1 /* SCTP kernel implementation 2 * Copyright (c) 2003 International Business Machines, Corp. 3 * 4 * This file is part of the SCTP kernel implementation 5 * 6 * This SCTP implementation is free software; 7 * you can redistribute it and/or modify it under the terms of 8 * the GNU General Public License as published by 9 * the Free Software Foundation; either version 2, or (at your option) 10 * any later version. 11 * 12 * This SCTP implementation is distributed in the hope that it 13 * will be useful, but WITHOUT ANY WARRANTY; without even the implied 14 * ************************ 15 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 16 * See the GNU General Public License for more details. 17 * 18 * You should have received a copy of the GNU General Public License 19 * along with GNU CC; see the file COPYING. If not, write to 20 * the Free Software Foundation, 59 Temple Place - Suite 330, 21 * Boston, MA 02111-1307, USA. 22 * 23 * Please send any bug reports or fixes you make to the 24 * email address(es): 25 * lksctp developers <lksctp-developers@lists.sourceforge.net> 26 * 27 * Or submit a bug report through the following website: 28 * http://www.sf.net/projects/lksctp 29 * 30 * Written or modified by: 31 * Sridhar Samudrala <sri@us.ibm.com> 32 * 33 * Any bugs reported given to us we will try to fix... any fixes shared will 34 * be incorporated into the next SCTP release. 35 */ 36 37 #include <linux/types.h> 38 #include <linux/seq_file.h> 39 #include <linux/init.h> 40 #include <linux/export.h> 41 #include <net/sctp/sctp.h> 42 #include <net/ip.h> /* for snmp_fold_field */ 43 44 static const struct snmp_mib sctp_snmp_list[] = { 45 SNMP_MIB_ITEM("SctpCurrEstab", SCTP_MIB_CURRESTAB), 46 SNMP_MIB_ITEM("SctpActiveEstabs", SCTP_MIB_ACTIVEESTABS), 47 SNMP_MIB_ITEM("SctpPassiveEstabs", SCTP_MIB_PASSIVEESTABS), 48 SNMP_MIB_ITEM("SctpAborteds", SCTP_MIB_ABORTEDS), 49 SNMP_MIB_ITEM("SctpShutdowns", SCTP_MIB_SHUTDOWNS), 50 SNMP_MIB_ITEM("SctpOutOfBlues", SCTP_MIB_OUTOFBLUES), 51 SNMP_MIB_ITEM("SctpChecksumErrors", SCTP_MIB_CHECKSUMERRORS), 52 SNMP_MIB_ITEM("SctpOutCtrlChunks", SCTP_MIB_OUTCTRLCHUNKS), 53 SNMP_MIB_ITEM("SctpOutOrderChunks", SCTP_MIB_OUTORDERCHUNKS), 54 SNMP_MIB_ITEM("SctpOutUnorderChunks", SCTP_MIB_OUTUNORDERCHUNKS), 55 SNMP_MIB_ITEM("SctpInCtrlChunks", SCTP_MIB_INCTRLCHUNKS), 56 SNMP_MIB_ITEM("SctpInOrderChunks", SCTP_MIB_INORDERCHUNKS), 57 SNMP_MIB_ITEM("SctpInUnorderChunks", SCTP_MIB_INUNORDERCHUNKS), 58 SNMP_MIB_ITEM("SctpFragUsrMsgs", SCTP_MIB_FRAGUSRMSGS), 59 SNMP_MIB_ITEM("SctpReasmUsrMsgs", SCTP_MIB_REASMUSRMSGS), 60 SNMP_MIB_ITEM("SctpOutSCTPPacks", SCTP_MIB_OUTSCTPPACKS), 61 SNMP_MIB_ITEM("SctpInSCTPPacks", SCTP_MIB_INSCTPPACKS), 62 SNMP_MIB_ITEM("SctpT1InitExpireds", SCTP_MIB_T1_INIT_EXPIREDS), 63 SNMP_MIB_ITEM("SctpT1CookieExpireds", SCTP_MIB_T1_COOKIE_EXPIREDS), 64 SNMP_MIB_ITEM("SctpT2ShutdownExpireds", SCTP_MIB_T2_SHUTDOWN_EXPIREDS), 65 SNMP_MIB_ITEM("SctpT3RtxExpireds", SCTP_MIB_T3_RTX_EXPIREDS), 66 SNMP_MIB_ITEM("SctpT4RtoExpireds", SCTP_MIB_T4_RTO_EXPIREDS), 67 SNMP_MIB_ITEM("SctpT5ShutdownGuardExpireds", SCTP_MIB_T5_SHUTDOWN_GUARD_EXPIREDS), 68 SNMP_MIB_ITEM("SctpDelaySackExpireds", SCTP_MIB_DELAY_SACK_EXPIREDS), 69 