lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 12 Feb 2018 09:18:41 -0500
From:   Neil Horman <nhorman@...driver.com>
To:     Xin Long <lucien.xin@...il.com>
Cc:     network dev <netdev@...r.kernel.org>, linux-sctp@...r.kernel.org,
        davem@...emloft.net,
        Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
Subject: Re: [PATCH net] sctp: rename sctp_diag.c as diag.c

On Mon, Feb 12, 2018 at 06:32:30PM +0800, Xin Long wrote:
> Remove sctp_ prefix for diag file, to keep consistent with other
> files' names, while at it, also to add file comments for diag.c.
> 
> Signed-off-by: Xin Long <lucien.xin@...il.com>
I'm fine with this as a single patch
Acked-by: Neil Horman <nhorman@...driver.com>

> ---
>  net/sctp/Makefile    |   2 +
>  net/sctp/diag.c      | 557 +++++++++++++++++++++++++++++++++++++++++++++++++++
>  net/sctp/sctp_diag.c | 526 ------------------------------------------------
>  3 files changed, 559 insertions(+), 526 deletions(-)
>  create mode 100644 net/sctp/diag.c
>  delete mode 100644 net/sctp/sctp_diag.c
> 
> diff --git a/net/sctp/Makefile b/net/sctp/Makefile
> index 6776582..e845e45 100644
> --- a/net/sctp/Makefile
> +++ b/net/sctp/Makefile
> @@ -15,6 +15,8 @@ sctp-y := sm_statetable.o sm_statefuns.o sm_sideeffect.o \
>  	  offload.o stream_sched.o stream_sched_prio.o \
>  	  stream_sched_rr.o stream_interleave.o
>  
> +sctp_diag-y := diag.o
> +
>  sctp-$(CONFIG_SCTP_DBG_OBJCNT) += objcnt.o
>  sctp-$(CONFIG_PROC_FS) += proc.o
>  sctp-$(CONFIG_SYSCTL) += sysctl.o
> diff --git a/net/sctp/diag.c b/net/sctp/diag.c
> new file mode 100644
> index 0000000..078f01a
> --- /dev/null
> +++ b/net/sctp/diag.c
> @@ -0,0 +1,557 @@
> +/* SCTP kernel implementation
> + * (C) Copyright Red Hat Inc. 2017
> + *
> + * This file is part of the SCTP kernel implementation
> + *
> + * These functions implement sctp diag support.
> + *
> + * This SCTP implementation is free software;
> + * you can redistribute it and/or modify it under the terms of
> + * the GNU General Public License as published by
> + * the Free Software Foundation; either version 2, or (at your option)
> + * any later version.
> + *
> + * This SCTP implementation is distributed in the hope that it
> + * will be useful, but WITHOUT ANY WARRANTY; without even the implied
> + *                 ************************
> + * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
> + * See the GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with GNU CC; see the file COPYING.  If not, see
> + * <http://www.gnu.org/licenses/>.
> + *
> + * Please send any bug reports or fixes you make to the
> + * email addresched(es):
> + *    lksctp developers <linux-sctp@...r.kernel.org>
> + *
> + * Written or modified by:
> + *    Xin Long <lucien.xin@...il.com>
> + */
> +
> +#include <linux/module.h>
> +#include <linux/inet_diag.h>
> +#include <linux/sock_diag.h>
> +#include <net/sctp/sctp.h>
> +
> +static void sctp_diag_get_info(struct sock *sk, struct inet_diag_msg *r,
> +			       void *info);
> +
> +/* define some functions to make asoc/ep fill look clean */
> +static void inet_diag_msg_sctpasoc_fill(struct inet_diag_msg *r,
> +					struct sock *sk,
> +					struct sctp_association *asoc)
> +{
> +	union sctp_addr laddr, paddr;
> +	struct dst_entry *dst;
> +	struct timer_list *t3_rtx = &asoc->peer.primary_path->T3_rtx_timer;
> +
> +	laddr = list_entry(asoc->base.bind_addr.address_list.next,
> +			   struct sctp_sockaddr_entry, list)->a;
> +	paddr = asoc->peer.primary_path->ipaddr;
> +	dst = asoc->peer.primary_path->dst;
> +
> +	r->idiag_family = sk->sk_family;
> +	r->id.idiag_sport = htons(asoc->base.bind_addr.port);
> +	r->id.idiag_dport = htons(asoc->peer.port);
> +	r->id.idiag_if = dst ? dst->dev->ifindex : 0;
> +	sock_diag_save_cookie(sk, r->id.idiag_cookie);
> +
> +#if IS_ENABLED(CONFIG_IPV6)
> +	if (sk->sk_family == AF_INET6) {
> +		*(struct in6_addr *)r->id.idiag_src = laddr.v6.sin6_addr;
> +		*(struct in6_addr *)r->id.idiag_dst = paddr.v6.sin6_addr;
> +	} else
> +#endif
> +	{
> +		memset(&r->id.idiag_src, 0, sizeof(r->id.idiag_src));
> +		memset(&r->id.idiag_dst, 0, sizeof(r->id.idiag_dst));
> +
> +		r->id.idiag_src[0] = laddr.v4.sin_addr.s_addr;
> +		r->id.idiag_dst[0] = paddr.v4.sin_addr.s_addr;
> +	}
> +
> +	r->idiag_state = asoc->state;
> +	if (timer_pending(t3_rtx)) {
