~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/net/vmw_vsock/diag.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0-only
  2 /*
  3  * vsock sock_diag(7) module
  4  *
  5  * Copyright (C) 2017 Red Hat, Inc.
  6  * Author: Stefan Hajnoczi <stefanha@redhat.com>
  7  */
  8 
  9 #include <linux/module.h>
 10 #include <linux/sock_diag.h>
 11 #include <linux/vm_sockets_diag.h>
 12 #include <net/af_vsock.h>
 13 
 14 static int sk_diag_fill(struct sock *sk, struct sk_buff *skb,
 15                         u32 portid, u32 seq, u32 flags)
 16 {
 17         struct vsock_sock *vsk = vsock_sk(sk);
 18         struct vsock_diag_msg *rep;
 19         struct nlmsghdr *nlh;
 20 
 21         nlh = nlmsg_put(skb, portid, seq, SOCK_DIAG_BY_FAMILY, sizeof(*rep),
 22                         flags);
 23         if (!nlh)
 24                 return -EMSGSIZE;
 25 
 26         rep = nlmsg_data(nlh);
 27         rep->vdiag_family = AF_VSOCK;
 28 
 29         /* Lock order dictates that sk_lock is acquired before
 30          * vsock_table_lock, so we cannot lock here.  Simply don't take
 31          * sk_lock; sk is guaranteed to stay alive since vsock_table_lock is
 32          * held.
 33          */
 34         rep->vdiag_type = sk->sk_type;
 35         rep->vdiag_state = sk->sk_state;
 36         rep->vdiag_shutdown = sk->sk_shutdown;
 37         rep->vdiag_src_cid = vsk->local_addr.svm_cid;
 38         rep->vdiag_src_port = vsk->local_addr.svm_port;
 39         rep->vdiag_dst_cid = vsk->remote_addr.svm_cid;
 40         rep->vdiag_dst_port = vsk->remote_addr.svm_port;
 41         rep->vdiag_ino = sock_i_ino(sk);
 42 
 43         sock_diag_save_cookie(sk, rep->vdiag_cookie);
 44 
 45         return 0;
 46 }
 47 
 48 static int vsock_diag_dump(struct sk_buff *skb, struct netlink_callback *cb)
 49 {
 50         struct vsock_diag_req *req;
 51         struct vsock_sock *vsk;
 52         unsigned int bucket;
 53         unsigned int last_i;
 54         unsigned int table;
 55         struct net *net;
 56         unsigned int i;
 57 
 58         req = nlmsg_data(cb->nlh);
 59         net = sock_net(skb->sk);
 60 
 61         /* State saved between calls: */
 62         table = cb->args[0];
 63         bucket = cb->args[1];
 64         i = last_i = cb->args[2];
 65 
 66         /* TODO VMCI pending sockets? */
 67 
 68         spin_lock_bh(&vsock_table_lock);
 69 
 70         /* Bind table (locally created sockets) */
 71         if (table == 0) {
 72                 while (bucket < ARRAY_SIZE(vsock_bind_table)) {
 73                         struct list_head *head = &vsock_bind_table[bucket];
 74 
 75                         i = 0;
 76                         list_for_each_entry(vsk, head, bound_table) {
 77                                 struct sock *sk = sk_vsock(vsk);
 78 
 79                                 if (!net_eq(sock_net(sk), net))
 80                                         continue;
 81                                 if (i < last_i)
 82                                         goto next_bind;
 83                                 if (!(req->vdiag_states & (1 << sk->sk_state)))
 84                                         goto next_bind;
 85                                 if (sk_diag_fill(sk, skb,
 86                                                  NETLINK_CB(cb->skb).portid,
 87                                                  cb->nlh->nlmsg_seq,
 88                                                  NLM_F_MULTI) < 0)
 89                                         goto done;
 90 next_bind:
 91                                 i++;
 92                         }
 93                         last_i = 0;
 94                         bucket++;
 95                 }
 96 
 97                 table++;
 98                 bucket = 0;
 99         }
100 
101         /* Connected table (accepted connections) */
102         while (bucket < ARRAY_SIZE(vsock_connected_table)) {
103                 struct list_head *head = &vsock_connected_table[bucket];
104 
105                 i = 0;
106                 list_for_each_entry(vsk, head, connected_table) {
107                         struct sock *sk = sk_vsock(vsk);
108 
109                         /* Skip sockets we've already seen above */
110                         if (__vsock_in_bound_table(vsk))
111                                 continue;
112 
113                         if (!net_eq(sock_net(sk), net))
114                                 continue;
115                         if (i < last_i)
116                                 goto next_connected;
117                         if (!(req->vdiag_states & (1 << sk->sk_state)))
118                                 goto next_connected;
119                         if (sk_diag_fill(sk, skb,
120                                          NETLINK_CB(cb->skb).portid,
121                                          cb->nlh->nlmsg_seq,
122                                          NLM_F_MULTI) < 0)
123                                 goto done;
124 next_connected:
125                         i++;
126                 }
127                 last_i = 0;
128                 bucket++;
129         }
130 
131 done:
132         spin_unlock_bh(&vsock_table_lock);
133 
134         cb->args[0] = table;
135         cb->args[1] = bucket;
136         cb->args[2] = i;
137 
138         return skb->len;
139 }
140 
141 static int vsock_diag_handler_dump(struct sk_buff *skb, struct nlmsghdr *h)
142 {
143         int hdrlen = sizeof(struct vsock_diag_req);
144         struct net *net = sock_net(skb->sk);
145 
146         if (nlmsg_len(h) < hdrlen)
147                 return -EINVAL;
148 
149         if (h->nlmsg_flags & NLM_F_DUMP) {
150                 struct netlink_dump_control c = {
151                         .dump = vsock_diag_dump,
152                 };
153                 return netlink_dump_start(net->diag_nlsk, skb, h, &c);
154         }
155 
156         return -EOPNOTSUPP;
157 }
158 
159 static const struct sock_diag_handler vsock_diag_handler = {
160         .owner = THIS_MODULE,
161         .family = AF_VSOCK,
162         .dump = vsock_diag_handler_dump,
163 };
164 
165 static int __init vsock_diag_init(void)
166 {
167         return sock_diag_register(&vsock_diag_handler);
168 }
169 
170 static void __exit vsock_diag_exit(void)
171 {
172         sock_diag_unregister(&vsock_diag_handler);
173 }
174 
175 module_init(vsock_diag_init);
176 module_exit(vsock_diag_exit);
177 MODULE_LICENSE("GPL");
178 MODULE_DESCRIPTION("VMware Virtual Sockets monitoring via SOCK_DIAG");
179 MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_NETLINK, NETLINK_SOCK_DIAG,
180                                40 /* AF_VSOCK */);
181 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php