Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2/* MPTCP socket monitoring support
  3 *
  4 * Copyright (c) 2019 Red Hat
  5 *
  6 * Author: Davide Caratti <dcaratti@redhat.com>
  7 */
  8
  9#include <linux/kernel.h>
 10#include <linux/net.h>
 11#include <linux/inet_diag.h>
 12#include <net/netlink.h>
 
 13#include "protocol.h"
 14
 15static int subflow_get_info(struct sock *sk, struct sk_buff *skb)
 16{
 17	struct mptcp_subflow_context *sf;
 18	struct nlattr *start;
 19	u32 flags = 0;
 20	bool slow;
 21	int err;
 22
 23	if (inet_sk_state_load(sk) == TCP_LISTEN)
 24		return 0;
 25
 26	start = nla_nest_start_noflag(skb, INET_ULP_INFO_MPTCP);
 27	if (!start)
 28		return -EMSGSIZE;
 29
 30	slow = lock_sock_fast(sk);
 31	rcu_read_lock();
 32	sf = rcu_dereference(inet_csk(sk)->icsk_ulp_data);
 33	if (!sf) {
 34		err = 0;
 35		goto nla_failure;
 36	}
 37
 38	if (sf->mp_capable)
 39		flags |= MPTCP_SUBFLOW_FLAG_MCAP_REM;
 40	if (sf->request_mptcp)
 41		flags |= MPTCP_SUBFLOW_FLAG_MCAP_LOC;
 42	if (sf->mp_join)
 43		flags |= MPTCP_SUBFLOW_FLAG_JOIN_REM;
 44	if (sf->request_join)
 45		flags |= MPTCP_SUBFLOW_FLAG_JOIN_LOC;
 46	if (sf->backup)
 47		flags |= MPTCP_SUBFLOW_FLAG_BKUP_REM;
 48	if (sf->request_bkup)
 49		flags |= MPTCP_SUBFLOW_FLAG_BKUP_LOC;
 50	if (READ_ONCE(sf->fully_established))
 51		flags |= MPTCP_SUBFLOW_FLAG_FULLY_ESTABLISHED;
 52	if (sf->conn_finished)
 53		flags |= MPTCP_SUBFLOW_FLAG_CONNECTED;
 54	if (sf->map_valid)
 55		flags |= MPTCP_SUBFLOW_FLAG_MAPVALID;
 56
 57	if (nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_TOKEN_REM, sf->remote_token) ||
 58	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_TOKEN_LOC, sf->token) ||
 59	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_RELWRITE_SEQ,
 60			sf->rel_write_seq) ||
 61	    nla_put_u64_64bit(skb, MPTCP_SUBFLOW_ATTR_MAP_SEQ, sf->map_seq,
 62			      MPTCP_SUBFLOW_ATTR_PAD) ||
 63	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_MAP_SFSEQ,
 64			sf->map_subflow_seq) ||
 65	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_SSN_OFFSET, sf->ssn_offset) ||
 66	    nla_put_u16(skb, MPTCP_SUBFLOW_ATTR_MAP_DATALEN,
 67			sf->map_data_len) ||
 68	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_FLAGS, flags) ||
 69	    nla_put_u8(skb, MPTCP_SUBFLOW_ATTR_ID_REM, sf->remote_id) ||
 70	    nla_put_u8(skb, MPTCP_SUBFLOW_ATTR_ID_LOC, subflow_get_local_id(sf))) {
 71		err = -EMSGSIZE;
 72		goto nla_failure;
 73	}
 74
 75	rcu_read_unlock();
 76	unlock_sock_fast(sk, slow);
 77	nla_nest_end(skb, start);
 78	return 0;
 79
 80nla_failure:
 81	rcu_read_unlock();
 82	unlock_sock_fast(sk, slow);
 83	nla_nest_cancel(skb, start);
 84	return err;
 85}
 86
 87static size_t subflow_get_info_size(const struct sock *sk)
 88{
 89	size_t size = 0;
 90
 91	size += nla_total_size(0) +	/* INET_ULP_INFO_MPTCP */
 92		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_TOKEN_REM */
 93		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_TOKEN_LOC */
 94		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_RELWRITE_SEQ */
 95		nla_total_size_64bit(8) +	/* MPTCP_SUBFLOW_ATTR_MAP_SEQ */
 96		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_MAP_SFSEQ */
 97		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_SSN_OFFSET */
 98		nla_total_size(2) +	/* MPTCP_SUBFLOW_ATTR_MAP_DATALEN */
 99		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_FLAGS */
100		nla_total_size(1) +	/* MPTCP_SUBFLOW_ATTR_ID_REM */
101		nla_total_size(1) +	/* MPTCP_SUBFLOW_ATTR_ID_LOC */
102		0;
103	return size;
104}
105
106void mptcp_diag_subflow_init(struct tcp_ulp_ops *ops)
107{
108	ops->get_info = subflow_get_info;
109	ops->get_info_size = subflow_get_info_size;