> +		r->idiag_timer = SCTP_EVENT_TIMEOUT_T3_RTX;
> +		r->idiag_retrans = asoc->rtx_data_chunks;
> +		r->idiag_expires = jiffies_to_msecs(t3_rtx->expires - jiffies);
> +	} else {
> +		r->idiag_timer = 0;
> +		r->idiag_retrans = 0;
> +		r->idiag_expires = 0;
> +	}
> +}
> +
> +static int inet_diag_msg_sctpladdrs_fill(struct sk_buff *skb,
> +					 struct list_head *address_list)
> +{
> +	struct sctp_sockaddr_entry *laddr;
> +	int addrlen = sizeof(struct sockaddr_storage);
> +	int addrcnt = 0;
> +	struct nlattr *attr;
> +	void *info = NULL;
> +
> +	list_for_each_entry_rcu(laddr, address_list, list)
> +		addrcnt++;
> +
> +	attr = nla_reserve(skb, INET_DIAG_LOCALS, addrlen * addrcnt);
> +	if (!attr)
> +		return -EMSGSIZE;
> +
> +	info = nla_data(attr);
> +	list_for_each_entry_rcu(laddr, address_list, list) {
> +		memcpy(info, &laddr->a, sizeof(laddr->a));
> +		memset(info + sizeof(laddr->a), 0, addrlen - sizeof(laddr->a));
> +		info += addrlen;
> +	}
> +
> +	return 0;
> +}
> +
> +static int inet_diag_msg_sctpaddrs_fill(struct sk_buff *skb,
> +					struct sctp_association *asoc)
> +{
> +	int addrlen = sizeof(struct sockaddr_storage);
> +	struct sctp_transport *from;
> +	struct nlattr *attr;
> +	void *info = NULL;
> +
> +	attr = nla_reserve(skb, INET_DIAG_PEERS,
> +			   addrlen * asoc->peer.transport_count);
> +	if (!attr)
> +		return -EMSGSIZE;
> +
> +	info = nla_data(attr);
> +	list_for_each_entry(from, &asoc->peer.transport_addr_list,
> +			    transports) {
> +		memcpy(info, &from->ipaddr, sizeof(from->ipaddr));
> +		memset(info + sizeof(from->ipaddr), 0,
> +		       addrlen - sizeof(from->ipaddr));
> +		info += addrlen;
> +	}
> +
> +	return 0;
> +}
> +
> +/* sctp asoc/ep fill*/
> +static int inet_sctp_diag_fill(struct sock *sk, struct sctp_association *asoc,
> +			       struct sk_buff *skb,
> +			       const struct inet_diag_req_v2 *req,
> +			       struct user_namespace *user_ns,
> +			       int portid, u32 seq, u16 nlmsg_flags,
> +			       const struct nlmsghdr *unlh,
> +			       bool net_admin)
> +{
> +	struct sctp_endpoint *ep = sctp_sk(sk)->ep;
> +	struct list_head *addr_list;
> +	struct inet_diag_msg *r;
> +	struct nlmsghdr  *nlh;
> +	int ext = req->idiag_ext;
> +	struct sctp_infox infox;
> +	void *info = NULL;
> +
> +	nlh = nlmsg_put(skb, portid, seq, unlh->nlmsg_type, sizeof(*r),
> +			nlmsg_flags);
> +	if (!nlh)
> +		return -EMSGSIZE;
> +
> +	r = nlmsg_data(nlh);
> +	BUG_ON(!sk_fullsock(sk));
> +
> +	if (asoc) {
> +		inet_diag_msg_sctpasoc_fill(r, sk, asoc);
> +	} else {
> +		inet_diag_msg_common_fill(r, sk);
> +		r->idiag_state = sk->sk_state;
> +		r->idiag_timer = 0;
> +		r->idiag_retrans = 0;
> +	}
> +
> +	if (inet_diag_msg_attrs_fill(sk, skb, r, ext, user_ns, net_admin))
> +		goto errout;
> +
> +	if (ext & (1 << (INET_DIAG_SKMEMINFO - 1))) {
> +		u32 mem[SK_MEMINFO_VARS];
> +		int amt;
> +
> +		if (asoc && asoc->ep->sndbuf_policy)
> +			amt = asoc->sndbuf_used;
> +		else
> +			amt = sk_wmem_alloc_get(sk);
> +		mem[SK_MEMINFO_WMEM_ALLOC] = amt;
> +		if (asoc && asoc->ep->rcvbuf_policy)
> +			amt = atomic_read(&asoc->rmem_alloc);
> +		else
> +			amt = sk_rmem_alloc_get(sk);
> +		mem[SK_MEMINFO_RMEM_ALLOC] = amt;
> +		mem[SK_MEMINFO_RCVBUF] = sk->sk_rcvbuf;
> +		mem[SK_MEMINFO_SNDBUF] = sk->sk_sndbuf;
> +		mem[SK_MEMINFO_FWD_ALLOC] = sk->sk_forward_alloc;
> +		mem[SK_MEMINFO_WMEM_QUEUED] = sk->sk_wmem_queued;
> +		mem[SK_MEMINFO_OPTMEM] = atomic_read(&sk->sk_omem_alloc);
> +		mem[SK_MEMINFO_BACKLOG] = sk->sk_backlog.len;
> +		mem[SK_MEMINFO_DROPS] = atomic_read(&sk->sk_drops);
> +
> +		if (nla_put(skb, INET_DIAG_SKMEMINFO, sizeof(mem), &mem) < 0)
> +			goto errout;
> +	}
> +
> +	if (ext & (1 << (INET_DIAG_INFO - 1))) {
> +		struct nlattr *attr;
> +
> +		attr = nla_reserve_64bit(skb, INET_DIAG_INFO,
> +					 sizeof(struct sctp_info),
> +					 INET_DIAG_PAD);
> +		if (!attr)
> +			goto errout;
> +
> +		info = nla_data(attr);
> +	}
> +	infox.sctpinfo = (struct sctp_info *)info;
> +	infox.asoc = asoc;
> +	sctp_diag_get_info(sk, r, &infox);
> +
> +	addr_list = asoc ? &asoc->base.bind_addr.address_list
> +			 : &ep->base.bind_addr.address_list;
> +	if (inet_diag_msg_sctpladdrs_fill(skb, addr_list))
> +		goto errout;
> +
> +	if (asoc && (ext & (1 << (INET_DIAG_CONG - 1))))
> +		if (nla_put_string(skb, INET_DIAG_CONG, "reno") < 0)
