1// SPDX-License-Identifier: GPL-2.0
2/*
3 * NETLINK Generic Netlink Family
4 *
5 * Authors: Jamal Hadi Salim
6 * Thomas Graf <tgraf@suug.ch>
7 * Johannes Berg <johannes@sipsolutions.net>
8 */
9
10#include <linux/module.h>
11#include <linux/kernel.h>
12#include <linux/slab.h>
13#include <linux/errno.h>
14#include <linux/types.h>
15#include <linux/socket.h>
16#include <linux/string_helpers.h>
17#include <linux/skbuff.h>
18#include <linux/mutex.h>
19#include <linux/bitmap.h>
20#include <linux/rwsem.h>
21#include <linux/idr.h>
22#include <net/sock.h>
23#include <net/genetlink.h>
24
25static DEFINE_MUTEX(genl_mutex); /* serialization of message processing */
26static DECLARE_RWSEM(cb_lock);
27
28atomic_t genl_sk_destructing_cnt = ATOMIC_INIT(0);
29DECLARE_WAIT_QUEUE_HEAD(genl_sk_destructing_waitq);
30
31void genl_lock(void)
32{
33 mutex_lock(&genl_mutex);
34}
35EXPORT_SYMBOL(genl_lock);
36
37void genl_unlock(void)
38{
39 mutex_unlock(lock: &genl_mutex);
40}
41EXPORT_SYMBOL(genl_unlock);
42
43static void genl_lock_all(void)
44{
45 down_write(sem: &cb_lock);
46 genl_lock();
47}
48
49static void genl_unlock_all(void)
50{
51 genl_unlock();
52 up_write(sem: &cb_lock);
53}
54
55static void genl_op_lock(const struct genl_family *family)
56{
57 if (!family->parallel_ops)
58 genl_lock();
59}
60
61static void genl_op_unlock(const struct genl_family *family)
62{
63 if (!family->parallel_ops)
64 genl_unlock();
65}
66
67static DEFINE_IDR(genl_fam_idr);
68
69/*
70 * Bitmap of multicast groups that are currently in use.
71 *
72 * To avoid an allocation at boot of just one unsigned long,
73 * declare it global instead.
74 * Bit 0 is marked as already used since group 0 is invalid.
75 * Bit 1 is marked as already used since the drop-monitor code
76 * abuses the API and thinks it can statically use group 1.
77 * That group will typically conflict with other groups that
78 * any proper users use.
79 * Bit 16 is marked as used since it's used for generic netlink
80 * and the code no longer marks pre-reserved IDs as used.
81 * Bit 17 is marked as already used since the VFS quota code
82 * also abused this API and relied on family == group ID, we
83 * cater to that by giving it a static family and group ID.
84 * Bit 18 is marked as already used since the PMCRAID driver
85 * did the same thing as the VFS quota code (maybe copied?)
86 */
87static unsigned long mc_group_start = 0x3 | BIT(GENL_ID_CTRL) |
88 BIT(GENL_ID_VFS_DQUOT) |
89 BIT(GENL_ID_PMCRAID);
90static unsigned long *mc_groups = &mc_group_start;
91static unsigned long mc_groups_longs = 1;
92
93/* We need the last attribute with non-zero ID therefore a 2-entry array */
94static struct nla_policy genl_policy_reject_all[] = {
95 { .type = NLA_REJECT },
96 { .type = NLA_REJECT },
97};
98
99static int genl_ctrl_event(int event, const struct genl_family *family,
100 const struct genl_multicast_group *grp,
101 int grp_id);
102
103static void
104genl_op_fill_in_reject_policy(const struct genl_family *family,
105 struct genl_ops *op)
106{
107 BUILD_BUG_ON(ARRAY_SIZE(genl_policy_reject_all) - 1 != 1);
108
109 if (op->policy || op->cmd < family->resv_start_op)
110 return;
111
112 op->policy = genl_policy_reject_all;
113 op->maxattr = 1;
114}
115
116static void
117genl_op_fill_in_reject_policy_split(const struct genl_family *family,
118 struct genl_split_ops *op)
119{
120 if (op->policy)
121 return;
122
123 op->policy = genl_policy_reject_all;
124 op->maxattr = 1;
125}
126
127static const struct genl_family *genl_family_find_byid(unsigned int id)
128{
129 return idr_find(&genl_fam_idr, id);
130}
131
132static const struct genl_family *genl_family_find_byname(char *name)
133{
134 const struct genl_family *family;
135 unsigned int id;
136
137 idr_for_each_entry(&genl_fam_idr, family, id)
138 if (strcmp(family->name, name) == 0)
139 return family;
140
141 return NULL;
142}
143
144struct genl_op_iter {
145 const struct genl_family *family;
146 struct genl_split_ops doit;
147 struct genl_split_ops dumpit;
148 int cmd_idx;
149 int entry_idx;
150 u32 cmd;
151 u8 flags;
152};
153
154static void genl_op_from_full(const struct genl_family *family,
155 unsigned int i, struct genl_ops *op)
156{
157 *op = family->ops[i];
158
159 if (!op->maxattr)
160 op->maxattr = family->maxattr;
161 if (!op->policy)
162 op->policy = family->policy;
163
164 genl_op_fill_in_reject_policy(family, op);
165}
166
167static int genl_get_cmd_full(u32 cmd, const struct genl_family *family,
168 struct genl_ops *op)
169{
170 int i;
171
172 for (i = 0; i < family->n_ops; i++)
173 if (family->ops[i].cmd == cmd) {
174 genl_op_from_full(family, i, op);
175 return 0;
176 }
177
178 return -ENOENT;
179}
180
181static void genl_op_from_small(const struct genl_family *family,
182 unsigned int i, struct genl_ops *op)
183{
184 memset(op, 0, sizeof(*op));
185 op->doit = family->small_ops[i].doit;
186 op->dumpit = family->small_ops[i].dumpit;
187 op->cmd = family->small_ops[i].cmd;
188 op->internal_flags = family->small_ops[i].internal_flags;
189 op->flags = family->small_ops[i].flags;
190 op->validate = family->small_ops[i].validate;
191
192 op->maxattr = family->maxattr;
193 op->policy = family->policy;
194
195 genl_op_fill_in_reject_policy(family, op);
196}
197
198static int genl_get_cmd_small(u32 cmd, const struct genl_family *family,
199 struct genl_ops *op)
200{
201 int i;
202
203 for (i = 0; i < family->n_small_ops; i++)
204 if (family->small_ops[i].cmd == cmd) {
205 genl_op_from_small(family, i, op);
206 return 0;
207 }
208
209 return -ENOENT;
210}
211
212static void genl_op_from_split(struct genl_op_iter *iter)
213{
214 const struct genl_family *family = iter->family;
215 int i, cnt = 0;
216
217 i = iter->entry_idx - family->n_ops - family->n_small_ops;
218
219 if (family->split_ops[i + cnt].flags & GENL_CMD_CAP_DO) {
220 iter->doit = family->split_ops[i + cnt];
221 genl_op_fill_in_reject_policy_split(family, op: &iter->doit);
222 cnt++;
223 } else {
224 memset(&iter->doit, 0, sizeof(iter->doit));
225 }
226
227 if (i + cnt < family->n_split_ops &&
228 family->split_ops[i + cnt].flags & GENL_CMD_CAP_DUMP &&
229 (!cnt || family->split_ops[i + cnt].cmd == iter->doit.cmd)) {
230 iter->dumpit = family->split_ops[i + cnt];
231 genl_op_fill_in_reject_policy_split(family, op: &iter->dumpit);
232 cnt++;
233 } else {
234 memset(&iter->dumpit, 0, sizeof(iter->dumpit));
235 }
236
237 WARN_ON(!cnt);
238 iter->entry_idx += cnt;
239}
240
241static int
242genl_get_cmd_split(u32 cmd, u8 flag, const struct genl_family *family,
243 struct genl_split_ops *op)
244{
245 int i;
246
247 for (i = 0; i < family->n_split_ops; i++)
248 if (family->split_ops[i].cmd == cmd &&
249 family->split_ops[i].flags & flag) {
250 *op = family->split_ops[i];
251 return 0;
252 }
253
254 return -ENOENT;
255}
256
257static int
258genl_cmd_full_to_split(struct genl_split_ops *op,
259 const struct genl_family *family,
260 const struct genl_ops *full, u8 flags)
261{
262 if ((flags & GENL_CMD_CAP_DO && !full->doit) ||
263 (flags & GENL_CMD_CAP_DUMP && !full->dumpit)) {
264 memset(op, 0, sizeof(*op));
265 return -ENOENT;
266 }
267
268 if (flags & GENL_CMD_CAP_DUMP) {
269 op->start = full->start;
270 op->dumpit = full->dumpit;
271 op->done = full->done;
272 } else {
273 op->pre_doit = family->pre_doit;
274 op->doit = full->doit;
275 op->post_doit = family->post_doit;
276 }
277
278 if (flags & GENL_CMD_CAP_DUMP &&
279 full->validate & GENL_DONT_VALIDATE_DUMP) {
280 op->policy = NULL;
281 op->maxattr = 0;
282 } else {
283 op->policy = full->policy;
284 op->maxattr = full->maxattr;
285 }
286
287 op->cmd = full->cmd;
288 op->internal_flags = full->internal_flags;
289 op->flags = full->flags;
290 op->validate = full->validate;
291
292 /* Make sure flags include the GENL_CMD_CAP_DO / GENL_CMD_CAP_DUMP */
293 op->flags |= flags;
294
295 return 0;
296}
297
298/* Must make sure that op is initialized to 0 on failure */
299static int
300genl_get_cmd(u32 cmd, u8 flags, const struct genl_family *family,
301 struct genl_split_ops *op)
302{
303 struct genl_ops full;
304 int err;
305
306 err = genl_get_cmd_full(cmd, family, op: &full);
307 if (err == -ENOENT)
308 err = genl_get_cmd_small(cmd, family, op: &full);
309 /* Found one of legacy forms */
310 if (err == 0)
311 return genl_cmd_full_to_split(op, family, full: &full, flags);
312
313 err = genl_get_cmd_split(cmd, flag: flags, family, op);
314 if (err)
315 memset(op, 0, sizeof(*op));
316 return err;
317}
318
319/* For policy dumping only, get ops of both do and dump.
