Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 1 | /* SCTP kernel implementation |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2 | * Copyright (c) 2003 International Business Machines, Corp. |
| 3 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 4 | * This file is part of the SCTP kernel implementation |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 5 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 6 | * This SCTP implementation is free software; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 7 | * you can redistribute it and/or modify it under the terms of |
| 8 | * the GNU General Public License as published by |
| 9 | * the Free Software Foundation; either version 2, or (at your option) |
| 10 | * any later version. |
| 11 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 12 | * This SCTP implementation is distributed in the hope that it |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 13 | * will be useful, but WITHOUT ANY WARRANTY; without even the implied |
| 14 | * ************************ |
| 15 | * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
| 16 | * See the GNU General Public License for more details. |
| 17 | * |
| 18 | * You should have received a copy of the GNU General Public License |
| 19 | * along with GNU CC; see the file COPYING. If not, write to |
| 20 | * the Free Software Foundation, 59 Temple Place - Suite 330, |
| 21 | * Boston, MA 02111-1307, USA. |
| 22 | * |
| 23 | * Please send any bug reports or fixes you make to the |
| 24 | * email address(es): |
| 25 | * lksctp developers <lksctp-developers@lists.sourceforge.net> |
| 26 | * |
| 27 | * Or submit a bug report through the following website: |
| 28 | * http://www.sf.net/projects/lksctp |
| 29 | * |
| 30 | * Written or modified by: |
| 31 | * Sridhar Samudrala <sri@us.ibm.com> |
| 32 | * |
| 33 | * Any bugs reported given to us we will try to fix... any fixes shared will |
| 34 | * be incorporated into the next SCTP release. |
| 35 | */ |
| 36 | |
| 37 | #include <linux/types.h> |
| 38 | #include <linux/seq_file.h> |
| 39 | #include <linux/init.h> |
Paul Gortmaker | bc3b2d7 | 2011-07-15 11:47:34 -0400 | [diff] [blame] | 40 | #include <linux/export.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 41 | #include <net/sctp/sctp.h> |
Pavel Emelyanov | 3f5340a | 2008-02-09 23:23:44 -0800 | [diff] [blame] | 42 | #include <net/ip.h> /* for snmp_fold_field */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 43 | |
Alexey Dobriyan | 5833929 | 2010-01-22 10:17:26 +0000 | [diff] [blame] | 44 | static const struct snmp_mib sctp_snmp_list[] = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 45 | SNMP_MIB_ITEM("SctpCurrEstab", SCTP_MIB_CURRESTAB), |
| 46 | SNMP_MIB_ITEM("SctpActiveEstabs", SCTP_MIB_ACTIVEESTABS), |
| 47 | SNMP_MIB_ITEM("SctpPassiveEstabs", SCTP_MIB_PASSIVEESTABS), |
| 48 | SNMP_MIB_ITEM("SctpAborteds", SCTP_MIB_ABORTEDS), |
| 49 | SNMP_MIB_ITEM("SctpShutdowns", SCTP_MIB_SHUTDOWNS), |
| 50 | SNMP_MIB_ITEM("SctpOutOfBlues", SCTP_MIB_OUTOFBLUES), |
| 51 | SNMP_MIB_ITEM("SctpChecksumErrors", SCTP_MIB_CHECKSUMERRORS), |
| 52 | SNMP_MIB_ITEM("SctpOutCtrlChunks", SCTP_MIB_OUTCTRLCHUNKS), |
| 53 | SNMP_MIB_ITEM("SctpOutOrderChunks", SCTP_MIB_OUTORDERCHUNKS), |
| 54 | SNMP_MIB_ITEM("SctpOutUnorderChunks", SCTP_MIB_OUTUNORDERCHUNKS), |
| 55 | SNMP_MIB_ITEM("SctpInCtrlChunks", SCTP_MIB_INCTRLCHUNKS), |
| 56 | SNMP_MIB_ITEM("SctpInOrderChunks", SCTP_MIB_INORDERCHUNKS), |
| 57 | SNMP_MIB_ITEM("SctpInUnorderChunks", SCTP_MIB_INUNORDERCHUNKS), |
| 58 | SNMP_MIB_ITEM("SctpFragUsrMsgs", SCTP_MIB_FRAGUSRMSGS), |
| 59 | SNMP_MIB_ITEM("SctpReasmUsrMsgs", SCTP_MIB_REASMUSRMSGS), |
