 549 int hdrlen, err;
482a8524 550
134e6375
JB
551 /* this family doesn't exist in this netns */
552 if (!family->netnsok && !net_eq(net, &init_net))
553 return -ENOENT;
554
482a8524
TG
555 hdrlen = GENL_HDRLEN + family->hdrsize;
556 if (nlh->nlmsg_len < nlmsg_msg_size(hdrlen))
1d00a4eb 557 return -EINVAL;
482a8524
TG
558
559 ops = genl_get_cmd(hdr->cmd, family);
1d00a4eb
TG
560 if (ops == NULL)
561 return -EOPNOTSUPP;
482a8524 562
1d00a4eb 563 if ((ops->flags & GENL_ADMIN_PERM) &&
fd778461 564 !capable(CAP_NET_ADMIN))
1d00a4eb 565 return -EPERM;
482a8524 566
e1ee3673 567 if ((nlh->nlmsg_flags & NLM_F_DUMP) == NLM_F_DUMP) {
9b96309c 568 int rc;
def31174 569
1d00a4eb
TG
570 if (ops->dumpit == NULL)
571 return -EOPNOTSUPP;
482a8524 572
9b96309c
PS
573 if (!family->parallel_ops) {
574 struct netlink_dump_control c = {
33c6b1f6 575 .module = family->module,
f84f771d
JB
576 /* we have const, but the netlink API doesn't */
577 .data = (void *)ops,
9b96309c
PS
578 .dump = genl_lock_dumpit,
579 .done = genl_lock_done,
580 };
581
582 genl_unlock();
33c6b1f6 583 rc = __netlink_dump_start(net->genl_sock, skb, nlh, &c);
9b96309c
PS
584 genl_lock();
585
586 } else {
587 struct netlink_dump_control c = {
33c6b1f6 588 .module = family->module,
9b96309c
PS
589 .dump = ops->dumpit,
590 .done = ops->done,
591 };
592
33c6b1f6 593 rc = __netlink_dump_start(net->genl_sock, skb, nlh, &c);
9b96309c
PS
594 }
595
596 return rc;
482a8524
TG
597 }
598
1d00a4eb
TG
599 if (ops->doit == NULL)
600 return -EOPNOTSUPP;
482a8524 601
def31174
PS
602 if (family->maxattr && family->parallel_ops) {
603 attrbuf = kmalloc((family->maxattr+1) *
604 sizeof(struct nlattr *), GFP_KERNEL);
605 if (attrbuf == NULL)
606 return -ENOMEM;
607 } else
608 attrbuf = family->attrbuf;
609
610 if (attrbuf) {
611 err = nlmsg_parse(nlh, hdrlen, attrbuf, family->maxattr,
482a8524
TG
612 ops->policy);
613 if (err < 0)
50754d21 614 goto out;
482a8524
TG
615 }
616
617 info.snd_seq = nlh->nlmsg_seq;
15e47304 618 info.snd_portid = NETLINK_CB(skb).portid;
482a8524
TG
619 info.nlhdr = nlh;
620 info.genlhdr = nlmsg_data(nlh);
621 info.userhdr = nlmsg_data(nlh) + GENL_HDRLEN;
def31174 622 info.attrs = attrbuf;
bb9b18fb 623 info.dst_sk = skb->sk;
134e6375 624 genl_info_net_set(&info, net);
ff4c92d8 625 memset(&info.user_ptr, 0, sizeof(info.user_ptr));
482a8524 626
ff4c92d8
JB
627 if (family->pre_doit) {
628 err = family->pre_doit(ops, skb, &info);
629 if (err)
50754d21 630 goto out;
ff4c92d8
JB
631 }
632
633 err = ops->doit(skb, &info);
634
635 if (family->post_doit)
636 family->post_doit(ops, skb, &info);
637
50754d21 638out:
def31174
PS
639 if (family->parallel_ops)
640 kfree(attrbuf);
641
642 return err;
643}
644
645static int genl_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
646{
647 struct genl_family *family;
648 int err;
649
650 family = genl_family_find_byid(nlh->nlmsg_type);
651 if (family == NULL)
652 return -ENOENT;
653
654 if (!family->parallel_ops)
655 genl_lock();
656
657 err = genl_family_rcv_msg(family, skb, nlh);
658
659 if (!family->parallel_ops)
660 genl_unlock();
661
ff4c92d8 662 return err;
482a8524
TG
663}
664