> +			goto errout;
> +
> +	if (asoc && inet_diag_msg_sctpaddrs_fill(skb, asoc))
> +		goto errout;
> +
> +	nlmsg_end(skb, nlh);
> +	return 0;
> +
> +errout:
> +	nlmsg_cancel(skb, nlh);
> +	return -EMSGSIZE;
> +}
> +
> +/* callback and param */
> +struct sctp_comm_param {
> +	struct sk_buff *skb;
> +	struct netlink_callback *cb;
> +	const struct inet_diag_req_v2 *r;
> +	const struct nlmsghdr *nlh;
> +	bool net_admin;
> +};
> +
> +static size_t inet_assoc_attr_size(struct sctp_association *asoc)
> +{
> +	int addrlen = sizeof(struct sockaddr_storage);
> +	int addrcnt = 0;
> +	struct sctp_sockaddr_entry *laddr;
> +
> +	list_for_each_entry_rcu(laddr, &asoc->base.bind_addr.address_list,
> +				list)
> +		addrcnt++;
> +
> +	return	  nla_total_size(sizeof(struct sctp_info))
> +		+ nla_total_size(1) /* INET_DIAG_SHUTDOWN */
> +		+ nla_total_size(1) /* INET_DIAG_TOS */
> +		+ nla_total_size(1) /* INET_DIAG_TCLASS */
> +		+ nla_total_size(4) /* INET_DIAG_MARK */
> +		+ nla_total_size(addrlen * asoc->peer.transport_count)
> +		+ nla_total_size(addrlen * addrcnt)
> +		+ nla_total_size(sizeof(struct inet_diag_meminfo))
> +		+ nla_total_size(sizeof(struct inet_diag_msg))
> +		+ 64;
> +}
> +
> +static int sctp_tsp_dump_one(struct sctp_transport *tsp, void *p)
> +{
> +	struct sctp_association *assoc = tsp->asoc;
> +	struct sock *sk = tsp->asoc->base.sk;
> +	struct sctp_comm_param *commp = p;
> +	struct sk_buff *in_skb = commp->skb;
> +	const struct inet_diag_req_v2 *req = commp->r;
> +	const struct nlmsghdr *nlh = commp->nlh;
> +	struct net *net = sock_net(in_skb->sk);
> +	struct sk_buff *rep;
> +	int err;
> +
> +	err = sock_diag_check_cookie(sk, req->id.idiag_cookie);
> +	if (err)
> +		goto out;
> +
> +	err = -ENOMEM;
> +	rep = nlmsg_new(inet_assoc_attr_size(assoc), GFP_KERNEL);
> +	if (!rep)
> +		goto out;
> +
> +	lock_sock(sk);
> +	if (sk != assoc->base.sk) {
> +		release_sock(sk);
> +		sk = assoc->base.sk;
> +		lock_sock(sk);
> +	}
> +	err = inet_sctp_diag_fill(sk, assoc, rep, req,
> +				  sk_user_ns(NETLINK_CB(in_skb).sk),
> +				  NETLINK_CB(in_skb).portid,
> +				  nlh->nlmsg_seq, 0, nlh,
> +				  commp->net_admin);
> +	release_sock(sk);
> +	if (err < 0) {
> +		WARN_ON(err == -EMSGSIZE);
> +		kfree_skb(rep);
> +		goto out;
> +	}
> +
> +	err = netlink_unicast(net->diag_nlsk, rep, NETLINK_CB(in_skb).portid,
> +			      MSG_DONTWAIT);
> +	if (err > 0)
> +		err = 0;
> +out:
> +	return err;
> +}
> +
> +static int sctp_sock_dump(struct sctp_transport *tsp, void *p)
> +{
> +	struct sctp_endpoint *ep = tsp->asoc->ep;
> +	struct sctp_comm_param *commp = p;
> +	struct sock *sk = ep->base.sk;
> +	struct sk_buff *skb = commp->skb;
> +	struct netlink_callback *cb = commp->cb;
> +	const struct inet_diag_req_v2 *r = commp->r;
> +	struct sctp_association *assoc;
> +	int err = 0;
> +
> +	lock_sock(sk);
> +	list_for_each_entry(assoc, &ep->asocs, asocs) {
> +		if (cb->args[4] < cb->args[1])
> +			goto next;
> +
> +		if (r->id.idiag_sport != htons(assoc->base.bind_addr.port) &&
> +		    r->id.idiag_sport)
> +			goto next;
> +		if (r->id.idiag_dport != htons(assoc->peer.port) &&
> +		    r->id.idiag_dport)
> +			goto next;
> +
> +		if (!cb->args[3] &&
> +		    inet_sctp_diag_fill(sk, NULL, skb, r,
> +					sk_user_ns(NETLINK_CB(cb->skb).sk),
> +					NETLINK_CB(cb->skb).portid,
> +					cb->nlh->nlmsg_seq,
> +					NLM_F_MULTI, cb->nlh,
> +					commp->net_admin) < 0) {
> +			err = 1;
> +			goto release;
> +		}
> +		cb->args[3] = 1;
> +
> +		if (inet_sctp_diag_fill(sk, assoc, skb, r,
> +					sk_user_ns(NETLINK_CB(cb->skb).sk),
> +					NETLINK_CB(cb->skb).portid,
> +					cb->nlh->nlmsg_seq, 0, cb->nlh,
> +					commp->net_admin) < 0) {
> +			err = 1;
> +			goto release;
> +		}
> +next:
> +		cb->args[4]++;
> +	}
> +	cb->args[1] = 0;
> +	cb->args[3] = 0;
> +	cb->args[4] = 0;
> +release:
> +	release_sock(sk);
> +	return err;
> +}
> +
> +static int sctp_sock_filter(struct sctp_transport *tsp, void *p)
> +{
> +	struct sctp_endpoint *ep = tsp->asoc->ep;
> +	struct sctp_comm_param *commp = p;
> +	struct sock *sk = ep->base.sk;
> +	const struct inet_diag_req_v2 *r = commp->r;
> +	struct sctp_association *assoc =
> +		list_entry(ep->asocs.next, struct sctp_association, asocs);
> +
> +	/* find the ep only once through the transports by this condition */
