Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp723185pxa; Fri, 21 Aug 2020 20:30:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxo0KOq8hAQ05vEK0XN3zXWVumkdwIBFvgpdxlJyuTqTCdF3K8Di5cZLG1E1Z/D7/Z2ZGq8 X-Received: by 2002:aa7:d688:: with SMTP id d8mr5925114edr.168.1598067036387; Fri, 21 Aug 2020 20:30:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598067036; cv=none; d=google.com; s=arc-20160816; b=sJ+1hhhyoyj6cbYDvZV1rPFRqMlVSeqX0gEZI1urw485GKDpkWhQV5tU6+A8GoCbQS N0wJYAbO86f6AfJ1U1OTTqC0WGm5rOvf66QC5cVj37MUBQ/Mu3DIIiAOCc7zG4XEsXSg tN58/IXpFvfhqTrasG/rBOTx/cJLxqH+DZ28lLWf4tF+3aBMEYw9PvrXkgbrCdFhodBp flwxL57DjISJVia74Cgn4QgpKjpcjLZGSXmxhsch2Cj0g54mNMemlDR1/VygB34S2P/e HMrAXGfuovcHXIcieTgeoEqNTPg0gE5z13WzrCF9M+XbGiEEuBnWUu1OXxnHuvrWekyS 4S/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Srj8tbi8H7OGKkWCBcz0qRrEm5Yx5d3t2AQ3ak3evYA=; b=ddAN2Oh6gW2yXKvbNmenAue7rEnDKqLGyzdRnS1HaCS8rR+hmDyecOg8RE8ckKUvHv +M+fco4C+sc3hgcvpoSJBpplGpC53rOPBK5UZ96cbQS0XaaKeZlgymlEjqUMirivHclB LqvWdR9cQ12F6L9udM0HawDhO7rd2rYT7O7fYYU7UWykv6HmBoxyd669vLK1Wfj7RExl rhRGMYBPp+i8xvMzU9PUlOia+yN43I4MRfmR+RihrRdTrAj6D0f1+argvzleaVCSc9XA hpcsmdAOpHkoexVIjx7AwSNOcCZ4/kWWEpphY1sKdO8ur08TLIh2u25UzOYtfaE7fiGn q+uQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@tfz-net.20150623.gappssmtp.com header.s=20150623 header.b=2Lyb0jq0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l26si2413129eje.138.2020.08.21.20.30.12; Fri, 21 Aug 2020 20:30:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@tfz-net.20150623.gappssmtp.com header.s=20150623 header.b=2Lyb0jq0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727008AbgHVD3F (ORCPT + 99 others); Fri, 21 Aug 2020 23:29:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51728 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726995AbgHVD3A (ORCPT ); Fri, 21 Aug 2020 23:29:00 -0400 Received: from mail-ot1-x342.google.com (mail-ot1-x342.google.com [IPv6:2607:f8b0:4864:20::342]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BE2B9C061575 for ; Fri, 21 Aug 2020 20:29:00 -0700 (PDT) Received: by mail-ot1-x342.google.com with SMTP id x24so3179667otp.3 for ; Fri, 21 Aug 2020 20:29:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tfz-net.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Srj8tbi8H7OGKkWCBcz0qRrEm5Yx5d3t2AQ3ak3evYA=; b=2Lyb0jq0EUHVSngH1Jgs57MFEUXCjkTyCZYmA/Mq6Q5PzJG3k3zwIne2Bn1Fm3Wg8z QWB7Yjbam3SATZe09HufLiwfkWWwn+GOQLQ/nckR+fYiQEChFSaePUakWajxvxDvFLAW TNVCDXKEJrkNfeyFutBtcwtY/wbGHfmWGMXxQxpfal+ML9yd6kU3f5y7vH6ZW8QW9HZ5 l7tscZ9+IlWgoDULVAK1d3GX56PVxKBPpxlu3yhmjEqp71Xm9FMf7tvTEQA+i8eqiZr9 t5l+TACvzlxb8l39Ndm9X4V9qI+XIpgRLPVj0o2OY3FEAvYJzJ/cLV5v21h1XxFvqpYh C6fA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Srj8tbi8H7OGKkWCBcz0qRrEm5Yx5d3t2AQ3ak3evYA=; b=rcdw6t7aX61u3QZwtjfBC4NN3yrRZyJBHoXczojwbhtmFk+UUgtpztNf6TM/B25I28 