]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - net/netlink/genetlink.c
net: Enable support for VRF with ipv4 multicast
[mirror_ubuntu-zesty-kernel.git] / net / netlink / genetlink.c
CommitLineData
482a8524
TG
1/*
2 * NETLINK Generic Netlink Family
3 *
4 * Authors: Jamal Hadi Salim
5 * Thomas Graf <tgraf@suug.ch>
2dbba6f7 6 * Johannes Berg <johannes@sipsolutions.net>
482a8524
TG
7 */
8
482a8524
TG
9#include <linux/module.h>
10#include <linux/kernel.h>
5a0e3ad6 11#include <linux/slab.h>
482a8524
TG
12#include <linux/errno.h>
13#include <linux/types.h>
14#include <linux/socket.h>
15#include <linux/string.h>
16#include <linux/skbuff.h>
14cc3e2b 17#include <linux/mutex.h>
2dbba6f7 18#include <linux/bitmap.h>
def31174 19#include <linux/rwsem.h>
2ae0f17d 20#include <linux/idr.h>
482a8524
TG
21#include <net/sock.h>
22#include <net/genetlink.h>
23
14cc3e2b 24static DEFINE_MUTEX(genl_mutex); /* serialization of message processing */
def31174 25static DECLARE_RWSEM(cb_lock);
482a8524 26
ee1c2442
JB
27atomic_t genl_sk_destructing_cnt = ATOMIC_INIT(0);
28DECLARE_WAIT_QUEUE_HEAD(genl_sk_destructing_waitq);
29
f408e0ce 30void genl_lock(void)
482a8524 31{
14cc3e2b 32 mutex_lock(&genl_mutex);
482a8524 33}
f408e0ce 34EXPORT_SYMBOL(genl_lock);
482a8524 35
f408e0ce 36void genl_unlock(void)
482a8524 37{
14cc3e2b 38 mutex_unlock(&genl_mutex);
482a8524 39}
f408e0ce 40EXPORT_SYMBOL(genl_unlock);
482a8524 41
320f5ea0 42#ifdef CONFIG_LOCKDEP
61d03535 43bool lockdep_genl_is_held(void)
86b1309c
PS
44{
45 return lockdep_is_held(&genl_mutex);
46}
47EXPORT_SYMBOL(lockdep_genl_is_held);
48#endif
49
def31174
PS
50static void genl_lock_all(void)
51{
52 down_write(&cb_lock);
53 genl_lock();
54}
55
56static void genl_unlock_all(void)
57{
58 genl_unlock();
59 up_write(&cb_lock);
60}
61
2ae0f17d 62static DEFINE_IDR(genl_fam_idr);
482a8524 63
2dbba6f7
JB
64/*
65 * Bitmap of multicast groups that are currently in use.
66 *
67 * To avoid an allocation at boot of just one unsigned long,
68 * declare it global instead.
69 * Bit 0 is marked as already used since group 0 is invalid.
e5dcecba
JB
70 * Bit 1 is marked as already used since the drop-monitor code
71 * abuses the API and thinks it can statically use group 1.
72 * That group will typically conflict with other groups that
73 * any proper users use.
2a94fe48
JB
74 * Bit 16 is marked as used since it's used for generic netlink
75 * and the code no longer marks pre-reserved IDs as used.
2ecf7536
JB
76 * Bit 17 is marked as already used since the VFS quota code
77 * also abused this API and relied on family == group ID, we
78 * cater to that by giving it a static family and group ID.
5e53e689
JB
79 * Bit 18 is marked as already used since the PMCRAID driver
80 * did the same thing as the VFS quota code (maybe copied?)
2dbba6f7 81 */
2a94fe48 82static unsigned long mc_group_start = 0x3 | BIT(GENL_ID_CTRL) |
5e53e689
JB
83 BIT(GENL_ID_VFS_DQUOT) |
84 BIT(GENL_ID_PMCRAID);
2dbba6f7
JB
85static unsigned long *mc_groups = &mc_group_start;
86static unsigned long mc_groups_longs = 1;
482a8524 87
2ae0f17d 88static int genl_ctrl_event(int event, const struct genl_family *family,
2a94fe48
JB
89 const struct genl_multicast_group *grp,
90 int grp_id);
482a8524 91
2ae0f17d 92static const struct genl_family *genl_family_find_byid(unsigned int id)
482a8524 93{
2ae0f17d 94 return idr_find(&genl_fam_idr, id);
482a8524
TG
95}
96
2ae0f17d 97static const struct genl_family *genl_family_find_byname(char *name)
482a8524 98{
2ae0f17d
JB
99 const struct genl_family *family;
100 unsigned int id;
482a8524 101
2ae0f17d
JB
102 idr_for_each_entry(&genl_fam_idr, family, id)
103 if (strcmp(family->name, name) == 0)
104 return family;
482a8524
TG
105
106 return NULL;
107}
108
2ae0f17d
JB
109static const struct genl_ops *genl_get_cmd(u8 cmd,
110 const struct genl_family *family)
482a8524 111{
d91824c0 112 int i;
482a8524 113
d91824c0
JB
114 for (i = 0; i < family->n_ops; i++)
115 if (family->ops[i].cmd == cmd)
116 return &family->ops[i];
482a8524
TG
117
118 return NULL;
119}
120
2a94fe48 121static int genl_allocate_reserve_groups(int n_groups, int *first_id)
2dbba6f7 122{
2dbba6f7 123 unsigned long *new_groups;
2a94fe48
JB
124 int start = 0;
125 int i;
126 int id;
127 bool fits;
128
129 do {
130 if (start == 0)
131 id = find_first_zero_bit(mc_groups,
132 mc_groups_longs *
133 BITS_PER_LONG);
134 else
135 id = find_next_zero_bit(mc_groups,
136 mc_groups_longs * BITS_PER_LONG,
137 start);
138
139 fits = true;
140 for (i = id;
141 i < min_t(int, id + n_groups,
142 mc_groups_longs * BITS_PER_LONG);
143 i++) {
144 if (test_bit(i, mc_groups)) {
145 start = i;
146 fits = false;
147 break;
148 }
149 }
2dbba6f7 150
b8e429a2 151 if (id + n_groups > mc_groups_longs * BITS_PER_LONG) {
2a94fe48
