]>
Commit | Line | Data |
---|---|---|
60c778b2 | 1 | /* SCTP kernel implementation |
1da177e4 LT |
2 | * Copyright (c) 2003 International Business Machines, Corp. |
3 | * | |
60c778b2 | 4 | * This file is part of the SCTP kernel implementation |
1da177e4 | 5 | * |
60c778b2 | 6 | * This SCTP implementation is free software; |
1da177e4 LT |
7 | * you can redistribute it and/or modify it under the terms of |
8 | * the GNU General Public License as published by | |
9 | * the Free Software Foundation; either version 2, or (at your option) | |
10 | * any later version. | |
11 | * | |
60c778b2 | 12 | * This SCTP implementation is distributed in the hope that it |
1da177e4 LT |
13 | * will be useful, but WITHOUT ANY WARRANTY; without even the implied |
14 | * ************************ | |
15 | * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. | |
16 | * See the GNU General Public License for more details. | |
17 | * | |
18 | * You should have received a copy of the GNU General Public License | |
19 | * along with GNU CC; see the file COPYING. If not, write to | |
20 | * the Free Software Foundation, 59 Temple Place - Suite 330, | |
21 | * Boston, MA 02111-1307, USA. | |
22 | * | |
23 | * Please send any bug reports or fixes you make to the | |
24 | * email address(es): | |
91705c61 | 25 | * lksctp developers <[email protected]> |
1da177e4 | 26 | * |
1da177e4 LT |
27 | * Written or modified by: |
28 | * Sridhar Samudrala <[email protected]> | |
1da177e4 LT |
29 | */ |
30 | ||
31 | #include <linux/types.h> | |
32 | #include <linux/seq_file.h> | |
33 | #include <linux/init.h> | |
bc3b2d7f | 34 | #include <linux/export.h> |
1da177e4 | 35 | #include <net/sctp/sctp.h> |
3f5340a6 | 36 | #include <net/ip.h> /* for snmp_fold_field */ |
1da177e4 | 37 | |
5833929c | 38 | static const struct snmp_mib sctp_snmp_list[] = { |
1da177e4 LT |
39 | SNMP_MIB_ITEM("SctpCurrEstab", SCTP_MIB_CURRESTAB), |
40 | SNMP_MIB_ITEM("SctpActiveEstabs", SCTP_MIB_ACTIVEESTABS), | |
41 | SNMP_MIB_ITEM("SctpPassiveEstabs", SCTP_MIB_PASSIVEESTABS), | |
42 | SNMP_MIB_ITEM("SctpAborteds", SCTP_MIB_ABORTEDS), | |
43 | SNMP_MIB_ITEM("SctpShutdowns", SCTP_MIB_SHUTDOWNS), | |
44 | SNMP_MIB_ITEM("SctpOutOfBlues", SCTP_MIB_OUTOFBLUES), | |
45 | SNMP_MIB_ITEM("SctpChecksumErrors", SCTP_MIB_CHECKSUMERRORS), | |
46 | SNMP_MIB_ITEM("SctpOutCtrlChunks", SCTP_MIB_OUTCTRLCHUNKS), | |
47 | SNMP_MIB_ITEM("SctpOutOrderChunks", SCTP_MIB_OUTORDERCHUNKS), | |
48 | SNMP_MIB_ITEM("SctpOutUnorderChunks", SCTP_MIB_OUTUNORDERCHUNKS), | |
49 | SNMP_MIB_ITEM("SctpInCtrlChunks", SCTP_MIB_INCTRLCHUNKS), | |
50 | SNMP_MIB_ITEM("SctpInOrderChunks", SCTP_MIB_INORDERCHUNKS), | |