320 * Fail if both are missing, genl_get_cmd() will zero-init in case of failure.
321 */
322static int
323genl_get_cmd_both(u32 cmd, const struct genl_family *family,
324 struct genl_split_ops *doit, struct genl_split_ops *dumpit)
325{
326 int err1, err2;
327
328 err1 = genl_get_cmd(cmd, GENL_CMD_CAP_DO, family, op: doit);
329 err2 = genl_get_cmd(cmd, GENL_CMD_CAP_DUMP, family, op: dumpit);
330
331 return err1 && err2 ? -ENOENT : 0;
332}
333
334static bool
335genl_op_iter_init(const struct genl_family *family, struct genl_op_iter *iter)
336{
337 iter->family = family;
338 iter->cmd_idx = 0;
339 iter->entry_idx = 0;
340
341 iter->flags = 0;
342
343 return iter->family->n_ops +
344 iter->family->n_small_ops +
345 iter->family->n_split_ops;
346}
347
348static bool genl_op_iter_next(struct genl_op_iter *iter)
349{
350 const struct genl_family *family = iter->family;
351 bool legacy_op = true;
352 struct genl_ops op;
353
354 if (iter->entry_idx < family->n_ops) {
355 genl_op_from_full(family, i: iter->entry_idx, op: &op);
356 } else if (iter->entry_idx < family->n_ops + family->n_small_ops) {
357 genl_op_from_small(family, i: iter->entry_idx - family->n_ops,
358 op: &op);
359 } else if (iter->entry_idx <
360 family->n_ops + family->n_small_ops + family->n_split_ops) {
361 legacy_op = false;
362 /* updates entry_idx */
363 genl_op_from_split(iter);
364 } else {
365 return false;
366 }
367
368 iter->cmd_idx++;
369
370 if (legacy_op) {
371 iter->entry_idx++;
372
373 genl_cmd_full_to_split(op: &iter->doit, family,
374 full: &op, GENL_CMD_CAP_DO);
375 genl_cmd_full_to_split(op: &iter->dumpit, family,
376 full: &op, GENL_CMD_CAP_DUMP);
377 }
378
379 iter->cmd = iter->doit.cmd | iter->dumpit.cmd;
380 iter->flags = iter->doit.flags | iter->dumpit.flags;
381
382 return true;
383}
384
385static void
386genl_op_iter_copy(struct genl_op_iter *dst, struct genl_op_iter *src)
387{
388 *dst = *src;
389}
390
391static unsigned int genl_op_iter_idx(struct genl_op_iter *iter)
392{
393 return iter->cmd_idx;
394}
395
396static int genl_allocate_reserve_groups(int n_groups, int *first_id)
397{
398 unsigned long *new_groups;
399 int start = 0;
400 int i;
401 int id;
402 bool fits;
403
404 do {
405 if (start == 0)
406 id = find_first_zero_bit(addr: mc_groups,
407 size: mc_groups_longs *
408 BITS_PER_LONG);
409 else
410 id = find_next_zero_bit(addr: mc_groups,
411 size: mc_groups_longs * BITS_PER_LONG,
412 offset: start);
413
414 fits = true;
415 for (i = id;
416 i < min_t(int, id + n_groups,
417 mc_groups_longs * BITS_PER_LONG);
418 i++) {
419 if (test_bit(i, mc_groups)) {
420 start = i;
421 fits = false;
422 break;
423 }
424 }
425
426 if (id + n_groups > mc_groups_longs * BITS_PER_LONG) {
427 unsigned long new_longs = mc_groups_longs +
428 BITS_TO_LONGS(n_groups);
429 size_t nlen = new_longs * sizeof(unsigned long);
430
431 if (mc_groups == &mc_group_start) {
432 new_groups = kzalloc(size: nlen, GFP_KERNEL);
433 if (!new_groups)
434 return -ENOMEM;
435 mc_groups = new_groups;
436 *mc_groups = mc_group_start;
437 } else {
438 new_groups = krealloc(objp: mc_groups, new_size: nlen,
439 GFP_KERNEL);
440 if (!new_groups)
441 return -ENOMEM;
442 mc_groups = new_groups;
443 for (i = 0; i < BITS_TO_LONGS(n_groups); i++)
444 mc_groups[mc_groups_longs + i] = 0;
445 }
446 mc_groups_longs = new_longs;
447 }
448 } while (!fits);
449
450 for (i = id; i < id + n_groups; i++)
451 set_bit(nr: i, addr: mc_groups);
452 *first_id = id;
453 return 0;
454}
455
456static struct genl_family genl_ctrl;
457
458static int genl_validate_assign_mc_groups(struct genl_family *family)
459{
460 int first_id;
461 int n_groups = family->n_mcgrps;
462 int err = 0, i;
463 bool groups_allocated = false;
464
465 if (!n_groups)
466 return 0;
467
468 for (i = 0; i < n_groups; i++) {
469 const struct genl_multicast_group *grp = &family->mcgrps[i];
470
471 if (WARN_ON(grp->name[0] == '\0'))
472 return -EINVAL;
473 if (WARN_ON(!string_is_terminated(grp->name, GENL_NAMSIZ)))
474 return -EINVAL;
475 }
476
477 /* special-case our own group and hacks */
478 if (family == &genl_ctrl) {
479 first_id = GENL_ID_CTRL;
480 BUG_ON(n_groups != 1);
481 } else if (strcmp(family->name, "NET_DM") == 0) {
482 first_id = 1;
483 BUG_ON(n_groups != 1);
484 } else if (family->id == GENL_ID_VFS_DQUOT) {
485 first_id = GENL_ID_VFS_DQUOT;
486 BUG_ON(n_groups != 1);
487 } else if (family->id == GENL_ID_PMCRAID) {
488 first_id = GENL_ID_PMCRAID;
489 BUG_ON(n_groups != 1);
490 } else {
491 groups_allocated = true;
492 err = genl_allocate_reserve_groups(n_groups, first_id: &first_id);
493 if (err)
494 return err;
495 }
496
497 family->mcgrp_offset = first_id;
498
499 /* if still initializing, can't and don't need to realloc bitmaps */
500 if (!init_net.genl_sock)
501 return 0;
502
503 if (family->netnsok) {
504 struct net *net;
505
506 netlink_table_grab();
507 rcu_read_lock();
508 for_each_net_rcu(net) {
509 err = __netlink_change_ngroups(sk: net->genl_sock,
510 groups: mc_groups_longs * BITS_PER_LONG);
511 if (err) {
512 /*
513 * No need to roll back, can only fail if
514 * memory allocation fails and then the
515 * number of _possible_ groups has been
516 * increased on some sockets which is ok.