| 60 | SNMP_MIB_ITEM("SctpOutSCTPPacks", SCTP_MIB_OUTSCTPPACKS), |
| 61 | SNMP_MIB_ITEM("SctpInSCTPPacks", SCTP_MIB_INSCTPPACKS), |
Sridhar Samudrala | ac0b046 | 2006-08-22 00:15:33 -0700 | [diff] [blame] | 62 | SNMP_MIB_ITEM("SctpT1InitExpireds", SCTP_MIB_T1_INIT_EXPIREDS), |
| 63 | SNMP_MIB_ITEM("SctpT1CookieExpireds", SCTP_MIB_T1_COOKIE_EXPIREDS), |
| 64 | SNMP_MIB_ITEM("SctpT2ShutdownExpireds", SCTP_MIB_T2_SHUTDOWN_EXPIREDS), |
| 65 | SNMP_MIB_ITEM("SctpT3RtxExpireds", SCTP_MIB_T3_RTX_EXPIREDS), |
| 66 | SNMP_MIB_ITEM("SctpT4RtoExpireds", SCTP_MIB_T4_RTO_EXPIREDS), |
| 67 | SNMP_MIB_ITEM("SctpT5ShutdownGuardExpireds", SCTP_MIB_T5_SHUTDOWN_GUARD_EXPIREDS), |
| 68 | SNMP_MIB_ITEM("SctpDelaySackExpireds", SCTP_MIB_DELAY_SACK_EXPIREDS), |
| 69 | SNMP_MIB_ITEM("SctpAutocloseExpireds", SCTP_MIB_AUTOCLOSE_EXPIREDS), |
| 70 | SNMP_MIB_ITEM("SctpT3Retransmits", SCTP_MIB_T3_RETRANSMITS), |
| 71 | SNMP_MIB_ITEM("SctpPmtudRetransmits", SCTP_MIB_PMTUD_RETRANSMITS), |
| 72 | SNMP_MIB_ITEM("SctpFastRetransmits", SCTP_MIB_FAST_RETRANSMITS), |
| 73 | SNMP_MIB_ITEM("SctpInPktSoftirq", SCTP_MIB_IN_PKT_SOFTIRQ), |
| 74 | SNMP_MIB_ITEM("SctpInPktBacklog", SCTP_MIB_IN_PKT_BACKLOG), |
| 75 | SNMP_MIB_ITEM("SctpInPktDiscards", SCTP_MIB_IN_PKT_DISCARDS), |
| 76 | SNMP_MIB_ITEM("SctpInDataChunkDiscards", SCTP_MIB_IN_DATA_CHUNK_DISCARDS), |
Vlad Yasevich | d2287f8 | 2005-08-23 10:12:04 -0700 | [diff] [blame] | 77 | SNMP_MIB_SENTINEL |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 78 | }; |
| 79 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 80 | /* Display sctp snmp mib statistics(/proc/net/sctp/snmp). */ |
| 81 | static int sctp_snmp_seq_show(struct seq_file *seq, void *v) |
| 82 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 83 | struct net *net = seq->private; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 84 | int i; |
| 85 | |
| 86 | for (i = 0; sctp_snmp_list[i].name != NULL; i++) |
| 87 | seq_printf(seq, "%-32s\t%ld\n", sctp_snmp_list[i].name, |
Eric W. Biederman | b01a240 | 2012-08-06 08:47:55 +0000 | [diff] [blame] | 88 | snmp_fold_field((void __percpu **)net->sctp.sctp_statistics, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 89 | sctp_snmp_list[i].entry)); |
| 90 | |
| 91 | return 0; |
| 92 | } |
| 93 | |
| 94 | /* Initialize the seq file operations for 'snmp' object. */ |
| 95 | static int sctp_snmp_seq_open(struct inode *inode, struct file *file) |
| 96 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 97 | return single_open_net(inode, file, sctp_snmp_seq_show); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 98 | } |
| 99 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 100 | static const struct file_operations sctp_snmp_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 101 | .owner = THIS_MODULE, |
| 102 | .open = sctp_snmp_seq_open, |
| 103 | .read = seq_read, |
| 104 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 105 | .release = single_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 106 | }; |
| 107 | |
| 108 | /* Set up the proc fs entry for 'snmp' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 109 | int __net_init sctp_snmp_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 110 | { |
| 111 | struct proc_dir_entry *p; |
| 112 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 113 | p = proc_create("snmp", S_IRUGO, net->sctp.proc_net_sctp, |
| 114 | &sctp_snmp_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 115 | if (!p) |
| 116 | return -ENOMEM; |
| 117 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 118 | return 0; |
| 119 | } |
| 120 | |