JB
152 unsigned long new_longs = mc_groups_longs +
153 BITS_TO_LONGS(n_groups);
154 size_t nlen = new_longs * sizeof(unsigned long);
155
156 if (mc_groups == &mc_group_start) {
157 new_groups = kzalloc(nlen, GFP_KERNEL);
158 if (!new_groups)
159 return -ENOMEM;
160 mc_groups = new_groups;
161 *mc_groups = mc_group_start;
162 } else {
163 new_groups = krealloc(mc_groups, nlen,
164 GFP_KERNEL);
165 if (!new_groups)
166 return -ENOMEM;
167 mc_groups = new_groups;
168 for (i = 0; i < BITS_TO_LONGS(n_groups); i++)
169 mc_groups[mc_groups_longs + i] = 0;
170 }
171 mc_groups_longs = new_longs;
172 }
173 } while (!fits);
2dbba6f7 174
2a94fe48
JB
175 for (i = id; i < id + n_groups; i++)
176 set_bit(i, mc_groups);
177 *first_id = id;
178 return 0;
179}
180
181static struct genl_family genl_ctrl;
182
183static int genl_validate_assign_mc_groups(struct genl_family *family)
184{
185 int first_id;
186 int n_groups = family->n_mcgrps;
0f0e2159 187 int err = 0, i;
2a94fe48
JB
188 bool groups_allocated = false;
189
190 if (!n_groups)
191 return 0;
192
193 for (i = 0; i < n_groups; i++) {
194 const struct genl_multicast_group *grp = &family->mcgrps[i];
195
196 if (WARN_ON(grp->name[0] == '\0'))
197 return -EINVAL;
198 if (WARN_ON(memchr(grp->name, '\0', GENL_NAMSIZ) == NULL))
199 return -EINVAL;
200 }
2dbba6f7 201
e5dcecba 202 /* special-case our own group and hacks */
2a94fe48
JB
203 if (family == &genl_ctrl) {
204 first_id = GENL_ID_CTRL;
205 BUG_ON(n_groups != 1);
206 } else if (strcmp(family->name, "NET_DM") == 0) {
207 first_id = 1;
208 BUG_ON(n_groups != 1);
5e53e689 209 } else if (family->id == GENL_ID_VFS_DQUOT) {
2a94fe48
JB
210 first_id = GENL_ID_VFS_DQUOT;
211 BUG_ON(n_groups != 1);
5e53e689
JB
212 } else if (family->id == GENL_ID_PMCRAID) {
213 first_id = GENL_ID_PMCRAID;
214 BUG_ON(n_groups != 1);
2a94fe48
JB
215 } else {
216 groups_allocated = true;
217 err = genl_allocate_reserve_groups(n_groups, &first_id);
218 if (err)
219 return err;
2dbba6f7
JB
220 }
221
2a94fe48
JB
222 family->mcgrp_offset = first_id;
223
224 /* if still initializing, can't and don't need to to realloc bitmaps */
225 if (!init_net.genl_sock)
226 return 0;
227
134e6375
JB
228 if (family->netnsok) {
229 struct net *net;
230
d136f1bd 231 netlink_table_grab();
134e6375
JB
232 rcu_read_lock();
233 for_each_net_rcu(net) {
d136f1bd 234 err = __netlink_change_ngroups(net->genl_sock,
134e6375
JB
235 mc_groups_longs * BITS_PER_LONG);
236 if (err) {
237 /*
238 * No need to roll back, can only fail if
239 * memory allocation fails and then the
240 * number of _possible_ groups has been
241 * increased on some sockets which is ok.
242 */
2a94fe48 243 break;
134e6375
JB
244 }
245 }
246 rcu_read_unlock();
d136f1bd 247 netlink_table_ungrab();
134e6375
JB
248 } else {
249 err = netlink_change_ngroups(init_net.genl_sock,
250 mc_groups_longs * BITS_PER_LONG);
134e6375 251 }
2dbba6f7 252
2a94fe48
JB
253 if (groups_allocated && err) {
254 for (i = 0; i < family->n_mcgrps; i++)
255 clear_bit(family->mcgrp_offset + i, mc_groups);
256 }
2dbba6f7 257
79d310d0 258 return err;
2dbba6f7 259}
2dbba6f7 260
2ae0f17d 261static void genl_unregister_mc_groups(const struct genl_family *family)
79dc4386 262{
134e6375 263 struct net *net;
2a94fe48 264 int i;
134e6375 265
b8273570 266 netlink_table_grab();
134e6375 267 rcu_read_lock();
2a94fe48
JB
268 for_each_net_rcu(net) {
269 for (i = 0; i < family->n_mcgrps; i++)
270 __netlink_clear_multicast_users(
271 net->genl_sock, family->mcgrp_offset + i);
272 }
134e6375 273 rcu_read_unlock();
b8273570 274 netlink_table_ungrab();
134e6375 275
2a94fe48
JB
276 for (i = 0; i < family->n_mcgrps; i++) {
277 int grp_id = family->mcgrp_offset + i;
2dbba6f7 278
2a94fe48
JB
279 if (grp_id != 1)
280 clear_bit(grp_id, mc_groups);
281 genl_ctrl_event(CTRL_CMD_DELMCAST_GRP, family,
282 &family->mcgrps[i], grp_id);
283 }
2dbba6f7
JB
284}
285
2f91abd4 286static int genl_validate_ops(const struct genl_family *family)
482a8524 287{
568508aa
JB
288 const struct genl_ops *ops = family->ops;
289 unsigned int n_ops = family->n_ops;
d91824c0
JB
290 int i, j;
291
568508aa
JB
292 if (WARN_ON(n_ops && !ops))
293 return -EINVAL;
294
295 if (!n_ops)
296 return 0;
297
d91824c0
JB
298 for (i = 0; i < n_ops; i++) {
299 if (ops[i].dumpit == NULL && ops[i].doit == NULL)
300 return -EINVAL;
301 for (j = i + 1; j < n_ops; j++)
302 if (ops[i].cmd == ops[j].cmd)
303 return -EINVAL;
482a8524
TG
304 }
305
d91824c0 306 return 0;
482a8524 307}
482a8524
TG
308
309/**
489111e5 310 * genl_register_family - register a generic netlink family
482a8524
TG
311 * @family: generic netlink family
312 *
313 * Registers the specified family after validating it first. Only one
314 * family may be registered with the same family name or identifier.