517 */
518 break;
519 }
520 }
521 rcu_read_unlock();
522 netlink_table_ungrab();
523 } else {
524 err = netlink_change_ngroups(sk: init_net.genl_sock,
525 groups: mc_groups_longs * BITS_PER_LONG);
526 }
527
528 if (groups_allocated && err) {
529 for (i = 0; i < family->n_mcgrps; i++)
530 clear_bit(nr: family->mcgrp_offset + i, addr: mc_groups);
531 }
532
533 return err;
534}
535
536static void genl_unregister_mc_groups(const struct genl_family *family)
537{
538 struct net *net;
539 int i;
540
541 netlink_table_grab();
542 rcu_read_lock();
543 for_each_net_rcu(net) {
544 for (i = 0; i < family->n_mcgrps; i++)
545 __netlink_clear_multicast_users(
546 sk: net->genl_sock, group: family->mcgrp_offset + i);
547 }
548 rcu_read_unlock();
549 netlink_table_ungrab();
550
551 for (i = 0; i < family->n_mcgrps; i++) {
552 int grp_id = family->mcgrp_offset + i;
553
554 if (grp_id != 1)
555 clear_bit(nr: grp_id, addr: mc_groups);
556 genl_ctrl_event(event: CTRL_CMD_DELMCAST_GRP, family,
557 grp: &family->mcgrps[i], grp_id);
558 }
559}
560
561static bool genl_split_op_check(const struct genl_split_ops *op)
562{
563 if (WARN_ON(hweight8(op->flags & (GENL_CMD_CAP_DO |
564 GENL_CMD_CAP_DUMP)) != 1))
565 return true;
566 return false;
567}
568
569static int genl_validate_ops(const struct genl_family *family)
570{
571 struct genl_op_iter i, j;
572 unsigned int s;
573
574 if (WARN_ON(family->n_ops && !family->ops) ||
575 WARN_ON(family->n_small_ops && !family->small_ops) ||
576 WARN_ON(family->n_split_ops && !family->split_ops))
577 return -EINVAL;
578
579 for (genl_op_iter_init(family, iter: &i); genl_op_iter_next(iter: &i); ) {
580 if (!(i.flags & (GENL_CMD_CAP_DO | GENL_CMD_CAP_DUMP)))
581 return -EINVAL;
582
583 if (WARN_ON(i.cmd >= family->resv_start_op &&
584 (i.doit.validate || i.dumpit.validate)))
585 return -EINVAL;
586
587 genl_op_iter_copy(dst: &j, src: &i);
588 while (genl_op_iter_next(iter: &j)) {
589 if (i.cmd == j.cmd)
590 return -EINVAL;
591 }
592 }
593
594 if (family->n_split_ops) {
595 if (genl_split_op_check(op: &family->split_ops[0]))
596 return -EINVAL;
597 }
598
599 for (s = 1; s < family->n_split_ops; s++) {
600 const struct genl_split_ops *a, *b;
601
602 a = &family->split_ops[s - 1];
603 b = &family->split_ops[s];
604
605 if (genl_split_op_check(op: b))
606 return -EINVAL;
607
608 /* Check sort order */
609 if (a->cmd < b->cmd) {
610 continue;
611 } else if (a->cmd > b->cmd) {
612 WARN_ON(1);
613 return -EINVAL;
614 }
615
616 if (a->internal_flags != b->internal_flags ||
617 ((a->flags ^ b->flags) & ~(GENL_CMD_CAP_DO |
618 GENL_CMD_CAP_DUMP))) {
619 WARN_ON(1);
620 return -EINVAL;
621 }
622
623 if ((a->flags & GENL_CMD_CAP_DO) &&
624 (b->flags & GENL_CMD_CAP_DUMP))
625 continue;
626
627 WARN_ON(1);
628 return -EINVAL;
629 }
630
631 return 0;
632}
633
634/**
635 * genl_register_family - register a generic netlink family
636 * @family: generic netlink family
637 *
638 * Registers the specified family after validating it first. Only one
639 * family may be registered with the same family name or identifier.
640 *
641 * The family's ops, multicast groups and module pointer must already
642 * be assigned.
643 *
644 * Return 0 on success or a negative error code.
645 */
646int genl_register_family(struct genl_family *family)
647{
648 int err, i;
649 int start = GENL_START_ALLOC, end = GENL_MAX_ID;
650
651 err = genl_validate_ops(family);
652 if (err)
653 return err;
654
655 genl_lock_all();
656
657 if (genl_family_find_byname(name: family->name)) {
658 err = -EEXIST;
659 goto errout_locked;
660 }
661
662 /*
663 * Sadly, a few cases need to be special-cased
664 * due to them having previously abused the API
665 * and having used their family ID also as their
666 * multicast group ID, so we use reserved IDs
667 * for both to be sure we can do that mapping.
668 */
669 if (family == &genl_ctrl) {
670 /* and this needs to be special for initial family lookups */
671 start = end = GENL_ID_CTRL;
672 } else if (strcmp(family->name, "pmcraid") == 0) {
673 start = end = GENL_ID_PMCRAID;
674 } else if (strcmp(family->name, "VFS_DQUOT") == 0) {
675 start = end = GENL_ID_VFS_DQUOT;
676 }
677
678 family->id = idr_alloc_cyclic(&genl_fam_idr, ptr: family,
679 start, end: end + 1, GFP_KERNEL);
680 if (family->id < 0) {
681 err = family->id;
682 goto errout_locked;
683 }
684
685 err = genl_validate_assign_mc_groups(family);
686 if (err)
687 goto errout_remove;
688
689 genl_unlock_all();
690
691 /* send all events */
692 genl_ctrl_event(event: CTRL_CMD_NEWFAMILY, family, NULL, grp_id: 0);
693 for (i = 0; i < family->n_mcgrps; i++)
694 genl_ctrl_event(event: CTRL_CMD_NEWMCAST_GRP, family,
695 grp: &family->mcgrps[i], grp_id: family->mcgrp_offset + i);
696
697 return 0;
698
699errout_remove:
700 idr_remove(&genl_fam_idr, id: family->id);
701errout_locked:
702 genl_unlock_all();
703 return err;
704}
705EXPORT_SYMBOL(genl_register_family);
706
707/**
708 * genl_unregister_family - unregister generic netlink family
709 * @family: generic netlink family
710 *
711 * Unregisters the specified family.
712 *
713 * Returns 0 on success or a negative error code.