| 121 | /* Cleanup the proc fs entry for 'snmp' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 122 | void sctp_snmp_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 123 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 124 | remove_proc_entry("snmp", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 125 | } |
| 126 | |
| 127 | /* Dump local addresses of an association/endpoint. */ |
| 128 | static void sctp_seq_dump_local_addrs(struct seq_file *seq, struct sctp_ep_common *epb) |
| 129 | { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 130 | struct sctp_association *asoc; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 131 | struct sctp_sockaddr_entry *laddr; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 132 | struct sctp_transport *peer; |
| 133 | union sctp_addr *addr, *primary = NULL; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 134 | struct sctp_af *af; |
| 135 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 136 | if (epb->type == SCTP_EP_TYPE_ASSOCIATION) { |
Daniel Borkmann | f9e42b8 | 2013-06-14 18:24:04 +0200 | [diff] [blame] | 137 | asoc = sctp_assoc(epb); |
| 138 | |
| 139 | peer = asoc->peer.primary_path; |
| 140 | if (unlikely(peer == NULL)) { |
Daniel Borkmann | b527fe6 | 2013-06-25 18:17:28 +0200 | [diff] [blame^] | 141 | WARN(1, "Association %p with NULL primary path!\n", asoc); |
Daniel Borkmann | f9e42b8 | 2013-06-14 18:24:04 +0200 | [diff] [blame] | 142 | return; |
| 143 | } |
| 144 | |
| 145 | primary = &peer->saddr; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 146 | } |
| 147 | |
Thomas Graf | 0b0fe91 | 2012-12-06 09:25:04 +0000 | [diff] [blame] | 148 | rcu_read_lock(); |
| 149 | list_for_each_entry_rcu(laddr, &epb->bind_addr.address_list, list) { |
| 150 | if (!laddr->valid) |
| 151 | continue; |
| 152 | |
Al Viro | 5f242a13 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 153 | addr = &laddr->a; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 154 | af = sctp_get_af_specific(addr->sa.sa_family); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 155 | if (primary && af->cmp_addr(addr, primary)) { |
| 156 | seq_printf(seq, "*"); |
| 157 | } |
Al Viro | 5f242a13 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 158 | af->seq_dump_addr(seq, addr); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 159 | } |
Thomas Graf | 0b0fe91 | 2012-12-06 09:25:04 +0000 | [diff] [blame] | 160 | rcu_read_unlock(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 161 | } |
| 162 | |
| 163 | /* Dump remote addresses of an association. */ |
| 164 | static void sctp_seq_dump_remote_addrs(struct seq_file *seq, struct sctp_association *assoc) |
| 165 | { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 166 | struct sctp_transport *transport; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 167 | union sctp_addr *addr, *primary; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 168 | struct sctp_af *af; |
| 169 | |
Al Viro | acd2bc9 | 2006-11-20 17:06:04 -0800 | [diff] [blame] | 170 | primary = &assoc->peer.primary_addr; |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 171 | rcu_read_lock(); |
| 172 | list_for_each_entry_rcu(transport, &assoc->peer.transport_addr_list, |
Robert P. J. Day | 9dbc15f | 2008-04-12 18:54:24 -0700 | [diff] [blame] | 173 | transports) { |
Al Viro | 5f242a13 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 174 | addr = &transport->ipaddr; |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 175 | if (transport->dead) |
| 176 | continue; |
| 177 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 178 | af = sctp_get_af_specific(addr->sa.sa_family); |
Al Viro | acd2bc9 | 2006-11-20 17:06:04 -0800 | [diff] [blame] | 179 | if (af->cmp_addr(addr, primary)) { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 180 | seq_printf(seq, "*"); |
