forked from mirrors/linux
		
	 86e8921df0
			
		
	
	
		86e8921df0
		
	
	
	
	
		
			
			TCPDIAG_GETSOCK and DCCPDIAG_GETSOCK diag are serialized on sock_diag_table_mutex. This is to make sure inet_diag module is not unloaded while diag was ongoing. It is time to get rid of this mutex and use RCU protection, allowing full parallelism. Signed-off-by: Eric Dumazet <edumazet@google.com> Reviewed-by: Guillaume Nault <gnault@redhat.com> Reviewed-by: Kuniyuki Iwashima <kuniyu@amazon.com> Reviewed-by: Willem de Bruijn <willemb@google.com> Signed-off-by: Paolo Abeni <pabeni@redhat.com>
		
			
				
	
	
		
			99 lines
		
	
	
	
		
			2.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			99 lines
		
	
	
	
		
			2.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* SPDX-License-Identifier: GPL-2.0 */
 | |
| #ifndef __SOCK_DIAG_H__
 | |
| #define __SOCK_DIAG_H__
 | |
| 
 | |
| #include <linux/netlink.h>
 | |
| #include <linux/user_namespace.h>
 | |
| #include <net/net_namespace.h>
 | |
| #include <net/sock.h>
 | |
| #include <uapi/linux/sock_diag.h>
 | |
| 
 | |
| struct sk_buff;
 | |
| struct nlmsghdr;
 | |
| struct sock;
 | |
| 
 | |
| struct sock_diag_handler {
 | |
| 	struct module *owner;
 | |
| 	__u8 family;
 | |
| 	int (*dump)(struct sk_buff *skb, struct nlmsghdr *nlh);
 | |
| 	int (*get_info)(struct sk_buff *skb, struct sock *sk);
 | |
| 	int (*destroy)(struct sk_buff *skb, struct nlmsghdr *nlh);
 | |
| };
 | |
| 
 | |
| int sock_diag_register(const struct sock_diag_handler *h);
 | |
| void sock_diag_unregister(const struct sock_diag_handler *h);
 | |
| 
 | |
| struct sock_diag_inet_compat {
 | |
| 	struct module *owner;
 | |
| 	int (*fn)(struct sk_buff *skb, struct nlmsghdr *nlh);
 | |
| };
 | |
| 
 | |
| void sock_diag_register_inet_compat(const struct sock_diag_inet_compat *ptr);
 | |
| void sock_diag_unregister_inet_compat(const struct sock_diag_inet_compat *ptr);
 | |
| 
 | |
| u64 __sock_gen_cookie(struct sock *sk);
 | |
| 
 | |
| static inline u64 sock_gen_cookie(struct sock *sk)
 | |
| {
 | |
| 	u64 cookie;
 | |
| 
 | |
| 	preempt_disable();
 | |
| 	cookie = __sock_gen_cookie(sk);
 | |
| 	preempt_enable();
 | |
| 
 | |
| 	return cookie;
 | |
| }
 | |
| 
 | |
| int sock_diag_check_cookie(struct sock *sk, const __u32 *cookie);
 | |
| void sock_diag_save_cookie(struct sock *sk, __u32 *cookie);
 | |
| 
 | |
| int sock_diag_put_meminfo(struct sock *sk, struct sk_buff *skb, int attr);
 | |
| int sock_diag_put_filterinfo(bool may_report_filterinfo, struct sock *sk,
 | |
| 			     struct sk_buff *skb, int attrtype);
 | |
| 
 | |
| static inline
 | |
| enum sknetlink_groups sock_diag_destroy_group(const struct sock *sk)
 | |
| {
 | |
| 	switch (sk->sk_family) {
 | |
| 	case AF_INET:
 | |
| 		if (sk->sk_type == SOCK_RAW)
 | |
| 			return SKNLGRP_NONE;
 | |
| 
 | |
| 		switch (sk->sk_protocol) {
 | |
| 		case IPPROTO_TCP:
 | |
| 			return SKNLGRP_INET_TCP_DESTROY;
 | |
| 		case IPPROTO_UDP:
 | |
| 			return SKNLGRP_INET_UDP_DESTROY;
 | |
| 		default:
 | |
| 			return SKNLGRP_NONE;
 | |
| 		}
 | |
| 	case AF_INET6:
 | |
| 		if (sk->sk_type == SOCK_RAW)
 | |
| 			return SKNLGRP_NONE;
 | |
| 
 | |
| 		switch (sk->sk_protocol) {
 | |
| 		case IPPROTO_TCP:
 | |
| 			return SKNLGRP_INET6_TCP_DESTROY;
 | |
| 		case IPPROTO_UDP:
 | |
| 			return SKNLGRP_INET6_UDP_DESTROY;
 | |
| 		default:
 | |
| 			return SKNLGRP_NONE;
 | |
| 		}
 | |
| 	default:
 | |
| 		return SKNLGRP_NONE;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static inline
 | |
| bool sock_diag_has_destroy_listeners(const struct sock *sk)
 | |
| {
 | |
| 	const struct net *n = sock_net(sk);
 | |
| 	const enum sknetlink_groups group = sock_diag_destroy_group(sk);
 | |
| 
 | |
| 	return group != SKNLGRP_NONE && n->diag_nlsk &&
 | |
| 		netlink_has_listeners(n->diag_nlsk, group);
 | |
| }
 | |
| void sock_diag_broadcast_destroy(struct sock *sk);
 | |
| 
 | |
| int sock_diag_destroy(struct sock *sk, int err);
 | |
| #endif
 |