482a8524 315 *
489111e5
JB
316 * The family's ops, multicast groups and module pointer must already
317 * be assigned.
568508aa 318 *
482a8524
TG
319 * Return 0 on success or a negative error code.
320 */
489111e5 321int genl_register_family(struct genl_family *family)
482a8524 322{
a07ea4d9 323 int err, i;
2ae0f17d 324 int start = GENL_START_ALLOC, end = GENL_MAX_ID;
482a8524 325
568508aa
JB
326 err = genl_validate_ops(family);
327 if (err)
328 return err;
329
def31174 330 genl_lock_all();
482a8524
TG
331
332 if (genl_family_find_byname(family->name)) {
333 err = -EEXIST;
334 goto errout_locked;
335 }
336
2ae0f17d
JB
337 /*
338 * Sadly, a few cases need to be special-cased
339 * due to them having previously abused the API
340 * and having used their family ID also as their
341 * multicast group ID, so we use reserved IDs
342 * for both to be sure we can do that mapping.
343 */
a07ea4d9 344 if (family == &genl_ctrl) {
2ae0f17d
JB
345 /* and this needs to be special for initial family lookups */
346 start = end = GENL_ID_CTRL;
347 } else if (strcmp(family->name, "pmcraid") == 0) {
348 start = end = GENL_ID_PMCRAID;
349 } else if (strcmp(family->name, "VFS_DQUOT") == 0) {
350 start = end = GENL_ID_VFS_DQUOT;
482a8524
TG
351 }
352
def31174 353 if (family->maxattr && !family->parallel_ops) {
482a8524
TG
354 family->attrbuf = kmalloc((family->maxattr+1) *
355 sizeof(struct nlattr *), GFP_KERNEL);
356 if (family->attrbuf == NULL) {
357 err = -ENOMEM;
e200bd80 358 goto errout_locked;
482a8524
TG
359 }
360 } else
361 family->attrbuf = NULL;
362
2ae0f17d
JB
363 family->id = idr_alloc(&genl_fam_idr, family,
364 start, end + 1, GFP_KERNEL);
365 if (!family->id)
366 goto errout_locked;
367
2a94fe48
JB
368 err = genl_validate_assign_mc_groups(family);
369 if (err)
2ae0f17d 370 goto errout_remove;
2a94fe48 371
def31174 372 genl_unlock_all();
482a8524 373
2a94fe48
JB
374 /* send all events */
375 genl_ctrl_event(CTRL_CMD_NEWFAMILY, family, NULL, 0);
376 for (i = 0; i < family->n_mcgrps; i++)
377 genl_ctrl_event(CTRL_CMD_NEWMCAST_GRP, family,
378 &family->mcgrps[i], family->mcgrp_offset + i);
482a8524
TG
379
380 return 0;
381
2ae0f17d
JB
382errout_remove:
383 idr_remove(&genl_fam_idr, family->id);
482a8524 384errout_locked:
def31174 385 genl_unlock_all();
482a8524
TG
386 return err;
387}
489111e5 388EXPORT_SYMBOL(genl_register_family);
482a8524
TG
389
390/**
391 * genl_unregister_family - unregister generic netlink family
392 * @family: generic netlink family
393 *
394 * Unregisters the specified family.
395 *
396 * Returns 0 on success or a negative error code.