| 181 | } |
Al Viro | 5f242a13 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 182 | af->seq_dump_addr(seq, addr); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 183 | } |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 184 | rcu_read_unlock(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 185 | } |
| 186 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 187 | static void * sctp_eps_seq_start(struct seq_file *seq, loff_t *pos) |
| 188 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 189 | if (*pos >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 190 | return NULL; |
| 191 | |
| 192 | if (*pos < 0) |
| 193 | *pos = 0; |
| 194 | |
| 195 | if (*pos == 0) |
| 196 | seq_printf(seq, " ENDPT SOCK STY SST HBKT LPORT UID INODE LADDRS\n"); |
| 197 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 198 | return (void *)pos; |
| 199 | } |
| 200 | |
| 201 | static void sctp_eps_seq_stop(struct seq_file *seq, void *v) |
| 202 | { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 203 | } |
| 204 | |
| 205 | |
| 206 | static void * sctp_eps_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
| 207 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 208 | if (++*pos >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 209 | return NULL; |
| 210 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 211 | return pos; |
| 212 | } |
| 213 | |
| 214 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 215 | /* Display sctp endpoints (/proc/net/sctp/eps). */ |
| 216 | static int sctp_eps_seq_show(struct seq_file *seq, void *v) |
| 217 | { |
| 218 | struct sctp_hashbucket *head; |
| 219 | struct sctp_ep_common *epb; |
| 220 | struct sctp_endpoint *ep; |
| 221 | struct sock *sk; |
Vlad Yasevich | 38b0e42 | 2006-01-17 11:54:06 -0800 | [diff] [blame] | 222 | int hash = *(loff_t *)v; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 223 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 224 | if (hash >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 225 | return -ENOMEM; |
| 226 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 227 | head = &sctp_ep_hashtable[hash]; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 228 | sctp_local_bh_disable(); |
| 229 | read_lock(&head->lock); |
Sasha Levin | b67bfe0 | 2013-02-27 17:06:00 -0800 | [diff] [blame] | 230 | sctp_for_each_hentry(epb, &head->chain) { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 231 | ep = sctp_ep(epb); |
| 232 | sk = epb->sk; |
Ulrich Weber | 6932f11 | 2012-08-16 01:24:49 +0000 | [diff] [blame] | 233 | if (!net_eq(sock_net(sk), seq_file_net(seq))) |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 234 | continue; |
Dan Rosenberg | 71338aa | 2011-05-23 12:17:35 +0000 | [diff] [blame] | 235 | seq_printf(seq, "%8pK %8pK %-3d %-3d %-4d %-5d %5d %5lu ", ep, sk, |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 236 | sctp_sk(sk)->type, sk->sk_state, hash, |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 237 | epb->bind_addr.port, |
Eric W. Biederman | a7cb5a4 | 2012-05-24 01:10:10 -0600 | [diff] [blame] | 238 | from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), |
| 239 | sock_i_ino(sk)); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 240 | |
| 241 | sctp_seq_dump_local_addrs(seq, epb); |
| 242 | seq_printf(seq, "\n"); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 243 | } |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 244 | read_unlock(&head->lock); |
| 245 | sctp_local_bh_enable(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 246 | |
| 247 | return 0; |
| 248 | } |
| 249 | |