> +	if (tsp->asoc != assoc)
> +		return 0;
> +
> +	if (r->sdiag_family != AF_UNSPEC && sk->sk_family != r->sdiag_family)
> +		return 0;
> +
> +	return 1;
> +}
> +
> +static int sctp_ep_dump(struct sctp_endpoint *ep, void *p)
> +{
> +	struct sctp_comm_param *commp = p;
> +	struct sock *sk = ep->base.sk;
> +	struct sk_buff *skb = commp->skb;
> +	struct netlink_callback *cb = commp->cb;
> +	const struct inet_diag_req_v2 *r = commp->r;
> +	struct net *net = sock_net(skb->sk);
> +	struct inet_sock *inet = inet_sk(sk);
> +	int err = 0;
> +
> +	if (!net_eq(sock_net(sk), net))
> +		goto out;
> +
> +	if (cb->args[4] < cb->args[1])
> +		goto next;
> +
> +	if (!(r->idiag_states & TCPF_LISTEN) && !list_empty(&ep->asocs))
> +		goto next;
> +
> +	if (r->sdiag_family != AF_UNSPEC &&
> +	    sk->sk_family != r->sdiag_family)
> +		goto next;
> +
> +	if (r->id.idiag_sport != inet->inet_sport &&
> +	    r->id.idiag_sport)
> +		goto next;
> +
> +	if (r->id.idiag_dport != inet->inet_dport &&
> +	    r->id.idiag_dport)
> +		goto next;
> +
> +	if (inet_sctp_diag_fill(sk, NULL, skb, r,
> +				sk_user_ns(NETLINK_CB(cb->skb).sk),
> +				NETLINK_CB(cb->skb).portid,
> +				cb->nlh->nlmsg_seq, NLM_F_MULTI,
> +				cb->nlh, commp->net_admin) < 0) {
> +		err = 2;
> +		goto out;
> +	}
> +next:
> +	cb->args[4]++;
> +out:
> +	return err;
> +}
> +
> +/* define the functions for sctp_diag_handler*/
> +static void sctp_diag_get_info(struct sock *sk, struct inet_diag_msg *r,
> +			       void *info)
> +{
> +	struct sctp_infox *infox = (struct sctp_infox *)info;
> +
> +	if (infox->asoc) {
> +		r->idiag_rqueue = atomic_read(&infox->asoc->rmem_alloc);
> +		r->idiag_wqueue = infox->asoc->sndbuf_used;
> +	} else {
> +		r->idiag_rqueue = sk->sk_ack_backlog;
> +		r->idiag_wqueue = sk->sk_max_ack_backlog;
> +	}
> +	if (infox->sctpinfo)
> +		sctp_get_sctp_info(sk, infox->asoc, infox->sctpinfo);
> +}
> +
> +static int sctp_diag_dump_one(struct sk_buff *in_skb,
> +			      const struct nlmsghdr *nlh,
> +			      const struct inet_diag_req_v2 *req)
> +{
> +	struct net *net = sock_net(in_skb->sk);
> +	union sctp_addr laddr, paddr;
> +	struct sctp_comm_param commp = {
> +		.skb = in_skb,
> +		.r = req,
> +		.nlh = nlh,
> +		.net_admin = netlink_net_capable(in_skb, CAP_NET_ADMIN),
> +	};
> +
> +	if (req->sdiag_family == AF_INET) {
> +		laddr.v4.sin_port = req->id.idiag_sport;
> +		laddr.v4.sin_addr.s_addr = req->id.idiag_src[0];
> +		laddr.v4.sin_family = AF_INET;
> +
> +		paddr.v4.sin_port = req->id.idiag_dport;
> +		paddr.v4.sin_addr.s_addr = req->id.idiag_dst[0];
> +		paddr.v4.sin_family = AF_INET;
> +	} else {
> +		laddr.v6.sin6_port = req->id.idiag_sport;
> +		memcpy(&laddr.v6.sin6_addr, req->id.idiag_src,
> +		       sizeof(laddr.v6.sin6_addr));
> +		laddr.v6.sin6_family = AF_INET6;
> +
> +		paddr.v6.sin6_port = req->id.idiag_dport;
> +		memcpy(&paddr.v6.sin6_addr, req->id.idiag_dst,
> +		       sizeof(paddr.v6.sin6_addr));
> +		paddr.v6.sin6_family = AF_INET6;
> +	}
> +
> +	return sctp_transport_lookup_process(sctp_tsp_dump_one,
> +					     net, &laddr, &paddr, &commp);
> +}
> +
> +static void sctp_diag_dump(struct sk_buff *skb, struct netlink_callback *cb,
> +			   const struct inet_diag_req_v2 *r, struct nlattr *bc)
> +{
> +	u32 idiag_states = r->idiag_states;
> +	struct net *net = sock_net(skb->sk);
> +	struct sctp_comm_param commp = {
> +		.skb = skb,
> +		.cb = cb,
> +		.r = r,
> +		.net_admin = netlink_net_capable(cb->skb, CAP_NET_ADMIN),
> +	};
> +	int pos = cb->args[2];
> +
> +	/* eps hashtable dumps
> +	 * args:
> +	 * 0 : if it will traversal listen sock
> +	 * 1 : to record the sock pos of this time's traversal
> +	 * 4 : to work as a temporary variable to traversal list
> +	 */
> +	if (cb->args[0] == 0) {
> +		if (!(idiag_states & TCPF_LISTEN))
> +			goto skip;
> +		if (sctp_for_each_endpoint(sctp_ep_dump, &commp))
> +			goto done;
> +skip:
> +		cb->args[0] = 1;
> +		cb->args[1] = 0;
> +		cb->args[4] = 0;
> +	}
> +
> +	/* asocs by transport hashtable dump
> +	 * args:
> +	 * 1 : to record the assoc pos of this time's traversal
> +	 * 2 : to record the transport pos of this time's traversal
> +	 * 3 : to mark if we have dumped the ep info of the current asoc
> +	 * 4 : to work as a temporary variable to traversal list
> +	 * 5 : to save the sk we get from travelsing the tsp list.
