2011-12-06 15:58:03 +08:00
|
|
|
#ifndef __SOCK_DIAG_H__
|
|
|
|
#define __SOCK_DIAG_H__
|
2011-12-15 10:42:42 +08:00
|
|
|
|
2015-06-15 23:26:18 +08:00
|
|
|
#include <linux/netlink.h>
|
2013-04-25 14:53:54 +08:00
|
|
|
#include <linux/user_namespace.h>
|
2015-06-15 23:26:18 +08:00
|
|
|
#include <net/net_namespace.h>
|
|
|
|
#include <net/sock.h>
|
2012-10-13 17:46:48 +08:00
|
|
|
#include <uapi/linux/sock_diag.h>
|
2011-12-15 10:42:42 +08:00
|
|
|
|
2011-12-30 08:52:21 +08:00
|
|
|
struct sk_buff;
|
|
|
|
struct nlmsghdr;
|
2011-12-30 08:53:13 +08:00
|
|
|
struct sock;
|
2011-12-30 08:52:21 +08:00
|
|
|
|
2011-12-06 15:58:03 +08:00
|
|
|
struct sock_diag_handler {
|
|
|
|
__u8 family;
|
|
|
|
int (*dump)(struct sk_buff *skb, struct nlmsghdr *nlh);
|
2015-06-15 23:26:18 +08:00
|
|
|
int (*get_info)(struct sk_buff *skb, struct sock *sk);
|
2011-12-06 15:58:03 +08:00
|
|
|
};
|
|
|
|
|
2012-04-25 02:21:07 +08:00
|
|
|
int sock_diag_register(const struct sock_diag_handler *h);
|
|
|
|
void sock_diag_unregister(const struct sock_diag_handler *h);
|
2011-12-06 15:58:03 +08:00
|
|
|
|
|
|
|
void sock_diag_register_inet_compat(int (*fn)(struct sk_buff *skb, struct nlmsghdr *nlh));
|
|
|
|
void sock_diag_unregister_inet_compat(int (*fn)(struct sk_buff *skb, struct nlmsghdr *nlh));
|
|
|
|
|
2015-03-12 09:53:14 +08:00
|
|
|
int sock_diag_check_cookie(struct sock *sk, const __u32 *cookie);
|
|
|
|
void sock_diag_save_cookie(struct sock *sk, __u32 *cookie);
|
2011-12-15 10:43:44 +08:00
|
|
|
|
2011-12-30 08:53:13 +08:00
|
|
|
int sock_diag_put_meminfo(struct sock *sk, struct sk_buff *skb, int attr);
|
2014-04-24 05:26:25 +08:00
|
|
|
int sock_diag_put_filterinfo(bool may_report_filterinfo, struct sock *sk,
|
2013-04-25 14:53:54 +08:00
|
|
|
struct sk_buff *skb, int attrtype);
|
2011-12-30 08:53:13 +08:00
|
|
|
|
2015-06-15 23:26:18 +08:00
|
|
|
static inline
|
|
|
|
enum sknetlink_groups sock_diag_destroy_group(const struct sock *sk)
|
|
|
|
{
|
|
|
|
switch (sk->sk_family) {
|
|
|
|
case AF_INET:
|
|
|
|
switch (sk->sk_protocol) {
|
|
|
|
case IPPROTO_TCP:
|
|
|
|
return SKNLGRP_INET_TCP_DESTROY;
|
|
|
|
case IPPROTO_UDP:
|
|
|
|
return SKNLGRP_INET_UDP_DESTROY;
|
|
|
|
default:
|
|
|
|
return SKNLGRP_NONE;
|
|
|
|
}
|
|
|
|
case AF_INET6:
|
|
|
|
switch (sk->sk_protocol) {
|
|
|
|
case IPPROTO_TCP:
|
|
|
|
return SKNLGRP_INET6_TCP_DESTROY;
|
|
|
|
case IPPROTO_UDP:
|
|
|
|
return SKNLGRP_INET6_UDP_DESTROY;
|
|
|
|
default:
|
|
|
|
return SKNLGRP_NONE;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return SKNLGRP_NONE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline
|
|
|
|
bool sock_diag_has_destroy_listeners(const struct sock *sk)
|
|
|
|
{
|
|
|
|
const struct net *n = sock_net(sk);
|
|
|
|
const enum sknetlink_groups group = sock_diag_destroy_group(sk);
|
|
|
|
|
|
|
|
return group != SKNLGRP_NONE && n->diag_nlsk &&
|
|
|
|
netlink_has_listeners(n->diag_nlsk, group);
|
|
|
|
}
|
|
|
|
void sock_diag_broadcast_destroy(struct sock *sk);
|
|
|
|
|
2011-12-06 15:58:03 +08:00
|
|
|
#endif
|