1 // SPDX-License-Identifier: GPL-2.0-only
2 #include <linux/types.h>
3 #include <linux/spinlock.h>
4 #include <linux/sock_diag.h>
5 #include <linux/unix_diag.h>
6 #include <linux/skbuff.h>
7 #include <linux/module.h>
8 #include <linux/uidgid.h>
9 #include <net/netlink.h>
10 #include <net/af_unix.h>
11 #include <net/tcp_states.h>
14 static int sk_diag_dump_name(struct sock
*sk
, struct sk_buff
*nlskb
)
16 /* might or might not have a hash table lock */
17 struct unix_address
*addr
= smp_load_acquire(&unix_sk(sk
)->addr
);
22 return nla_put(nlskb
, UNIX_DIAG_NAME
,
23 addr
->len
- offsetof(struct sockaddr_un
, sun_path
),
24 addr
->name
->sun_path
);
27 static int sk_diag_dump_vfs(struct sock
*sk
, struct sk_buff
*nlskb
)
29 struct dentry
*dentry
= unix_sk(sk
)->path
.dentry
;
32 struct unix_diag_vfs uv
= {
33 .udiag_vfs_ino
= d_backing_inode(dentry
)->i_ino
,
34 .udiag_vfs_dev
= dentry
->d_sb
->s_dev
,
37 return nla_put(nlskb
, UNIX_DIAG_VFS
, sizeof(uv
), &uv
);
43 static int sk_diag_dump_peer(struct sock
*sk
, struct sk_buff
*nlskb
)
48 peer
= unix_peer_get(sk
);
50 ino
= sock_i_ino(peer
);
53 return nla_put_u32(nlskb
, UNIX_DIAG_PEER
, ino
);
59 static int sk_diag_dump_icons(struct sock
*sk
, struct sk_buff
*nlskb
)
66 if (READ_ONCE(sk
->sk_state
) == TCP_LISTEN
) {
67 spin_lock(&sk
->sk_receive_queue
.lock
);
69 attr
= nla_reserve(nlskb
, UNIX_DIAG_ICONS
,
70 sk
->sk_receive_queue
.qlen
* sizeof(u32
));
76 skb_queue_walk(&sk
->sk_receive_queue
, skb
)
77 buf
[i
++] = sock_i_ino(unix_peer(skb
->sk
));
79 spin_unlock(&sk
->sk_receive_queue
.lock
);
85 spin_unlock(&sk
->sk_receive_queue
.lock
);
89 static int sk_diag_show_rqlen(struct sock
*sk
, struct sk_buff
*nlskb
)
91 struct unix_diag_rqlen rql
;
93 if (READ_ONCE(sk
->sk_state
) == TCP_LISTEN
) {
94 rql
.udiag_rqueue
= skb_queue_len_lockless(&sk
->sk_receive_queue
);
95 rql
.udiag_wqueue
= sk
->sk_max_ack_backlog
;
97 rql
.udiag_rqueue
= (u32
) unix_inq_len(sk
);
98 rql
.udiag_wqueue
= (u32
) unix_outq_len(sk
);
101 return nla_put(nlskb
, UNIX_DIAG_RQLEN
, sizeof(rql
), &rql
);
104 static int sk_diag_dump_uid(struct sock
*sk
, struct sk_buff
*nlskb
,
105 struct user_namespace
*user_ns
)
107 uid_t uid
= from_kuid_munged(user_ns
, sock_i_uid(sk
));
108 return nla_put(nlskb
, UNIX_DIAG_UID
, sizeof(uid_t
), &uid
);
111 static int sk_diag_fill(struct sock
*sk
, struct sk_buff
*skb
, struct unix_diag_req
*req
,
112 struct user_namespace
*user_ns
,
113 u32 portid
, u32 seq
, u32 flags
, int sk_ino
)
115 struct nlmsghdr
*nlh
;
116 struct unix_diag_msg
*rep
;
118 nlh
= nlmsg_put(skb
, portid
, seq
, SOCK_DIAG_BY_FAMILY
, sizeof(*rep
),
123 rep
= nlmsg_data(nlh
);
124 rep
->udiag_family
= AF_UNIX
;
125 rep
->udiag_type
= sk
->sk_type
;
126 rep
->udiag_state
= READ_ONCE(sk
->sk_state
);
128 rep
->udiag_ino
= sk_ino
;
129 sock_diag_save_cookie(sk
, rep
->udiag_cookie
);
131 if ((req
->udiag_show
& UDIAG_SHOW_NAME
) &&
132 sk_diag_dump_name(sk
, skb
))
135 if ((req
->udiag_show
& UDIAG_SHOW_VFS
) &&
136 sk_diag_dump_vfs(sk
, skb
))
139 if ((req
->udiag_show
& UDIAG_SHOW_PEER
) &&
140 sk_diag_dump_peer(sk
, skb
))
143 if ((req
->udiag_show
& UDIAG_SHOW_ICONS
) &&
144 sk_diag_dump_icons(sk
, skb
))
147 if ((req