51 | SNMP_MIB_ITEM("SctpInUnorderChunks", SCTP_MIB_INUNORDERCHUNKS), | |
52 | SNMP_MIB_ITEM("SctpFragUsrMsgs", SCTP_MIB_FRAGUSRMSGS), | |
53 | SNMP_MIB_ITEM("SctpReasmUsrMsgs", SCTP_MIB_REASMUSRMSGS), | |
54 | SNMP_MIB_ITEM("SctpOutSCTPPacks", SCTP_MIB_OUTSCTPPACKS), | |
55 | SNMP_MIB_ITEM("SctpInSCTPPacks", SCTP_MIB_INSCTPPACKS), | |
ac0b0462 SS |
56 | SNMP_MIB_ITEM("SctpT1InitExpireds", SCTP_MIB_T1_INIT_EXPIREDS), |
57 | SNMP_MIB_ITEM("SctpT1CookieExpireds", SCTP_MIB_T1_COOKIE_EXPIREDS), | |
58 | SNMP_MIB_ITEM("SctpT2ShutdownExpireds", SCTP_MIB_T2_SHUTDOWN_EXPIREDS), | |
59 | SNMP_MIB_ITEM("SctpT3RtxExpireds", SCTP_MIB_T3_RTX_EXPIREDS), | |
60 | SNMP_MIB_ITEM("SctpT4RtoExpireds", SCTP_MIB_T4_RTO_EXPIREDS), | |
61 | SNMP_MIB_ITEM("SctpT5ShutdownGuardExpireds", SCTP_MIB_T5_SHUTDOWN_GUARD_EXPIREDS), | |
62 | SNMP_MIB_ITEM("SctpDelaySackExpireds", SCTP_MIB_DELAY_SACK_EXPIREDS), | |
63 | SNMP_MIB_ITEM("SctpAutocloseExpireds", SCTP_MIB_AUTOCLOSE_EXPIREDS), | |
64 | SNMP_MIB_ITEM("SctpT3Retransmits", SCTP_MIB_T3_RETRANSMITS), | |
65 | SNMP_MIB_ITEM("SctpPmtudRetransmits", SCTP_MIB_PMTUD_RETRANSMITS), | |
66 | SNMP_MIB_ITEM("SctpFastRetransmits", SCTP_MIB_FAST_RETRANSMITS), | |
67 | SNMP_MIB_ITEM("SctpInPktSoftirq", SCTP_MIB_IN_PKT_SOFTIRQ), | |
68 | SNMP_MIB_ITEM("SctpInPktBacklog", SCTP_MIB_IN_PKT_BACKLOG), | |
69 | SNMP_MIB_ITEM("SctpInPktDiscards", SCTP_MIB_IN_PKT_DISCARDS), | |
70 | SNMP_MIB_ITEM("SctpInDataChunkDiscards", SCTP_MIB_IN_DATA_CHUNK_DISCARDS), | |
d2287f84 | 71 | SNMP_MIB_SENTINEL |
1da177e4 LT |
72 | }; |
73 | ||
1da177e4 LT |
74 | /* Display sctp snmp mib statistics(/proc/net/sctp/snmp). */ |
75 | static int sctp_snmp_seq_show(struct seq_file *seq, void *v) | |
76 | { | |
13d782f6 | 77 | struct net *net = seq->private; |
1da177e4 LT |
78 | int i; |
79 | ||
80 | for (i = 0; sctp_snmp_list[i].name != NULL; i++) | |
81 | seq_printf(seq, "%-32s\t%ld\n", sctp_snmp_list[i].name, | |
b01a2407 | 82 | snmp_fold_field((void __percpu **)net->sctp.sctp_statistics, |
1da177e4 LT |
83 | sctp_snmp_list[i].entry)); |
84 | ||
85 | return 0; | |
86 | } | |
87 | ||
88 | /* Initialize the seq file operations for 'snmp' object. */ | |
89 | static int sctp_snmp_seq_open(struct inode *inode, struct file *file) | |
90 | { | |
13d782f6 | 91 | return single_open_net(inode, file, sctp_snmp_seq_show); |
1da177e4 LT |
92 | } |
93 | ||
da7071d7 | 94 | static const struct file_operations sctp_snmp_seq_fops = { |
1da177e4 LT |
95 | .owner = THIS_MODULE, |
96 | .open = sctp_snmp_seq_open, | |
97 | .read = seq_read, | |
98 | .llseek = seq_lseek, | |
0da9a0c2 | 99 | .release = single_release_net, |
1da177e4 LT |
100 | }; |
101 | ||
