Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 1 | /* SCTP kernel implementation |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2 | * Copyright (c) 2003 International Business Machines, Corp. |
| 3 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 4 | * This file is part of the SCTP kernel implementation |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 5 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 6 | * This SCTP implementation is free software; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 7 | * you can redistribute it and/or modify it under the terms of |
| 8 | * the GNU General Public License as published by |
| 9 | * the Free Software Foundation; either version 2, or (at your option) |
| 10 | * any later version. |
| 11 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 12 | * This SCTP implementation is distributed in the hope that it |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 13 | * will be useful, but WITHOUT ANY WARRANTY; without even the implied |
| 14 | * ************************ |
| 15 | * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
| 16 | * See the GNU General Public License for more details. |
| 17 | * |
| 18 | * You should have received a copy of the GNU General Public License |
Jeff Kirsher | 4b2f13a | 2013-12-06 06:28:48 -0800 | [diff] [blame] | 19 | * along with GNU CC; see the file COPYING. If not, see |
| 20 | * <http://www.gnu.org/licenses/>. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 21 | * |
| 22 | * Please send any bug reports or fixes you make to the |
| 23 | * email address(es): |
Daniel Borkmann | 91705c6 | 2013-07-23 14:51:47 +0200 | [diff] [blame] | 24 | * lksctp developers <linux-sctp@vger.kernel.org> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 25 | * |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 26 | * Written or modified by: |
| 27 | * Sridhar Samudrala <sri@us.ibm.com> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 28 | */ |
| 29 | |
| 30 | #include <linux/types.h> |
| 31 | #include <linux/seq_file.h> |
| 32 | #include <linux/init.h> |
Paul Gortmaker | bc3b2d7 | 2011-07-15 11:47:34 -0400 | [diff] [blame] | 33 | #include <linux/export.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 34 | #include <net/sctp/sctp.h> |
Pavel Emelyanov | 3f5340a | 2008-02-09 23:23:44 -0800 | [diff] [blame] | 35 | #include <net/ip.h> /* for snmp_fold_field */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 36 | |
Alexey Dobriyan | 5833929 | 2010-01-22 10:17:26 +0000 | [diff] [blame] | 37 | static const struct snmp_mib sctp_snmp_list[] = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 38 | SNMP_MIB_ITEM("SctpCurrEstab", SCTP_MIB_CURRESTAB), |
| 39 | SNMP_MIB_ITEM("SctpActiveEstabs", SCTP_MIB_ACTIVEESTABS), |
| 40 | SNMP_MIB_ITEM("SctpPassiveEstabs", SCTP_MIB_PASSIVEESTABS), |
| 41 | SNMP_MIB_ITEM("SctpAborteds", SCTP_MIB_ABORTEDS), |
| 42 | SNMP_MIB_ITEM("SctpShutdowns", SCTP_MIB_SHUTDOWNS), |
| 43 | SNMP_MIB_ITEM("SctpOutOfBlues", SCTP_MIB_OUTOFBLUES), |
| 44 | SNMP_MIB_ITEM("SctpChecksumErrors", SCTP_MIB_CHECKSUMERRORS), |
| 45 | SNMP_MIB_ITEM("SctpOutCtrlChunks", SCTP_MIB_OUTCTRLCHUNKS), |
| 46 | SNMP_MIB_ITEM("SctpOutOrderChunks", SCTP_MIB_OUTORDERCHUNKS), |
| 47 | SNMP_MIB_ITEM("SctpOutUnorderChunks", SCTP_MIB_OUTUNORDERCHUNKS), |
| 48 | SNMP_MIB_ITEM("SctpInCtrlChunks", SCTP_MIB_INCTRLCHUNKS), |
| 49 | SNMP_MIB_ITEM("SctpInOrderChunks", SCTP_MIB_INORDERCHUNKS), |
| 50 | SNMP_MIB_ITEM("SctpInUnorderChunks", SCTP_MIB_INUNORDERCHUNKS), |
| 51 | SNMP_MIB_ITEM("SctpFragUsrMsgs", SCTP_MIB_FRAGUSRMSGS), |
| 52 | SNMP_MIB_ITEM("SctpReasmUsrMsgs", SCTP_MIB_REASMUSRMSGS), |
| 53 | SNMP_MIB_ITEM("SctpOutSCTPPacks", SCTP_MIB_OUTSCTPPACKS), |