Philippe De Muyter | 56b3d97 | 2007-07-10 23:07:31 -0700 | [diff] [blame] | 250 | static const struct seq_operations sctp_eps_ops = { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 251 | .start = sctp_eps_seq_start, |
| 252 | .next = sctp_eps_seq_next, |
| 253 | .stop = sctp_eps_seq_stop, |
| 254 | .show = sctp_eps_seq_show, |
| 255 | }; |
| 256 | |
| 257 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 258 | /* Initialize the seq file operations for 'eps' object. */ |
| 259 | static int sctp_eps_seq_open(struct inode *inode, struct file *file) |
| 260 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 261 | return seq_open_net(inode, file, &sctp_eps_ops, |
| 262 | sizeof(struct seq_net_private)); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 263 | } |
| 264 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 265 | static const struct file_operations sctp_eps_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 266 | .open = sctp_eps_seq_open, |
| 267 | .read = seq_read, |
| 268 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 269 | .release = seq_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 270 | }; |
| 271 | |
| 272 | /* Set up the proc fs entry for 'eps' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 273 | int __net_init sctp_eps_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 274 | { |
| 275 | struct proc_dir_entry *p; |
| 276 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 277 | p = proc_create("eps", S_IRUGO, net->sctp.proc_net_sctp, |
| 278 | &sctp_eps_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 279 | if (!p) |
| 280 | return -ENOMEM; |
| 281 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 282 | return 0; |
| 283 | } |
| 284 | |
| 285 | /* Cleanup the proc fs entry for 'eps' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 286 | void sctp_eps_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 287 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 288 | remove_proc_entry("eps", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 289 | } |
| 290 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 291 | |
| 292 | static void * sctp_assocs_seq_start(struct seq_file *seq, loff_t *pos) |
| 293 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 294 | if (*pos >= sctp_assoc_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 295 | return NULL; |
| 296 | |
| 297 | if (*pos < 0) |
| 298 | *pos = 0; |
| 299 | |
| 300 | if (*pos == 0) |
Neil Horman | 58fbbed | 2008-02-29 11:40:56 -0800 | [diff] [blame] | 301 | seq_printf(seq, " ASSOC SOCK STY SST ST HBKT " |
| 302 | "ASSOC-ID TX_QUEUE RX_QUEUE UID INODE LPORT " |
| 303 | "RPORT LADDRS <-> RADDRS " |
Dilip Daya | f406c8b | 2013-04-16 01:39:07 +0000 | [diff] [blame] | 304 | "HBINT INS OUTS MAXRT T1X T2X RTXC " |
| 305 | "wmema wmemq sndbuf rcvbuf\n"); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 306 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 307 | return (void *)pos; |
| 308 | } |
| 309 | |
| 310 | static void sctp_assocs_seq_stop(struct seq_file *seq, void *v) |
| 311 | { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 312 | } |
| 313 | |
| 314 | |
| 315 | static void * sctp_assocs_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
| 316 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 317 | if (++*pos >= sctp_assoc_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 318 | return NULL; |
| 319 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 320 | return pos; |
| 321 | } |
| 322 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 323 | /* Display sctp associations (/proc/net/sctp/assocs). */ |
| 324 | static int sctp_assocs_seq_show(struct seq_file *seq, void *v) |
| 325 | { |
| 326 | struct sctp_hashbucket *head; |
| 327 | struct sctp_ep_common *epb; |