397 */
2ae0f17d 398int genl_unregister_family(const struct genl_family *family)
482a8524 399{
def31174 400 genl_lock_all();
482a8524 401
0e82c763 402 if (!genl_family_find_byid(family->id)) {
2ae0f17d
JB
403 genl_unlock_all();
404 return -ENOENT;
405 }
482a8524 406
2ae0f17d 407 genl_unregister_mc_groups(family);
ee1c2442 408
2ae0f17d 409 idr_remove(&genl_fam_idr, family->id);
482a8524 410
2ae0f17d
JB
411 up_write(&cb_lock);
412 wait_event(genl_sk_destructing_waitq,
413 atomic_read(&genl_sk_destructing_cnt) == 0);
414 genl_unlock();
482a8524 415
2ae0f17d 416 kfree(family->attrbuf);
482a8524 417
2ae0f17d
JB
418 genl_ctrl_event(CTRL_CMD_DELFAMILY, family, NULL, 0);
419
420 return 0;
482a8524 421}
416c2f9c 422EXPORT_SYMBOL(genl_unregister_family);
482a8524 423
a46621a3
DV
424/**
425 * genlmsg_put - Add generic netlink header to netlink message
426 * @skb: socket buffer holding the message
15e47304 427 * @portid: netlink portid the message is addressed to
a46621a3
DV
428 * @seq: sequence number (usually the one of the sender)
429 * @family: generic netlink family
2c53040f 430 * @flags: netlink message flags
a46621a3
DV
431 * @cmd: generic netlink command
432 *
433 * Returns pointer to user specific header
434 */
15e47304 435void *genlmsg_put(struct sk_buff *skb, u32 portid, u32 seq,
2ae0f17d 436 const struct genl_family *family, int flags, u8 cmd)
a46621a3
DV
437{
438 struct nlmsghdr *nlh;
439 struct genlmsghdr *hdr;
440
15e47304 441 nlh = nlmsg_put(skb, portid, seq, family->id, GENL_HDRLEN +
a46621a3
DV
442 family->hdrsize, flags);
443 if (nlh == NULL)
444 return NULL;
445
446 hdr = nlmsg_data(nlh);
447 hdr->cmd = cmd;
448 hdr->version = family->version;
449 hdr->reserved = 0;
450
451 return (char *) hdr + GENL_HDRLEN;
452}
453EXPORT_SYMBOL(genlmsg_put);
454
fc9e50f5
TH
455static int genl_lock_start(struct netlink_callback *cb)
456{
457 /* our ops are always const - netlink API doesn't propagate that */
458 const struct genl_ops *ops = cb->data;
459 int rc = 0;
460
461 if (ops->start) {
462 genl_lock();
463 rc = ops->start(cb);
464 genl_unlock();
465 }
466 return rc;
467}
468
9b96309c
PS
469static int genl_lock_dumpit(struct sk_buff *skb, struct netlink_callback *cb)
470{
f84f771d
JB
471 /* our ops are always const - netlink API doesn't propagate that */
472 const struct genl_ops *ops = cb->data;
9b96309c
PS
473 int rc;
474
475 genl_lock();
476 rc = ops->dumpit(skb, cb);
477 genl_unlock();
478 return rc;
479}
480
481static int genl_lock_done(struct netlink_callback *cb)
482{
f84f771d
JB
483 /* our ops are always const - netlink API doesn't propagate that */
484 const struct genl_ops *ops = cb->data;
9b96309c
PS
485 int rc = 0;
486
487 if (ops->done) {
488 genl_lock();
489 rc = ops->done(cb);
490 genl_unlock();
491 }
492 return rc;
493}
494
2ae0f17d 495static int genl_family_rcv_msg(const struct genl_family *family,
def31174
PS
496 struct sk_buff *skb,
497 struct nlmsghdr *nlh)
482a8524 498{
f84f771d 499 const struct genl_ops *ops;
134e6375 500 struct net *net = sock_net(skb->sk);
482a8524
TG
501 struct genl_info info;
502 struct genlmsghdr *hdr = nlmsg_data(nlh);
def31174 503 struct nlattr **attrbuf;
1d00a4eb 504 int hdrlen, err;
482a8524 505
134e6375
JB
506 /* this family doesn't exist in this netns */
507 if (!family->netnsok && !net_eq(net, &init_net))
508 return -ENOENT;
509
482a8524
TG
510 hdrlen = GENL_HDRLEN + family->hdrsize;
511 if (nlh->nlmsg_len < nlmsg_msg_size(hdrlen))
1d00a4eb 512 return -EINVAL;
482a8524
TG
513
514 ops = genl_get_cmd(hdr->cmd, family);
1d00a4eb
TG
515 if (ops == NULL)
516 return -EOPNOTSUPP;
482a8524 517
1d00a4eb 518 if ((ops->flags & GENL_ADMIN_PERM) &&
90f62cf3 519 !netlink_capable(skb, CAP_NET_ADMIN))
1d00a4eb 520 return -EPERM;
482a8524 521
4a92602a
TA
522 if ((ops->flags & GENL_UNS_ADMIN_PERM) &&
523 !netlink_ns_capable(skb, net->user_ns, CAP_NET_ADMIN))
524 return -EPERM;
525
e1ee3673 526 if ((nlh->nlmsg_flags & NLM_F_DUMP) == NLM_F_DUMP) {
9b96309c 527 int rc;
def31174 528
1d00a4eb
TG
529 if (ops->dumpit == NULL)
530 return -EOPNOTSUPP;
482a8524 531
9b96309c
PS
532 if (!family->parallel_ops) {
533 struct netlink_dump_control c = {
33c6b1f6 534 .module = family->module,
f84f771d
JB
535 /* we have const, but the netlink API doesn't */