gNducvTAvQUhEoZksN6fS3RMdCjaUIjaM1bzf51ciITrTdz/hO+73eui9MNzj5vmJRB9 eRAqv6DvmqrzVIaNaT0CQ88RZogbOUMb0yhzBUkSumvDC+4dh+xWaL4YhZKGo6bvlzlT mVbGnIOSY9P08wZTKS+TPYQCb7WeEnDXsewKJrr6Z1bWDHDvlq5/Bs3wvzq76Qj1j2QY UBVt5N2ma1IKYhVvBUIbTz35eE0HzBSwfJrwMuUIDF5ZYSbirG8NhxSTedIliKu6FVO5 BHPw== X-Gm-Message-State: AOAM532DooPhxt3wSzv1MVgo1bIKqcTiVlzjVTA4aqkepzdcIbqRggjS 5PSipAhWQ/m4+mTBcueayFgEXYy9fhPLZnCerok= X-Received: by 2002:a05:6830:1e15:: with SMTP id s21mr4241022otr.204.1598066939731; Fri, 21 Aug 2020 20:28:59 -0700 (PDT) Received: from foo.attlocal.net (108-232-117-128.lightspeed.sntcca.sbcglobal.net. [108.232.117.128]) by smtp.gmail.com with ESMTPSA id o3sm829431oom.26.2020.08.21.20.28.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 21 Aug 2020 20:28:59 -0700 (PDT) From: Pascal Bouchareine To: linux-kernel@vger.kernel.org Cc: Pascal Bouchareine , linux-api@vger.kernel.org, netdev@vger.kernel.org, "David S. Miller" , "Jakub Kicinski" , "Andrew Morton" , "Alexey Dobriyan" , "Al Viro" Subject: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION Date: Fri, 21 Aug 2020 20:28:27 -0700 Message-Id: <20200822032827.6386-2-kalou@tfz.net> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200822032827.6386-1-kalou@tfz.net> References: <20200815182344.7469-1-kalou@tfz.net> <20200822032827.6386-1-kalou@tfz.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This command attaches the zero terminated string in optval to the socket for troubleshooting purposes. The free string is displayed in the process fdinfo file for that fd (/proc//fdinfo/). One intended usage is to allow processes to self-document sockets for netstat and friends to report We ignore optlen and constrain the string to a static max size Signed-off-by: Pascal Bouchareine --- include/net/sock.h | 4 +++ include/uapi/asm-generic/socket.h | 2 ++ net/core/sock.c | 53 +++++++++++++++++++++++++++++++ net/socket.c | 5 +++ 4 files changed, 64 insertions(+) diff --git a/include/net/sock.h b/include/net/sock.h index 1183507df95b..6b4fd1383282 100644 --- a/include/net/sock.h +++ b/include/net/sock.h @@ -342,6 +342,7 @@ struct bpf_sk_storage; * @sk_txtime_deadline_mode: set deadline mode for SO_TXTIME * @sk_txtime_report_errors: set report errors mode for SO_TXTIME * @sk_txtime_unused: unused txtime flags + * @sk_description: user supplied with SO_DESCRIPTION */ struct sock { /* @@ -519,6 +520,9 @@ struct sock { struct bpf_sk_storage __rcu *sk_bpf_storage; #endif struct rcu_head sk_rcu; + +#define SK_MAX_DESC_SIZE 256 + char *sk_description; }; enum sk_pacing { diff --git a/include/uapi/asm-generic/socket.h b/include/uapi/asm-generic/socket.h index 77f7c1638eb1..fb51c4bb7a12 100644 --- a/include/uapi/asm-generic/socket.h +++ b/include/uapi/asm-generic/socket.h @@ -119,6 +119,8 @@ #define SO_DETACH_REUSEPORT_BPF 68 +#define