SNMP_MIB_ITEM("SctpAutocloseExpireds", SCTP_MIB_AUTOCLOSE_EXPIREDS), 70 SNMP_MIB_ITEM("SctpT3Retransmits", SCTP_MIB_T3_RETRANSMITS), 71 SNMP_MIB_ITEM("SctpPmtudRetransmits", SCTP_MIB_PMTUD_RETRANSMITS), 72 SNMP_MIB_ITEM("SctpFastRetransmits", SCTP_MIB_FAST_RETRANSMITS), 73 SNMP_MIB_ITEM("SctpInPktSoftirq", SCTP_MIB_IN_PKT_SOFTIRQ), 74 SNMP_MIB_ITEM("SctpInPktBacklog", SCTP_MIB_IN_PKT_BACKLOG), 75 SNMP_MIB_ITEM("SctpInPktDiscards", SCTP_MIB_IN_PKT_DISCARDS), 76 SNMP_MIB_ITEM("SctpInDataChunkDiscards", SCTP_MIB_IN_DATA_CHUNK_DISCARDS), 77 SNMP_MIB_SENTINEL 78 }; 79 80 /* Display sctp snmp mib statistics(/proc/net/sctp/snmp). */ 81 static int sctp_snmp_seq_show(struct seq_file *seq, void *v) 82 { 83 struct net *net = seq->private; 84 int i; 85 86 for (i = 0; sctp_snmp_list[i].name != NULL; i++) 87 seq_printf(seq, "%-32s\t%ld\n", sctp_snmp_list[i].name, 88 snmp_fold_field((void __percpu **)net->sctp.sctp_statistics, 89 sctp_snmp_list[i].entry)); 90 91 return 0; 92 } 93 94 /* Initialize the seq file operations for 'snmp' object. */ 95 static int sctp_snmp_seq_open(struct inode *inode, struct file *file) 96 { 97 return single_open_net(inode, file, sctp_snmp_seq_show); 98 } 99 100 static const struct file_operations sctp_snmp_seq_fops = { 101 .owner = THIS_MODULE, 102 .open = sctp_snmp_seq_open, 103 .read = seq_read, 104 .llseek = seq_lseek, 105 .release = single_release_net, 106 }; 107 108 /* Set up the proc fs entry for 'snmp' object. */ 109 int __net_init sctp_snmp_proc_init(struct net *net) 110 { 111 struct proc_dir_entry *p; 112 113 p = proc_create("snmp", S_IRUGO, net->sctp.proc_net_sctp, 114 &sctp_snmp_seq_fops); 115 if (!p) 116 return -ENOMEM; 117 118 return 0; 119 } 120 121 /* Cleanup the proc fs entry for 'snmp' object. */ 122 void sctp_snmp_proc_exit(struct net *net) 123 { 124 remove_proc_entry("snmp", net->sctp.proc_net_sctp); 125 } 126 127 /* Dump local addresses of an association/endpoint. */ 128 static void sctp_seq_dump_local_addrs(struct seq_file *seq, struct sctp_ep_common *epb) 129 { 130 struct sctp_association *asoc; 131 struct sctp_sockaddr_entry *laddr; 132 struct sctp_transport *peer; 133 union sctp_addr *addr, *primary = NULL; 134 struct sctp_af *af; 135 136 if (epb->type == SCTP_EP_TYPE_ASSOCIATION) { 137 asoc = sctp_assoc(epb); 138 peer = asoc->peer.primary_path; 139 primary = &peer->saddr; 140 } 141 142 rcu_read_lock(); 143 list_for_each_entry_rcu(laddr, &epb->bind_addr.address_list, list) { 144 if (!laddr->valid) 145 continue; 146 147 addr = &laddr->a; 148 af = sctp_get_af_specific(addr->sa.sa_family); 149 if (primary && af->cmp_addr(addr, primary)) { 150 seq_printf(seq, "*"); 151 } 152 af->seq_dump_addr(seq, addr); 153 } 154 rcu_read_unlock(); 155 } 156 157 /* Dump remote addresses of an association. */ 158 static void sctp_seq_dump_remote_addrs(struct seq_file *seq, struct sctp_association *assoc) 159 { 160 struct sctp_transport *transport; 161 union sctp_addr *addr, *primary; 162 struct sctp_af *af; 163 164 primary = &assoc->peer.primary_addr; 165 rcu_read_lock(); 166 list_for_each_entry_rcu(transport, &assoc->peer.transport_addr_list, 167 transports) { 168 addr = &transport->ipaddr; 169 if (transport->dead) 170 continue; 171 172 af = sctp_get_af_specific(addr->sa.sa_family); 173 if (af->cmp_addr(addr, primary)) { 174 seq_printf(seq, "*"); 175 } 176 af->seq_dump_addr(seq, addr); 177 } 178 rcu_read_unlock(); 179 } 180 181 static void * sctp_eps_seq_start(struct seq_file *seq, loff_t *pos) 182 { 183 if (*pos >= sctp_ep_hashsize) 184 return NULL; 185 186 if (*pos < 0) 187 *pos = 0; 188 189 if (*pos == 0) 190 seq_printf(seq, " ENDPT SOCK STY SST HBKT LPORT UID INODE LADDRS\n"); 191 192 return (void *)pos; 193 } 194 195 static void sctp_eps_seq_stop(struct seq_file *seq, void *v) 196 { 197 } 198 199 200 static void * sctp_eps_seq_next(struct seq_file *seq, void *v, loff_t *pos) 201 { 202 if (++*pos >= sctp_ep_hashsize) 203 return NULL; 204 205 return pos; 206 } 207 208 209 /* Display sctp endpoints (/proc/net/sctp/eps). */ 210 static int sctp_eps_seq_show(struct seq_file *seq, void *v) 211 { 212 struct sctp_hashbucket *head; 213 struct sctp_ep_common *epb; 214 struct sctp_endpoint *ep; 215 struct sock *sk; 216 struct hlist_node *node; 217 int hash = *(loff_t *)v; 218 219 if (hash >= sctp_ep_hashsize) 220 return -ENOMEM; 221 222 head = &sctp_ep_hashtable[hash]; 223 sctp_local_bh_disable(); 224 read_lock(&head->lock); 225 sctp_for_each_hentry(epb, node, &head->chain) { 226 ep = sctp_ep(epb); 227 sk = epb->sk; 228 if (!net_eq(sock_net(sk), seq_file_net(seq))) 229 continue; 230 seq_printf(seq, "%8pK %8pK %-3d %-3d %-4d %-5d %5d %5lu ", ep, sk, 231 sctp_sk(sk)->type, sk->sk_state, hash, 232 epb->bind_addr.port, 233 from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), 234 sock_i_ino(sk)); 235 236 sctp_seq_dump_local_addrs(seq, epb); 237 seq_printf(seq, "\n"); 238 } 239 read_unlock(&head->lock); 240 sctp_local_bh_enable(); 241 242 return 0; 243 } 244 245 static const struct seq_operations sctp_eps_ops = { 246 .start = sctp_eps_seq_start, 247 .next = sctp_eps_seq_next, 248 .stop = sctp_eps_seq_stop, 249 .show = sctp_eps_seq_show, 250 }; 251 252 253 /* Initialize the seq file operations for 'eps' object. */ 254 static int sctp_eps_seq_open(struct inode *inode, struct file *file) 255 { 256 return seq_open_net(inode, file, &sctp_eps_ops, 257 sizeof(struct seq_net_private)); 258 } 259 260 static const struct file_operations sctp_eps_seq_fops = { 261 .open = sctp_eps_seq_open, 262 .read = seq_read, 263 .llseek = seq_lseek, 264 .release = seq_release_net, 265 }; 266 267 /* Set up the proc fs entry for 'eps' object. */ 268 int __net_init sctp_eps_proc_init(struct net *net) 269 { 270 struct proc_dir_entry *p; 271 272 p = proc_create("eps", S_IRUGO, net->sctp.proc_net_sctp, 273 &sctp_eps_seq_fops); 274 if (!p) 275 return -ENOMEM; 276 277 return 0; 278 } 279 280 /* Cleanup the proc fs entry for 'eps' object. */ 281 void sctp_eps_proc_exit(struct net *net) 282 { 283 remove_proc_entry("eps", net->sctp.proc_net_sctp); 284 } 285 286 287 static void * sctp_assocs_seq_start(struct seq_file *seq, loff_t *pos) 288 { 289 if (*pos >= sctp_assoc_hashsize) 290 return NULL; 291 292 if (*pos < 0) 293 *pos = 0; 294 295 if (*pos == 0) 296 seq_printf(seq, " ASSOC SOCK STY SST ST HBKT " 297 "ASSOC-ID TX_QUEUE RX_QUEUE UID INODE LPORT " 298 "RPORT LADDRS <-> RADDRS " 299 "HBINT INS OUTS MAXRT T1X T2X RTXC\n"); 300 301 return (void *)pos; 302 } 303 304 static void sctp_assocs_seq_stop(struct seq_file *seq, void *v) 305 { 306 } 307 308 309 static void * sctp_assocs_seq_next(struct seq_file *seq, void *v, loff_t *pos) 310 { 311 if (++*pos >= sctp_assoc_hashsize) 312 return NULL; 313 314 return pos; 315 } 316 317 /* Display sctp associations (/proc/net/sctp/assocs). */ 318 static int sctp_assocs_seq_show(struct seq_file *seq, void *v) 319 { 320 struct sctp_hashbucket *head; 321 struct sctp_ep_common *epb; 322 struct sctp_association *assoc; 323 struct sock *sk; 324 struct hlist_node *node; 325 int hash = *(loff_t *)v; 326 327 if (hash >= sctp_assoc_hashsize) 328 return -ENOMEM; 329 330 head = &sctp_assoc_hashtable[hash]; 331 sctp_local_bh_disable(); 332 read_lock(&head->lock); 333 sctp_for_each_hentry(epb, node, &head->chain) { 334 assoc = sctp_assoc(epb); 335 sk = epb->sk; 336 if (!net_eq(sock_net(sk), seq_file_net(seq))) 337 continue; 338 seq_printf(seq, 339 "%8pK %8pK %-3d %-3d %-2d %-4d " 340 "%4d %8d %8d %7d %5lu %-5d %5d ", 341 assoc, sk, sctp_sk(sk)->type, sk->sk_state, 342 assoc->state, hash, 343 assoc->assoc_id, 344 assoc->sndbuf_used, 345 atomic_read(&assoc->rmem_alloc), 346 from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), 347 sock_i_ino(sk), 348 epb->bind_addr.port, 349 assoc->peer.port); 350 seq_printf(seq, " "); 351 sctp_seq_dump_local_addrs(seq, epb); 352 seq_printf(seq, "<-> "); 353 sctp_seq_dump_remote_addrs(seq, assoc); 354 seq_printf(seq, "\t%8lu %5d %5d %4d %4d %4d %8d ", 355 assoc->hbinterval, assoc->c.sinit_max_instreams, 356 assoc->c.sinit_num_ostreams, assoc->max_retrans, 357 assoc->init_retries, assoc->shutdown_retries, 358 assoc->rtx_data_chunks); 359 seq_printf(seq, "\n"); 360 } 361 read_unlock(&head->lock); 362 sctp_local_bh_enable(); 363 364 return 0; 365 } 366 367 static const struct seq_operations sctp_assoc_ops = { 368 .start = sctp_assocs_seq_start, 369 .next = sctp_assocs_seq_next, 370 .stop = sctp_assocs_seq_stop, 371 .show = sctp_assocs_seq_show, 372 }; 373 374 /* Initialize the seq file operations for 'assocs' object. */ 375 static int sctp_assocs_seq_open(struct inode *inode, struct file *file) 376 { 377 return seq_open_net(inode, file, &sctp_assoc_ops, 378 sizeof(struct seq_net_private)); 379 } 380 381 static const struct file_operations sctp_assocs_seq_fops = { 382 .open = sctp_assocs_seq_open, 383 .read = seq_read, 384 .llseek = seq_lseek, 385 .release = seq_release_net, 386 }; 387 388 /* Set up the proc fs entry for 'assocs' object. */ 389 int __net_init sctp_assocs_proc_init(struct net *net) 390 { 391 struct proc_dir_entry *p; 392 393 p = proc_create("assocs", S_IRUGO, net->sctp.proc_net_sctp, 394 &sctp_assocs_seq_fops); 395 if (!p) 396 return -ENOMEM; 397 398 return 0; 399 } 400 401 /* Cleanup the proc fs entry for 'assocs' object. */ 402 void sctp_assocs_proc_exit(struct net *net) 403 { 404 remove_proc_entry("assocs", net->sctp.proc_net_sctp); 405 } 406 407 static void *sctp_remaddr_seq_start(struct seq_file *seq, loff_t *pos) 408 { 409 if (*pos >= sctp_assoc_hashsize) 410 return NULL; 411 412 if (*pos < 0) 413 *pos = 0; 414 415 if (*pos == 0) 416 seq_printf(seq, "ADDR ASSOC_ID HB_ACT RTO MAX_PATH_RTX " 417 "REM_ADDR_RTX