| 328 | struct sctp_association *assoc; |
| 329 | struct sock *sk; |
Vlad Yasevich | 38b0e42 | 2006-01-17 11:54:06 -0800 | [diff] [blame] | 330 | int hash = *(loff_t *)v; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 331 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 332 | if (hash >= sctp_assoc_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 333 | return -ENOMEM; |
| 334 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 335 | head = &sctp_assoc_hashtable[hash]; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 336 | sctp_local_bh_disable(); |
| 337 | read_lock(&head->lock); |
Sasha Levin | b67bfe0 | 2013-02-27 17:06:00 -0800 | [diff] [blame] | 338 | sctp_for_each_hentry(epb, &head->chain) { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 339 | assoc = sctp_assoc(epb); |
| 340 | sk = epb->sk; |
Ulrich Weber | 6932f11 | 2012-08-16 01:24:49 +0000 | [diff] [blame] | 341 | if (!net_eq(sock_net(sk), seq_file_net(seq))) |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 342 | continue; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 343 | seq_printf(seq, |
Dan Rosenberg | 71338aa | 2011-05-23 12:17:35 +0000 | [diff] [blame] | 344 | "%8pK %8pK %-3d %-3d %-2d %-4d " |
Neil Horman | 30e9356 | 2008-04-12 18:53:48 -0700 | [diff] [blame] | 345 | "%4d %8d %8d %7d %5lu %-5d %5d ", |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 346 | assoc, sk, sctp_sk(sk)->type, sk->sk_state, |
Neil Horman | 58fbbed | 2008-02-29 11:40:56 -0800 | [diff] [blame] | 347 | assoc->state, hash, |
| 348 | assoc->assoc_id, |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 349 | assoc->sndbuf_used, |
Vlad Yasevich | 6aa2551 | 2006-10-09 21:34:26 -0700 | [diff] [blame] | 350 | atomic_read(&assoc->rmem_alloc), |
Eric W. Biederman | a7cb5a4 | 2012-05-24 01:10:10 -0600 | [diff] [blame] | 351 | from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), |
| 352 | sock_i_ino(sk), |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 353 | epb->bind_addr.port, |
Neil Horman | 30e9356 | 2008-04-12 18:53:48 -0700 | [diff] [blame] | 354 | assoc->peer.port); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 355 | seq_printf(seq, " "); |
| 356 | sctp_seq_dump_local_addrs(seq, epb); |
| 357 | seq_printf(seq, "<-> "); |
| 358 | sctp_seq_dump_remote_addrs(seq, assoc); |
Dilip Daya | f406c8b | 2013-04-16 01:39:07 +0000 | [diff] [blame] | 359 | seq_printf(seq, "\t%8lu %5d %5d %4d %4d %4d %8d " |
| 360 | "%8d %8d %8d %8d", |
Neil Horman | 30e9356 | 2008-04-12 18:53:48 -0700 | [diff] [blame] | 361 | assoc->hbinterval, assoc->c.sinit_max_instreams, |
| 362 | assoc->c.sinit_num_ostreams, assoc->max_retrans, |
| 363 | assoc->init_retries, assoc->shutdown_retries, |
Dilip Daya | f406c8b | 2013-04-16 01:39:07 +0000 | [diff] [blame] | 364 | assoc->rtx_data_chunks, |
| 365 | atomic_read(&sk->sk_wmem_alloc), |
| 366 | sk->sk_wmem_queued, |
| 367 | sk->sk_sndbuf, |
| 368 | sk->sk_rcvbuf); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 369 | seq_printf(seq, "\n"); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 370 | } |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 371 | read_unlock(&head->lock); |
| 372 | sctp_local_bh_enable(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 373 | |
| 374 | return 0; |
| 375 | } |
| 376 | |
Philippe De Muyter | 56b3d97 | 2007-07-10 23:07:31 -0700 | [diff] [blame] | 377 | static const struct seq_operations sctp_assoc_ops = { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 378 | .start = sctp_assocs_seq_start, |
| 379 | .next = sctp_assocs_seq_next, |
| 380 | .stop = sctp_assocs_seq_stop, |
| 381 | .show = sctp_assocs_seq_show, |
| 382 | }; |