714 */
715int genl_unregister_family(const struct genl_family *family)
716{
717 genl_lock_all();
718
719 if (!genl_family_find_byid(id: family->id)) {
720 genl_unlock_all();
721 return -ENOENT;
722 }
723
724 genl_unregister_mc_groups(family);
725
726 idr_remove(&genl_fam_idr, id: family->id);
727
728 up_write(sem: &cb_lock);
729 wait_event(genl_sk_destructing_waitq,
730 atomic_read(&genl_sk_destructing_cnt) == 0);
731 genl_unlock();
732
733 genl_ctrl_event(event: CTRL_CMD_DELFAMILY, family, NULL, grp_id: 0);
734
735 return 0;
736}
737EXPORT_SYMBOL(genl_unregister_family);
738
739/**
740 * genlmsg_put - Add generic netlink header to netlink message
741 * @skb: socket buffer holding the message
742 * @portid: netlink portid the message is addressed to
743 * @seq: sequence number (usually the one of the sender)
744 * @family: generic netlink family
745 * @flags: netlink message flags
746 * @cmd: generic netlink command
747 *
748 * Returns pointer to user specific header
749 */
750void *genlmsg_put(struct sk_buff *skb, u32 portid, u32 seq,
751 const struct genl_family *family, int flags, u8 cmd)
752{
753 struct nlmsghdr *nlh;
754 struct genlmsghdr *hdr;
755
756 nlh = nlmsg_put(skb, portid, seq, type: family->id, GENL_HDRLEN +
757 family->hdrsize, flags);
758 if (nlh == NULL)
759 return NULL;
760
761 hdr = nlmsg_data(nlh);
762 hdr->cmd = cmd;
763 hdr->version = family->version;
764 hdr->reserved = 0;
765
766 return (char *) hdr + GENL_HDRLEN;
767}
768EXPORT_SYMBOL(genlmsg_put);
769
770static struct genl_dumpit_info *genl_dumpit_info_alloc(void)
771{
772 return kmalloc(size: sizeof(struct genl_dumpit_info), GFP_KERNEL);
773}
774
775static void genl_dumpit_info_free(const struct genl_dumpit_info *info)
776{
777 kfree(objp: info);
778}
779
780static struct nlattr **
781genl_family_rcv_msg_attrs_parse(const struct genl_family *family,
782 struct nlmsghdr *nlh,
783 struct netlink_ext_ack *extack,
784 const struct genl_split_ops *ops,
785 int hdrlen,
786 enum genl_validate_flags no_strict_flag)
787{
788 enum netlink_validation validate = ops->validate & no_strict_flag ?
789 NL_VALIDATE_LIBERAL :
790 NL_VALIDATE_STRICT;
791 struct nlattr **attrbuf;
792 int err;
793
794 if (!ops->maxattr)
795 return NULL;
796
797 attrbuf = kmalloc_array(n: ops->maxattr + 1,
798 size: sizeof(struct nlattr *), GFP_KERNEL);
799 if (!attrbuf)
800 return ERR_PTR(error: -ENOMEM);
801
802 err = __nlmsg_parse(nlh, hdrlen, tb: attrbuf, maxtype: ops->maxattr, policy: ops->policy,
803 validate, extack);
804 if (err) {
805 kfree(objp: attrbuf);
806 return ERR_PTR(error: err);
807 }
808 return attrbuf;
809}
810
811static void genl_family_rcv_msg_attrs_free(struct nlattr **attrbuf)
812{
813 kfree(objp: attrbuf);
814}
815
816struct genl_start_context {
817 const struct genl_family *family;
818 struct nlmsghdr *nlh;
819 struct netlink_ext_ack *extack;
820 const struct genl_split_ops *ops;
821 int hdrlen;
822};
823
824static int genl_start(struct netlink_callback *cb)
825{
826 struct genl_start_context *ctx = cb->data;
827 const struct genl_split_ops *ops;
828 struct genl_dumpit_info *info;
829 struct nlattr **attrs = NULL;
830 int rc = 0;
831
832 ops = ctx->ops;
833 if (!(ops->validate & GENL_DONT_VALIDATE_DUMP) &&
834 ctx->nlh->nlmsg_len < nlmsg_msg_size(payload: ctx->hdrlen))
835 return -EINVAL;
836
837 attrs = genl_family_rcv_msg_attrs_parse(family: ctx->family, nlh: ctx->nlh, extack: ctx->extack,
838 ops, hdrlen: ctx->hdrlen,
839 no_strict_flag: GENL_DONT_VALIDATE_DUMP_STRICT);
840 if (IS_ERR(ptr: attrs))
841 return PTR_ERR(ptr: attrs);
842
843 info = genl_dumpit_info_alloc();
844 if (!info) {
845 genl_family_rcv_msg_attrs_free(attrbuf: attrs);
846 return -ENOMEM;
847 }
848 info->op = *ops;
849 info->info.family = ctx->family;
850 info->info.snd_seq = cb->nlh->nlmsg_seq;
851 info->info.snd_portid = NETLINK_CB(cb->skb).portid;
852 info->info.nlhdr = cb->nlh;
853 info->info.genlhdr = nlmsg_data(nlh: cb->nlh);
854 info->info.attrs = attrs;
855 genl_info_net_set(info: &info->info, net: sock_net(sk: cb->skb->sk));
856 info->info.extack = cb->extack;
857 memset(&info->info.user_ptr, 0, sizeof(info->info.user_ptr));
858
859 cb->data = info;
860 if (ops->start) {
861 genl_op_lock(family: ctx->family);
862 rc = ops->start(cb);
863 genl_op_unlock(family: ctx->family);
864 }
865
866 if (rc) {
867 genl_family_rcv_msg_attrs_free(attrbuf: info->info.attrs);
868 genl_dumpit_info_free(info);
869 cb->data = NULL;
870 }
871 return rc;
872}
873
874static int genl_dumpit(struct sk_buff *skb, struct netlink_callback *cb)
875{
876 struct genl_dumpit_info *dump_info = cb->data;
877 const struct genl_split_ops *ops = &dump_info->op;
878 struct genl_info *info = &dump_info->info;
879 int rc;
880
881 info->extack = cb->extack;
882
883 genl_op_lock(family: info->family);
884 rc = ops->dumpit(skb, cb);
885 genl_op_unlock(family: info->family);
886 return rc;
887}
888
889static int genl_done(struct netlink_callback *cb)
890{
891 struct genl_dumpit_info *dump_info = cb->data;
892 const struct genl_split_ops *ops = &dump_info->op;
893 struct genl_info *info = &dump_info->info;
894 int rc = 0;
895
896 info->extack = cb->extack;
897
898 if (ops->done) {
899 genl_op_lock(family: info->family);
900 rc = ops->done(cb);
901 genl_op_unlock(family: info->family);
902 }
903 genl_family_rcv_msg_attrs_free(attrbuf: info->attrs);
904 genl_dumpit_info_free(info: dump_info);
905 return rc;
906}
907
908static int genl_family_rcv_msg_dumpit(const struct genl_family *family,
909 struct sk_buff *skb,
910 struct nlmsghdr *nlh,
911 struct netlink_ext_ack *extack,
912 const struct genl_split_ops *ops,
913 int hdrlen, struct net *net)
914{
915 struct genl_start_context ctx;
916 struct netlink_dump_control c = {
917 .module = family->module,
918 .data = &ctx,
919 .start = genl_start,
920 .dump = genl_dumpit,
921 .done = genl_done,
922 .extack = extack,
923 };
924 int err;
925
926 ctx.family = family;
927 ctx.nlh = nlh;
928 ctx.extack = extack;
929 ctx.ops = ops;
930 ctx.hdrlen = hdrlen;
931
932 genl_op_unlock(family);
933 err = __netlink_dump_start(ssk: net->genl_sock, skb, nlh, control: &c);
934 genl_op_lock(family);
935
936 return err;
937}
938
939static int genl_family_rcv_msg_doit(const struct genl_family *family,
940 struct sk_buff *skb,
941 struct nlmsghdr *nlh,
942 struct netlink_ext_ack *extack,
943 const struct genl_split_ops *ops,
944 int hdrlen, struct net *net)
945{
946 struct nlattr **attrbuf;
947 struct genl_info info;
948 int err;
949
950 attrbuf = genl_family_rcv_msg_attrs_parse(family, nlh, extack,
951 ops, hdrlen,
952 no_strict_flag: GENL_DONT_VALIDATE_STRICT);
953 if (IS_ERR(ptr: attrbuf))
954 return PTR_ERR(ptr: attrbuf);
955
956 info.snd_seq = nlh->nlmsg_seq;
957 info.snd_portid = NETLINK_CB(skb).portid;
958 info.family = family;
959 info.nlhdr = nlh;
960 info.genlhdr = nlmsg_data(nlh);
961 info.attrs = attrbuf;
962 info.extack = extack;
963 genl_info_net_set(info: &info, net);
964 memset(&info.user_ptr, 0, sizeof(info.user_ptr));
965
966 if (ops->pre_doit) {
967 err = ops->pre_doit(ops, skb, &info);
968 if (err)
969 goto out;
970 }
971
972 err = ops->doit(skb, &info);
973
974 if (ops->post_doit)
975 ops->post_doit(ops, skb, &info);
976
977out:
978 genl_family_rcv_msg_attrs_free(attrbuf);
979
980 return err;
981}
982
983static int genl_header_check(const struct genl_family *family,
984 struct nlmsghdr *nlh, struct genlmsghdr *hdr,
985 struct netlink_ext_ack *extack)
986{
987 u16 flags;
988
989 /* Only for commands added after we started validating */
990 if (hdr->cmd < family->resv_start_op)
991 return 0;
992
993 if (hdr->reserved) {
994 NL_SET_ERR_MSG(extack, "genlmsghdr.reserved field is not 0");
995 return -EINVAL;
996 }
997
998 /* Old netlink flags have pretty loose semantics, allow only the flags
999 * consumed by the core where we can enforce the meaning.