> +	 */
> +	if (!(idiag_states & ~(TCPF_LISTEN | TCPF_CLOSE)))
> +		goto done;
> +
> +	sctp_for_each_transport(sctp_sock_filter, sctp_sock_dump,
> +				net, &pos, &commp);
> +	cb->args[2] = pos;
> +
> +done:
> +	cb->args[1] = cb->args[4];
> +	cb->args[4] = 0;
> +}
> +
> +static const struct inet_diag_handler sctp_diag_handler = {
> +	.dump		 = sctp_diag_dump,
> +	.dump_one	 = sctp_diag_dump_one,
> +	.idiag_get_info  = sctp_diag_get_info,
> +	.idiag_type	 = IPPROTO_SCTP,
> +	.idiag_info_size = sizeof(struct sctp_info),
> +};
> +
> +static int __init sctp_diag_init(void)
> +{
> +	return inet_diag_register(&sctp_diag_handler);
> +}
> +
> +static void __exit sctp_diag_exit(void)
> +{
> +	inet_diag_unregister(&sctp_diag_handler);
> +}
> +
> +module_init(sctp_diag_init);
> +module_exit(sctp_diag_exit);
> +MODULE_LICENSE("GPL");
> +MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_NETLINK, NETLINK_SOCK_DIAG, 2-132);
> diff --git a/net/sctp/sctp_diag.c b/net/sctp/sctp_diag.c
> deleted file mode 100644
> index a72a7d9..0000000
> --- a/net/sctp/sctp_diag.c
> +++ /dev/null
> @@ -1,526 +0,0 @@
> -#include <linux/module.h>
> -#include <linux/inet_diag.h>
> -#include <linux/sock_diag.h>
> -#include <net/sctp/sctp.h>
> -
> -static void sctp_diag_get_info(struct sock *sk, struct inet_diag_msg *r,
> -			       void *info);
> -
> -/* define some functions to make asoc/ep fill look clean */
> -static void inet_diag_msg_sctpasoc_fill(struct inet_diag_msg *r,
> -					struct sock *sk,
> -					struct sctp_association *asoc)
> -{
> -	union sctp_addr laddr, paddr;
> -	struct dst_entry *dst;
> -	struct timer_list *t3_rtx = &asoc->peer.primary_path->T3_rtx_timer;
> -
> -	laddr = list_entry(asoc->base.bind_addr.address_list.next,
> -			   struct sctp_sockaddr_entry, list)->a;
> -	paddr = asoc->peer.primary_path->ipaddr;
> -	dst = asoc->peer.primary_path->dst;
> -
> -	r->idiag_family = sk->sk_family;
> -	r->id.idiag_sport = htons(asoc->base.bind_addr.port);
> -	r->id.idiag_dport = htons(asoc->peer.port);
> -	r->id.idiag_if = dst ? dst->dev->ifindex : 0;
> -	sock_diag_save_cookie(sk, r->id.idiag_cookie);
> -
> -#if IS_ENABLED(CONFIG_IPV6)
> -	if (sk->sk_family == AF_INET6) {
> -		*(struct in6_addr *)r->id.idiag_src = laddr.v6.sin6_addr;
> -		*(struct in6_addr *)r->id.idiag_dst = paddr.v6.sin6_addr;
> -	} else
> -#endif
> -	{
> -		memset(&r->id.idiag_src, 0, sizeof(r->id.idiag_src));
> -		memset(&r->id.idiag_dst, 0, sizeof(r->id.idiag_dst));
> -
> -		r->id.idiag_src[0] = laddr.v4.sin_addr.s_addr;
> -		r->id.idiag_dst[0] = paddr.v4.sin_addr.s_addr;
> -	}
> -
> -	r->idiag_state = asoc->state;
> -	if (timer_pending(t3_rtx)) {
> -		r->idiag_timer = SCTP_EVENT_TIMEOUT_T3_RTX;
> -		r->idiag_retrans = asoc->rtx_data_chunks;
> -		r->idiag_expires = jiffies_to_msecs(t3_rtx->expires - jiffies);
> -	} else {
> -		r->idiag_timer = 0;
> -		r->idiag_retrans = 0;
> -		r->idiag_expires = 0;
> -	}
> -}
> -
> -static int inet_diag_msg_sctpladdrs_fill(struct sk_buff *skb,
> -					 struct list_head *address_list)
> -{
> -	struct sctp_sockaddr_entry *laddr;
> -	int addrlen = sizeof(struct sockaddr_storage);
> -	int addrcnt = 0;
> -	struct nlattr *attr;
> -	void *info = NULL;
> -
> -	list_for_each_entry_rcu(laddr, address_list, list)
> -		addrcnt++;
> -
> -	attr = nla_reserve(skb, INET_DIAG_LOCALS, addrlen * addrcnt);
> -	if (!attr)
> -		return -EMSGSIZE;
> -
> -	info = nla_data(attr);
> -	list_for_each_entry_rcu(laddr, address_list, list) {
> -		memcpy(info, &laddr->a, sizeof(laddr->a));
> -		memset(info + sizeof(laddr->a), 0, addrlen - sizeof(laddr->a));
> -		info += addrlen;
> -	}
> -
> -	return 0;
> -}
> -
> -static int inet_diag_msg_sctpaddrs_fill(struct sk_buff *skb,
> -					struct sctp_association *asoc)
> -{
> -	int addrlen = sizeof(struct sockaddr_storage);
> -	struct sctp_transport *from;
> -	struct nlattr *attr;
> -	void *info = NULL;
> -
> -	attr = nla_reserve(skb, INET_DIAG_PEERS,
> -			   addrlen * asoc->peer.transport_count);
> -	if (!attr)
> -		return -EMSGSIZE;
> -
> -	info = nla_data(attr);
> -	list_for_each_entry(from, &asoc->peer.transport_addr_list,
> -			    transports) {