| 383 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 384 | /* Initialize the seq file operations for 'assocs' object. */ |
| 385 | static int sctp_assocs_seq_open(struct inode *inode, struct file *file) |
| 386 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 387 | return seq_open_net(inode, file, &sctp_assoc_ops, |
| 388 | sizeof(struct seq_net_private)); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 389 | } |
| 390 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 391 | static const struct file_operations sctp_assocs_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 392 | .open = sctp_assocs_seq_open, |
| 393 | .read = seq_read, |
| 394 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 395 | .release = seq_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 396 | }; |
| 397 | |
| 398 | /* Set up the proc fs entry for 'assocs' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 399 | int __net_init sctp_assocs_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 400 | { |
| 401 | struct proc_dir_entry *p; |
| 402 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 403 | p = proc_create("assocs", S_IRUGO, net->sctp.proc_net_sctp, |
Pavel Emelyanov | 459eea7 | 2008-02-29 11:24:45 -0800 | [diff] [blame] | 404 | &sctp_assocs_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 405 | if (!p) |
| 406 | return -ENOMEM; |
| 407 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 408 | return 0; |
| 409 | } |
| 410 | |
| 411 | /* Cleanup the proc fs entry for 'assocs' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 412 | void sctp_assocs_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 413 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 414 | remove_proc_entry("assocs", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 415 | } |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 416 | |
| 417 | static void *sctp_remaddr_seq_start(struct seq_file *seq, loff_t *pos) |
| 418 | { |
| 419 | if (*pos >= sctp_assoc_hashsize) |
| 420 | return NULL; |
| 421 | |
| 422 | if (*pos < 0) |
| 423 | *pos = 0; |
| 424 | |
| 425 | if (*pos == 0) |
| 426 | seq_printf(seq, "ADDR ASSOC_ID HB_ACT RTO MAX_PATH_RTX " |
| 427 | "REM_ADDR_RTX START\n"); |
| 428 | |
| 429 | return (void *)pos; |
| 430 | } |
| 431 | |
| 432 | static void *sctp_remaddr_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
| 433 | { |
| 434 | if (++*pos >= sctp_assoc_hashsize) |
| 435 | return NULL; |
| 436 | |
| 437 | return pos; |
| 438 | } |
| 439 | |
| 440 | static void sctp_remaddr_seq_stop(struct seq_file *seq, void *v) |
| 441 | { |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 442 | } |
| 443 | |
| 444 | static int sctp_remaddr_seq_show(struct seq_file *seq, void *v) |
| 445 | { |
| 446 | struct sctp_hashbucket *head; |
| 447 | struct sctp_ep_common *epb; |
| 448 | struct sctp_association *assoc; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 449 | struct sctp_transport *tsp; |
| 450 | int hash = *(loff_t *)v; |
| 451 | |
| 452 | if (hash >= sctp_assoc_hashsize) |
| 453 | return -ENOMEM; |
| 454 | |
| 455 | head = &sctp_assoc_hashtable[hash]; |
| 456 | sctp_local_bh_disable(); |
| 457 | read_lock(&head->lock); |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 458 | rcu_read_lock(); |
Sasha Levin | b67bfe0 | 2013-02-27 17:06:00 -0800 | [diff] [blame] | 459 | sctp_for_each_hentry(epb, &head->chain) { |
Ulrich Weber | 6932f11 | 2012-08-16 01:24:49 +0000 | [diff] [blame] | 460 | if (!net_eq(sock_net(epb->sk), seq_file_net(seq))) |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 461 | continue; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 462 | assoc = sctp_assoc(epb); |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 463 | list_for_each_entry_rcu(tsp, &assoc->peer.transport_addr_list, |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 464 | transports) { |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 465 | if (tsp->dead) |