cd40b7d3 665static void genl_rcv(struct sk_buff *skb)
482a8524 666{
def31174 667 down_read(&cb_lock);
cd40b7d3 668 netlink_rcv_skb(skb, &genl_rcv_msg);
def31174 669 up_read(&cb_lock);
482a8524
TG
670}
671
672/**************************************************************************
673 * Controller
674 **************************************************************************/
675
17c157c8
TG
676static struct genl_family genl_ctrl = {
677 .id = GENL_ID_CTRL,
678 .name = "nlctrl",
334c29a6 679 .version = 0x2,
17c157c8 680 .maxattr = CTRL_ATTR_MAX,
134e6375 681 .netnsok = true,
17c157c8
TG
682};
683
15e47304 684static int ctrl_fill_info(struct genl_family *family, u32 portid, u32 seq,
482a8524
TG
685 u32 flags, struct sk_buff *skb, u8 cmd)
686{
687 void *hdr;
688
15e47304 689 hdr = genlmsg_put(skb, portid, seq, &genl_ctrl, flags, cmd);
482a8524
TG
690 if (hdr == NULL)
691 return -1;
692
444653f6
DM
693 if (nla_put_string(skb, CTRL_ATTR_FAMILY_NAME, family->name) ||
694 nla_put_u16(skb, CTRL_ATTR_FAMILY_ID, family->id) ||
695 nla_put_u32(skb, CTRL_ATTR_VERSION, family->version) ||
696 nla_put_u32(skb, CTRL_ATTR_HDRSIZE, family->hdrsize) ||
697 nla_put_u32(skb, CTRL_ATTR_MAXATTR, family->maxattr))
698 goto nla_put_failure;
eb328111 699
d91824c0 700 if (family->n_ops) {
e94ef682 701 struct nlattr *nla_ops;
d91824c0 702 int i;
eb328111 703
e94ef682
TG
704 nla_ops = nla_nest_start(skb, CTRL_ATTR_OPS);
705 if (nla_ops == NULL)
eb328111
TG
706 goto nla_put_failure;
707
d91824c0 708 for (i = 0; i < family->n_ops; i++) {
e94ef682 709 struct nlattr *nest;
f84f771d 710 const struct genl_ops *ops = &family->ops[i];
029b234f 711 u32 op_flags = ops->flags;
f84f771d
JB
712
713 if (ops->dumpit)
029b234f 714 op_flags |= GENL_CMD_CAP_DUMP;
f84f771d 715 if (ops->doit)
029b234f 716 op_flags |= GENL_CMD_CAP_DO;
f84f771d 717 if (ops->policy)
029b234f 718 op_flags |= GENL_CMD_CAP_HASPOL;
eb328111 719
d91824c0 720 nest = nla_nest_start(skb, i + 1);
e94ef682
TG
721 if (nest == NULL)
722 goto nla_put_failure;
eb328111 723
444653f6 724 if (nla_put_u32(skb, CTRL_ATTR_OP_ID, ops->cmd) ||
029b234f 725 nla_put_u32(skb, CTRL_ATTR_OP_FLAGS, op_flags))
444653f6 726 goto nla_put_failure;
eb328111 727
e94ef682
TG
728 nla_nest_end(skb, nest);
729 }
730
731 nla_nest_end(skb, nla_ops);
732 }
482a8524 733
2a94fe48 734 if (family->n_mcgrps) {
2dbba6f7 735 struct nlattr *nla_grps;
2a94fe48 736 int i;
2dbba6f7
JB
737
738 nla_grps = nla_nest_start(skb, CTRL_ATTR_MCAST_GROUPS);
739 if (nla_grps == NULL)
740 goto nla_put_failure;
741
2a94fe48 742 for (i = 0; i < family->n_mcgrps; i++) {
2dbba6f7 743 struct nlattr *nest;
2a94fe48 744 const struct genl_multicast_group *grp;
2dbba6f7 745
2a94fe48
JB
746 grp = &family->mcgrps[i];
747
748 nest = nla_nest_start(skb, i + 1);
2dbba6f7
JB
749 if (nest == NULL)
750 goto nla_put_failure;
751
2a94fe48
JB
752 if (nla_put_u32(skb, CTRL_ATTR_MCAST_GRP_ID,
753 family->mcgrp_offset + i) ||
444653f6
DM
754 nla_put_string(skb, CTRL_ATTR_MCAST_GRP_NAME,
755 grp->name))
756 goto nla_put_failure;
2dbba6f7
JB
757
758 nla_nest_end(skb, nest);
759 }
760 nla_nest_end(skb, nla_grps);
761 }
762
763 return genlmsg_end(skb, hdr);
764
765nla_put_failure:
bc3ed28c
TG
766 genlmsg_cancel(skb, hdr);
767 return -EMSGSIZE;
2dbba6f7
JB
768}
769
c2ebb908 770static int ctrl_fill_mcgrp_info(struct genl_family *family,
2a94fe48
JB
771 const struct genl_multicast_group *grp,
772 int grp_id, u32 portid, u32 seq, u32 flags,
773 struct sk_buff *skb, u8 cmd)
2dbba6f7
JB
774{
775 void *hdr;
776 struct nlattr *nla_grps;
777 struct nlattr *nest;
778
15e47304 779 hdr = genlmsg_put(skb, portid, seq, &genl_ctrl, flags, cmd);
2dbba6f7
JB
780 if (hdr == NULL)
781 return -1;
782
c2ebb908
JB
783 if (nla_put_string(skb, CTRL_ATTR_FAMILY_NAME, family->name) ||
784 nla_put_u16(skb, CTRL_ATTR_FAMILY_ID, family->id))
444653f6 785 goto nla_put_failure;
2dbba6f7
JB
786
787 nla_grps = nla_nest_start(skb, CTRL_ATTR_MCAST_GROUPS);
788 if (nla_grps == NULL)
789 goto nla_put_failure;
790
791 nest = nla_nest_start(skb, 1);
792 if (nest == NULL)
793 goto nla_put_failure;
794
2a94fe48 795 if (nla_put_u32(skb, CTRL_ATTR_MCAST_GRP_ID, grp_id) ||
444653f6
DM
796 nla_put_string(skb, CTRL_ATTR_MCAST_GRP_NAME,
797 grp->name))
798 goto nla_put_failure;
2dbba6f7
JB
799
800 nla_nest_end(skb, nest);
801 nla_nest_end(skb, nla_grps);
802
482a8524
TG
803 return genlmsg_end(skb, hdr);
804
805nla_put_failure:
bc3ed28c
TG
806 genlmsg_cancel(skb, hdr);
807 return -EMSGSIZE;
482a8524
TG
808}
809
810static int ctrl_dumpfamily(struct sk_buff *skb, struct netlink_callback *cb)
811{
812
813 int i, n = 0;
814 struct genl_family *rt;
134e6375 815 struct net *net = sock_net(skb->sk);
482a8524
TG
816 int chains_to_skip = cb->args[0];
817 int fams_to_skip = cb->args[1];
818
e1d5a010 819 for (i = chains_to_skip; i < GENL_FAM_TAB_SIZE; i++) {
482a8524
TG
820 n = 0;
821 list_for_each_entry(rt, genl_family_chain(i), family_list) {
134e6375
JB
822 if (!rt->netnsok && !net_eq(net, &init_net))
823 continue;
482a8524
TG
824 if (++n < fams_to_skip)
825 continue;
15e47304 826 if (ctrl_fill_info(rt, NETLINK_CB(cb->skb).portid,
482a8524
TG
827 cb->nlh->nlmsg_seq, NLM_F_MULTI,
828 skb, CTRL_CMD_NEWFAMILY) < 0)
829 goto errout;
830 }
831
832 fams_to_skip = 0;
833 }
834
835errout:
836 cb->args[0] = i;
837 cb->args[1] = n;
838
839 return skb->len;
840}
841
2dbba6f7 842static struct sk_buff *ctrl_build_family_msg(struct genl_family *family,
15e47304 843 u32 portid, int seq, u8 cmd)
482a8524
TG
844{
845 struct sk_buff *skb;
846 int err;
847
339bf98f 848 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
482a8524
TG
849 if (skb == NULL)
850 return ERR_PTR(-ENOBUFS);
851
15e47304 852 err = ctrl_fill_info(family, portid, seq, 0, skb, cmd);
482a8524
TG
853 if (err < 0) {
854 nlmsg_free(skb);
855 return ERR_PTR(err);
856 }
857
858 return skb;
859}
860
2a94fe48
JB
861static struct sk_buff *
862ctrl_build_mcgrp_msg(struct genl_family *family,
863 const struct genl_multicast_group *grp,
864 int grp_id, u32 portid, int seq, u8 cmd)
2dbba6f7
JB
865{
866 struct sk_buff *skb;
867 int err;
868
869 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
870 if (skb == NULL)
871 return ERR_PTR(-ENOBUFS);
872
2a94fe48
JB
873 err = ctrl_fill_mcgrp_info(family, grp, grp_id, portid,
874 seq, 0, skb, cmd);
2dbba6f7
JB
875 if (err < 0) {