> -		memcpy(info, &from->ipaddr, sizeof(from->ipaddr));
> -		memset(info + sizeof(from->ipaddr), 0,
> -		       addrlen - sizeof(from->ipaddr));
> -		info += addrlen;
> -	}
> -
> -	return 0;
> -}
> -
> -/* sctp asoc/ep fill*/
> -static int inet_sctp_diag_fill(struct sock *sk, struct sctp_association *asoc,
> -			       struct sk_buff *skb,
> -			       const struct inet_diag_req_v2 *req,
> -			       struct user_namespace *user_ns,
> -			       int portid, u32 seq, u16 nlmsg_flags,
> -			       const struct nlmsghdr *unlh,
> -			       bool net_admin)
> -{
> -	struct sctp_endpoint *ep = sctp_sk(sk)->ep;
> -	struct list_head *addr_list;
> -	struct inet_diag_msg *r;
> -	struct nlmsghdr  *nlh;
> -	int ext = req->idiag_ext;
> -	struct sctp_infox infox;
> -	void *info = NULL;
> -
> -	nlh = nlmsg_put(skb, portid, seq, unlh->nlmsg_type, sizeof(*r),
> -			nlmsg_flags);
> -	if (!nlh)
> -		return -EMSGSIZE;
> -
> -	r = nlmsg_data(nlh);
> -	BUG_ON(!sk_fullsock(sk));
> -
> -	if (asoc) {
> -		inet_diag_msg_sctpasoc_fill(r, sk, asoc);
> -	} else {
> -		inet_diag_msg_common_fill(r, sk);
> -		r->idiag_state = sk->sk_state;
> -		r->idiag_timer = 0;
> -		r->idiag_retrans = 0;
> -	}
> -
> -	if (inet_diag_msg_attrs_fill(sk, skb, r, ext, user_ns, net_admin))
> -		goto errout;
> -
> -	if (ext & (1 << (INET_DIAG_SKMEMINFO - 1))) {
> -		u32 mem[SK_MEMINFO_VARS];
> -		int amt;
> -
> -		if (asoc && asoc->ep->sndbuf_policy)
> -			amt = asoc->sndbuf_used;
> -		else
> -			amt = sk_wmem_alloc_get(sk);
> -		mem[SK_MEMINFO_WMEM_ALLOC] = amt;
> -		if (asoc && asoc->ep->rcvbuf_policy)
> -			amt = atomic_read(&asoc->rmem_alloc);
> -		else
> -			amt = sk_rmem_alloc_get(sk);
> -		mem[SK_MEMINFO_RMEM_ALLOC] = amt;
> -		mem[SK_MEMINFO_RCVBUF] = sk->sk_rcvbuf;
> -		mem[SK_MEMINFO_SNDBUF] = sk->sk_sndbuf;
> -		mem[SK_MEMINFO_FWD_ALLOC] = sk->sk_forward_alloc;
> -		mem[SK_MEMINFO_WMEM_QUEUED] = sk->sk_wmem_queued;
> -		mem[SK_MEMINFO_OPTMEM] = atomic_read(&sk->sk_omem_alloc);
> -		mem[SK_MEMINFO_BACKLOG] = sk->sk_backlog.len;
> -		mem[SK_MEMINFO_DROPS] = atomic_read(&sk->sk_drops);
> -
> -		if (nla_put(skb, INET_DIAG_SKMEMINFO, sizeof(mem), &mem) < 0)
> -			goto errout;
> -	}
> -
> -	if (ext & (1 << (INET_DIAG_INFO - 1))) {
> -		struct nlattr *attr;
> -
> -		attr = nla_reserve_64bit(skb, INET_DIAG_INFO,
> -					 sizeof(struct sctp_info),
> -					 INET_DIAG_PAD);
> -		if (!attr)
> -			goto errout;
> -
> -		info = nla_data(attr);
> -	}
> -	infox.sctpinfo = (struct sctp_info *)info;
> -	infox.asoc = asoc;
> -	sctp_diag_get_info(sk, r, &infox);
> -
> -	addr_list = asoc ? &asoc->base.bind_addr.address_list
> -			 : &ep->base.bind_addr.address_list;
> -	if (inet_diag_msg_sctpladdrs_fill(skb, addr_list))
> -		goto errout;
> -
> -	if (asoc && (ext & (1 << (INET_DIAG_CONG - 1))))
> -		if (nla_put_string(skb, INET_DIAG_CONG, "reno") < 0)
> -			goto errout;
> -
> -	if (asoc && inet_diag_msg_sctpaddrs_fill(skb, asoc))
> -		goto errout;
> -
> -	nlmsg_end(skb, nlh);
> -	return 0;
> -
> -errout:
> -	nlmsg_cancel(skb, nlh);
> -	return -EMSGSIZE;
> -}
> -
> -/* callback and param */
> -struct sctp_comm_param {
> -	struct sk_buff *skb;
> -	struct netlink_callback *cb;
> -	const struct inet_diag_req_v2 *r;
> -	const struct nlmsghdr *nlh;
> -	bool net_admin;
> -};
> -
> -static size_t inet_assoc_attr_size(struct sctp_association *asoc)
> -{
> -	int addrlen = sizeof(struct sockaddr_storage);
> -	int addrcnt = 0;
> -	struct sctp_sockaddr_entry *laddr;
> -
> -	list_for_each_entry_rcu(laddr, &asoc->base.bind_addr.address_list,
> -				list)
> -		addrcnt++;
> -
> -	return	  nla_total_size(sizeof(struct sctp_info))
> -		+ nla_total_size(1) /* INET_DIAG_SHUTDOWN */
> -		+ nla_total_size(1) /* INET_DIAG_TOS */
> -		+ nla_total_size(1) /* INET_DIAG_TCLASS */
> -		+ nla_total_size(4) /* INET_DIAG_MARK */
> -		+ nla_total_size(addrlen * asoc->peer.transport_count)
> -		+ nla_total_size(addrlen * addrcnt)
> -		+ nla_total_size(sizeof(struct inet_diag_meminfo))
> -		+ nla_total_size(sizeof(struct inet_diag_msg))
> -		+ 64;
> -}
> -
> -static int sctp_tsp_dump_one(struct sctp_transport *tsp, void *p)
> -{
> -	struct sctp_association *assoc = tsp->asoc;
