blob: aa2831587b821d1c3afb65d59f96d0eb739a9377 [file] [log] [blame]
Harald Weltef6ebe772005-08-09 20:21:49 -07001#include <linux/kernel.h>
2#include <linux/init.h>
3#include <linux/module.h>
4#include <linux/skbuff.h>
5#include <linux/netfilter.h>
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -08006#include <linux/mutex.h>
Harald Weltef6ebe772005-08-09 20:21:49 -07007#include <net/sock.h>
8
9#include "nf_internals.h"
10
11/* Sockopts only registered and called from user context, so
12 net locking would be overkill. Also, [gs]etsockopt calls may
13 sleep. */
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -080014static DEFINE_MUTEX(nf_sockopt_mutex);
Harald Weltef6ebe772005-08-09 20:21:49 -070015static LIST_HEAD(nf_sockopts);
16
17/* Do exclusive ranges overlap? */
18static inline int overlap(int min1, int max1, int min2, int max2)
19{
20 return max1 > min2 && min1 < max2;
21}
22
23/* Functions to register sockopt ranges (exclusive). */
24int nf_register_sockopt(struct nf_sockopt_ops *reg)
25{
26 struct list_head *i;
27 int ret = 0;
28
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -080029 if (mutex_lock_interruptible(&nf_sockopt_mutex) != 0)
Harald Weltef6ebe772005-08-09 20:21:49 -070030 return -EINTR;
31
32 list_for_each(i, &nf_sockopts) {
33 struct nf_sockopt_ops *ops = (struct nf_sockopt_ops *)i;
34 if (ops->pf == reg->pf
YOSHIFUJI Hideaki601e68e2007-02-12 11:15:49 -080035 && (overlap(ops->set_optmin, ops->set_optmax,
Harald Weltef6ebe772005-08-09 20:21:49 -070036 reg->set_optmin, reg->set_optmax)
YOSHIFUJI Hideaki601e68e2007-02-12 11:15:49 -080037 || overlap(ops->get_optmin, ops->get_optmax,
Harald Weltef6ebe772005-08-09 20:21:49 -070038 reg->get_optmin, reg->get_optmax))) {
39 NFDEBUG("nf_sock overlap: %u-%u/%u-%u v %u-%u/%u-%u\n",
YOSHIFUJI Hideaki601e68e2007-02-12 11:15:49 -080040 ops->set_optmin, ops->set_optmax,
41 ops->get_optmin, ops->get_optmax,
Harald Weltef6ebe772005-08-09 20:21:49 -070042 reg->set_optmin, reg->set_optmax,
43 reg->get_optmin, reg->get_optmax);
44 ret = -EBUSY;
45 goto out;
46 }
47 }
48
49 list_add(&reg->list, &nf_sockopts);
50out:
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -080051 mutex_unlock(&nf_sockopt_mutex);
Harald Weltef6ebe772005-08-09 20:21:49 -070052 return ret;
53}
54EXPORT_SYMBOL(nf_register_sockopt);
55
56void nf_unregister_sockopt(struct nf_sockopt_ops *reg)
57{
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -080058 mutex_lock(&nf_sockopt_mutex);
Harald Weltef6ebe772005-08-09 20:21:49 -070059 list_del(&reg->list);
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -080060 mutex_unlock(&nf_sockopt_mutex);
Harald Weltef6ebe772005-08-09 20:21:49 -070061}
62EXPORT_SYMBOL(nf_unregister_sockopt);
63
64/* Call get/setsockopt() */
YOSHIFUJI Hideaki601e68e2007-02-12 11:15:49 -080065static int nf_sockopt(struct sock *sk, int pf, int val,
Harald Weltef6ebe772005-08-09 20:21:49 -070066 char __user *opt, int *len, int get)
67{
68 struct list_head *i;
69 struct nf_sockopt_ops *ops;
70 int ret;
71
Eric W. Biedermanc48dad72007-09-12 13:58:02 +020072 if (sk->sk_net != &init_net)
73 return -ENOPROTOOPT;
74
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -080075 if (mutex_lock_interruptible(&nf_sockopt_mutex) != 0)
Harald Weltef6ebe772005-08-09 20:21:49 -070076 return -EINTR;
77
78 list_for_each(i, &nf_sockopts) {
79 ops = (struct nf_sockopt_ops *)i;
80 if (ops->pf == pf) {
Neil Horman16fcec32007-09-11 11:28:26 +020081 if (!try_module_get(ops->owner))
82 goto out_nosup;
Harald Weltef6ebe772005-08-09 20:21:49 -070083 if (get) {
84 if (val >= ops->get_optmin
85 && val < ops->get_optmax) {
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -080086 mutex_unlock(&nf_sockopt_mutex);