876 nlmsg_free(skb);
877 return ERR_PTR(err);
878 }
879
880 return skb;
881}
882
ef7c79ed 883static const struct nla_policy ctrl_policy[CTRL_ATTR_MAX+1] = {
482a8524 884 [CTRL_ATTR_FAMILY_ID] = { .type = NLA_U16 },
5176f91e
TG
885 [CTRL_ATTR_FAMILY_NAME] = { .type = NLA_NUL_STRING,
886 .len = GENL_NAMSIZ - 1 },
482a8524
TG
887};
888
889static int ctrl_getfamily(struct sk_buff *skb, struct genl_info *info)
890{
891 struct sk_buff *msg;
892 struct genl_family *res = NULL;
893 int err = -EINVAL;
894
895 if (info->attrs[CTRL_ATTR_FAMILY_ID]) {
896 u16 id = nla_get_u16(info->attrs[CTRL_ATTR_FAMILY_ID]);
897 res = genl_family_find_byid(id);
134e6375 898 err = -ENOENT;
482a8524
TG
899 }
900
901 if (info->attrs[CTRL_ATTR_FAMILY_NAME]) {
5176f91e 902 char *name;
482a8524 903
5176f91e 904 name = nla_data(info->attrs[CTRL_ATTR_FAMILY_NAME]);
482a8524 905 res = genl_family_find_byname(name);
fa843095
SH
906#ifdef CONFIG_MODULES
907 if (res == NULL) {
908 genl_unlock();
c74f2b26 909 up_read(&cb_lock);
e9412c37 910 request_module("net-pf-%d-proto-%d-family-%s",
fa843095 911 PF_NETLINK, NETLINK_GENERIC, name);
c74f2b26 912 down_read(&cb_lock);
fa843095
SH
913 genl_lock();
914 res = genl_family_find_byname(name);
915 }
916#endif
134e6375 917 err = -ENOENT;
482a8524
TG
918 }
919
134e6375
JB
920 if (res == NULL)
921 return err;
922
923 if (!res->netnsok && !net_eq(genl_info_net(info), &init_net)) {
924 /* family doesn't exist here */
925 return -ENOENT;
482a8524
TG
926 }
927
15e47304 928 msg = ctrl_build_family_msg(res, info->snd_portid, info->snd_seq,
2dbba6f7 929 CTRL_CMD_NEWFAMILY);
134e6375
JB
930 if (IS_ERR(msg))
931 return PTR_ERR(msg);
482a8524 932
134e6375 933 return genlmsg_reply(msg, info);
482a8524
TG
934}
935
c2ebb908 936static int genl_ctrl_event(int event, struct genl_family *family,
2a94fe48
JB
937 const struct genl_multicast_group *grp,
938 int grp_id)
482a8524
TG
939{
940 struct sk_buff *msg;
941
134e6375
JB
942 /* genl is still initialising */
943 if (!init_net.genl_sock)
482a8524
TG
944 return 0;
945
946 switch (event) {
947 case CTRL_CMD_NEWFAMILY:
948 case CTRL_CMD_DELFAMILY:
c2ebb908 949 WARN_ON(grp);
134e6375 950 msg = ctrl_build_family_msg(family, 0, 0, event);
2dbba6f7
JB
951 break;
952 case CTRL_CMD_NEWMCAST_GRP:
953 case CTRL_CMD_DELMCAST_GRP:
c2ebb908 954 BUG_ON(!grp);
2a94fe48 955 msg = ctrl_build_mcgrp_msg(family, grp, grp_id, 0, 0, event);
482a8524 956 break;
134e6375
JB
957 default:
958 return -EINVAL;
959 }
960
961 if (IS_ERR(msg))
962 return PTR_ERR(msg);
963
964 if (!family->netnsok) {
68eb5503 965 genlmsg_multicast_netns(&genl_ctrl, &init_net, msg, 0,
2a94fe48 966 0, GFP_KERNEL);
134e6375
JB
967 } else {
968 rcu_read_lock();
68eb5503 969 genlmsg_multicast_allns(&genl_ctrl, msg, 0,
2a94fe48 970 0, GFP_ATOMIC);
134e6375 971 rcu_read_unlock();
482a8524
TG
972 }
973
974 return 0;
975}
976
c53ed742
JB
977static struct genl_ops genl_ctrl_ops[] = {
978 {
979 .cmd = CTRL_CMD_GETFAMILY,
980 .doit = ctrl_getfamily,
981 .dumpit = ctrl_dumpfamily,
982 .policy = ctrl_policy,
983 },
482a8524
TG
984};
985
2a94fe48
JB
986static struct genl_multicast_group genl_ctrl_groups[] = {
987 { .name = "notify", },
