/* * Copyright 2017 Intel Deutschland GmbH * Copyright (C) 2018 Intel Corporation * * Backport functionality introduced in Linux 4.20. * Much of this is based on upstream lib/nlattr.c. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. */ #include #include #include #include #include #include #include static const struct genl_family *find_family_real_ops(const struct genl_ops **ops) { const struct genl_family *family; const struct genl_ops *tmp_ops = *ops; /* find the family ... */ while (tmp_ops->doit || tmp_ops->dumpit) tmp_ops++; family = (void *)tmp_ops->done; /* cast to suppress const warning */ *ops = (void *)(family->ops + (*ops - family->copy_ops)); return family; } #if LINUX_VERSION_IS_LESS(4,12,0) enum nlmsgerr_attrs { NLMSGERR_ATTR_UNUSED, NLMSGERR_ATTR_MSG, NLMSGERR_ATTR_OFFS, NLMSGERR_ATTR_COOKIE, __NLMSGERR_ATTR_MAX, NLMSGERR_ATTR_MAX = __NLMSGERR_ATTR_MAX - 1 }; #define NLM_F_CAPPED 0x100 /* request was capped */ #define NLM_F_ACK_TLVS 0x200 /* extended ACK TVLs were included */ static void extack_netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err, const struct netlink_ext_ack *extack) { struct sk_buff *skb; struct nlmsghdr *rep; struct nlmsgerr *errmsg; size_t payload = sizeof(*errmsg); size_t tlvlen = 0; unsigned int flags = 0; /* backports assumes everyone supports this - libnl does so it's true */ bool nlk_has_extack = true; /* Error messages get the original request appened, unless the user * requests to cap the error message, and get extra error data if * requested. * (ignored in backports) */ if (nlk_has_extack && extack && extack->_msg) tlvlen += nla_total_size(strlen(extack->_msg) + 1); if (err) { if (1) payload += nlmsg_len(nlh); else flags |= NLM_F_CAPPED; if (nlk_has_extack && extack && extack->bad_attr) tlvlen += nla_total_size(sizeof(u32)); } else { flags |= NLM_F_CAPPED; if (nlk_has_extack && extack && extack->cookie_len) tlvlen += nla_total_size(extack->cookie_len); } if (tlvlen) flags |= NLM_F_ACK_TLVS; skb = nlmsg_new(payload + tlvlen, GFP_KERNEL); if (!skb) { NETLINK_CB(in_skb).sk->sk_err = ENOBUFS; sk_error_report(NETLINK_CB(in_skb).sk); return; } rep = __nlmsg_put(skb, NETLINK_CB(in_skb).portid, nlh->nlmsg_seq, NLMSG_ERROR, payload, flags); errmsg = nlmsg_data(rep); errmsg->error = err; memcpy(&errmsg->msg, nlh, payload > sizeof(*errmsg) ? nlh->nlmsg_len : sizeof(*nlh)); if (nlk_has_extack && extack) { if (extack->_msg) { WARN_ON(nla_put_string(skb, NLMSGERR_ATTR_MSG, extack->_msg)); } if (err) { if (extack->bad_attr && !WARN_ON((u8 *)extack->bad_attr < in_skb->data || (u8 *)extack->bad_attr >= in_skb->data + in_skb->len)) WARN_ON(nla_put_u32(skb, NLMSGERR_ATTR_OFFS, (u8 *)extack->bad_attr - in_skb->data)); } else { if (extack->cookie_len) WARN_ON(nla_put(skb, NLMSGERR_ATTR_COOKIE, extack->cookie_len, extack->cookie)); } } nlmsg_end(skb, rep); netlink_unicast(in_skb->sk, skb, NETLINK_CB(in_skb).portid, MSG_DONTWAIT); } static int extack_doit(struct sk_buff *skb, struct genl_info *info) { int (*doit)(struct sk_buff *, struct genl_info *); int err; doit = genl_info_extack(info)->__bp_doit; /* signal from our pre_doit to not do anything */ if (!doit) return 0; err = doit(skb, info); if (err == -EINTR) return