1000 */
1001 flags = nlh->nlmsg_flags;
1002 if ((flags & NLM_F_DUMP) == NLM_F_DUMP) /* DUMP is 2 bits */
1003 flags &= ~NLM_F_DUMP;
1004 if (flags & ~(NLM_F_REQUEST | NLM_F_ACK | NLM_F_ECHO)) {
1005 NL_SET_ERR_MSG(extack,
1006 "ambiguous or reserved bits set in nlmsg_flags");
1007 return -EINVAL;
1008 }
1009
1010 return 0;
1011}
1012
1013static int genl_family_rcv_msg(const struct genl_family *family,
1014 struct sk_buff *skb,
1015 struct nlmsghdr *nlh,
1016 struct netlink_ext_ack *extack)
1017{
1018 struct net *net = sock_net(sk: skb->sk);
1019 struct genlmsghdr *hdr = nlmsg_data(nlh);
1020 struct genl_split_ops op;
1021 int hdrlen;
1022 u8 flags;
1023
1024 /* this family doesn't exist in this netns */
1025 if (!family->netnsok && !net_eq(net1: net, net2: &init_net))
1026 return -ENOENT;
1027
1028 hdrlen = GENL_HDRLEN + family->hdrsize;
1029 if (nlh->nlmsg_len < nlmsg_msg_size(payload: hdrlen))
1030 return -EINVAL;
1031
1032 if (genl_header_check(family, nlh, hdr, extack))
1033 return -EINVAL;
1034
1035 flags = (nlh->nlmsg_flags & NLM_F_DUMP) == NLM_F_DUMP ?
1036 GENL_CMD_CAP_DUMP : GENL_CMD_CAP_DO;
1037 if (genl_get_cmd(cmd: hdr->cmd, flags, family, op: &op))
1038 return -EOPNOTSUPP;
1039
1040 if ((op.flags & GENL_ADMIN_PERM) &&
1041 !netlink_capable(skb, CAP_NET_ADMIN))
1042 return -EPERM;
1043
1044 if ((op.flags & GENL_UNS_ADMIN_PERM) &&
1045 !netlink_ns_capable(skb, ns: net->user_ns, CAP_NET_ADMIN))
1046 return -EPERM;
1047
1048 if (flags & GENL_CMD_CAP_DUMP)
1049 return genl_family_rcv_msg_dumpit(family, skb, nlh, extack,
1050 ops: &op, hdrlen, net);
1051 else
1052 return genl_family_rcv_msg_doit(family, skb, nlh, extack,
1053 ops: &op, hdrlen, net);
1054}
1055
1056static int genl_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh,
1057 struct netlink_ext_ack *extack)
1058{
1059 const struct genl_family *family;
1060 int err;
1061
1062 family = genl_family_find_byid(id: nlh->nlmsg_type);
1063 if (family == NULL)
1064 return -ENOENT;
1065
1066 genl_op_lock(family);
1067 err = genl_family_rcv_msg(family, skb, nlh, extack);
1068 genl_op_unlock(family);
1069
1070 return err;
1071}
1072
1073static void genl_rcv(struct sk_buff *skb)
1074{
1075 down_read(sem: &cb_lock);
1076 netlink_rcv_skb(skb, cb: &genl_rcv_msg);
1077 up_read(sem: &cb_lock);
1078}
1079
1080/**************************************************************************
1081 * Controller
1082 **************************************************************************/
1083
1084static struct genl_family genl_ctrl;
1085
1086static int ctrl_fill_info(const struct genl_family *family, u32 portid, u32 seq,
1087 u32 flags, struct sk_buff *skb, u8 cmd)
1088{
1089 struct genl_op_iter i;
1090 void *hdr;
1091
1092 hdr = genlmsg_put(skb, portid, seq, &genl_ctrl, flags, cmd);
1093 if (hdr == NULL)
1094 return -1;
1095
1096 if (nla_put_string(skb, attrtype: CTRL_ATTR_FAMILY_NAME, str: family->name) ||
1097 nla_put_u16(skb, attrtype: CTRL_ATTR_FAMILY_ID, value: family->id) ||
1098 nla_put_u32(skb, attrtype: CTRL_ATTR_VERSION, value: family->version) ||
1099 nla_put_u32(skb, attrtype: CTRL_ATTR_HDRSIZE, value: family->hdrsize) ||
1100 nla_put_u32(skb, attrtype: CTRL_ATTR_MAXATTR, value: family->maxattr))
1101 goto nla_put_failure;
1102
1103 if (genl_op_iter_init(family, iter: &i)) {
1104 struct nlattr *nla_ops;
1105
1106 nla_ops = nla_nest_start_noflag(skb, attrtype: CTRL_ATTR_OPS);
1107 if (nla_ops == NULL)
1108 goto nla_put_failure;
1109
1110 while (genl_op_iter_next(iter: &i)) {
1111 struct nlattr *nest;
1112 u32 op_flags;
1113
1114 op_flags = i.flags;
1115 if (i.doit.policy || i.dumpit.policy)
1116 op_flags |= GENL_CMD_CAP_HASPOL;
1117
1118 nest = nla_nest_start_noflag(skb, attrtype: genl_op_iter_idx(iter: &i));
1119 if (nest == NULL)
1120 goto nla_put_failure;
1121
1122 if (nla_put_u32(skb, attrtype: CTRL_ATTR_OP_ID, value: i.cmd) ||
1123 nla_put_u32(skb, attrtype: CTRL_ATTR_OP_FLAGS, value: op_flags))
1124 goto nla_put_failure;
1125
1126 nla_nest_end(skb, start: nest);
1127 }
1128
1129 nla_nest_end(skb, start: nla_ops);
1130 }
1131
1132 if (family->n_mcgrps) {
1133 struct nlattr *nla_grps;
1134 int i;
1135
1136 nla_grps = nla_nest_start_noflag(skb, attrtype: CTRL_ATTR_MCAST_GROUPS);
1137 if (nla_grps == NULL)
1138 goto nla_put_failure;
1139
1140 for (i = 0; i < family->n_mcgrps; i++) {
1141 struct nlattr *nest;
1142 const struct genl_multicast_group *grp;
1143
1144 grp = &family->mcgrps[i];
1145
1146 nest = nla_nest_start_noflag(skb, attrtype: i + 1);
1147 if (nest == NULL)
1148 goto nla_put_failure;
1149
1150 if (nla_put_u32(skb, attrtype: CTRL_ATTR_MCAST_GRP_ID,
1151 value: family->mcgrp_offset + i) ||
1152 nla_put_string(skb, attrtype: CTRL_ATTR_MCAST_GRP_NAME,
1153 str: grp->name))
1154 goto nla_put_failure;
1155
1156 nla_nest_end(skb, start: nest);
1157 }
1158 nla_nest_end(skb, start: nla_grps);
1159 }
1160
1161 genlmsg_end(skb, hdr);
1162 return 0;
1163
1164nla_put_failure:
1165 genlmsg_cancel(skb, hdr);
1166 return -EMSGSIZE;
1167}
1168
1169static int ctrl_fill_mcgrp_info(const struct genl_family *family,
1170 const struct genl_multicast_group *grp,
1171 int grp_id, u32 portid, u32 seq, u32 flags,
1172 struct sk_buff *skb, u8 cmd)
1173{
1174 void *hdr;
1175 struct nlattr *nla_grps;
1176 struct nlattr *nest;
1177
1178 hdr = genlmsg_put(skb, portid, seq, &genl_ctrl, flags, cmd);
1179 if (hdr == NULL)
1180 return -1;
1181
1182 if (nla_put_string(skb, attrtype: CTRL_ATTR_FAMILY_NAME, str: family->name) ||
1183 nla_put_u16(skb, attrtype: CTRL_ATTR_FAMILY_ID, value: family->id))