102 | /* Set up the proc fs entry for 'snmp' object. */ | |
13d782f6 | 103 | int __net_init sctp_snmp_proc_init(struct net *net) |
1da177e4 LT |
104 | { |
105 | struct proc_dir_entry *p; | |
106 | ||
13d782f6 EB |
107 | p = proc_create("snmp", S_IRUGO, net->sctp.proc_net_sctp, |
108 | &sctp_snmp_seq_fops); | |
1da177e4 LT |
109 | if (!p) |
110 | return -ENOMEM; | |
111 | ||
1da177e4 LT |
112 | return 0; |
113 | } | |
114 | ||
115 | /* Cleanup the proc fs entry for 'snmp' object. */ | |
13d782f6 | 116 | void sctp_snmp_proc_exit(struct net *net) |
1da177e4 | 117 | { |
13d782f6 | 118 | remove_proc_entry("snmp", net->sctp.proc_net_sctp); |
1da177e4 LT |
119 | } |
120 | ||
121 | /* Dump local addresses of an association/endpoint. */ | |
122 | static void sctp_seq_dump_local_addrs(struct seq_file *seq, struct sctp_ep_common *epb) | |
123 | { | |
bca735bd | 124 | struct sctp_association *asoc; |
1da177e4 | 125 | struct sctp_sockaddr_entry *laddr; |
bca735bd VY |
126 | struct sctp_transport *peer; |
127 | union sctp_addr *addr, *primary = NULL; | |
1da177e4 LT |
128 | struct sctp_af *af; |
129 | ||
bca735bd | 130 | if (epb->type == SCTP_EP_TYPE_ASSOCIATION) { |
f9e42b85 DB |
131 | asoc = sctp_assoc(epb); |
132 | ||
133 | peer = asoc->peer.primary_path; | |
134 | if (unlikely(peer == NULL)) { | |
b527fe69 | 135 | WARN(1, "Association %p with NULL primary path!\n", asoc); |
f9e42b85 DB |
136 | return; |
137 | } | |
138 | ||
139 | primary = &peer->saddr; | |
bca735bd VY |
140 | } |
141 | ||
0b0fe913 TG |
142 | rcu_read_lock(); |
143 | list_for_each_entry_rcu(laddr, &epb->bind_addr.address_list, list) { | |
144 | if (!laddr->valid) | |
145 | continue; | |
146 | ||
5f242a13 | 147 | addr = &laddr->a; |
1da177e4 | 148 | af = sctp_get_af_specific(addr->sa.sa_family); |
bca735bd VY |
149 | if (primary && af->cmp_addr(addr, primary)) { |
150 | seq_printf(seq, "*"); | |
151 | } | |
5f242a13 | 152 | af->seq_dump_addr(seq, addr); |
1da177e4 | 153 | } |
0b0fe913 | 154 | rcu_read_unlock(); |
1da177e4 LT |
155 | } |
156 | ||
157 | /* Dump remote addresses of an association. */ | |
158 | static void sctp_seq_dump_remote_addrs(struct seq_file *seq, struct sctp_association *assoc) | |
159 | { | |
1da177e4 | 160 | struct sctp_transport *transport; |
bca735bd | 161 | union sctp_addr *addr, *primary; |
1da177e4 LT |
162 | struct sctp_af *af; |
163 | ||
acd2bc96 | 164 | primary = &assoc->peer.primary_addr; |
45122ca2 TG |
165 | rcu_read_lock(); |
166 | list_for_each_entry_rcu(transport, &assoc->peer.transport_addr_list, | |
9dbc15f0 | 167 | transports) { |
5f242a13 | 168 | addr = &transport->ipaddr; |
45122ca2 TG |
169 | if (transport->dead) |
170 | continue; | |
171 | ||