| 54 | SNMP_MIB_ITEM("SctpInSCTPPacks", SCTP_MIB_INSCTPPACKS), |
Sridhar Samudrala | ac0b046 | 2006-08-22 00:15:33 -0700 | [diff] [blame] | 55 | SNMP_MIB_ITEM("SctpT1InitExpireds", SCTP_MIB_T1_INIT_EXPIREDS), |
| 56 | SNMP_MIB_ITEM("SctpT1CookieExpireds", SCTP_MIB_T1_COOKIE_EXPIREDS), |
| 57 | SNMP_MIB_ITEM("SctpT2ShutdownExpireds", SCTP_MIB_T2_SHUTDOWN_EXPIREDS), |
| 58 | SNMP_MIB_ITEM("SctpT3RtxExpireds", SCTP_MIB_T3_RTX_EXPIREDS), |
| 59 | SNMP_MIB_ITEM("SctpT4RtoExpireds", SCTP_MIB_T4_RTO_EXPIREDS), |
| 60 | SNMP_MIB_ITEM("SctpT5ShutdownGuardExpireds", SCTP_MIB_T5_SHUTDOWN_GUARD_EXPIREDS), |
| 61 | SNMP_MIB_ITEM("SctpDelaySackExpireds", SCTP_MIB_DELAY_SACK_EXPIREDS), |
| 62 | SNMP_MIB_ITEM("SctpAutocloseExpireds", SCTP_MIB_AUTOCLOSE_EXPIREDS), |
| 63 | SNMP_MIB_ITEM("SctpT3Retransmits", SCTP_MIB_T3_RETRANSMITS), |
| 64 | SNMP_MIB_ITEM("SctpPmtudRetransmits", SCTP_MIB_PMTUD_RETRANSMITS), |
| 65 | SNMP_MIB_ITEM("SctpFastRetransmits", SCTP_MIB_FAST_RETRANSMITS), |
| 66 | SNMP_MIB_ITEM("SctpInPktSoftirq", SCTP_MIB_IN_PKT_SOFTIRQ), |
| 67 | SNMP_MIB_ITEM("SctpInPktBacklog", SCTP_MIB_IN_PKT_BACKLOG), |
| 68 | SNMP_MIB_ITEM("SctpInPktDiscards", SCTP_MIB_IN_PKT_DISCARDS), |
| 69 | SNMP_MIB_ITEM("SctpInDataChunkDiscards", SCTP_MIB_IN_DATA_CHUNK_DISCARDS), |
Vlad Yasevich | d2287f8 | 2005-08-23 10:12:04 -0700 | [diff] [blame] | 70 | SNMP_MIB_SENTINEL |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 71 | }; |
| 72 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 73 | /* Display sctp snmp mib statistics(/proc/net/sctp/snmp). */ |
| 74 | static int sctp_snmp_seq_show(struct seq_file *seq, void *v) |
| 75 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 76 | struct net *net = seq->private; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 77 | int i; |
| 78 | |
| 79 | for (i = 0; sctp_snmp_list[i].name != NULL; i++) |
| 80 | seq_printf(seq, "%-32s\t%ld\n", sctp_snmp_list[i].name, |
WANG Cong | c9f2dba | 2014-05-12 16:52:02 -0700 | [diff] [blame] | 81 | snmp_fold_field(net->sctp.sctp_statistics, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 82 | sctp_snmp_list[i].entry)); |
| 83 | |
| 84 | return 0; |
| 85 | } |
| 86 | |
| 87 | /* Initialize the seq file operations for 'snmp' object. */ |
| 88 | static int sctp_snmp_seq_open(struct inode *inode, struct file *file) |
| 89 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 90 | return single_open_net(inode, file, sctp_snmp_seq_show); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 91 | } |
| 92 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 93 | static const struct file_operations sctp_snmp_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 94 | .owner = THIS_MODULE, |
| 95 | .open = sctp_snmp_seq_open, |
| 96 | .read = seq_read, |
| 97 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 98 | .release = single_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 99 | }; |
| 100 | |
| 101 | /* Set up the proc fs entry for 'snmp' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 102 | int __net_init sctp_snmp_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 103 | { |
| 104 | struct proc_dir_entry *p; |
| 105 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 106 | p = proc_create("snmp", S_IRUGO, net->sctp.proc_net_sctp, |
| 107 | &sctp_snmp_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 108 | if (!p) |
| 109 | return -ENOMEM; |
| 110 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 111 | return 0; |
| 112 | } |
| 113 | |
| 114 | /* Cleanup the proc fs entry for 'snmp' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 115 | void sctp_snmp_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 116 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 117 | remove_proc_entry("snmp", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 118 | } |