> -	struct sock *sk = tsp->asoc->base.sk;
> -	struct sctp_comm_param *commp = p;
> -	struct sk_buff *in_skb = commp->skb;
> -	const struct inet_diag_req_v2 *req = commp->r;
> -	const struct nlmsghdr *nlh = commp->nlh;
> -	struct net *net = sock_net(in_skb->sk);
> -	struct sk_buff *rep;
> -	int err;
> -
> -	err = sock_diag_check_cookie(sk, req->id.idiag_cookie);
> -	if (err)
> -		goto out;
> -
> -	err = -ENOMEM;
> -	rep = nlmsg_new(inet_assoc_attr_size(assoc), GFP_KERNEL);
> -	if (!rep)
> -		goto out;
> -
> -	lock_sock(sk);
> -	if (sk != assoc->base.sk) {
> -		release_sock(sk);
> -		sk = assoc->base.sk;
> -		lock_sock(sk);
> -	}
> -	err = inet_sctp_diag_fill(sk, assoc, rep, req,
> -				  sk_user_ns(NETLINK_CB(in_skb).sk),
> -				  NETLINK_CB(in_skb).portid,
> -				  nlh->nlmsg_seq, 0, nlh,
> -				  commp->net_admin);
> -	release_sock(sk);
> -	if (err < 0) {
> -		WARN_ON(err == -EMSGSIZE);
> -		kfree_skb(rep);
> -		goto out;
> -	}
> -
> -	err = netlink_unicast(net->diag_nlsk, rep, NETLINK_CB(in_skb).portid,
> -			      MSG_DONTWAIT);
> -	if (err > 0)
> -		err = 0;
> -out:
> -	return err;
> -}
> -
> -static int sctp_sock_dump(struct sctp_transport *tsp, void *p)
> -{
> -	struct sctp_endpoint *ep = tsp->asoc->ep;
> -	struct sctp_comm_param *commp = p;
> -	struct sock *sk = ep->base.sk;
> -	struct sk_buff *skb = commp->skb;
> -	struct netlink_callback *cb = commp->cb;
> -	const struct inet_diag_req_v2 *r = commp->r;
> -	struct sctp_association *assoc;
> -	int err = 0;
> -
> -	lock_sock(sk);
> -	list_for_each_entry(assoc, &ep->asocs, asocs) {
> -		if (cb->args[4] < cb->args[1])
> -			goto next;
> -
> -		if (r->id.idiag_sport != htons(assoc->base.bind_addr.port) &&
> -		    r->id.idiag_sport)
> -			goto next;
> -		if (r->id.idiag_dport != htons(assoc->peer.port) &&
> -		    r->id.idiag_dport)
> -			goto next;
> -
> -		if (!cb->args[3] &&
> -		    inet_sctp_diag_fill(sk, NULL, skb, r,
> -					sk_user_ns(NETLINK_CB(cb->skb).sk),
> -					NETLINK_CB(cb->skb).portid,
> -					cb->nlh->nlmsg_seq,
> -					NLM_F_MULTI, cb->nlh,
> -					commp->net_admin) < 0) {
> -			err = 1;
> -			goto release;
> -		}
> -		cb->args[3] = 1;
> -
> -		if (inet_sctp_diag_fill(sk, assoc, skb, r,
> -					sk_user_ns(NETLINK_CB(cb->skb).sk),
> -					NETLINK_CB(cb->skb).portid,
> -					cb->nlh->nlmsg_seq, 0, cb->nlh,
> -					commp->net_admin) < 0) {
> -			err = 1;
> -			goto release;
> -		}
> -next:
> -		cb->args[4]++;
> -	}
> -	cb->args[1] = 0;
> -	cb->args[3] = 0;
> -	cb->args[4] = 0;
> -release:
> -	release_sock(sk);
> -	return err;
> -}
> -
> -static int sctp_sock_filter(struct sctp_transport *tsp, void *p)
> -{
> -	struct sctp_endpoint *ep = tsp->asoc->ep;
> -	struct sctp_comm_param *commp = p;
> -	struct sock *sk = ep->base.sk;
> -	const struct inet_diag_req_v2 *r = commp->r;
> -	struct sctp_association *assoc =
> -		list_entry(ep->asocs.next, struct sctp_association, asocs);
> -
> -	/* find the ep only once through the transports by this condition */
> -	if (tsp->asoc != assoc)
> -		return 0;
> -
> -	if (r->sdiag_family != AF_UNSPEC && sk->sk_family != r->sdiag_family)
> -		return 0;
> -
> -	return 1;
> -}
> -
> -static int sctp_ep_dump(struct sctp_endpoint *ep, void *p)
> -{
> -	struct sctp_comm_param *commp = p;
> -	struct sock *sk = ep->base.sk;
> -	struct sk_buff *skb = commp->skb;
> -	struct netlink_callback *cb = commp->cb;
> -	const struct inet_diag_req_v2 *r = commp->r;
> -	struct net *net = sock_net(skb->sk);
> -	struct inet_sock *inet = inet_sk(sk);
> -	int err = 0;
> -
> -	if (!net_eq(sock_net(sk), net))
> -		goto out;
> -
> -	if (cb->args[4] < cb->args[1])
> -		goto next;
> -
> -	if (!(r->idiag_states & TCPF_LISTEN) && !list_empty(&ep->asocs))
> -		goto next;
> -
> -	if (r->sdiag_family != AF_UNSPEC &&
> -	    sk->sk_family != r->sdiag_family)
> -		goto next;
> -
> -	if (r->id.idiag_sport != inet->inet_sport &&
> -	    r->id.idiag_sport)
> -		goto next;
> -
> -	if (r->id.idiag_dport != inet->inet_dport &&
> -	    r->id.idiag_dport)
> -		goto next;
> -
> -	if (inet_sctp_diag_fill(sk, NULL, skb, r,
> -				sk_user_ns(NETLINK_CB(cb->skb).sk),
> -				NETLINK_CB(cb->skb).portid,
> -				cb->nlh->nlmsg_seq, NLM_F_MULTI,