1da177e4 | 172 | af = sctp_get_af_specific(addr->sa.sa_family); |
acd2bc96 | 173 | if (af->cmp_addr(addr, primary)) { |
bca735bd VY |
174 | seq_printf(seq, "*"); |
175 | } | |
5f242a13 | 176 | af->seq_dump_addr(seq, addr); |
1da177e4 | 177 | } |
45122ca2 | 178 | rcu_read_unlock(); |
1da177e4 LT |
179 | } |
180 | ||
bca735bd VY |
181 | static void * sctp_eps_seq_start(struct seq_file *seq, loff_t *pos) |
182 | { | |
49392e5e | 183 | if (*pos >= sctp_ep_hashsize) |
bca735bd VY |
184 | return NULL; |
185 | ||
186 | if (*pos < 0) | |
187 | *pos = 0; | |
188 | ||
189 | if (*pos == 0) | |
190 | seq_printf(seq, " ENDPT SOCK STY SST HBKT LPORT UID INODE LADDRS\n"); | |
191 | ||
bca735bd VY |
192 | return (void *)pos; |
193 | } | |
194 | ||
195 | static void sctp_eps_seq_stop(struct seq_file *seq, void *v) | |
196 | { | |
bca735bd VY |
197 | } |
198 | ||
199 | ||
200 | static void * sctp_eps_seq_next(struct seq_file *seq, void *v, loff_t *pos) | |
201 | { | |
49392e5e | 202 | if (++*pos >= sctp_ep_hashsize) |
bca735bd VY |
203 | return NULL; |
204 | ||
bca735bd VY |
205 | return pos; |
206 | } | |
207 | ||
208 | ||
1da177e4 LT |
209 | /* Display sctp endpoints (/proc/net/sctp/eps). */ |
210 | static int sctp_eps_seq_show(struct seq_file *seq, void *v) | |
211 | { | |
212 | struct sctp_hashbucket *head; | |
213 | struct sctp_ep_common *epb; | |
214 | struct sctp_endpoint *ep; | |
215 | struct sock *sk; | |
38b0e42a | 216 | int hash = *(loff_t *)v; |
bca735bd | 217 | |
49392e5e | 218 | if (hash >= sctp_ep_hashsize) |
bca735bd VY |
219 | return -ENOMEM; |
220 | ||
49392e5e | 221 | head = &sctp_ep_hashtable[hash]; |
bca735bd VY |
222 | sctp_local_bh_disable(); |
223 | read_lock(&head->lock); | |
b67bfe0d | 224 | sctp_for_each_hentry(epb, &head->chain) { |
bca735bd VY |
225 | ep = sctp_ep(epb); |
226 | sk = epb->sk; | |
6932f119 | 227 | if (!net_eq(sock_net(sk), seq_file_net(seq))) |
13d782f6 | 228 | continue; |
d14c5ab6 | 229 | seq_printf(seq, "%8pK %8pK %-3d %-3d %-4d %-5d %5u %5lu ", ep, sk, |
49392e5e | 230 | sctp_sk(sk)->type, sk->sk_state, hash, |
bca735bd | 231 | epb->bind_addr.port, |
a7cb5a49 EB |
232 | from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), |
233 | sock_i_ino(sk)); | |
bca735bd VY |
234 | |
235 | sctp_seq_dump_local_addrs(seq, epb); | |
236 | seq_printf(seq, "\n"); | |
1da177e4 | 237 | } |
bca735bd VY |
238 | read_unlock(&head->lock); |
239 | sctp_local_bh_enable(); | |
1da177e4 LT |
240 | |
241 | return 0; | |
242 | } | |
243 | ||
56b3d975 | 244 | static const struct seq_operations sctp_eps_ops = { |
bca735bd VY |
245 | .start = sctp_eps_seq_start, |
246 | .next = sctp_eps_seq_next, | |
247 | .stop = sctp_eps_seq_stop, | |