| 119 | |
| 120 | /* Dump local addresses of an association/endpoint. */ |
| 121 | static void sctp_seq_dump_local_addrs(struct seq_file *seq, struct sctp_ep_common *epb) |
| 122 | { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 123 | struct sctp_association *asoc; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 124 | struct sctp_sockaddr_entry *laddr; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 125 | struct sctp_transport *peer; |
| 126 | union sctp_addr *addr, *primary = NULL; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 127 | struct sctp_af *af; |
| 128 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 129 | if (epb->type == SCTP_EP_TYPE_ASSOCIATION) { |
Daniel Borkmann | f9e42b8 | 2013-06-14 18:24:04 +0200 | [diff] [blame] | 130 | asoc = sctp_assoc(epb); |
| 131 | |
| 132 | peer = asoc->peer.primary_path; |
| 133 | if (unlikely(peer == NULL)) { |
Daniel Borkmann | b527fe6 | 2013-06-25 18:17:28 +0200 | [diff] [blame] | 134 | WARN(1, "Association %p with NULL primary path!\n", asoc); |
Daniel Borkmann | f9e42b8 | 2013-06-14 18:24:04 +0200 | [diff] [blame] | 135 | return; |
| 136 | } |
| 137 | |
| 138 | primary = &peer->saddr; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 139 | } |
| 140 | |
Thomas Graf | 0b0fe91 | 2012-12-06 09:25:04 +0000 | [diff] [blame] | 141 | rcu_read_lock(); |
| 142 | list_for_each_entry_rcu(laddr, &epb->bind_addr.address_list, list) { |
| 143 | if (!laddr->valid) |
| 144 | continue; |
| 145 | |
Al Viro | 5f242a13 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 146 | addr = &laddr->a; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 147 | af = sctp_get_af_specific(addr->sa.sa_family); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 148 | if (primary && af->cmp_addr(addr, primary)) { |
| 149 | seq_printf(seq, "*"); |
| 150 | } |
Al Viro | 5f242a13 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 151 | af->seq_dump_addr(seq, addr); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 152 | } |
Thomas Graf | 0b0fe91 | 2012-12-06 09:25:04 +0000 | [diff] [blame] | 153 | rcu_read_unlock(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 154 | } |
| 155 | |
| 156 | /* Dump remote addresses of an association. */ |
| 157 | static void sctp_seq_dump_remote_addrs(struct seq_file *seq, struct sctp_association *assoc) |
| 158 | { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 159 | struct sctp_transport *transport; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 160 | union sctp_addr *addr, *primary; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 161 | struct sctp_af *af; |
| 162 | |
Al Viro | acd2bc9 | 2006-11-20 17:06:04 -0800 | [diff] [blame] | 163 | primary = &assoc->peer.primary_addr; |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 164 | list_for_each_entry_rcu(transport, &assoc->peer.transport_addr_list, |
Robert P. J. Day | 9dbc15f0 | 2008-04-12 18:54:24 -0700 | [diff] [blame] | 165 | transports) { |
Al Viro | 5f242a13 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 166 | addr = &transport->ipaddr; |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 167 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 168 | af = sctp_get_af_specific(addr->sa.sa_family); |
Al Viro | acd2bc9 | 2006-11-20 17:06:04 -0800 | [diff] [blame] | 169 | if (af->cmp_addr(addr, primary)) { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 170 | seq_printf(seq, "*"); |
| 171 | } |
Al Viro | 5f242a13 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 172 | af->seq_dump_addr(seq, addr); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 173 | } |