536 .data = (void *)ops,
fc9e50f5 537 .start = genl_lock_start,
9b96309c
PS
538 .dump = genl_lock_dumpit,
539 .done = genl_lock_done,
540 };
541
542 genl_unlock();
33c6b1f6 543 rc = __netlink_dump_start(net->genl_sock, skb, nlh, &c);
9b96309c
PS
544 genl_lock();
545
546 } else {
547 struct netlink_dump_control c = {
33c6b1f6 548 .module = family->module,
fc9e50f5 549 .start = ops->start,
9b96309c
PS
550 .dump = ops->dumpit,
551 .done = ops->done,
552 };
553
33c6b1f6 554 rc = __netlink_dump_start(net->genl_sock, skb, nlh, &c);
9b96309c
PS
555 }
556
557 return rc;
482a8524
TG
558 }
559
1d00a4eb
TG
560 if (ops->doit == NULL)
561 return -EOPNOTSUPP;
482a8524 562
def31174
PS
563 if (family->maxattr && family->parallel_ops) {
564 attrbuf = kmalloc((family->maxattr+1) *
565 sizeof(struct nlattr *), GFP_KERNEL);
566 if (attrbuf == NULL)
567 return -ENOMEM;
568 } else
569 attrbuf = family->attrbuf;
570
571 if (attrbuf) {
572 err = nlmsg_parse(nlh, hdrlen, attrbuf, family->maxattr,
482a8524
TG
573 ops->policy);
574 if (err < 0)
50754d21 575 goto out;
482a8524
TG
576 }
577
578 info.snd_seq = nlh->nlmsg_seq;
15e47304 579 info.snd_portid = NETLINK_CB(skb).portid;
482a8524
TG
580 info.nlhdr = nlh;
581 info.genlhdr = nlmsg_data(nlh);
582 info.userhdr = nlmsg_data(nlh) + GENL_HDRLEN;
def31174 583 info.attrs = attrbuf;
134e6375 584 genl_info_net_set(&info, net);
ff4c92d8 585 memset(&info.user_ptr, 0, sizeof(info.user_ptr));
482a8524 586
ff4c92d8
JB
587 if (family->pre_doit) {
588 err = family->pre_doit(ops, skb, &info);
589 if (err)
50754d21 590 goto out;
ff4c92d8
JB
591 }
592
593 err = ops->doit(skb, &info);
594
595 if (family->post_doit)
596 family->post_doit(ops, skb, &info);
597
50754d21 598out:
def31174
PS
599 if (family->parallel_ops)
600 kfree(attrbuf);
601
602 return err;
603}
604
605static int genl_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
606{
2ae0f17d 607 const struct genl_family *family;
def31174
PS
608 int err;
609
610 family = genl_family_find_byid(nlh->nlmsg_type);
611 if (family == NULL)
612 return -ENOENT;
613
614 if (!family->parallel_ops)
615 genl_lock();
616
617 err = genl_family_rcv_msg(family, skb, nlh);
618
619 if (!family->parallel_ops)
620 genl_unlock();
621
ff4c92d8 622 return err;
482a8524
TG
623}
624
cd40b7d3 625static void genl_rcv(struct sk_buff *skb)
482a8524 626{
def31174 627 down_read(&cb_lock);
cd40b7d3 628 netlink_rcv_skb(skb, &genl_rcv_msg);
def31174 629 up_read(&cb_lock);
482a8524
TG
630}
631
632/**************************************************************************
633 * Controller
634 **************************************************************************/
635
489111e5 636static struct genl_family genl_ctrl;
17c157c8 637
2ae0f17d 638static int ctrl_fill_info(const struct genl_family *family, u32 portid, u32 seq,
482a8524
TG
639 u32 flags, struct sk_buff *skb, u8 cmd)
640{
641 void *hdr;
642
15e47304 643 hdr = genlmsg_put(skb, portid, seq, &genl_ctrl, flags, cmd);
482a8524
TG
644 if (hdr == NULL)
645 return -1;
646
444653f6
DM
647 if (nla_put_string(skb, CTRL_ATTR_FAMILY_NAME, family->name) ||
648 nla_put_u16(skb, CTRL_ATTR_FAMILY_ID, family->id) ||
649 nla_put_u32(skb, CTRL_ATTR_VERSION, family->version) ||
650 nla_put_u32(skb, CTRL_ATTR_HDRSIZE, family->hdrsize) ||
651 nla_put_u32(skb, CTRL_ATTR_MAXATTR, family->maxattr))
652 goto nla_put_failure;
eb328111 653
d91824c0 654 if (family->n_ops) {
e94ef682 655 struct nlattr *nla_ops;
d91824c0 656 int i;
eb328111 657
e94ef682
TG
658 nla_ops = nla_nest_start(skb, CTRL_ATTR_OPS);
659 if (nla_ops == NULL)
eb328111
TG
660 goto nla_put_failure;
661
d91824c0 662 for (i = 0; i < family->n_ops; i++) {
e94ef682 663 struct nlattr *nest;
f84f771d 664 const struct genl_ops *ops = &family->ops[i];
029b234f 665 u32 op_flags = ops->flags;
f84f771d
JB
666
667 if (ops->dumpit)
029b234f 668 op_flags |= GENL_CMD_CAP_DUMP;
f84f771d 669 if (ops->doit)
029b234f 670 op_flags |= GENL_CMD_CAP_DO;
f84f771d 671 if (ops->policy)
029b234f 672 op_flags |= GENL_CMD_CAP_HASPOL;
eb328111 673
d91824c0 674 nest = nla_nest_start(skb, i + 1);
e94ef682
TG
675 if (nest == NULL)
676 goto nla_put_failure;
eb328111 677
444653f6 678 if (nla_put_u32(skb, CTRL_ATTR_OP_ID, ops->cmd) ||
029b234f 679 nla_put_u32(skb, CTRL_ATTR_OP_FLAGS, op_flags))