248 | .show = sctp_eps_seq_show, | |
249 | }; | |
250 | ||
251 | ||
1da177e4 LT |
252 | /* Initialize the seq file operations for 'eps' object. */ |
253 | static int sctp_eps_seq_open(struct inode *inode, struct file *file) | |
254 | { | |
13d782f6 EB |
255 | return seq_open_net(inode, file, &sctp_eps_ops, |
256 | sizeof(struct seq_net_private)); | |
1da177e4 LT |
257 | } |
258 | ||
da7071d7 | 259 | static const struct file_operations sctp_eps_seq_fops = { |
1da177e4 LT |
260 | .open = sctp_eps_seq_open, |
261 | .read = seq_read, | |
262 | .llseek = seq_lseek, | |
0da9a0c2 | 263 | .release = seq_release_net, |
1da177e4 LT |
264 | }; |
265 | ||
266 | /* Set up the proc fs entry for 'eps' object. */ | |
13d782f6 | 267 | int __net_init sctp_eps_proc_init(struct net *net) |
1da177e4 LT |
268 | { |
269 | struct proc_dir_entry *p; | |
270 | ||
13d782f6 EB |
271 | p = proc_create("eps", S_IRUGO, net->sctp.proc_net_sctp, |
272 | &sctp_eps_seq_fops); | |
1da177e4 LT |
273 | if (!p) |
274 | return -ENOMEM; | |
275 | ||
1da177e4 LT |
276 | return 0; |
277 | } | |
278 | ||
279 | /* Cleanup the proc fs entry for 'eps' object. */ | |
13d782f6 | 280 | void sctp_eps_proc_exit(struct net *net) |
1da177e4 | 281 | { |
13d782f6 | 282 | remove_proc_entry("eps", net->sctp.proc_net_sctp); |
1da177e4 LT |
283 | } |
284 | ||
bca735bd VY |
285 | |
286 | static void * sctp_assocs_seq_start(struct seq_file *seq, loff_t *pos) | |
287 | { | |
49392e5e | 288 | if (*pos >= sctp_assoc_hashsize) |
bca735bd VY |
289 | return NULL; |
290 | ||
291 | if (*pos < 0) | |
292 | *pos = 0; | |
293 | ||
294 | if (*pos == 0) | |
58fbbed4 NH |
295 | seq_printf(seq, " ASSOC SOCK STY SST ST HBKT " |
296 | "ASSOC-ID TX_QUEUE RX_QUEUE UID INODE LPORT " | |
297 | "RPORT LADDRS <-> RADDRS " | |
f406c8b9 DD |
298 | "HBINT INS OUTS MAXRT T1X T2X RTXC " |
299 | "wmema wmemq sndbuf rcvbuf\n"); | |
bca735bd | 300 | |
bca735bd VY |
301 | return (void *)pos; |
302 | } | |
303 | ||
304 | static void sctp_assocs_seq_stop(struct seq_file *seq, void *v) | |
305 | { | |
bca735bd VY |
306 | } |
307 | ||
308 | ||
309 | static void * sctp_assocs_seq_next(struct seq_file *seq, void *v, loff_t *pos) | |
310 | { | |
49392e5e | 311 | if (++*pos >= sctp_assoc_hashsize) |
bca735bd VY |
312 | return NULL; |
313 | ||
bca735bd VY |
314 | return pos; |
315 | } | |
316 | ||
1da177e4 LT |
317 | /* Display sctp associations (/proc/net/sctp/assocs). */ |
318 | static int sctp_assocs_seq_show(struct seq_file *seq, void *v) | |
319 | { | |
320 | struct sctp_hashbucket *head; | |
321 | struct sctp_ep_common *epb; | |
322 | struct sctp_association *assoc; | |
323 | struct sock *sk; | |