| 174 | } |
| 175 | |
wangweidong | 26ac8e5 | 2013-12-23 12:16:51 +0800 | [diff] [blame] | 176 | static void *sctp_eps_seq_start(struct seq_file *seq, loff_t *pos) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 177 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 178 | if (*pos >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 179 | return NULL; |
| 180 | |
| 181 | if (*pos < 0) |
| 182 | *pos = 0; |
| 183 | |
| 184 | if (*pos == 0) |
| 185 | seq_printf(seq, " ENDPT SOCK STY SST HBKT LPORT UID INODE LADDRS\n"); |
| 186 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 187 | return (void *)pos; |
| 188 | } |
| 189 | |
| 190 | static void sctp_eps_seq_stop(struct seq_file *seq, void *v) |
| 191 | { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 192 | } |
| 193 | |
| 194 | |
wangweidong | 26ac8e5 | 2013-12-23 12:16:51 +0800 | [diff] [blame] | 195 | static void *sctp_eps_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 196 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 197 | if (++*pos >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 198 | return NULL; |
| 199 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 200 | return pos; |
| 201 | } |
| 202 | |
| 203 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 204 | /* Display sctp endpoints (/proc/net/sctp/eps). */ |
| 205 | static int sctp_eps_seq_show(struct seq_file *seq, void *v) |
| 206 | { |
| 207 | struct sctp_hashbucket *head; |
| 208 | struct sctp_ep_common *epb; |
| 209 | struct sctp_endpoint *ep; |
| 210 | struct sock *sk; |
Vlad Yasevich | 38b0e42 | 2006-01-17 11:54:06 -0800 | [diff] [blame] | 211 | int hash = *(loff_t *)v; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 212 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 213 | if (hash >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 214 | return -ENOMEM; |
| 215 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 216 | head = &sctp_ep_hashtable[hash]; |
wangweidong | 79b9113 | 2014-01-21 15:44:07 +0800 | [diff] [blame] | 217 | local_bh_disable(); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 218 | read_lock(&head->lock); |
Sasha Levin | b67bfe0 | 2013-02-27 17:06:00 -0800 | [diff] [blame] | 219 | sctp_for_each_hentry(epb, &head->chain) { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 220 | ep = sctp_ep(epb); |
| 221 | sk = epb->sk; |
Ulrich Weber | 6932f11 | 2012-08-16 01:24:49 +0000 | [diff] [blame] | 222 | if (!net_eq(sock_net(sk), seq_file_net(seq))) |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 223 | continue; |
Francesco Fusco | d14c5ab | 2013-08-15 13:42:14 +0200 | [diff] [blame] | 224 | seq_printf(seq, "%8pK %8pK %-3d %-3d %-4d %-5d %5u %5lu ", ep, sk, |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 225 | sctp_sk(sk)->type, sk->sk_state, hash, |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 226 | epb->bind_addr.port, |
Eric W. Biederman | a7cb5a4 | 2012-05-24 01:10:10 -0600 | [diff] [blame] | 227 | from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), |
| 228 | sock_i_ino(sk)); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 229 | |
| 230 | sctp_seq_dump_local_addrs(seq, epb); |
| 231 | seq_printf(seq, "\n"); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 232 | } |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 233 | read_unlock(&head->lock); |
wangweidong | 79b9113 | 2014-01-21 15:44:07 +0800 | [diff] [blame] | 234 | local_bh_enable(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 235 | |
| 236 | return 0; |
| 237 | } |
| 238 | |