444653f6 680 goto nla_put_failure;
eb328111 681
e94ef682
TG
682 nla_nest_end(skb, nest);
683 }
684
685 nla_nest_end(skb, nla_ops);
686 }
482a8524 687
2a94fe48 688 if (family->n_mcgrps) {
2dbba6f7 689 struct nlattr *nla_grps;
2a94fe48 690 int i;
2dbba6f7
JB
691
692 nla_grps = nla_nest_start(skb, CTRL_ATTR_MCAST_GROUPS);
693 if (nla_grps == NULL)
694 goto nla_put_failure;
695
2a94fe48 696 for (i = 0; i < family->n_mcgrps; i++) {
2dbba6f7 697 struct nlattr *nest;
2a94fe48 698 const struct genl_multicast_group *grp;
2dbba6f7 699
2a94fe48
JB
700 grp = &family->mcgrps[i];
701
702 nest = nla_nest_start(skb, i + 1);
2dbba6f7
JB
703 if (nest == NULL)
704 goto nla_put_failure;
705
2a94fe48
JB
706 if (nla_put_u32(skb, CTRL_ATTR_MCAST_GRP_ID,
707 family->mcgrp_offset + i) ||
444653f6
DM
708 nla_put_string(skb, CTRL_ATTR_MCAST_GRP_NAME,
709 grp->name))
710 goto nla_put_failure;
2dbba6f7
JB
711
712 nla_nest_end(skb, nest);
713 }
714 nla_nest_end(skb, nla_grps);
715 }
716
053c095a
JB
717 genlmsg_end(skb, hdr);
718 return 0;
2dbba6f7
JB
719
720nla_put_failure:
bc3ed28c
TG
721 genlmsg_cancel(skb, hdr);
722 return -EMSGSIZE;
2dbba6f7
JB
723}
724
2ae0f17d 725static int ctrl_fill_mcgrp_info(const struct genl_family *family,
2a94fe48
JB
726 const struct genl_multicast_group *grp,
727 int grp_id, u32 portid, u32 seq, u32 flags,
728 struct sk_buff *skb, u8 cmd)
2dbba6f7
JB
729{
730 void *hdr;
731 struct nlattr *nla_grps;
732 struct nlattr *nest;
733
15e47304 734 hdr = genlmsg_put(skb, portid, seq, &genl_ctrl, flags, cmd);
2dbba6f7
JB
735 if (hdr == NULL)
736 return -1;
737
c2ebb908
JB
738 if (nla_put_string(skb, CTRL_ATTR_FAMILY_NAME, family->name) ||
739 nla_put_u16(skb, CTRL_ATTR_FAMILY_ID, family->id))
444653f6 740 goto nla_put_failure;
2dbba6f7
JB
741
742 nla_grps = nla_nest_start(skb, CTRL_ATTR_MCAST_GROUPS);
743 if (nla_grps == NULL)
744 goto nla_put_failure;
745
746 nest = nla_nest_start(skb, 1);
747 if (nest == NULL)
748 goto nla_put_failure;
749
2a94fe48 750 if (nla_put_u32(skb, CTRL_ATTR_MCAST_GRP_ID, grp_id) ||
444653f6
DM
751 nla_put_string(skb, CTRL_ATTR_MCAST_GRP_NAME,
752 grp->name))
753 goto nla_put_failure;
2dbba6f7
JB
754
755 nla_nest_end(skb, nest);
756 nla_nest_end(skb, nla_grps);
757
053c095a
JB
758 genlmsg_end(skb, hdr);
759 return 0;
482a8524
TG
760
761nla_put_failure:
bc3ed28c
TG
762 genlmsg_cancel(skb, hdr);
763 return -EMSGSIZE;
482a8524
TG
764}
765
766static int ctrl_dumpfamily(struct sk_buff *skb, struct netlink_callback *cb)
767{
2ae0f17d 768 int n = 0;
482a8524 769 struct genl_family *rt;
134e6375 770 struct net *net = sock_net(skb->sk);
2ae0f17d
JB
771 int fams_to_skip = cb->args[0];
772 unsigned int id;
482a8524 773
2ae0f17d
JB
774 idr_for_each_entry(&genl_fam_idr, rt, id) {
775 if (!rt->netnsok && !net_eq(net, &init_net))
776 continue;
777
778 if (n++ < fams_to_skip)
779 continue;
482a8524 780
2ae0f17d
JB
781 if (ctrl_fill_info(rt, NETLINK_CB(cb->skb).portid,
782 cb->nlh->nlmsg_seq, NLM_F_MULTI,
783 skb, CTRL_CMD_NEWFAMILY) < 0)
784 break;
785 }
482a8524 786
2ae0f17d 787 cb->args[0] = n;
482a8524
TG
788 return skb->len;
789}
790
2ae0f17d 791static struct sk_buff *ctrl_build_family_msg(const struct genl_family *family,
15e47304 792 u32 portid, int seq, u8 cmd)
482a8524
TG
793{
794 struct sk_buff *skb;
795 int err;
796
339bf98f 797 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
482a8524
TG
798 if (skb == NULL)
799 return ERR_PTR(-ENOBUFS);
800
15e47304 801 err = ctrl_fill_info(family, portid, seq, 0, skb, cmd);
482a8524
TG
802 if (err < 0) {
803 nlmsg_free(skb);
804 return ERR_PTR(err);
805 }
806
807 return skb;
808}
809
2a94fe48 810static struct sk_buff *
2ae0f17d 811ctrl_build_mcgrp_msg(const struct genl_family *family,
2a94fe48
JB
812 const struct genl_multicast_group *grp,
813 int grp_id, u32 portid, int seq, u8 cmd)
2dbba6f7
JB
814{
815 struct sk_buff *skb;
816 int err;
817
818 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
819 if (skb == NULL)
820 return ERR_PTR(-ENOBUFS);
821
2a94fe48
JB
822 err = ctrl_fill_mcgrp_info(family, grp, grp_id, portid,
823 seq, 0, skb, cmd);
2dbba6f7
JB
824 if (err < 0) {
825 nlmsg_free(skb);
826 return ERR_PTR(err);
827 }
828
829 return skb;
830}
831
ef7c79ed 832static const struct nla_policy ctrl_policy[CTRL_ATTR_MAX+1] = {