38b0e42a | 324 | int hash = *(loff_t *)v; |
bca735bd | 325 | |
49392e5e | 326 | if (hash >= sctp_assoc_hashsize) |
bca735bd VY |
327 | return -ENOMEM; |
328 | ||
49392e5e | 329 | head = &sctp_assoc_hashtable[hash]; |
bca735bd VY |
330 | sctp_local_bh_disable(); |
331 | read_lock(&head->lock); | |
b67bfe0d | 332 | sctp_for_each_hentry(epb, &head->chain) { |
bca735bd VY |
333 | assoc = sctp_assoc(epb); |
334 | sk = epb->sk; | |
6932f119 | 335 | if (!net_eq(sock_net(sk), seq_file_net(seq))) |
13d782f6 | 336 | continue; |
bca735bd | 337 | seq_printf(seq, |
71338aa7 | 338 | "%8pK %8pK %-3d %-3d %-2d %-4d " |
d14c5ab6 | 339 | "%4d %8d %8d %7u %5lu %-5d %5d ", |
bca735bd | 340 | assoc, sk, sctp_sk(sk)->type, sk->sk_state, |
58fbbed4 NH |
341 | assoc->state, hash, |
342 | assoc->assoc_id, | |
bca735bd | 343 | assoc->sndbuf_used, |
6aa2551c | 344 | atomic_read(&assoc->rmem_alloc), |
a7cb5a49 EB |
345 | from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), |
346 | sock_i_ino(sk), | |
bca735bd | 347 | epb->bind_addr.port, |
30e93560 | 348 | assoc->peer.port); |
bca735bd VY |
349 | seq_printf(seq, " "); |
350 | sctp_seq_dump_local_addrs(seq, epb); | |
351 | seq_printf(seq, "<-> "); | |
352 | sctp_seq_dump_remote_addrs(seq, assoc); | |
f406c8b9 DD |
353 | seq_printf(seq, "\t%8lu %5d %5d %4d %4d %4d %8d " |
354 | "%8d %8d %8d %8d", | |
30e93560 NH |
355 | assoc->hbinterval, assoc->c.sinit_max_instreams, |
356 | assoc->c.sinit_num_ostreams, assoc->max_retrans, | |
357 | assoc->init_retries, assoc->shutdown_retries, | |
f406c8b9 DD |
358 | assoc->rtx_data_chunks, |
359 | atomic_read(&sk->sk_wmem_alloc), | |
360 | sk->sk_wmem_queued, | |
361 | sk->sk_sndbuf, | |
362 | sk->sk_rcvbuf); | |
bca735bd | 363 | seq_printf(seq, "\n"); |
1da177e4 | 364 | } |
bca735bd VY |
365 | read_unlock(&head->lock); |
366 | sctp_local_bh_enable(); | |
1da177e4 LT |
367 | |
368 | return 0; | |
369 | } | |
370 | ||
56b3d975 | 371 | static const struct seq_operations sctp_assoc_ops = { |
bca735bd VY |
372 | .start = sctp_assocs_seq_start, |
373 | .next = sctp_assocs_seq_next, | |
374 | .stop = sctp_assocs_seq_stop, | |
375 | .show = sctp_assocs_seq_show, | |
376 | }; | |
377 | ||
1da177e4 LT |
378 | /* Initialize the seq file operations for 'assocs' object. */ |
379 | static int sctp_assocs_seq_open(struct inode *inode, struct file *file) | |
380 | { | |
13d782f6 EB |
381 | return seq_open_net(inode, file, &sctp_assoc_ops, |
382 | sizeof(struct seq_net_private)); | |
1da177e4 LT |
383 | } |
384 | ||
da7071d7 | 385 | static const struct file_operations sctp_assocs_seq_fops = { |
1da177e4 LT |
386 | .open = sctp_assocs_seq_open, |
387 | .read = seq_read, | |