Philippe De Muyter | 56b3d97 | 2007-07-10 23:07:31 -0700 | [diff] [blame] | 239 | static const struct seq_operations sctp_eps_ops = { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 240 | .start = sctp_eps_seq_start, |
| 241 | .next = sctp_eps_seq_next, |
| 242 | .stop = sctp_eps_seq_stop, |
| 243 | .show = sctp_eps_seq_show, |
| 244 | }; |
| 245 | |
| 246 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 247 | /* Initialize the seq file operations for 'eps' object. */ |
| 248 | static int sctp_eps_seq_open(struct inode *inode, struct file *file) |
| 249 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 250 | return seq_open_net(inode, file, &sctp_eps_ops, |
| 251 | sizeof(struct seq_net_private)); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 252 | } |
| 253 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 254 | static const struct file_operations sctp_eps_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 255 | .open = sctp_eps_seq_open, |
| 256 | .read = seq_read, |
| 257 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 258 | .release = seq_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 259 | }; |
| 260 | |
| 261 | /* Set up the proc fs entry for 'eps' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 262 | int __net_init sctp_eps_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 263 | { |
| 264 | struct proc_dir_entry *p; |
| 265 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 266 | p = proc_create("eps", S_IRUGO, net->sctp.proc_net_sctp, |
| 267 | &sctp_eps_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 268 | if (!p) |
| 269 | return -ENOMEM; |
| 270 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 271 | return 0; |
| 272 | } |
| 273 | |
| 274 | /* Cleanup the proc fs entry for 'eps' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 275 | void sctp_eps_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 276 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 277 | remove_proc_entry("eps", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 278 | } |
| 279 | |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 280 | struct sctp_ht_iter { |
| 281 | struct seq_net_private p; |
| 282 | struct rhashtable_iter hti; |
Xin Long | 53fa103 | 2016-04-14 15:35:35 +0800 | [diff] [blame] | 283 | int start_fail; |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 284 | }; |
| 285 | |
Xin Long | b5e2f4e | 2016-04-14 15:35:34 +0800 | [diff] [blame] | 286 | static void *sctp_transport_seq_start(struct seq_file *seq, loff_t *pos) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 287 | { |
Xin Long | 626d16f | 2016-04-14 15:35:31 +0800 | [diff] [blame] | 288 | struct sctp_ht_iter *iter = seq->private; |
| 289 | int err = sctp_transport_walk_start(&iter->hti); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 290 | |
Xin Long | 53fa103 | 2016-04-14 15:35:35 +0800 | [diff] [blame] | 291 | if (err) { |
| 292 | iter->start_fail = 1; |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 293 | return ERR_PTR(err); |
Xin Long | 53fa103 | 2016-04-14 15:35:35 +0800 | [diff] [blame] | 294 | } |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 295 | |
Xin Long | 626d16f | 2016-04-14 15:35:31 +0800 | [diff] [blame] | 296 | return sctp_transport_get_idx(seq_file_net(seq), &iter->hti, *pos); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 297 | } |
| 298 | |
Xin Long | b5e2f4e | 2016-04-14 15:35:34 +0800 | [diff] [blame] | 299 | static void sctp_transport_seq_stop(struct seq_file *seq, void *v) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 300 | { |
Xin Long | 626d16f | 2016-04-14 15:35:31 +0800 | [diff] [blame] | 301 | struct sctp_ht_iter *iter = seq->private; |
| 302 | |
Xin Long | 53fa103 | 2016-04-14 15:35:35 +0800 | [diff] [blame] | 303 | if (iter->start_fail) |