> -				cb->nlh, commp->net_admin) < 0) {
> -		err = 2;
> -		goto out;
> -	}
> -next:
> -	cb->args[4]++;
> -out:
> -	return err;
> -}
> -
> -/* define the functions for sctp_diag_handler*/
> -static void sctp_diag_get_info(struct sock *sk, struct inet_diag_msg *r,
> -			       void *info)
> -{
> -	struct sctp_infox *infox = (struct sctp_infox *)info;
> -
> -	if (infox->asoc) {
> -		r->idiag_rqueue = atomic_read(&infox->asoc->rmem_alloc);
> -		r->idiag_wqueue = infox->asoc->sndbuf_used;
> -	} else {
> -		r->idiag_rqueue = sk->sk_ack_backlog;
> -		r->idiag_wqueue = sk->sk_max_ack_backlog;
> -	}
> -	if (infox->sctpinfo)
> -		sctp_get_sctp_info(sk, infox->asoc, infox->sctpinfo);
> -}
> -
> -static int sctp_diag_dump_one(struct sk_buff *in_skb,
> -			      const struct nlmsghdr *nlh,
> -			      const struct inet_diag_req_v2 *req)
> -{
> -	struct net *net = sock_net(in_skb->sk);
> -	union sctp_addr laddr, paddr;
> -	struct sctp_comm_param commp = {
> -		.skb = in_skb,
> -		.r = req,
> -		.nlh = nlh,
> -		.net_admin = netlink_net_capable(in_skb, CAP_NET_ADMIN),
> -	};
> -
> -	if (req->sdiag_family == AF_INET) {
> -		laddr.v4.sin_port = req->id.idiag_sport;
> -		laddr.v4.sin_addr.s_addr = req->id.idiag_src[0];
> -		laddr.v4.sin_family = AF_INET;
> -
> -		paddr.v4.sin_port = req->id.idiag_dport;
> -		paddr.v4.sin_addr.s_addr = req->id.idiag_dst[0];
> -		paddr.v4.sin_family = AF_INET;
> -	} else {
> -		laddr.v6.sin6_port = req->id.idiag_sport;
> -		memcpy(&laddr.v6.sin6_addr, req->id.idiag_src,
> -		       sizeof(laddr.v6.sin6_addr));
> -		laddr.v6.sin6_family = AF_INET6;
> -
> -		paddr.v6.sin6_port = req->id.idiag_dport;
> -		memcpy(&paddr.v6.sin6_addr, req->id.idiag_dst,
> -		       sizeof(paddr.v6.sin6_addr));
> -		paddr.v6.sin6_family = AF_INET6;
> -	}
> -
> -	return sctp_transport_lookup_process(sctp_tsp_dump_one,
> -					     net, &laddr, &paddr, &commp);
> -}
> -
> -static void sctp_diag_dump(struct sk_buff *skb, struct netlink_callback *cb,
> -			   const struct inet_diag_req_v2 *r, struct nlattr *bc)
> -{
> -	u32 idiag_states = r->idiag_states;
> -	struct net *net = sock_net(skb->sk);
> -	struct sctp_comm_param commp = {
> -		.skb = skb,
> -		.cb = cb,
> -		.r = r,
> -		.net_admin = netlink_net_capable(cb->skb, CAP_NET_ADMIN),
> -	};
> -	int pos = cb->args[2];
> -
> -	/* eps hashtable dumps
> -	 * args:
> -	 * 0 : if it will traversal listen sock
> -	 * 1 : to record the sock pos of this time's traversal
> -	 * 4 : to work as a temporary variable to traversal list
> -	 */
> -	if (cb->args[0] == 0) {
> -		if (!(idiag_states & TCPF_LISTEN))
> -			goto skip;
> -		if (sctp_for_each_endpoint(sctp_ep_dump, &commp))
> -			goto done;
> -skip:
> -		cb->args[0] = 1;
> -		cb->args[1] = 0;
> -		cb->args[4] = 0;
> -	}
> -
> -	/* asocs by transport hashtable dump
> -	 * args:
> -	 * 1 : to record the assoc pos of this time's traversal
> -	 * 2 : to record the transport pos of this time's traversal
> -	 * 3 : to mark if we have dumped the ep info of the current asoc
> -	 * 4 : to work as a temporary variable to traversal list
> -	 * 5 : to save the sk we get from travelsing the tsp list.
> -	 */
> -	if (!(idiag_states & ~(TCPF_LISTEN | TCPF_CLOSE)))
> -		goto done;
> -
> -	sctp_for_each_transport(sctp_sock_filter, sctp_sock_dump,
> -				net, &pos, &commp);
> -	cb->args[2] = pos;
> -
> -done:
> -	cb->args[1] = cb->args[4];
> -	cb->args[4] = 0;
> -}
> -
> -static const struct inet_diag_handler sctp_diag_handler = {
> -	.dump		 = sctp_diag_dump,
> -	.dump_one	 = sctp_diag_dump_one,
> -	.idiag_get_info  = sctp_diag_get_info,
> -	.idiag_type	 = IPPROTO_SCTP,
> -	.idiag_info_size = sizeof(struct sctp_info),
> -};
> -
> -static int __init sctp_diag_init(void)
> -{
> -	return inet_diag_register(&sctp_diag_handler);
> -}
> -
> -static void __exit sctp_diag_exit(void)
> -{
> -	inet_diag_unregister(&sctp_diag_handler);
> -}
> -
> -module_init(sctp_diag_init);
> -module_exit(sctp_diag_exit);
> -MODULE_LICENSE("GPL");
> -MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_NETLINK, NETLINK_SOCK_DIAG, 2-132);
> -- 
> 2.1.0
> 
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