SO_DESCRIPTION 69 + #if !defined(__KERNEL__) #if __BITS_PER_LONG == 64 || (defined(__x86_64__) && defined(__ILP32__)) diff --git a/net/core/sock.c b/net/core/sock.c index 2e5b7870e5d3..b8bad57338d8 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -828,6 +828,49 @@ void sock_set_rcvbuf(struct sock *sk, int val) } EXPORT_SYMBOL(sock_set_rcvbuf); +static int sock_set_description(struct sock *sk, char __user *user_desc) +{ + char *old, *desc; + + desc = strndup_user(user_desc, SK_MAX_DESC_SIZE, GFP_KERNEL_ACCOUNT); + if (IS_ERR(desc)) + return PTR_ERR(desc); + + lock_sock(sk); + old = sk->sk_description; + sk->sk_description = desc; + release_sock(sk); + + kfree(old); + + return 0; +} + +static int sock_get_description(struct sock *sk, char __user *optval, + int __user *optlen, int len) +{ + char desc[SK_MAX_DESC_SIZE]; + + lock_sock(sk); + if (sk->sk_description) { + /* strndup_user: len(desc + nul) <= SK_MAX_DESC_SIZE */ + len = min_t(unsigned int, len, + strlen(sk->sk_description) + 1); + memcpy(desc, sk->sk_description, len); + } else { + len = 0; + } + release_sock(sk); + + if (copy_to_user(optval, desc, len)) + return -EFAULT; + + if (put_user(len, optlen)) + return -EFAULT; + + return 0; +} + /* * This is meant for all protocols to use and covers goings on * at the socket level. Everything here is generic. @@ -850,6 +893,9 @@ int sock_setsockopt(struct socket *sock, int level, int optname, if (optname == SO_BINDTODEVICE) return sock_setbindtodevice(sk, optval, optlen); + if (optname == SO_DESCRIPTION) + return sock_set_description(sk, optval); + if (optlen < sizeof(int)) return -EINVAL; @@ -1614,6 +1660,9 @@ int sock_getsockopt(struct socket *sock, int level, int optname, v.val = sk->sk_bound_dev_if; break; + case SO_DESCRIPTION: + return sock_get_description(sk, optval, optlen, len); + default: /* We implement the SO_SNDLOWAT etc to not be settable * (1003.1g 7). @@ -1792,6 +1841,8 @@ static void __sk_destruct(struct rcu_head *head) RCU_INIT_POINTER(sk->sk_filter, NULL); } + kfree(sk->sk_description); + sock_disable_timestamp(sk, SK_FLAGS_TIMESTAMP); #ifdef CONFIG_BPF_SYSCALL @@ -1964,6 +2015,8 @@ struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority) if (sk_user_data_is_nocopy(newsk)) newsk->sk_user_data = NULL; + newsk->sk_description = NULL; + newsk->sk_err = 0; newsk->sk_err_soft = 0; newsk->sk_priority = 0; diff --git a/net/socket.c b/net/socket.c index 976426d03f09..4f2c1a7744b0 100644 --- a/net/socket.c +++ b/net/socket.c @@ -134,6 +134,11 @@ static void sock_show_fdinfo(struct seq_file *m, struct file *f) { struct socket *sock = f->private_data; + lock_sock(sock->sk); + if (sock->sk->sk_description) + seq_printf(m, "desc:\t%s\n", sock->sk->sk_description); + release_sock(sock->sk); + if (sock->ops->show_fdinfo) sock->ops->show_fdinfo(m, sock); } -- 2.25.1