forked from Qortal/Brooklyn
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
104 lines
3.0 KiB
104 lines
3.0 KiB
// SPDX-License-Identifier: GPL-2.0 |
|
/* MPTCP socket monitoring support |
|
* |
|
* Copyright (c) 2019 Red Hat |
|
* |
|
* Author: Davide Caratti <[email protected]> |
|
*/ |
|
|
|
#include <linux/kernel.h> |
|
#include <linux/net.h> |
|
#include <linux/inet_diag.h> |
|
#include <net/netlink.h> |
|
#include <uapi/linux/mptcp.h> |
|
#include "protocol.h" |
|
|
|
static int subflow_get_info(const struct sock *sk, struct sk_buff *skb) |
|
{ |
|
struct mptcp_subflow_context *sf; |
|
struct nlattr *start; |
|
u32 flags = 0; |
|
int err; |
|
|
|
start = nla_nest_start_noflag(skb, INET_ULP_INFO_MPTCP); |
|
if (!start) |
|
return -EMSGSIZE; |
|
|
|
rcu_read_lock(); |
|
sf = rcu_dereference(inet_csk(sk)->icsk_ulp_data); |
|
if (!sf) { |
|
err = 0; |
|
goto nla_failure; |
|
} |
|
|
|
if (sf->mp_capable) |
|
flags |= MPTCP_SUBFLOW_FLAG_MCAP_REM; |
|
if (sf->request_mptcp) |
|
flags |= MPTCP_SUBFLOW_FLAG_MCAP_LOC; |
|
if (sf->mp_join) |
|
flags |= MPTCP_SUBFLOW_FLAG_JOIN_REM; |
|
if (sf->request_join) |
|
flags |= MPTCP_SUBFLOW_FLAG_JOIN_LOC; |
|
if (sf->backup) |
|
flags |= MPTCP_SUBFLOW_FLAG_BKUP_REM; |
|
if (sf->request_bkup) |
|
flags |= MPTCP_SUBFLOW_FLAG_BKUP_LOC; |
|
if (sf->fully_established) |
|
flags |= MPTCP_SUBFLOW_FLAG_FULLY_ESTABLISHED; |
|
if (sf->conn_finished) |
|
flags |= MPTCP_SUBFLOW_FLAG_CONNECTED; |
|
if (sf->map_valid) |
|
flags |= MPTCP_SUBFLOW_FLAG_MAPVALID; |
|
|
|
if (nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_TOKEN_REM, sf->remote_token) || |
|
nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_TOKEN_LOC, sf->token) || |
|
nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_RELWRITE_SEQ, |
|
sf->rel_write_seq) || |
|
nla_put_u64_64bit(skb, MPTCP_SUBFLOW_ATTR_MAP_SEQ, sf->map_seq, |
|
MPTCP_SUBFLOW_ATTR_PAD) || |
|
nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_MAP_SFSEQ, |
|
sf->map_subflow_seq) || |
|
nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_SSN_OFFSET, sf->ssn_offset) || |
|
nla_put_u16(skb, MPTCP_SUBFLOW_ATTR_MAP_DATALEN, |
|
sf->map_data_len) || |
|
nla_put_u32(skb, MPTCP_SUBFLOW_ATTR_FLAGS, flags) || |
|
nla_put_u8(skb, MPTCP_SUBFLOW_ATTR_ID_REM, sf->remote_id) || |
|
nla_put_u8(skb, MPTCP_SUBFLOW_ATTR_ID_LOC, sf->local_id)) { |
|
err = -EMSGSIZE; |
|
goto nla_failure; |
|
} |
|
|
|
rcu_read_unlock(); |
|
nla_nest_end(skb, start); |
|
return 0; |
|
|
|
nla_failure: |
|
rcu_read_unlock(); |
|
nla_nest_cancel(skb, start); |
|
return err; |
|
} |
|
|
|
static size_t subflow_get_info_size(const struct sock *sk) |
|
{ |
|
size_t size = 0; |
|
|
|
size += nla_total_size(0) + /* INET_ULP_INFO_MPTCP */ |
|
nla_total_size(4) + /* MPTCP_SUBFLOW_ATTR_TOKEN_REM */ |
|
nla_total_size(4) + /* MPTCP_SUBFLOW_ATTR_TOKEN_LOC */ |
|
nla_total_size(4) + /* MPTCP_SUBFLOW_ATTR_RELWRITE_SEQ */ |
|
nla_total_size_64bit(8) + /* MPTCP_SUBFLOW_ATTR_MAP_SEQ */ |
|
nla_total_size(4) + /* MPTCP_SUBFLOW_ATTR_MAP_SFSEQ */ |
|
nla_total_size(2) + /* MPTCP_SUBFLOW_ATTR_SSN_OFFSET */ |
|
nla_total_size(2) + /* MPTCP_SUBFLOW_ATTR_MAP_DATALEN */ |
|
nla_total_size(4) + /* MPTCP_SUBFLOW_ATTR_FLAGS */ |
|
nla_total_size(1) + /* MPTCP_SUBFLOW_ATTR_ID_REM */ |
|
nla_total_size(1) + /* MPTCP_SUBFLOW_ATTR_ID_LOC */ |
|
0; |
|
return size; |
|
} |
|
|
|
void mptcp_diag_subflow_init(struct tcp_ulp_ops *ops) |
|
{ |
|
ops->get_info = subflow_get_info; |
|
ops->get_info_size = subflow_get_info_size; |
|
}
|
|
|