| 304 | return; |
Xin Long | 626d16f | 2016-04-14 15:35:31 +0800 | [diff] [blame] | 305 | sctp_transport_walk_stop(&iter->hti); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 306 | } |
| 307 | |
Xin Long | b5e2f4e | 2016-04-14 15:35:34 +0800 | [diff] [blame] | 308 | static void *sctp_transport_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 309 | { |
Xin Long | 626d16f | 2016-04-14 15:35:31 +0800 | [diff] [blame] | 310 | struct sctp_ht_iter *iter = seq->private; |
| 311 | |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 312 | ++*pos; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 313 | |
Xin Long | 626d16f | 2016-04-14 15:35:31 +0800 | [diff] [blame] | 314 | return sctp_transport_get_next(seq_file_net(seq), &iter->hti); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 315 | } |
| 316 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 317 | /* Display sctp associations (/proc/net/sctp/assocs). */ |
| 318 | static int sctp_assocs_seq_show(struct seq_file *seq, void *v) |
| 319 | { |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 320 | struct sctp_transport *transport; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 321 | struct sctp_association *assoc; |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 322 | struct sctp_ep_common *epb; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 323 | struct sock *sk; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 324 | |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 325 | if (v == SEQ_START_TOKEN) { |
| 326 | seq_printf(seq, " ASSOC SOCK STY SST ST HBKT " |
| 327 | "ASSOC-ID TX_QUEUE RX_QUEUE UID INODE LPORT " |
| 328 | "RPORT LADDRS <-> RADDRS " |
| 329 | "HBINT INS OUTS MAXRT T1X T2X RTXC " |
| 330 | "wmema wmemq sndbuf rcvbuf\n"); |
| 331 | return 0; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 332 | } |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 333 | |
| 334 | transport = (struct sctp_transport *)v; |
Xin Long | fba4c33 | 2016-01-22 01:49:08 +0800 | [diff] [blame] | 335 | if (!sctp_transport_hold(transport)) |
| 336 | return 0; |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 337 | assoc = transport->asoc; |
| 338 | epb = &assoc->base; |
| 339 | sk = epb->sk; |
| 340 | |
| 341 | seq_printf(seq, |
| 342 | "%8pK %8pK %-3d %-3d %-2d %-4d " |
| 343 | "%4d %8d %8d %7u %5lu %-5d %5d ", |
| 344 | assoc, sk, sctp_sk(sk)->type, sk->sk_state, |
| 345 | assoc->state, 0, |
| 346 | assoc->assoc_id, |
| 347 | assoc->sndbuf_used, |
| 348 | atomic_read(&assoc->rmem_alloc), |
| 349 | from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), |
| 350 | sock_i_ino(sk), |
| 351 | epb->bind_addr.port, |
| 352 | assoc->peer.port); |
| 353 | seq_printf(seq, " "); |
| 354 | sctp_seq_dump_local_addrs(seq, epb); |
| 355 | seq_printf(seq, "<-> "); |
| 356 | sctp_seq_dump_remote_addrs(seq, assoc); |
| 357 | seq_printf(seq, "\t%8lu %5d %5d %4d %4d %4d %8d " |
| 358 | "%8d %8d %8d %8d", |
| 359 | assoc->hbinterval, assoc->c.sinit_max_instreams, |
| 360 | assoc->c.sinit_num_ostreams, assoc->max_retrans, |
| 361 | assoc->init_retries, assoc->shutdown_retries, |
| 362 | assoc->rtx_data_chunks, |
| 363 | atomic_read(&sk->sk_wmem_alloc), |
| 364 | sk->sk_wmem_queued, |
| 365 | sk->sk_sndbuf, |
| 366 | sk->sk_rcvbuf); |
| 367 | seq_printf(seq, "\n"); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 368 | |
Xin Long | fba4c33 | 2016-01-22 01:49:08 +0800 | [diff] [blame] | 369 | sctp_transport_put(transport); |
| 370 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 371 | return 0; |
| 372 | } |
| 373 | |
Philippe De Muyter | 56b3d97 | 2007-07-10 23:07:31 -0700 | [diff] [blame] | 374 | static const struct seq_operations sctp_assoc_ops = { |