1184 goto nla_put_failure;
1185
1186 nla_grps = nla_nest_start_noflag(skb, attrtype: CTRL_ATTR_MCAST_GROUPS);
1187 if (nla_grps == NULL)
1188 goto nla_put_failure;
1189
1190 nest = nla_nest_start_noflag(skb, attrtype: 1);
1191 if (nest == NULL)
1192 goto nla_put_failure;
1193
1194 if (nla_put_u32(skb, attrtype: CTRL_ATTR_MCAST_GRP_ID, value: grp_id) ||
1195 nla_put_string(skb, attrtype: CTRL_ATTR_MCAST_GRP_NAME,
1196 str: grp->name))
1197 goto nla_put_failure;
1198
1199 nla_nest_end(skb, start: nest);
1200 nla_nest_end(skb, start: nla_grps);
1201
1202 genlmsg_end(skb, hdr);
1203 return 0;
1204
1205nla_put_failure:
1206 genlmsg_cancel(skb, hdr);
1207 return -EMSGSIZE;
1208}
1209
1210static int ctrl_dumpfamily(struct sk_buff *skb, struct netlink_callback *cb)
1211{
1212 int n = 0;
1213 struct genl_family *rt;
1214 struct net *net = sock_net(sk: skb->sk);
1215 int fams_to_skip = cb->args[0];
1216 unsigned int id;
1217
1218 idr_for_each_entry(&genl_fam_idr, rt, id) {
1219 if (!rt->netnsok && !net_eq(net1: net, net2: &init_net))
1220 continue;
1221
1222 if (n++ < fams_to_skip)
1223 continue;
1224
1225 if (ctrl_fill_info(family: rt, NETLINK_CB(cb->skb).portid,
1226 seq: cb->nlh->nlmsg_seq, NLM_F_MULTI,
1227 skb, cmd: CTRL_CMD_NEWFAMILY) < 0) {
1228 n--;
1229 break;
1230 }
1231 }
1232
1233 cb->args[0] = n;
1234 return skb->len;
1235}
1236
1237static struct sk_buff *ctrl_build_family_msg(const struct genl_family *family,
1238 u32 portid, int seq, u8 cmd)
1239{
1240 struct sk_buff *skb;
1241 int err;
1242
1243 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
1244 if (skb == NULL)
1245 return ERR_PTR(error: -ENOBUFS);
1246
1247 err = ctrl_fill_info(family, portid, seq, flags: 0, skb, cmd);
1248 if (err < 0) {
1249 nlmsg_free(skb);
1250 return ERR_PTR(error: err);
1251 }
1252
1253 return skb;
1254}
1255
1256static struct sk_buff *
1257ctrl_build_mcgrp_msg(const struct genl_family *family,
1258 const struct genl_multicast_group *grp,
1259 int grp_id, u32 portid, int seq, u8 cmd)
1260{
1261 struct sk_buff *skb;
1262 int err;
1263
1264 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
1265 if (skb == NULL)
1266 return ERR_PTR(error: -ENOBUFS);
1267
1268 err = ctrl_fill_mcgrp_info(family, grp, grp_id, portid,
1269 seq, flags: 0, skb, cmd);
1270 if (err < 0) {
1271 nlmsg_free(skb);
1272 return ERR_PTR(error: err);
1273 }
1274
1275 return skb;
1276}
1277
1278static const struct nla_policy ctrl_policy_family[] = {
1279 [CTRL_ATTR_FAMILY_ID] = { .type = NLA_U16 },
1280 [CTRL_ATTR_FAMILY_NAME] = { .type = NLA_NUL_STRING,
1281 .len = GENL_NAMSIZ - 1 },
1282};
1283
1284static int ctrl_getfamily(struct sk_buff *skb, struct genl_info *info)
1285{
1286 struct sk_buff *msg;
1287 const struct genl_family *res = NULL;
1288 int err = -EINVAL;
1289
1290 if (info->attrs[CTRL_ATTR_FAMILY_ID]) {
1291 u16 id = nla_get_u16(nla: info->attrs[CTRL_ATTR_FAMILY_ID]);
1292 res = genl_family_find_byid(id);
1293 err = -ENOENT;
1294 }
1295
1296 if (info->attrs[CTRL_ATTR_FAMILY_NAME]) {
1297 char *name;
1298
1299 name = nla_data(nla: info->attrs[CTRL_ATTR_FAMILY_NAME]);
1300 res = genl_family_find_byname(name);
1301#ifdef CONFIG_MODULES
1302 if (res == NULL) {
1303 genl_unlock();
1304 up_read(sem: &cb_lock);
1305 request_module("net-pf-%d-proto-%d-family-%s",
1306 PF_NETLINK, NETLINK_GENERIC, name);
1307 down_read(sem: &cb_lock);
1308 genl_lock();
1309 res = genl_family_find_byname(name);
1310 }
1311#endif
1312 err = -ENOENT;
1313 }
1314
1315 if (res == NULL)
1316 return err;
1317
1318 if (!res->netnsok && !net_eq(net1: genl_info_net(info), net2: &init_net)) {
1319 /* family doesn't exist here */
1320 return -ENOENT;
1321 }
1322
1323 msg = ctrl_build_family_msg(family: res, portid: info->snd_portid, seq: info->snd_seq,
1324 cmd: CTRL_CMD_NEWFAMILY);
1325 if (IS_ERR(ptr: msg))
1326 return PTR_ERR(ptr: msg);
1327
1328 return genlmsg_reply(skb: msg, info);
1329}
1330
1331static int genl_ctrl_event(int event, const struct genl_family *family,
1332 const struct genl_multicast_group *grp,
1333 int grp_id)
1334{
1335 struct sk_buff *msg;
1336
1337 /* genl is still initialising */
1338 if (!init_net.genl_sock)
1339 return 0;
1340
1341 switch (event) {
1342 case CTRL_CMD_NEWFAMILY:
1343 case CTRL_CMD_DELFAMILY:
1344 WARN_ON(grp);
1345 msg = ctrl_build_family_msg(family, portid: 0, seq: 0, cmd: event);
1346 break;
1347 case CTRL_CMD_NEWMCAST_GRP:
1348 case CTRL_CMD_DELMCAST_GRP:
1349 BUG_ON(!grp);
1350 msg = ctrl_build_mcgrp_msg(family, grp, grp_id, portid: 0, seq: 0, cmd: event);
1351 break;
1352 default:
1353 return -EINVAL;
1354 }
1355
1356 if (IS_ERR(ptr: msg))
1357 return PTR_ERR(ptr: msg);
1358
1359 if (!family->netnsok) {
1360 genlmsg_multicast_netns(family: &genl_ctrl, net: &init_net, skb: msg, portid: 0,
1361 group: 0, GFP_KERNEL);
1362 } else {
1363 rcu_read_lock();
1364 genlmsg_multicast_allns(family: &genl_ctrl, skb: msg, portid: 0,
1365 group: 0, GFP_ATOMIC);
1366 rcu_read_unlock();
1367 }
1368
1369 return 0;
1370}
1371
1372struct ctrl_dump_policy_ctx {
1373 struct netlink_policy_dump_state *state;
1374 const struct genl_family *rt;
1375 struct genl_op_iter *op_iter;
1376 u32 op;
1377 u16 fam_id;
1378 u8 dump_map:1,
1379 single_op:1;
1380};
1381
1382static const struct nla_policy ctrl_policy_policy[] = {
1383 [CTRL_ATTR_FAMILY_ID] = { .type = NLA_U16 },
1384 [CTRL_ATTR_FAMILY_NAME] = { .type = NLA_NUL_STRING,
1385 .len = GENL_NAMSIZ - 1 },
1386 [CTRL_ATTR_OP] = { .type = NLA_U32 },
1387};
1388
1389static int ctrl_dumppolicy_start(struct netlink_callback *cb)