388 | .llseek = seq_lseek, | |
0da9a0c2 | 389 | .release = seq_release_net, |
1da177e4 LT |
390 | }; |
391 | ||
392 | /* Set up the proc fs entry for 'assocs' object. */ | |
13d782f6 | 393 | int __net_init sctp_assocs_proc_init(struct net *net) |
1da177e4 LT |
394 | { |
395 | struct proc_dir_entry *p; | |
396 | ||
13d782f6 | 397 | p = proc_create("assocs", S_IRUGO, net->sctp.proc_net_sctp, |
459eea74 | 398 | &sctp_assocs_seq_fops); |
1da177e4 LT |
399 | if (!p) |
400 | return -ENOMEM; | |
401 | ||
1da177e4 LT |
402 | return 0; |
403 | } | |
404 | ||
405 | /* Cleanup the proc fs entry for 'assocs' object. */ | |
13d782f6 | 406 | void sctp_assocs_proc_exit(struct net *net) |
1da177e4 | 407 | { |
13d782f6 | 408 | remove_proc_entry("assocs", net->sctp.proc_net_sctp); |
1da177e4 | 409 | } |
20c2c1fd NH |
410 | |
411 | static void *sctp_remaddr_seq_start(struct seq_file *seq, loff_t *pos) | |
412 | { | |
413 | if (*pos >= sctp_assoc_hashsize) | |
414 | return NULL; | |
415 | ||
416 | if (*pos < 0) | |
417 | *pos = 0; | |
418 | ||
419 | if (*pos == 0) | |
420 | seq_printf(seq, "ADDR ASSOC_ID HB_ACT RTO MAX_PATH_RTX " | |
421 | "REM_ADDR_RTX START\n"); | |
422 | ||
423 | return (void *)pos; | |
424 | } | |
425 | ||
426 | static void *sctp_remaddr_seq_next(struct seq_file *seq, void *v, loff_t *pos) | |
427 | { | |
428 | if (++*pos >= sctp_assoc_hashsize) | |
429 | return NULL; | |
430 | ||
431 | return pos; | |
432 | } | |
433 | ||
434 | static void sctp_remaddr_seq_stop(struct seq_file *seq, void *v) | |
435 | { | |
20c2c1fd NH |
436 | } |
437 | ||
438 | static int sctp_remaddr_seq_show(struct seq_file *seq, void *v) | |
439 | { | |
440 | struct sctp_hashbucket *head; | |
441 | struct sctp_ep_common *epb; | |
442 | struct sctp_association *assoc; | |
20c2c1fd NH |
443 | struct sctp_transport *tsp; |
444 | int hash = *(loff_t *)v; | |
445 | ||
446 | if (hash >= sctp_assoc_hashsize) | |
447 | return -ENOMEM; | |
448 | ||
449 | head = &sctp_assoc_hashtable[hash]; | |
450 | sctp_local_bh_disable(); | |
451 | read_lock(&head->lock); | |
45122ca2 | 452 | rcu_read_lock(); |
b67bfe0d | 453 | sctp_for_each_hentry(epb, &head->chain) { |
6932f119 | 454 | if (!net_eq(sock_net(epb->sk), seq_file_net(seq))) |
13d782f6 | 455 | continue; |
20c2c1fd | 456 | assoc = sctp_assoc(epb); |
45122ca2 | 457 | list_for_each_entry_rcu(tsp, &assoc->peer.transport_addr_list, |
20c2c1fd | 458 | transports) { |
45122ca2 TG |
459 | if (tsp->dead) |
460 | continue; | |
461 | ||
20c2c1fd NH |
462 | /* |
463 | * The remote address (ADDR) | |
464 | */ | |
465 | tsp->af_specific->seq_dump_addr(seq, &tsp->ipaddr); | |
466 | seq_printf(seq, " "); | |
467 | ||
468 | /* | |