Xin Long | b5e2f4e | 2016-04-14 15:35:34 +0800 | [diff] [blame] | 375 | .start = sctp_transport_seq_start, |
| 376 | .next = sctp_transport_seq_next, |
| 377 | .stop = sctp_transport_seq_stop, |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 378 | .show = sctp_assocs_seq_show, |
| 379 | }; |
| 380 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 381 | /* Initialize the seq file operations for 'assocs' object. */ |
| 382 | static int sctp_assocs_seq_open(struct inode *inode, struct file *file) |
| 383 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 384 | return seq_open_net(inode, file, &sctp_assoc_ops, |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 385 | sizeof(struct sctp_ht_iter)); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 386 | } |
| 387 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 388 | static const struct file_operations sctp_assocs_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 389 | .open = sctp_assocs_seq_open, |
| 390 | .read = seq_read, |
| 391 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 392 | .release = seq_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 393 | }; |
| 394 | |
| 395 | /* Set up the proc fs entry for 'assocs' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 396 | int __net_init sctp_assocs_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 397 | { |
| 398 | struct proc_dir_entry *p; |
| 399 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 400 | p = proc_create("assocs", S_IRUGO, net->sctp.proc_net_sctp, |
Pavel Emelyanov | 459eea7 | 2008-02-29 11:24:45 -0800 | [diff] [blame] | 401 | &sctp_assocs_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 402 | if (!p) |
| 403 | return -ENOMEM; |
| 404 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 405 | return 0; |
| 406 | } |
| 407 | |
| 408 | /* Cleanup the proc fs entry for 'assocs' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 409 | void sctp_assocs_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 410 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 411 | remove_proc_entry("assocs", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 412 | } |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 413 | |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 414 | static int sctp_remaddr_seq_show(struct seq_file *seq, void *v) |
| 415 | { |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 416 | struct sctp_association *assoc; |
Xin Long | 3d73e8f | 2016-02-28 10:33:11 +0800 | [diff] [blame] | 417 | struct sctp_transport *transport, *tsp; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 418 | |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 419 | if (v == SEQ_START_TOKEN) { |
| 420 | seq_printf(seq, "ADDR ASSOC_ID HB_ACT RTO MAX_PATH_RTX " |
| 421 | "REM_ADDR_RTX START STATE\n"); |
| 422 | return 0; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 423 | } |
| 424 | |
Xin Long | 3d73e8f | 2016-02-28 10:33:11 +0800 | [diff] [blame] | 425 | transport = (struct sctp_transport *)v; |
| 426 | if (!sctp_transport_hold(transport)) |
Xin Long | fba4c33 | 2016-01-22 01:49:08 +0800 | [diff] [blame] | 427 | return 0; |
Xin Long | 3d73e8f | 2016-02-28 10:33:11 +0800 | [diff] [blame] | 428 | assoc = transport->asoc; |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 429 | |
| 430 | list_for_each_entry_rcu(tsp, &assoc->peer.transport_addr_list, |
| 431 | transports) { |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 432 | /* |
| 433 | * The remote address (ADDR) |
| 434 | */ |
| 435 | tsp->af_specific->seq_dump_addr(seq, &tsp->ipaddr); |
| 436 | seq_printf(seq, " "); |
| 437 | /* |