err; if (info->nlhdr->nlmsg_flags & NLM_F_ACK || err) extack_netlink_ack(skb, info->nlhdr, err, genl_info_extack(info)); /* suppress sending ACK from normal netlink code */ info->nlhdr->nlmsg_flags &= ~NLM_F_ACK; return 0; } #endif /* LINUX_VERSION_IS_LESS(4,12,0) */ static int backport_pre_doit(const struct genl_ops *ops, struct sk_buff *skb, struct genl_info *info) { const struct genl_family *family = find_family_real_ops(&ops); int err; #if LINUX_VERSION_IS_LESS(4,12,0) struct netlink_ext_ack *extack = kzalloc(sizeof(*extack), GFP_KERNEL); if (!extack) return -ENOMEM; __bp_genl_info_userhdr_set(info, extack); extack->__bp_doit = ops->doit; #else struct netlink_ext_ack *extack = info->extack; #endif if (ops->validate & GENL_DONT_VALIDATE_STRICT) err = nlmsg_validate_deprecated(info->nlhdr, GENL_HDRLEN + family->hdrsize, family->maxattr, family->policy, extack); else err = nlmsg_validate(info->nlhdr, GENL_HDRLEN + family->hdrsize, family->maxattr, family->policy, extack); if (!err && family->pre_doit) err = family->pre_doit(ops, skb, info); #if LINUX_VERSION_IS_LESS(4,12,0) if (err) { /* signal to do nothing */ extack->__bp_doit = NULL; extack_netlink_ack(skb, info->nlhdr, err, extack); /* suppress sending ACK from normal netlink code */ info->nlhdr->nlmsg_flags &= ~NLM_F_ACK; /* extack will be freed in post_doit as usual */ return 0; } #endif return err; } static void backport_post_doit(const struct genl_ops *ops, struct sk_buff *skb, struct genl_info *info) { const struct genl_family *family = find_family_real_ops(&ops); #if LINUX_VERSION_IS_LESS(4,12,0) if (genl_info_extack(info)->__bp_doit) #else if (1) #endif if (family->post_doit) family->post_doit(ops, skb, info); #if LINUX_VERSION_IS_LESS(4,12,0) kfree(__bp_genl_info_userhdr(info)); #endif } int backport_genl_register_family(struct genl_family *family) { struct genl_ops *ops; int err, i; #define COPY(memb) family->family.memb = family->memb #define BACK(memb) family->memb = family->family.memb /* we append one entry to the ops to find our family pointer ... */ ops = kzalloc(sizeof(*ops) * (family->n_ops + 1), GFP_KERNEL); if (!ops) return -ENOMEM; memcpy(ops, family->ops, sizeof(*ops) * family->n_ops); /* * Remove policy to skip validation as the struct nla_policy * memory layout isn't compatible with the old version */ for (i = 0; i < family->n_ops; i++) { #if LINUX_VERSION_IS_LESS(4,12,0) if (ops[i].doit) ops[i].doit = extack_doit; #endif /* * TODO: add dumpit redirect (like extack_doit) that will * make this code honor !GENL_DONT_VALIDATE_DUMP and * actually validate in this case ... */ } /* keep doit/dumpit NULL - that's invalid */ ops[family->n_ops].done = (void *)family; COPY(id); memcpy(family->family.name, family->name, sizeof(family->name)); COPY(hdrsize); COPY(version); COPY(maxattr); COPY(netnsok); COPY(parallel_ops); /* The casts are OK - we checked everything is the same offset in genl_ops */ family->family.pre_doit = (void *)backport_pre_doit; family->family.post_doit = (void *)backport_post_doit; /* attrbuf is output only */ family->copy_ops = (void *)ops; family->family.ops = (void *)ops; COPY(mcgrps); COPY(n_ops); COPY(n_mcgrps); COPY(module); err = __real_backport_genl_register_family(&family->family); BACK(id); BACK(attrbuf); if (err) return err; return 0; } EXPORT_SYMBOL_GPL(backport_genl_register_family); int backport_genl_unregister_family(struct genl_family *family) { return __real_backport_genl_unregister_family(&family->family); } EXPORT_SYMBOL_GPL(backport_genl_unregister_family); #define INVALID_GROUP 0xffffffff static u32 __backport_genl_group(const struct genl_family *family, u32 group) { if (WARN_ON_ONCE(group >= family->n_mcgrps)) return INVALID_GROUP; return family->family.mcgrp_offset + group; } void genl_notify(const struct genl_family *family, struct sk_buff *skb, struct genl_info *info, u32 group, gfp_t flags) { struct net *net = genl_info_net(info); struct sock *sk = net->genl_sock; int report = 0; if (info->nlhdr) report = nlmsg_report(info->nlhdr); group = __backport_genl_group(family, group); if (group == INVALID_GROUP) return; nlmsg_notify(sk, skb, info->snd_portid, group, report, flags); } EXPORT_SYMBOL_GPL(genl_notify); void *genlmsg_put(struct sk_buff *skb, u32 portid, u32 seq, const struct genl_family *family, int flags, u8 cmd) { struct nlmsghdr *nlh; struct genlmsghdr *hdr; nlh = nlmsg_put(skb, portid, seq, family->id, GENL_HDRLEN + family->hdrsize, flags); if (nlh == NULL) return NULL; hdr = nlmsg_data(nlh); hdr->cmd = cmd; hdr->version = family->version; hdr->reserved = 0; return (char *) hdr + GENL_HDRLEN; } EXPORT_SYMBOL_GPL(genlmsg_put); void *genlmsg_put_reply(struct sk_buff *skb, struct genl_info *info, const struct genl_family *family, int flags, u8 cmd) { return genlmsg_put(skb, info->snd_portid, info->snd_seq, family, flags, cmd); } EXPORT_SYMBOL_GPL(genlmsg_put_reply); int genlmsg_multicast_netns(const struct genl_family *family, struct net *net, struct sk_buff *skb, u32 portid, unsigned int group, gfp_t flags) { group = __backport_genl_group(family, group); if (group == INVALID_GROUP) return -EINVAL; return nlmsg_multicast(net->genl_sock, skb, portid, group, flags); } EXPORT_SYMBOL_GPL(genlmsg_multicast_netns); int genlmsg_multicast(const struct genl_family *family, struct sk_buff *skb, u32 portid, unsigned int group, gfp_t flags) { return genlmsg_multicast_netns(family, &init_net, skb, portid, group, flags); } EXPORT_SYMBOL_GPL(genlmsg_multicast); static int genlmsg_mcast(struct sk_buff *skb, u32 portid, unsigned long group, gfp_t flags) { struct sk_buff *tmp; struct net *net, *prev = NULL; bool delivered = false; int err; for_each_net_rcu(net) { if (prev) { tmp = skb_clone(skb, flags); if (!tmp) { err = -ENOMEM; goto error; } err = nlmsg_multicast(prev->genl_sock, tmp, portid, group, flags); if (!err) delivered = true; else if (err != -ESRCH) goto error; } prev = net; } err = nlmsg_multicast(prev->genl_sock, skb, portid, group, flags); if (!err) delivered = true; else if (err != -ESRCH) return err; return delivered ? 0 : -ESRCH; error: kfree_skb(skb); return err; } int backport_genlmsg_multicast_allns(const struct genl_family *family, struct sk_buff *skb, u32 portid, unsigned int group, gfp_t flags) { group = __backport_genl_group(family, group); if (group == INVALID_GROUP) return -EINVAL; return genlmsg_mcast(skb, portid, group, flags); } EXPORT_SYMBOL_GPL(backport_genlmsg_multicast_allns);