mptcp_diag.c 5.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. // SPDX-License-Identifier: GPL-2.0
  2. /* MPTCP socket monitoring support
  3. *
  4. * Copyright (c) 2020 Red Hat
  5. *
  6. * Author: Paolo Abeni <[email protected]>
  7. */
  8. #include <linux/kernel.h>
  9. #include <linux/net.h>
  10. #include <linux/inet_diag.h>
  11. #include <net/netlink.h>
  12. #include <uapi/linux/mptcp.h>
  13. #include "protocol.h"
  14. static int sk_diag_dump(struct sock *sk, struct sk_buff *skb,
  15. struct netlink_callback *cb,
  16. const struct inet_diag_req_v2 *req,
  17. struct nlattr *bc, bool net_admin)
  18. {
  19. if (!inet_diag_bc_sk(bc, sk))
  20. return 0;
  21. return inet_sk_diag_fill(sk, inet_csk(sk), skb, cb, req, NLM_F_MULTI,
  22. net_admin);
  23. }
  24. static int mptcp_diag_dump_one(struct netlink_callback *cb,
  25. const struct inet_diag_req_v2 *req)
  26. {
  27. struct sk_buff *in_skb = cb->skb;
  28. struct mptcp_sock *msk = NULL;
  29. struct sk_buff *rep;
  30. int err = -ENOENT;
  31. struct net *net;
  32. struct sock *sk;
  33. net = sock_net(in_skb->sk);
  34. msk = mptcp_token_get_sock(net, req->id.idiag_cookie[0]);
  35. if (!msk)
  36. goto out_nosk;
  37. err = -ENOMEM;
  38. sk = (struct sock *)msk;
  39. rep = nlmsg_new(nla_total_size(sizeof(struct inet_diag_msg)) +
  40. inet_diag_msg_attrs_size() +
  41. nla_total_size(sizeof(struct mptcp_info)) +
  42. nla_total_size(sizeof(struct inet_diag_meminfo)) + 64,
  43. GFP_KERNEL);
  44. if (!rep)
  45. goto out;
  46. err = inet_sk_diag_fill(sk, inet_csk(sk), rep, cb, req, 0,
  47. netlink_net_capable(in_skb, CAP_NET_ADMIN));
  48. if (err < 0) {
  49. WARN_ON(err == -EMSGSIZE);
  50. kfree_skb(rep);
  51. goto out;
  52. }
  53. err = nlmsg_unicast(net->diag_nlsk, rep, NETLINK_CB(in_skb).portid);
  54. out:
  55. sock_put(sk);
  56. out_nosk:
  57. return err;
  58. }
  59. struct mptcp_diag_ctx {
  60. long s_slot;
  61. long s_num;
  62. unsigned int l_slot;
  63. unsigned int l_num;
  64. };
  65. static void mptcp_diag_dump_listeners(struct sk_buff *skb, struct netlink_callback *cb,
  66. const struct inet_diag_req_v2 *r,
  67. bool net_admin)
  68. {
  69. struct inet_diag_dump_data *cb_data = cb->data;
  70. struct mptcp_diag_ctx *diag_ctx = (void *)cb->ctx;
  71. struct nlattr *bc = cb_data->inet_diag_nla_bc;
  72. struct net *net = sock_net(skb->sk);
  73. struct inet_hashinfo *hinfo;
  74. int i;
  75. hinfo = net->ipv4.tcp_death_row.hashinfo;
  76. for (i = diag_ctx->l_slot; i <= hinfo->lhash2_mask; i++) {
  77. struct inet_listen_hashbucket *ilb;
  78. struct hlist_nulls_node *node;
  79. struct sock *sk;
  80. int num = 0;
  81. ilb = &hinfo->lhash2[i];
  82. rcu_read_lock();
  83. spin_lock(&ilb->lock);
  84. sk_nulls_for_each(sk, node, &ilb->nulls_head) {
  85. const struct mptcp_subflow_context *ctx = mptcp_subflow_ctx(sk);
  86. struct inet_sock *inet = inet_sk(sk);
  87. int ret;
  88. if (num < diag_ctx->l_num)
  89. goto next_listen;
  90. if (!ctx || strcmp(inet_csk(sk)->icsk_ulp_ops->name, "mptcp"))
  91. goto next_listen;
  92. sk = ctx->conn;
  93. if (!sk || !net_eq(sock_net(sk), net))
  94. goto next_listen;
  95. if (r->sdiag_family != AF_UNSPEC &&
  96. sk->sk_family != r->sdiag_family)
  97. goto next_listen;
  98. if (r->id.idiag_sport != inet->inet_sport &&
  99. r->id.idiag_sport)
  100. goto next_listen;
  101. if (!refcount_inc_not_zero(&sk->sk_refcnt))
  102. goto next_listen;