->udiag_show
& UDIAG_SHOW_RQLEN
) &&
148 sk_diag_show_rqlen(sk
, skb
))
151 if ((req
->udiag_show
& UDIAG_SHOW_MEMINFO
) &&
152 sock_diag_put_meminfo(sk
, skb
, UNIX_DIAG_MEMINFO
))
155 if (nla_put_u8(skb
, UNIX_DIAG_SHUTDOWN
, READ_ONCE(sk
->sk_shutdown
)))
158 if ((req
->udiag_show
& UDIAG_SHOW_UID
) &&
159 sk_diag_dump_uid(sk
, skb
, user_ns
))
166 nlmsg_cancel(skb
, nlh
);
170 static int unix_diag_dump(struct sk_buff
*skb
, struct netlink_callback
*cb
)
172 struct net
*net
= sock_net(skb
->sk
);
173 int num
, s_num
, slot
, s_slot
;
174 struct unix_diag_req
*req
;
176 req
= nlmsg_data(cb
->nlh
);
178 s_slot
= cb
->args
[0];
179 num
= s_num
= cb
->args
[1];
181 for (slot
= s_slot
; slot
< UNIX_HASH_SIZE
; s_num
= 0, slot
++) {
185 spin_lock(&net
->unx
.table
.locks
[slot
]);
186 sk_for_each(sk
, &net
->unx
.table
.buckets
[slot
]) {
192 if (!(req
->udiag_states
& (1 << READ_ONCE(sk
->sk_state
))))
195 sk_ino
= sock_i_ino(sk
);
199 if (sk_diag_fill(sk
, skb
, req
, sk_user_ns(skb
->sk
),
200 NETLINK_CB(cb
->skb
).portid
,
202 NLM_F_MULTI
, sk_ino
) < 0) {
203 spin_unlock(&net
->unx
.table
.locks
[slot
]);
209 spin_unlock(&net
->unx
.table
.locks
[slot
]);
218 static struct sock
*unix_lookup_by_ino(struct net
*net
, unsigned int ino
)
223 for (i
= 0; i
< UNIX_HASH_SIZE
; i
++) {
224 spin_lock(&net
->unx
.table
.locks
[i
]);
225 sk_for_each(sk
, &net
->unx
.table
.buckets
[i
]) {
226 if (ino
== sock_i_ino(sk
)) {
228 spin_unlock(&net
->unx
.table
.locks
[i
]);
232 spin_unlock(&net
->unx
.table
.locks
[i
]);
237 static int unix_diag_get_exact(struct sk_buff
*in_skb
,
238 const struct nlmsghdr
*nlh
,
239 struct unix_diag_req
*req
)
241 struct net
*net
= sock_net(in_skb
->sk
);
242 unsigned int extra_len
;
248 if (req
->udiag_ino
== 0)
251 sk
= unix_lookup_by_ino(net
, req
->udiag_ino
);
256 err
= sock_diag_check_cookie(sk
, req
->udiag_cookie
);
263 rep
= nlmsg_new(sizeof(struct unix_diag_msg
) + extra_len
, GFP_KERNEL
);
267 err
= sk_diag_fill(sk
, rep
, req
, sk_user_ns(NETLINK_CB(in_skb
).sk
),
268 NETLINK_CB(in_skb
).portid
,
269 nlh
->nlmsg_seq
, 0, req
->udiag_ino
);
273 if (extra_len
>= PAGE_SIZE
)
278 err
= nlmsg_unicast(net
->diag_nlsk
, rep
, NETLINK_CB(in_skb
).portid
);
287 static int unix_diag_handler_dump(struct sk_buff
*skb
, struct nlmsghdr
*h
)
289 int hdrlen
= sizeof(struct unix_diag_req
);
291 if (nlmsg_len(h
) < hdrlen
)
294 if (h
->nlmsg_flags
& NLM_F_DUMP
) {
295 struct netlink_dump_control c
= {
296 .dump
= unix_diag_dump
,
298 return netlink_dump_start(sock_net(skb
->sk
)->diag_nlsk
, skb
, h
, &c
);
300 return unix_diag_get_exact(skb
, h
, nlmsg_data(h
));
303 static const struct sock_diag_handler unix_diag_handler
= {
304 .owner
= THIS_MODULE
,
306 .dump
= unix_diag_handler_dump
,
309 static int __init
unix_diag_init(void)
311 return sock_diag_register(&unix_diag_handler
);
314 static void __exit
unix_diag_exit(void)
316 sock_diag_unregister(&unix_diag_handler
);
319 module_init(unix_diag_init
);
320 module_exit(unix_diag_exit
);
321 MODULE_LICENSE("GPL");
322 MODULE_DESCRIPTION("UNIX socket monitoring via SOCK_DIAG");
323 MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_NETLINK
, NETLINK_SOCK_DIAG
, 1 /* AF_LOCAL */);