469 | * The association ID (ASSOC_ID) | |
470 | */ | |
471 | seq_printf(seq, "%d ", tsp->asoc->assoc_id); | |
472 | ||
473 | /* | |
474 | * If the Heartbeat is active (HB_ACT) | |
475 | * Note: 1 = Active, 0 = Inactive | |
476 | */ | |
477 | seq_printf(seq, "%d ", timer_pending(&tsp->hb_timer)); | |
478 | ||
479 | /* | |
480 | * Retransmit time out (RTO) | |
481 | */ | |
482 | seq_printf(seq, "%lu ", tsp->rto); | |
483 | ||
484 | /* | |
485 | * Maximum path retransmit count (PATH_MAX_RTX) | |
486 | */ | |
487 | seq_printf(seq, "%d ", tsp->pathmaxrxt); | |
488 | ||
489 | /* | |
490 | * remote address retransmit count (REM_ADDR_RTX) | |
491 | * Note: We don't have a way to tally this at the moment | |
492 | * so lets just leave it as zero for the moment | |
493 | */ | |
494 | seq_printf(seq, "0 "); | |
495 | ||
496 | /* | |
497 | * remote address start time (START). This is also not | |
498 | * currently implemented, but we can record it with a | |
499 | * jiffies marker in a subsequent patch | |
500 | */ | |
501 | seq_printf(seq, "0"); | |
502 | ||
503 | seq_printf(seq, "\n"); | |
504 | } | |
505 | } | |
506 | ||
45122ca2 | 507 | rcu_read_unlock(); |
20c2c1fd NH |
508 | read_unlock(&head->lock); |
509 | sctp_local_bh_enable(); | |
510 | ||
511 | return 0; | |
512 | ||
513 | } | |
514 | ||
515 | static const struct seq_operations sctp_remaddr_ops = { | |
516 | .start = sctp_remaddr_seq_start, | |
517 | .next = sctp_remaddr_seq_next, | |
518 | .stop = sctp_remaddr_seq_stop, | |
519 | .show = sctp_remaddr_seq_show, | |
520 | }; | |
521 | ||
522 | /* Cleanup the proc fs entry for 'remaddr' object. */ | |
13d782f6 | 523 | void sctp_remaddr_proc_exit(struct net *net) |
20c2c1fd | 524 | { |
13d782f6 | 525 | remove_proc_entry("remaddr", net->sctp.proc_net_sctp); |
20c2c1fd NH |
526 | } |
527 | ||
528 | static int sctp_remaddr_seq_open(struct inode *inode, struct file *file) | |
529 | { | |
13d782f6 EB |
530 | return seq_open_net(inode, file, &sctp_remaddr_ops, |
531 | sizeof(struct seq_net_private)); | |
20c2c1fd NH |
532 | } |
533 | ||
534 | static const struct file_operations sctp_remaddr_seq_fops = { | |
535 | .open = sctp_remaddr_seq_open, | |
536 | .read = seq_read, | |
537 | .llseek = seq_lseek, | |
0da9a0c2 | 538 | .release = seq_release_net, |
20c2c1fd NH |
539 | }; |
540 | ||
13d782f6 | 541 | int __net_init sctp_remaddr_proc_init(struct net *net) |
20c2c1fd NH |
542 | { |
543 | struct proc_dir_entry *p; | |
544 | ||
13d782f6 EB |
545 | p = proc_create("remaddr", S_IRUGO, net->sctp.proc_net_sctp, |
546 | &sctp_remaddr_seq_fops); | |
20c2c1fd NH |
547 | if (!p) |
548 | return -ENOMEM; | |
20c2c1fd NH |
549 | return 0; |
550 | } |