110}
v6.8
  1// SPDX-License-Identifier: GPL-2.0
  2/* MPTCP socket monitoring support
  3 *
  4 * Copyright (c) 2019 Red Hat
  5 *
  6 * Author: Davide Caratti <dcaratti@redhat.com>
  7 */
  8
  9#include <linux/kernel.h>
 10#include <linux/net.h>
 11#include <linux/inet_diag.h>
 12#include <net/netlink.h>
 13#include <uapi/linux/mptcp.h>
 14#include "protocol.h"
 15
 16static int subflow_get_info(struct sock *sk, struct sk_buff *skb)
 17{
 18	struct mptcp_subflow_context *sf;
 19	struct nlattr *start;
 20	u32 flags = 0;
 21	bool slow;
 22	int err;
 23
 24	if (inet_sk_state_load(sk) == TCP_LISTEN)
 25		return 0;
 26
 27	start = nla_nest_start_noflag(skb, INET_ULP_INFO_MPTCP);
 28	if (!start)
 29		return -EMSGSIZE;
 30
 31	slow = lock_sock_fast(sk);
 32	rcu_read_lock();
 33	sf = rcu_dereference(inet_csk(sk)->icsk_ulp_data);
 34	if (!sf) {
 35		err = 0;
 36		goto nla_failure;
 37	}
 38
 39	if (sf->mp_capable)
 40		flags |= MPTCP_SUBFLOW_FLAG_MCAP_REM;
 41	if (sf->request_mptcp)
 42		flags |= MPTCP_SUBFLOW_FLAG_MCAP_LOC;
 43	if (sf->mp_join)
 44		flags |= MPTCP_SUBFLOW_FLAG_JOIN_REM;
 45	if (sf->request_join)
 46		flags |= MPTCP_SUBFLOW_FLAG_JOIN_LOC;
 47	if (sf->backup)
 48		flags |= MPTCP_SUBFLOW_FLAG_BKUP_REM;
 49	if (sf->request_bkup)
 50		flags |= MPTCP_SUBFLOW_FLAG_BKUP_LOC;
 51	if (sf->fully_established)
 52		flags |= MPTCP_SUBFLOW_FLAG_FULLY_ESTABLISHED;
 53	if (sf->conn_finished)
 54		flags |= MPTCP_SUBFLOW_FLAG_CONNECTED;
 55	if (sf->map_valid)
 56		flags |= MPTCP_SUBFLOW_FLAG_MAPVALID;
 57
 58	if (nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_TOKEN_REM, sf->remote_token) ||
 59	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_TOKEN_LOC, sf->token) ||
 60	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_RELWRITE_SEQ,
 61			sf->rel_write_seq) ||
 62	    nla_put_u64_64bit(skb, MPTCP_SUBFLOW_ATTR_MAP_SEQ, sf->map_seq,
 63			      MPTCP_SUBFLOW_ATTR_PAD) ||
 64	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_MAP_SFSEQ,
 65			sf->map_subflow_seq) ||
 66	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_SSN_OFFSET, sf->ssn_offset) ||
 67	    nla_put_u16(skb, MPTCP_SUBFLOW_ATTR_MAP_DATALEN,
 68			sf->map_data_len) ||
 69	    nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_FLAGS, flags) ||
 70	    nla_put_u8(skb, MPTCP_SUBFLOW_ATTR_ID_REM, sf->remote_id) ||
 71	    nla_put_u8(skb, MPTCP_SUBFLOW_ATTR_ID_LOC, subflow_get_local_id(sf))) {
 72		err = -EMSGSIZE;
 73		goto nla_failure;
 74	}
 75
 76	rcu_read_unlock();
 77	unlock_sock_fast(sk, slow);
 78	nla_nest_end(skb, start);
 79	return 0;
 80
 81nla_failure:
 82	rcu_read_unlock();
 83	unlock_sock_fast(sk, slow);
 84	nla_nest_cancel(skb, start);
 85	return err;
 86}
 87
 88static size_t subflow_get_info_size(const struct sock *sk)
 89{
 90	size_t size = 0;
 91
 92	size += nla_total_size(0) +	/* INET_ULP_INFO_MPTCP */
 93		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_TOKEN_REM */
 94		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_TOKEN_LOC */
 95		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_RELWRITE_SEQ */
 96		nla_total_size_64bit(8) +	/* MPTCP_SUBFLOW_ATTR_MAP_SEQ */
 97		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_MAP_SFSEQ */
 98		nla_total_size(2) +	/* MPTCP_SUBFLOW_ATTR_SSN_OFFSET */
 99		nla_total_size(2) +	/* MPTCP_SUBFLOW_ATTR_MAP_DATALEN */
100		nla_total_size(4) +	/* MPTCP_SUBFLOW_ATTR_FLAGS */
101		nla_total_size(1) +	/* MPTCP_SUBFLOW_ATTR_ID_REM */
102		nla_total_size(1) +	/* MPTCP_SUBFLOW_ATTR_ID_LOC */
103		0;
104	return size;
105}
106
107void mptcp_diag_subflow_init(struct tcp_ulp_ops *ops)
108{
109	ops->get_info = subflow_get_info;
110	ops->get_info_size = subflow_get_info_size;
111}