2dbba6f7
JB
988};
989
134e6375
JB
990static int __net_init genl_pernet_init(struct net *net)
991{
a31f2d17
PNA
992 struct netlink_kernel_cfg cfg = {
993 .input = genl_rcv,
9785e10a 994 .flags = NL_CFG_F_NONROOT_RECV,
a31f2d17
PNA
995 };
996
134e6375 997 /* we'll bump the group number right afterwards */
9f00d977 998 net->genl_sock = netlink_kernel_create(net, NETLINK_GENERIC, &cfg);
134e6375
JB
999
1000 if (!net->genl_sock && net_eq(net, &init_net))
1001 panic("GENL: Cannot initialize generic netlink\n");
1002
1003 if (!net->genl_sock)
1004 return -ENOMEM;
1005
1006 return 0;
1007}
1008
1009static void __net_exit genl_pernet_exit(struct net *net)
1010{
1011 netlink_kernel_release(net->genl_sock);
1012 net->genl_sock = NULL;
1013}
1014
1015static struct pernet_operations genl_pernet_ops = {
1016 .init = genl_pernet_init,
1017 .exit = genl_pernet_exit,
1018};
1019
482a8524
TG
1020static int __init genl_init(void)
1021{
1022 int i, err;
1023
1024 for (i = 0; i < GENL_FAM_TAB_SIZE; i++)
1025 INIT_LIST_HEAD(&family_ht[i]);
1026
2a94fe48
JB
1027 err = genl_register_family_with_ops_groups(&genl_ctrl, genl_ctrl_ops,
1028 genl_ctrl_groups);
482a8524 1029 if (err < 0)
134e6375 1030 goto problem;
482a8524 1031
134e6375
JB
1032 err = register_pernet_subsys(&genl_pernet_ops);
1033 if (err)
1034 goto problem;
482a8524
TG
1035
1036 return 0;
1037
134e6375 1038problem:
482a8524 1039 panic("GENL: Cannot register controller: %d\n", err);
482a8524
TG
1040}
1041
1042subsys_initcall(genl_init);
1043
15e47304 1044static int genlmsg_mcast(struct sk_buff *skb, u32 portid, unsigned long group,
134e6375
JB
1045 gfp_t flags)
1046{
1047 struct sk_buff *tmp;
1048 struct net *net, *prev = NULL;
1049 int err;
1050
1051 for_each_net_rcu(net) {
1052 if (prev) {
1053 tmp = skb_clone(skb, flags);
1054 if (!tmp) {
1055 err = -ENOMEM;
1056 goto error;
1057 }
1058 err = nlmsg_multicast(prev->genl_sock, tmp,
15e47304 1059 portid, group, flags);
134e6375
JB
1060 if (err)
1061 goto error;
1062 }
1063
1064 prev = net;
1065 }
1066
15e47304 1067 return nlmsg_multicast(prev->genl_sock, skb, portid, group, flags);
134e6375
JB
1068 error:
1069 kfree_skb(skb);
1070 return err;
1071}
1072
68eb5503
JB
1073int genlmsg_multicast_allns(struct genl_family *family, struct sk_buff *skb,
1074 u32 portid, unsigned int group, gfp_t flags)
134e6375 1075{
220815a9 1076 if (WARN_ON_ONCE(group >= family->n_mcgrps))
2a94fe48
JB
1077 return -EINVAL;
1078 group = family->mcgrp_offset + group;
15e47304 1079 return genlmsg_mcast(skb, portid, group, flags);
134e6375
JB
1080}
1081EXPORT_SYMBOL(genlmsg_multicast_allns);
263ba61d 1082
68eb5503
JB
1083void genl_notify(struct genl_family *family,
1084 struct sk_buff *skb, struct net *net, u32 portid, u32 group,
263ba61d
PS
1085 struct nlmsghdr *nlh, gfp_t flags)
1086{
1087 struct sock *sk = net->genl_sock;
1088 int report = 0;
1089
1090 if (nlh)
1091 report = nlmsg_report(nlh);
1092
220815a9 1093 if (WARN_ON_ONCE(group >= family->n_mcgrps))
2a94fe48
JB
1094 return;
1095 group = family->mcgrp_offset + group;
15e47304 1096 nlmsg_notify(sk, skb, portid, group, report, flags);
263ba61d
PS
1097}
1098EXPORT_SYMBOL(genl_notify);