  103. ret = sk_diag_dump(sk, skb, cb, r, bc, net_admin);
  104. sock_put(sk);
  105. if (ret < 0) {
  106. spin_unlock(&ilb->lock);
  107. rcu_read_unlock();
  108. diag_ctx->l_slot = i;
  109. diag_ctx->l_num = num;
  110. return;
  111. }
  112. diag_ctx->l_num = num + 1;
  113. num = 0;
  114. next_listen:
  115. ++num;
  116. }
  117. spin_unlock(&ilb->lock);
  118. rcu_read_unlock();
  119. cond_resched();
  120. diag_ctx->l_num = 0;
  121. }
  122. diag_ctx->l_num = 0;
  123. diag_ctx->l_slot = i;
  124. }
  125. static void mptcp_diag_dump(struct sk_buff *skb, struct netlink_callback *cb,
  126. const struct inet_diag_req_v2 *r)
  127. {
  128. bool net_admin = netlink_net_capable(cb->skb, CAP_NET_ADMIN);
  129. struct mptcp_diag_ctx *diag_ctx = (void *)cb->ctx;
  130. struct net *net = sock_net(skb->sk);
  131. struct inet_diag_dump_data *cb_data;
  132. struct mptcp_sock *msk;
  133. struct nlattr *bc;
  134. BUILD_BUG_ON(sizeof(cb->ctx) < sizeof(*diag_ctx));
  135. cb_data = cb->data;
  136. bc = cb_data->inet_diag_nla_bc;
  137. while ((msk = mptcp_token_iter_next(net, &diag_ctx->s_slot,
  138. &diag_ctx->s_num)) != NULL) {
  139. struct inet_sock *inet = (struct inet_sock *)msk;
  140. struct sock *sk = (struct sock *)msk;
  141. int ret = 0;
  142. if (!(r->idiag_states & (1 << sk->sk_state)))
  143. goto next;
  144. if (r->sdiag_family != AF_UNSPEC &&
  145. sk->sk_family != r->sdiag_family)
  146. goto next;
  147. if (r->id.idiag_sport != inet->inet_sport &&
  148. r->id.idiag_sport)
  149. goto next;
  150. if (r->id.idiag_dport != inet->inet_dport &&
  151. r->id.idiag_dport)
  152. goto next;
  153. ret = sk_diag_dump(sk, skb, cb, r, bc, net_admin);
  154. next:
  155. sock_put(sk);
  156. if (ret < 0) {
  157. /* will retry on the same position */
  158. diag_ctx->s_num--;
  159. break;
  160. }
  161. cond_resched();
  162. }
  163. if ((r->idiag_states & TCPF_LISTEN) && r->id.idiag_dport == 0)
  164. mptcp_diag_dump_listeners(skb, cb, r, net_admin);
  165. }
  166. static void mptcp_diag_get_info(struct sock *sk, struct inet_diag_msg *r,
  167. void *_info)
  168. {
  169. struct mptcp_sock *msk = mptcp_sk(sk);
  170. struct mptcp_info *info = _info;
  171. r->idiag_rqueue = sk_rmem_alloc_get(sk);
  172. r->idiag_wqueue = sk_wmem_alloc_get(sk);
  173. if (inet_sk_state_load(sk) == TCP_LISTEN) {
  174. struct sock *lsk = READ_ONCE(msk->first);
  175. if (lsk) {
  176. /* override with settings from tcp listener,
  177. * so Send-Q will show accept queue.
  178. */
  179. r->idiag_rqueue = READ_ONCE(lsk->sk_ack_backlog);
  180. r->idiag_wqueue = READ_ONCE(lsk->sk_max_ack_backlog);
  181. }
  182. }
  183. if (!info)
  184. return;
  185. mptcp_diag_fill_info(msk, info);
  186. }
  187. static const struct inet_diag_handler mptcp_diag_handler = {
  188. .dump = mptcp_diag_dump,
  189. .dump_one = mptcp_diag_dump_one,
  190. .idiag_get_info = mptcp_diag_get_info,
  191. .idiag_type = IPPROTO_MPTCP,
  192. .idiag_info_size = sizeof(struct mptcp_info),
  193. };
  194. static int __init mptcp_diag_init(void)
  195. {
  196. return inet_diag_register(&mptcp_diag_handler);
  197. }
  198. static void __exit mptcp_diag_exit(void)
  199. {
  200. inet_diag_unregister(&mptcp_diag_handler);
  201. }
  202. module_init(mptcp_diag_init);
  203. module_exit(mptcp_diag_exit);
  204. MODULE_LICENSE("GPL");
  205. MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_NETLINK, NETLINK_SOCK_DIAG, 2-262 /* AF_INET - IPPROTO_MPTCP */);