1390{
1391 const struct genl_dumpit_info *info = genl_dumpit_info(cb);
1392 struct ctrl_dump_policy_ctx *ctx = (void *)cb->ctx;
1393 struct nlattr **tb = info->info.attrs;
1394 const struct genl_family *rt;
1395 struct genl_op_iter i;
1396 int err;
1397
1398 BUILD_BUG_ON(sizeof(*ctx) > sizeof(cb->ctx));
1399
1400 if (!tb[CTRL_ATTR_FAMILY_ID] && !tb[CTRL_ATTR_FAMILY_NAME])
1401 return -EINVAL;
1402
1403 if (tb[CTRL_ATTR_FAMILY_ID]) {
1404 ctx->fam_id = nla_get_u16(nla: tb[CTRL_ATTR_FAMILY_ID]);
1405 } else {
1406 rt = genl_family_find_byname(
1407 name: nla_data(nla: tb[CTRL_ATTR_FAMILY_NAME]));
1408 if (!rt)
1409 return -ENOENT;
1410 ctx->fam_id = rt->id;
1411 }
1412
1413 rt = genl_family_find_byid(id: ctx->fam_id);
1414 if (!rt)
1415 return -ENOENT;
1416
1417 ctx->rt = rt;
1418
1419 if (tb[CTRL_ATTR_OP]) {
1420 struct genl_split_ops doit, dump;
1421
1422 ctx->single_op = true;
1423 ctx->op = nla_get_u32(nla: tb[CTRL_ATTR_OP]);
1424
1425 err = genl_get_cmd_both(cmd: ctx->op, family: rt, doit: &doit, dumpit: &dump);
1426 if (err) {
1427 NL_SET_BAD_ATTR(cb->extack, tb[CTRL_ATTR_OP]);
1428 return err;
1429 }
1430
1431 if (doit.policy) {
1432 err = netlink_policy_dump_add_policy(pstate: &ctx->state,
1433 policy: doit.policy,
1434 maxtype: doit.maxattr);
1435 if (err)
1436 goto err_free_state;
1437 }
1438 if (dump.policy) {
1439 err = netlink_policy_dump_add_policy(pstate: &ctx->state,
1440 policy: dump.policy,
1441 maxtype: dump.maxattr);
1442 if (err)
1443 goto err_free_state;
1444 }
1445
1446 if (!ctx->state)
1447 return -ENODATA;
1448
1449 ctx->dump_map = 1;
1450 return 0;
1451 }
1452
1453 ctx->op_iter = kmalloc(size: sizeof(*ctx->op_iter), GFP_KERNEL);
1454 if (!ctx->op_iter)
1455 return -ENOMEM;
1456
1457 genl_op_iter_init(family: rt, iter: ctx->op_iter);
1458 ctx->dump_map = genl_op_iter_next(iter: ctx->op_iter);
1459
1460 for (genl_op_iter_init(family: rt, iter: &i); genl_op_iter_next(iter: &i); ) {
1461 if (i.doit.policy) {
1462 err = netlink_policy_dump_add_policy(pstate: &ctx->state,
1463 policy: i.doit.policy,
1464 maxtype: i.doit.maxattr);
1465 if (err)
1466 goto err_free_state;
1467 }
1468 if (i.dumpit.policy) {
1469 err = netlink_policy_dump_add_policy(pstate: &ctx->state,
1470 policy: i.dumpit.policy,
1471 maxtype: i.dumpit.maxattr);
1472 if (err)
1473 goto err_free_state;
1474 }
1475 }
1476
1477 if (!ctx->state) {
1478 err = -ENODATA;
1479 goto err_free_op_iter;
1480 }
1481 return 0;
1482
1483err_free_state:
1484 netlink_policy_dump_free(state: ctx->state);
1485err_free_op_iter:
1486 kfree(objp: ctx->op_iter);
1487 return err;
1488}
1489
1490static void *ctrl_dumppolicy_prep(struct sk_buff *skb,
1491 struct netlink_callback *cb)
1492{
1493 struct ctrl_dump_policy_ctx *ctx = (void *)cb->ctx;
1494 void *hdr;
1495
1496 hdr = genlmsg_put(skb, NETLINK_CB(cb->skb).portid,
1497 cb->nlh->nlmsg_seq, &genl_ctrl,
1498 NLM_F_MULTI, CTRL_CMD_GETPOLICY);
1499 if (!hdr)
1500 return NULL;
1501
1502 if (nla_put_u16(skb, attrtype: CTRL_ATTR_FAMILY_ID, value: ctx->fam_id))
1503 return NULL;
1504
1505 return hdr;
1506}
1507
1508static int ctrl_dumppolicy_put_op(struct sk_buff *skb,
1509 struct netlink_callback *cb,
1510 struct genl_split_ops *doit,
1511 struct genl_split_ops *dumpit)
1512{
1513 struct ctrl_dump_policy_ctx *ctx = (void *)cb->ctx;
1514 struct nlattr *nest_pol, *nest_op;
1515 void *hdr;
1516 int idx;
1517
1518 /* skip if we have nothing to show */
1519 if (!doit->policy && !dumpit->policy)
1520 return 0;
1521
1522 hdr = ctrl_dumppolicy_prep(skb, cb);
1523 if (!hdr)
1524 return -ENOBUFS;
1525
1526 nest_pol = nla_nest_start(skb, attrtype: CTRL_ATTR_OP_POLICY);
1527 if (!nest_pol)
1528 goto err;
1529
1530 nest_op = nla_nest_start(skb, attrtype: doit->cmd);
1531 if (!nest_op)
1532 goto err;
1533
1534 if (doit->policy) {
1535 idx = netlink_policy_dump_get_policy_idx(state: ctx->state,
1536 policy: doit->policy,
1537 maxtype: doit->maxattr);
1538
1539 if (nla_put_u32(skb, attrtype: CTRL_ATTR_POLICY_DO, value: idx))
1540 goto err;
1541 }
1542 if (dumpit->policy) {
1543 idx = netlink_policy_dump_get_policy_idx(state: ctx->state,
1544 policy: dumpit->policy,
1545 maxtype: dumpit->maxattr);
1546
1547 if (nla_put_u32(skb, attrtype: CTRL_ATTR_POLICY_DUMP, value: idx))
1548 goto err;
1549 }
1550
1551 nla_nest_end(skb, start: nest_op);
1552 nla_nest_end(skb, start: nest_pol);
1553 genlmsg_end(skb, hdr);
1554
1555 return 0;
1556err:
1557 genlmsg_cancel(skb, hdr);
1558 return -ENOBUFS;
1559}
1560
1561static int ctrl_dumppolicy(struct sk_buff *skb, struct netlink_callback *cb)
1562{
1563 struct ctrl_dump_policy_ctx *ctx = (void *)cb->ctx;
1564 void *hdr;
1565
1566 if (ctx->dump_map) {
1567 if (ctx->single_op) {
1568 struct genl_split_ops doit, dumpit;
1569
1570 if (WARN_ON(genl_get_cmd_both(ctx->op, ctx->rt,
1571 &doit, &dumpit)))
1572 return -ENOENT;
1573
1574 if (ctrl_dumppolicy_put_op(skb, cb, doit: &doit, dumpit: &dumpit))
1575 return skb->len;
1576
1577 /* done with the per-op policy index list */
1578 ctx->dump_map = 0;
1579 }
1580
1581 while (ctx->dump_map) {
1582 if (ctrl_dumppolicy_put_op(skb, cb,
1583 doit: &ctx->op_iter->doit,
1584 dumpit: &ctx->op_iter->dumpit))
1585 return skb->len;
1586
1587 ctx->dump_map = genl_op_iter_next(iter: ctx->op_iter);
1588 }
1589 }
1590
1591 while (netlink_policy_dump_loop(state: ctx->state)) {
1592 struct nlattr *nest;
1593
1594 hdr = ctrl_dumppolicy_prep(skb, cb);
1595 if (!hdr)
1596 goto nla_put_failure;
1597
1598 nest = nla_nest_start(skb, attrtype: CTRL_ATTR_POLICY);
1599 if (!nest)