START\n"); 418 419 return (void *)pos; 420 } 421 422 static void *sctp_remaddr_seq_next(struct seq_file *seq, void *v, loff_t *pos) 423 { 424 if (++*pos >= sctp_assoc_hashsize) 425 return NULL; 426 427 return pos; 428 } 429 430 static void sctp_remaddr_seq_stop(struct seq_file *seq, void *v) 431 { 432 } 433 434 static int sctp_remaddr_seq_show(struct seq_file *seq, void *v) 435 { 436 struct sctp_hashbucket *head; 437 struct sctp_ep_common *epb; 438 struct sctp_association *assoc; 439 struct hlist_node *node; 440 struct sctp_transport *tsp; 441 int hash = *(loff_t *)v; 442 443 if (hash >= sctp_assoc_hashsize) 444 return -ENOMEM; 445 446 head = &sctp_assoc_hashtable[hash]; 447 sctp_local_bh_disable(); 448 read_lock(&head->lock); 449 rcu_read_lock(); 450 sctp_for_each_hentry(epb, node, &head->chain) { 451 if (!net_eq(sock_net(epb->sk), seq_file_net(seq))) 452 continue; 453 assoc = sctp_assoc(epb); 454 list_for_each_entry_rcu(tsp, &assoc->peer.transport_addr_list, 455 transports) { 456 if (tsp->dead) 457 continue; 458 459 /* 460 * The remote address (ADDR) 461 */ 462 tsp->af_specific->seq_dump_addr(seq, &tsp->ipaddr); 463 seq_printf(seq, " "); 464 465 /* 466 * The association ID (ASSOC_ID) 467 */ 468 seq_printf(seq, "%d ", tsp->asoc->assoc_id); 469 470 /* 471 * If the Heartbeat is active (HB_ACT) 472 * Note: 1 = Active, 0 = Inactive 473 */ 474 seq_printf(seq, "%d ", timer_pending(&tsp->hb_timer)); 475 476 /* 477 * Retransmit time out (RTO) 478 */ 479 seq_printf(seq, "%lu ", tsp->rto); 480 481 /* 482 * Maximum path retransmit count (PATH_MAX_RTX) 483 */ 484 seq_printf(seq, "%d ", tsp->pathmaxrxt); 485 486 /* 487 * remote address retransmit count (REM_ADDR_RTX) 488 * Note: We don't have a way to tally this at the moment 489 * so lets just leave it as zero for the moment 490 */ 491 seq_printf(seq, "0 "); 492 493 /* 494 * remote address start time (START). This is also not 495 * currently implemented, but we can record it with a 496 * jiffies marker in a subsequent patch 497 */ 498 seq_printf(seq, "0"); 499 500 seq_printf(seq, "\n"); 501 } 502 } 503 504 rcu_read_unlock(); 505 read_unlock(&head->lock); 506 sctp_local_bh_enable(); 507 508 return 0; 509 510 } 511 512 static const struct seq_operations sctp_remaddr_ops = { 513 .start = sctp_remaddr_seq_start, 514 .next = sctp_remaddr_seq_next, 515 .stop = sctp_remaddr_seq_stop, 516 .show = sctp_remaddr_seq_show, 517 }; 518 519 /* Cleanup the proc fs entry for 'remaddr' object. */ 520 void sctp_remaddr_proc_exit(struct net *net) 521 { 522 remove_proc_entry("remaddr", net->sctp.proc_net_sctp); 523 } 524 525 static int sctp_remaddr_seq_open(struct inode *inode, struct file *file) 526 { 527 return seq_open_net(inode, file, &sctp_remaddr_ops, 528 sizeof(struct seq_net_private)); 529 } 530 531 static const struct file_operations sctp_remaddr_seq_fops = { 532 .open = sctp_remaddr_seq_open, 533 .read = seq_read, 534 .llseek = seq_lseek, 535 .release = seq_release_net, 536 }; 537 538 int __net_init sctp_remaddr_proc_init(struct net *net) 539 { 540 struct proc_dir_entry *p; 541 542 p = proc_create("remaddr", S_IRUGO, net->sctp.proc_net_sctp, 543 &sctp_remaddr_seq_fops); 544 if (!p) 545 return -ENOMEM; 546 return 0; 547 } 548