482a8524 833 [CTRL_ATTR_FAMILY_ID] = { .type = NLA_U16 },
5176f91e
TG
834 [CTRL_ATTR_FAMILY_NAME] = { .type = NLA_NUL_STRING,
835 .len = GENL_NAMSIZ - 1 },
482a8524
TG
836};
837
838static int ctrl_getfamily(struct sk_buff *skb, struct genl_info *info)
839{
840 struct sk_buff *msg;
2ae0f17d 841 const struct genl_family *res = NULL;
482a8524
TG
842 int err = -EINVAL;
843
844 if (info->attrs[CTRL_ATTR_FAMILY_ID]) {
845 u16 id = nla_get_u16(info->attrs[CTRL_ATTR_FAMILY_ID]);
846 res = genl_family_find_byid(id);
134e6375 847 err = -ENOENT;
482a8524
TG
848 }
849
850 if (info->attrs[CTRL_ATTR_FAMILY_NAME]) {
5176f91e 851 char *name;
482a8524 852
5176f91e 853 name = nla_data(info->attrs[CTRL_ATTR_FAMILY_NAME]);
482a8524 854 res = genl_family_find_byname(name);
fa843095
SH
855#ifdef CONFIG_MODULES
856 if (res == NULL) {
857 genl_unlock();
c74f2b26 858 up_read(&cb_lock);
e9412c37 859 request_module("net-pf-%d-proto-%d-family-%s",
fa843095 860 PF_NETLINK, NETLINK_GENERIC, name);
c74f2b26 861 down_read(&cb_lock);
fa843095
SH
862 genl_lock();
863 res = genl_family_find_byname(name);
864 }
865#endif
134e6375 866 err = -ENOENT;
482a8524
TG
867 }
868
134e6375
JB
869 if (res == NULL)
870 return err;
871
872 if (!res->netnsok && !net_eq(genl_info_net(info), &init_net)) {
873 /* family doesn't exist here */
874 return -ENOENT;
482a8524
TG
875 }
876
15e47304 877 msg = ctrl_build_family_msg(res, info->snd_portid, info->snd_seq,
2dbba6f7 878 CTRL_CMD_NEWFAMILY);
134e6375
JB
879 if (IS_ERR(msg))
880 return PTR_ERR(msg);
482a8524 881
134e6375 882 return genlmsg_reply(msg, info);
482a8524
TG
883}
884
2ae0f17d 885static int genl_ctrl_event(int event, const struct genl_family *family,
2a94fe48
JB
886 const struct genl_multicast_group *grp,
887 int grp_id)
482a8524
TG
888{
889 struct sk_buff *msg;
890
134e6375
JB
891 /* genl is still initialising */
892 if (!init_net.genl_sock)
482a8524
TG
893 return 0;
894
895 switch (event) {
896 case CTRL_CMD_NEWFAMILY:
897 case CTRL_CMD_DELFAMILY:
c2ebb908 898 WARN_ON(grp);
134e6375 899 msg = ctrl_build_family_msg(family, 0, 0, event);
2dbba6f7
JB
900 break;
901 case CTRL_CMD_NEWMCAST_GRP:
902 case CTRL_CMD_DELMCAST_GRP:
c2ebb908 903 BUG_ON(!grp);
2a94fe48 904 msg = ctrl_build_mcgrp_msg(family, grp, grp_id, 0, 0, event);
482a8524 905 break;
134e6375
JB
906 default:
907 return -EINVAL;
908 }
909
910 if (IS_ERR(msg))
911 return PTR_ERR(msg);
912
913 if (!family->netnsok) {
68eb5503 914 genlmsg_multicast_netns(&genl_ctrl, &init_net, msg, 0,
2a94fe48 915 0, GFP_KERNEL);
134e6375
JB
916 } else {
917 rcu_read_lock();
68eb5503 918 genlmsg_multicast_allns(&genl_ctrl, msg, 0,
2a94fe48 919 0, GFP_ATOMIC);
134e6375 920 rcu_read_unlock();
482a8524
TG
921 }
922
923 return 0;
924}
925
12d8de6d 926static const struct genl_ops genl_ctrl_ops[] = {
c53ed742
JB
927 {
928 .cmd = CTRL_CMD_GETFAMILY,
929 .doit = ctrl_getfamily,
930 .dumpit = ctrl_dumpfamily,
931 .policy = ctrl_policy,
932 },
482a8524
TG
933};
934
12d8de6d 935static const struct genl_multicast_group genl_ctrl_groups[] = {
2a94fe48 936 { .name = "notify", },
2dbba6f7
JB
937};
938
56989f6d 939static struct genl_family genl_ctrl __ro_after_init = {
489111e5
JB
940 .module = THIS_MODULE,
941 .ops = genl_ctrl_ops,
942 .n_ops = ARRAY_SIZE(genl_ctrl_ops),
943 .mcgrps = genl_ctrl_groups,
944 .n_mcgrps = ARRAY_SIZE(genl_ctrl_groups),
945 .id = GENL_ID_CTRL,
946 .name = "nlctrl",
947 .version = 0x2,
948 .maxattr = CTRL_ATTR_MAX,
949 .netnsok = true,
950};
951
023e2cfa 952static int genl_bind(struct net *net, int group)
c380d9a7 953{
2ae0f17d
JB
954 struct genl_family *f;
955 int err = -ENOENT;
956 unsigned int id;
c380d9a7
JB
957
958 down_read(&cb_lock);
2ae0f17d
JB
959
960 idr_for_each_entry(&genl_fam_idr, f, id) {
961 if (group >= f->mcgrp_offset &&
962 group < f->mcgrp_offset + f->n_mcgrps) {
963 int fam_grp = group - f->mcgrp_offset;
964
965 if (!f->netnsok && net != &init_net)
966 err = -ENOENT;
967 else if (f->mcast_bind)
968 err = f->mcast_bind(net, fam_grp);
969 else
970 err = 0;
971 break;
c380d9a7
JB
972 }
973 }
974 up_read(&cb_lock);
975
c380d9a7
JB
976 return err;
977}
978
023e2cfa 979static void genl_unbind(struct net *net, int group)
c380d9a7 980{
2ae0f17d
JB
981 struct genl_family *f;