| 438 | * The association ID (ASSOC_ID) |
| 439 | */ |
| 440 | seq_printf(seq, "%d ", tsp->asoc->assoc_id); |
| 441 | |
| 442 | /* |
| 443 | * If the Heartbeat is active (HB_ACT) |
| 444 | * Note: 1 = Active, 0 = Inactive |
| 445 | */ |
| 446 | seq_printf(seq, "%d ", timer_pending(&tsp->hb_timer)); |
| 447 | |
| 448 | /* |
| 449 | * Retransmit time out (RTO) |
| 450 | */ |
| 451 | seq_printf(seq, "%lu ", tsp->rto); |
| 452 | |
| 453 | /* |
| 454 | * Maximum path retransmit count (PATH_MAX_RTX) |
| 455 | */ |
| 456 | seq_printf(seq, "%d ", tsp->pathmaxrxt); |
| 457 | |
| 458 | /* |
| 459 | * remote address retransmit count (REM_ADDR_RTX) |
| 460 | * Note: We don't have a way to tally this at the moment |
| 461 | * so lets just leave it as zero for the moment |
| 462 | */ |
| 463 | seq_puts(seq, "0 "); |
| 464 | |
| 465 | /* |
| 466 | * remote address start time (START). This is also not |
| 467 | * currently implemented, but we can record it with a |
| 468 | * jiffies marker in a subsequent patch |
| 469 | */ |
| 470 | seq_puts(seq, "0 "); |
| 471 | |
| 472 | /* |
| 473 | * The current state of this destination. I.e. |
| 474 | * SCTP_ACTIVE, SCTP_INACTIVE, ... |
| 475 | */ |
| 476 | seq_printf(seq, "%d", tsp->state); |
| 477 | |
| 478 | seq_printf(seq, "\n"); |
| 479 | } |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 480 | |
Xin Long | 3d73e8f | 2016-02-28 10:33:11 +0800 | [diff] [blame] | 481 | sctp_transport_put(transport); |
Xin Long | fba4c33 | 2016-01-22 01:49:08 +0800 | [diff] [blame] | 482 | |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 483 | return 0; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 484 | } |
| 485 | |
| 486 | static const struct seq_operations sctp_remaddr_ops = { |
Xin Long | b5e2f4e | 2016-04-14 15:35:34 +0800 | [diff] [blame] | 487 | .start = sctp_transport_seq_start, |
| 488 | .next = sctp_transport_seq_next, |
| 489 | .stop = sctp_transport_seq_stop, |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 490 | .show = sctp_remaddr_seq_show, |
| 491 | }; |
| 492 | |
| 493 | /* Cleanup the proc fs entry for 'remaddr' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 494 | void sctp_remaddr_proc_exit(struct net *net) |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 495 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 496 | remove_proc_entry("remaddr", net->sctp.proc_net_sctp); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 497 | } |
| 498 | |
| 499 | static int sctp_remaddr_seq_open(struct inode *inode, struct file *file) |
| 500 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 501 | return seq_open_net(inode, file, &sctp_remaddr_ops, |
Xin Long | 39f66a7 | 2015-12-30 23:50:48 +0800 | [diff] [blame] | 502 | sizeof(struct sctp_ht_iter)); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 503 | } |
| 504 | |
| 505 | static const struct file_operations sctp_remaddr_seq_fops = { |
| 506 | .open = sctp_remaddr_seq_open, |
| 507 | .read = seq_read, |
| 508 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 509 | .release = seq_release_net, |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 510 | }; |
| 511 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 512 | int __net_init sctp_remaddr_proc_init(struct net *net) |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 513 | { |
| 514 | struct proc_dir_entry *p; |
| 515 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 516 | p = proc_create("remaddr", S_IRUGO, net->sctp.proc_net_sctp, |
| 517 | &sctp_remaddr_seq_fops); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 518 | if (!p) |
| 519 | return -ENOMEM; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 520 | return 0; |
| 521 | } |