Harald Weltef6ebe772005-08-09 20:21:49 -070087 ret = ops->get(sk, val, opt, len);
88 goto out;
89 }
90 } else {
91 if (val >= ops->set_optmin
92 && val < ops->set_optmax) {
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -080093 mutex_unlock(&nf_sockopt_mutex);
Harald Weltef6ebe772005-08-09 20:21:49 -070094 ret = ops->set(sk, val, opt, *len);
95 goto out;
96 }
97 }
Neil Horman16fcec32007-09-11 11:28:26 +020098 module_put(ops->owner);
Harald Weltef6ebe772005-08-09 20:21:49 -070099 }
100 }
Neil Horman16fcec32007-09-11 11:28:26 +0200101 out_nosup:
Arjan van de Ven4a3e2f72006-03-20 22:33:17 -0800102 mutex_unlock(&nf_sockopt_mutex);
Harald Weltef6ebe772005-08-09 20:21:49 -0700103 return -ENOPROTOOPT;
YOSHIFUJI Hideaki601e68e2007-02-12 11:15:49 -0800104
Harald Weltef6ebe772005-08-09 20:21:49 -0700105 out:
Neil Horman16fcec32007-09-11 11:28:26 +0200106 module_put(ops->owner);
Harald Weltef6ebe772005-08-09 20:21:49 -0700107 return ret;
108}
109
110int nf_setsockopt(struct sock *sk, int pf, int val, char __user *opt,
111 int len)
112{
113 return nf_sockopt(sk, pf, val, opt, &len, 0);
114}
115EXPORT_SYMBOL(nf_setsockopt);
116
117int nf_getsockopt(struct sock *sk, int pf, int val, char __user *opt, int *len)
118{
119 return nf_sockopt(sk, pf, val, opt, len, 1);
120}
121EXPORT_SYMBOL(nf_getsockopt);
122
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800123#ifdef CONFIG_COMPAT
124static int compat_nf_sockopt(struct sock *sk, int pf, int val,
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -0800125 char __user *opt, int *len, int get)
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800126{
127 struct list_head *i;
128 struct nf_sockopt_ops *ops;
129 int ret;
130
Eric W. Biedermanc48dad72007-09-12 13:58:02 +0200131 if (sk->sk_net != &init_net)
132 return -ENOPROTOOPT;
133
134
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800135 if (mutex_lock_interruptible(&nf_sockopt_mutex) != 0)
136 return -EINTR;
137
138 list_for_each(i, &nf_sockopts) {
139 ops = (struct nf_sockopt_ops *)i;
140 if (ops->pf == pf) {
Neil Horman16fcec32007-09-11 11:28:26 +0200141 if (!try_module_get(ops->owner))
142 goto out_nosup;
143
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800144 if (get) {
145 if (val >= ops->get_optmin
146 && val < ops->get_optmax) {
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800147 mutex_unlock(&nf_sockopt_mutex);
148 if (ops->compat_get)
149 ret = ops->compat_get(sk,
150 val, opt, len);
151 else
152 ret = ops->get(sk,
153 val, opt, len);
154 goto out;
155 }
156 } else {
157 if (val >= ops->set_optmin
158 && val < ops->set_optmax) {
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800159 mutex_unlock(&nf_sockopt_mutex);
160 if (ops->compat_set)
161 ret = ops->compat_set(sk,
162 val, opt, *len);
163 else
164 ret = ops->set(sk,
165 val, opt, *len);
166 goto out;
167 }
168 }
Neil Horman16fcec32007-09-11 11:28:26 +0200169 module_put(ops->owner);
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800170 }
171 }
Neil Horman16fcec32007-09-11 11:28:26 +0200172 out_nosup:
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800173 mutex_unlock(&nf_sockopt_mutex);
174 return -ENOPROTOOPT;
175
176 out:
Neil Horman16fcec32007-09-11 11:28:26 +0200177 module_put(ops->owner);
Dmitry Mishin3fdadf72006-03-20 22:45:21 -0800178 return ret;
179}
180
181int compat_nf_setsockopt(struct sock *sk, int pf,
182 int val, char __user *opt, int len)
183{
184 return compat_nf_sockopt(sk, pf, val, opt, &len, 0);
185}
186EXPORT_SYMBOL(compat_nf_setsockopt);
187
188int compat_nf_getsockopt(struct sock *sk, int pf,
189 int val, char __user *opt, int *len)
190{
191 return compat_nf_sockopt(sk, pf, val, opt, len, 1);
192}
193EXPORT_SYMBOL(compat_nf_getsockopt);
194#endif