982 unsigned int id;
c380d9a7
JB
983
984 down_read(&cb_lock);
c380d9a7 985
2ae0f17d
JB
986 idr_for_each_entry(&genl_fam_idr, f, id) {
987 if (group >= f->mcgrp_offset &&
988 group < f->mcgrp_offset + f->n_mcgrps) {
989 int fam_grp = group - f->mcgrp_offset;
c380d9a7 990
2ae0f17d
JB
991 if (f->mcast_unbind)
992 f->mcast_unbind(net, fam_grp);
993 break;
c380d9a7
JB
994 }
995 }
996 up_read(&cb_lock);
c380d9a7
JB
997}
998
134e6375
JB
999static int __net_init genl_pernet_init(struct net *net)
1000{
a31f2d17
PNA
1001 struct netlink_kernel_cfg cfg = {
1002 .input = genl_rcv,
9785e10a 1003 .flags = NL_CFG_F_NONROOT_RECV,
c380d9a7
JB
1004 .bind = genl_bind,
1005 .unbind = genl_unbind,
a31f2d17
PNA
1006 };
1007
134e6375 1008 /* we'll bump the group number right afterwards */
9f00d977 1009 net->genl_sock = netlink_kernel_create(net, NETLINK_GENERIC, &cfg);
134e6375
JB
1010
1011 if (!net->genl_sock && net_eq(net, &init_net))
1012 panic("GENL: Cannot initialize generic netlink\n");
1013
1014 if (!net->genl_sock)
1015 return -ENOMEM;
1016
1017 return 0;
1018}
1019
1020static void __net_exit genl_pernet_exit(struct net *net)
1021{
1022 netlink_kernel_release(net->genl_sock);
1023 net->genl_sock = NULL;
1024}
1025
1026static struct pernet_operations genl_pernet_ops = {
1027 .init = genl_pernet_init,
1028 .exit = genl_pernet_exit,
1029};
1030
482a8524
TG
1031static int __init genl_init(void)
1032{
2ae0f17d 1033 int err;
482a8524 1034
489111e5 1035 err = genl_register_family(&genl_ctrl);
482a8524 1036 if (err < 0)
134e6375 1037 goto problem;
482a8524 1038
134e6375
JB
1039 err = register_pernet_subsys(&genl_pernet_ops);
1040 if (err)
1041 goto problem;
482a8524
TG
1042
1043 return 0;
1044
134e6375 1045problem:
482a8524 1046 panic("GENL: Cannot register controller: %d\n", err);
482a8524
TG
1047}
1048
1049subsys_initcall(genl_init);
1050
c90c39da
JB
1051/**
1052 * genl_family_attrbuf - return family's attrbuf
1053 * @family: the family
1054 *
1055 * Return the family's attrbuf, while validating that it's
1056 * actually valid to access it.
1057 *
1058 * You cannot use this function with a family that has parallel_ops
1059 * and you can only use it within (pre/post) doit/dumpit callbacks.
1060 */
2ae0f17d 1061struct nlattr **genl_family_attrbuf(const struct genl_family *family)
c90c39da
JB
1062{
1063 if (!WARN_ON(family->parallel_ops))
1064 lockdep_assert_held(&genl_mutex);
1065
1066 return family->attrbuf;
1067}
1068EXPORT_SYMBOL(genl_family_attrbuf);
1069
15e47304 1070static int genlmsg_mcast(struct sk_buff *skb, u32 portid, unsigned long group,
134e6375
JB
1071 gfp_t flags)
1072{
1073 struct sk_buff *tmp;
1074 struct net *net, *prev = NULL;
1075 int err;
1076
1077 for_each_net_rcu(net) {
1078 if (prev) {
1079 tmp = skb_clone(skb, flags);
1080 if (!tmp) {
1081 err = -ENOMEM;
1082 goto error;
1083 }
1084 err = nlmsg_multicast(prev->genl_sock, tmp,
15e47304 1085 portid, group, flags);
134e6375
JB
1086 if (err)
1087 goto error;
1088 }
1089
1090 prev = net;
1091 }
1092
15e47304 1093 return nlmsg_multicast(prev->genl_sock, skb, portid, group, flags);
134e6375
JB
1094 error:
1095 kfree_skb(skb);
1096 return err;
1097}
1098
2ae0f17d
JB
1099int genlmsg_multicast_allns(const struct genl_family *family,
1100 struct sk_buff *skb, u32 portid,
1101 unsigned int group, gfp_t flags)
134e6375 1102{
220815a9 1103 if (WARN_ON_ONCE(group >= family->n_mcgrps))
2a94fe48
JB
1104 return -EINVAL;
1105 group = family->mcgrp_offset + group;
15e47304 1106 return genlmsg_mcast(skb, portid, group, flags);
134e6375
JB
1107}
1108EXPORT_SYMBOL(genlmsg_multicast_allns);
263ba61d 1109
2ae0f17d 1110void genl_notify(const struct genl_family *family, struct sk_buff *skb,
92c14d9b 1111 struct genl_info *info, u32 group, gfp_t flags)
263ba61d 1112{
92c14d9b 1113 struct net *net = genl_info_net(info);
263ba61d
PS
1114 struct sock *sk = net->genl_sock;
1115 int report = 0;
1116
92c14d9b
JB
1117 if (info->nlhdr)
1118 report = nlmsg_report(info->nlhdr);
263ba61d 1119
220815a9 1120 if (WARN_ON_ONCE(group >= family->n_mcgrps))
2a94fe48
JB
1121 return;
1122 group = family->mcgrp_offset + group;
92c14d9b 1123 nlmsg_notify(sk, skb, info->snd_portid, group, report, flags);
263ba61d
PS
1124}
1125EXPORT_SYMBOL(genl_notify);