1600 goto nla_put_failure;
1601
1602 if (netlink_policy_dump_write(skb, state: ctx->state))
1603 goto nla_put_failure;
1604
1605 nla_nest_end(skb, start: nest);
1606
1607 genlmsg_end(skb, hdr);
1608 }
1609
1610 return skb->len;
1611
1612nla_put_failure:
1613 genlmsg_cancel(skb, hdr);
1614 return skb->len;
1615}
1616
1617static int ctrl_dumppolicy_done(struct netlink_callback *cb)
1618{
1619 struct ctrl_dump_policy_ctx *ctx = (void *)cb->ctx;
1620
1621 kfree(objp: ctx->op_iter);
1622 netlink_policy_dump_free(state: ctx->state);
1623 return 0;
1624}
1625
1626static const struct genl_split_ops genl_ctrl_ops[] = {
1627 {
1628 .cmd = CTRL_CMD_GETFAMILY,
1629 .validate = GENL_DONT_VALIDATE_STRICT,
1630 .policy = ctrl_policy_family,
1631 .maxattr = ARRAY_SIZE(ctrl_policy_family) - 1,
1632 .doit = ctrl_getfamily,
1633 .flags = GENL_CMD_CAP_DO,
1634 },
1635 {
1636 .cmd = CTRL_CMD_GETFAMILY,
1637 .validate = GENL_DONT_VALIDATE_DUMP,
1638 .policy = ctrl_policy_family,
1639 .maxattr = ARRAY_SIZE(ctrl_policy_family) - 1,
1640 .dumpit = ctrl_dumpfamily,
1641 .flags = GENL_CMD_CAP_DUMP,
1642 },
1643 {
1644 .cmd = CTRL_CMD_GETPOLICY,
1645 .policy = ctrl_policy_policy,
1646 .maxattr = ARRAY_SIZE(ctrl_policy_policy) - 1,
1647 .start = ctrl_dumppolicy_start,
1648 .dumpit = ctrl_dumppolicy,
1649 .done = ctrl_dumppolicy_done,
1650 .flags = GENL_CMD_CAP_DUMP,
1651 },
1652};
1653
1654static const struct genl_multicast_group genl_ctrl_groups[] = {
1655 { .name = "notify", },
1656};
1657
1658static struct genl_family genl_ctrl __ro_after_init = {
1659 .module = THIS_MODULE,
1660 .split_ops = genl_ctrl_ops,
1661 .n_split_ops = ARRAY_SIZE(genl_ctrl_ops),
1662 .resv_start_op = CTRL_CMD_GETPOLICY + 1,
1663 .mcgrps = genl_ctrl_groups,
1664 .n_mcgrps = ARRAY_SIZE(genl_ctrl_groups),
1665 .id = GENL_ID_CTRL,
1666 .name = "nlctrl",
1667 .version = 0x2,
1668 .netnsok = true,
1669};
1670
1671static int genl_bind(struct net *net, int group)
1672{
1673 const struct genl_family *family;
1674 unsigned int id;
1675 int ret = 0;
1676
1677 down_read(sem: &cb_lock);
1678
1679 idr_for_each_entry(&genl_fam_idr, family, id) {
1680 const struct genl_multicast_group *grp;
1681 int i;
1682
1683 if (family->n_mcgrps == 0)
1684 continue;
1685
1686 i = group - family->mcgrp_offset;
1687 if (i < 0 || i >= family->n_mcgrps)
1688 continue;
1689
1690 grp = &family->mcgrps[i];
1691 if ((grp->flags & GENL_UNS_ADMIN_PERM) &&
1692 !ns_capable(ns: net->user_ns, CAP_NET_ADMIN))
1693 ret = -EPERM;
1694
1695 break;
1696 }
1697
1698 up_read(sem: &cb_lock);
1699 return ret;
1700}
1701
1702static int __net_init genl_pernet_init(struct net *net)
1703{
1704 struct netlink_kernel_cfg cfg = {
1705 .input = genl_rcv,
1706 .flags = NL_CFG_F_NONROOT_RECV,
1707 .bind = genl_bind,
1708 };
1709
1710 /* we'll bump the group number right afterwards */
1711 net->genl_sock = netlink_kernel_create(net, NETLINK_GENERIC, cfg: &cfg);
1712
1713 if (!net->genl_sock && net_eq(net1: net, net2: &init_net))
1714 panic(fmt: "GENL: Cannot initialize generic netlink\n");
1715
1716 if (!net->genl_sock)
1717 return -ENOMEM;
1718
1719 return 0;
1720}
1721
1722static void __net_exit genl_pernet_exit(struct net *net)
1723{
1724 netlink_kernel_release(sk: net->genl_sock);
1725 net->genl_sock = NULL;
1726}
1727
1728static struct pernet_operations genl_pernet_ops = {
1729 .init = genl_pernet_init,
1730 .exit = genl_pernet_exit,
1731};
1732
1733static int __init genl_init(void)
1734{
1735 int err;
1736
1737 err = genl_register_family(&genl_ctrl);
1738 if (err < 0)
1739 goto problem;
1740
1741 err = register_pernet_subsys(&genl_pernet_ops);
1742 if (err)
1743 goto problem;
1744
1745 return 0;
1746
1747problem:
1748 panic(fmt: "GENL: Cannot register controller: %d\n", err);
1749}
1750
1751core_initcall(genl_init);
1752
1753static int genlmsg_mcast(struct sk_buff *skb, u32 portid, unsigned long group,
1754 gfp_t flags)
1755{
1756 struct sk_buff *tmp;
1757 struct net *net, *prev = NULL;
1758 bool delivered = false;
1759 int err;
1760
1761 for_each_net_rcu(net) {
1762 if (prev) {
1763 tmp = skb_clone(skb, priority: flags);
1764 if (!tmp) {
1765 err = -ENOMEM;
1766 goto error;
1767 }
1768 err = nlmsg_multicast(sk: prev->genl_sock, skb: tmp,
1769 portid, group, flags);
1770 if (!err)
1771 delivered = true;
1772 else if (err != -ESRCH)
1773 goto error;
1774 }
1775
1776 prev = net;
1777 }
1778
1779 err = nlmsg_multicast(sk: prev->genl_sock, skb, portid, group, flags);
1780 if (!err)
1781 delivered = true;
1782 else if (err != -ESRCH)
1783 return err;
1784 return delivered ? 0 : -ESRCH;
1785 error:
1786 kfree_skb(skb);
1787 return err;
1788}
1789
1790int genlmsg_multicast_allns(const struct genl_family *family,
1791 struct sk_buff *skb, u32 portid,
1792 unsigned int group, gfp_t flags)
1793{
1794 if (WARN_ON_ONCE(group >= family->n_mcgrps))
1795 return -EINVAL;
1796
1797 group = family->mcgrp_offset + group;
1798 return genlmsg_mcast(skb, portid, group, flags);
1799}
1800EXPORT_SYMBOL(genlmsg_multicast_allns);
1801
1802void genl_notify(const struct genl_family *family, struct sk_buff *skb,
1803 struct genl_info *info, u32 group, gfp_t flags)
1804{
1805 struct net *net = genl_info_net(info);
1806 struct sock *sk = net->genl_sock;
1807
1808 if (WARN_ON_ONCE(group >= family->n_mcgrps))
1809 return;
1810
1811 group = family->mcgrp_offset + group;
1812 nlmsg_notify(sk, skb, portid: info->snd_portid, group,
1813 report: nlmsg_report(nlh: info->nlhdr), flags);
1814}
1815EXPORT_SYMBOL(genl_notify);
1816

source code of linux/net/netlink/genetlink.c