| 466 | continue; |
| 467 | |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 468 | /* |
| 469 | * The remote address (ADDR) |
| 470 | */ |
| 471 | tsp->af_specific->seq_dump_addr(seq, &tsp->ipaddr); |
| 472 | seq_printf(seq, " "); |
| 473 | |
| 474 | /* |
| 475 | * The association ID (ASSOC_ID) |
| 476 | */ |
| 477 | seq_printf(seq, "%d ", tsp->asoc->assoc_id); |
| 478 | |
| 479 | /* |
| 480 | * If the Heartbeat is active (HB_ACT) |
| 481 | * Note: 1 = Active, 0 = Inactive |
| 482 | */ |
| 483 | seq_printf(seq, "%d ", timer_pending(&tsp->hb_timer)); |
| 484 | |
| 485 | /* |
| 486 | * Retransmit time out (RTO) |
| 487 | */ |
| 488 | seq_printf(seq, "%lu ", tsp->rto); |
| 489 | |
| 490 | /* |
| 491 | * Maximum path retransmit count (PATH_MAX_RTX) |
| 492 | */ |
| 493 | seq_printf(seq, "%d ", tsp->pathmaxrxt); |
| 494 | |
| 495 | /* |
| 496 | * remote address retransmit count (REM_ADDR_RTX) |
| 497 | * Note: We don't have a way to tally this at the moment |
| 498 | * so lets just leave it as zero for the moment |
| 499 | */ |
| 500 | seq_printf(seq, "0 "); |
| 501 | |
| 502 | /* |
| 503 | * remote address start time (START). This is also not |
| 504 | * currently implemented, but we can record it with a |
| 505 | * jiffies marker in a subsequent patch |
| 506 | */ |
| 507 | seq_printf(seq, "0"); |
| 508 | |
| 509 | seq_printf(seq, "\n"); |
| 510 | } |
| 511 | } |
| 512 | |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 513 | rcu_read_unlock(); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 514 | read_unlock(&head->lock); |
| 515 | sctp_local_bh_enable(); |
| 516 | |
| 517 | return 0; |
| 518 | |
| 519 | } |
| 520 | |
| 521 | static const struct seq_operations sctp_remaddr_ops = { |
| 522 | .start = sctp_remaddr_seq_start, |
| 523 | .next = sctp_remaddr_seq_next, |
| 524 | .stop = sctp_remaddr_seq_stop, |
| 525 | .show = sctp_remaddr_seq_show, |
| 526 | }; |
| 527 | |
| 528 | /* Cleanup the proc fs entry for 'remaddr' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 529 | void sctp_remaddr_proc_exit(struct net *net) |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 530 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 531 | remove_proc_entry("remaddr", net->sctp.proc_net_sctp); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 532 | } |
| 533 | |
| 534 | static int sctp_remaddr_seq_open(struct inode *inode, struct file *file) |
| 535 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 536 | return seq_open_net(inode, file, &sctp_remaddr_ops, |
| 537 | sizeof(struct seq_net_private)); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 538 | } |
| 539 | |
| 540 | static const struct file_operations sctp_remaddr_seq_fops = { |
| 541 | .open = sctp_remaddr_seq_open, |
| 542 | .read = seq_read, |
| 543 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 544 | .release = seq_release_net, |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 545 | }; |
| 546 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 547 | int __net_init sctp_remaddr_proc_init(struct net *net) |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 548 | { |
| 549 | struct proc_dir_entry *p; |
| 550 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 551 | p = proc_create("remaddr", S_IRUGO, net->sctp.proc_net_sctp, |
| 552 | &sctp_remaddr_seq_fops); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 553 | if (!p) |
| 554 | return -ENOMEM; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 555 | return 0; |
| 556 | } |