Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 1 | /* SCTP kernel implementation |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2 | * Copyright (c) 2003 International Business Machines, Corp. |
| 3 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 4 | * This file is part of the SCTP kernel implementation |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 5 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 6 | * This SCTP implementation is free software; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 7 | * you can redistribute it and/or modify it under the terms of |
| 8 | * the GNU General Public License as published by |
| 9 | * the Free Software Foundation; either version 2, or (at your option) |
| 10 | * any later version. |
| 11 | * |
Vlad Yasevich | 60c778b | 2008-01-11 09:57:09 -0500 | [diff] [blame] | 12 | * This SCTP implementation is distributed in the hope that it |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 13 | * will be useful, but WITHOUT ANY WARRANTY; without even the implied |
| 14 | * ************************ |
| 15 | * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
| 16 | * See the GNU General Public License for more details. |
| 17 | * |
| 18 | * You should have received a copy of the GNU General Public License |
Jeff Kirsher | 4b2f13a | 2013-12-06 06:28:48 -0800 | [diff] [blame] | 19 | * along with GNU CC; see the file COPYING. If not, see |
| 20 | * <http://www.gnu.org/licenses/>. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 21 | * |
| 22 | * Please send any bug reports or fixes you make to the |
| 23 | * email address(es): |
Daniel Borkmann | 91705c6 | 2013-07-23 14:51:47 +0200 | [diff] [blame] | 24 | * lksctp developers <linux-sctp@vger.kernel.org> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 25 | * |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 26 | * Written or modified by: |
| 27 | * Sridhar Samudrala <sri@us.ibm.com> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 28 | */ |
| 29 | |
| 30 | #include <linux/types.h> |
| 31 | #include <linux/seq_file.h> |
| 32 | #include <linux/init.h> |
Paul Gortmaker | bc3b2d7 | 2011-07-15 11:47:34 -0400 | [diff] [blame] | 33 | #include <linux/export.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 34 | #include <net/sctp/sctp.h> |
Pavel Emelyanov | 3f5340a | 2008-02-09 23:23:44 -0800 | [diff] [blame] | 35 | #include <net/ip.h> /* for snmp_fold_field */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 36 | |
Alexey Dobriyan | 5833929 | 2010-01-22 10:17:26 +0000 | [diff] [blame] | 37 | static const struct snmp_mib sctp_snmp_list[] = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 38 | SNMP_MIB_ITEM("SctpCurrEstab", SCTP_MIB_CURRESTAB), |
| 39 | SNMP_MIB_ITEM("SctpActiveEstabs", SCTP_MIB_ACTIVEESTABS), |
| 40 | SNMP_MIB_ITEM("SctpPassiveEstabs", SCTP_MIB_PASSIVEESTABS), |
| 41 | SNMP_MIB_ITEM("SctpAborteds", SCTP_MIB_ABORTEDS), |
| 42 | SNMP_MIB_ITEM("SctpShutdowns", SCTP_MIB_SHUTDOWNS), |
| 43 | SNMP_MIB_ITEM("SctpOutOfBlues", SCTP_MIB_OUTOFBLUES), |
| 44 | SNMP_MIB_ITEM("SctpChecksumErrors", SCTP_MIB_CHECKSUMERRORS), |
| 45 | SNMP_MIB_ITEM("SctpOutCtrlChunks", SCTP_MIB_OUTCTRLCHUNKS), |
| 46 | SNMP_MIB_ITEM("SctpOutOrderChunks", SCTP_MIB_OUTORDERCHUNKS), |
| 47 | SNMP_MIB_ITEM("SctpOutUnorderChunks", SCTP_MIB_OUTUNORDERCHUNKS), |
| 48 | SNMP_MIB_ITEM("SctpInCtrlChunks", SCTP_MIB_INCTRLCHUNKS), |
| 49 | SNMP_MIB_ITEM("SctpInOrderChunks", SCTP_MIB_INORDERCHUNKS), |
| 50 | SNMP_MIB_ITEM("SctpInUnorderChunks", SCTP_MIB_INUNORDERCHUNKS), |
| 51 | SNMP_MIB_ITEM("SctpFragUsrMsgs", SCTP_MIB_FRAGUSRMSGS), |
| 52 | SNMP_MIB_ITEM("SctpReasmUsrMsgs", SCTP_MIB_REASMUSRMSGS), |
| 53 | SNMP_MIB_ITEM("SctpOutSCTPPacks", SCTP_MIB_OUTSCTPPACKS), |
| 54 | SNMP_MIB_ITEM("SctpInSCTPPacks", SCTP_MIB_INSCTPPACKS), |
Sridhar Samudrala | ac0b046 | 2006-08-22 00:15:33 -0700 | [diff] [blame] | 55 | SNMP_MIB_ITEM("SctpT1InitExpireds", SCTP_MIB_T1_INIT_EXPIREDS), |
| 56 | SNMP_MIB_ITEM("SctpT1CookieExpireds", SCTP_MIB_T1_COOKIE_EXPIREDS), |
| 57 | SNMP_MIB_ITEM("SctpT2ShutdownExpireds", SCTP_MIB_T2_SHUTDOWN_EXPIREDS), |
| 58 | SNMP_MIB_ITEM("SctpT3RtxExpireds", SCTP_MIB_T3_RTX_EXPIREDS), |
| 59 | SNMP_MIB_ITEM("SctpT4RtoExpireds", SCTP_MIB_T4_RTO_EXPIREDS), |
| 60 | SNMP_MIB_ITEM("SctpT5ShutdownGuardExpireds", SCTP_MIB_T5_SHUTDOWN_GUARD_EXPIREDS), |
| 61 | SNMP_MIB_ITEM("SctpDelaySackExpireds", SCTP_MIB_DELAY_SACK_EXPIREDS), |
| 62 | SNMP_MIB_ITEM("SctpAutocloseExpireds", SCTP_MIB_AUTOCLOSE_EXPIREDS), |
| 63 | SNMP_MIB_ITEM("SctpT3Retransmits", SCTP_MIB_T3_RETRANSMITS), |
| 64 | SNMP_MIB_ITEM("SctpPmtudRetransmits", SCTP_MIB_PMTUD_RETRANSMITS), |
| 65 | SNMP_MIB_ITEM("SctpFastRetransmits", SCTP_MIB_FAST_RETRANSMITS), |
| 66 | SNMP_MIB_ITEM("SctpInPktSoftirq", SCTP_MIB_IN_PKT_SOFTIRQ), |
| 67 | SNMP_MIB_ITEM("SctpInPktBacklog", SCTP_MIB_IN_PKT_BACKLOG), |
| 68 | SNMP_MIB_ITEM("SctpInPktDiscards", SCTP_MIB_IN_PKT_DISCARDS), |
| 69 | SNMP_MIB_ITEM("SctpInDataChunkDiscards", SCTP_MIB_IN_DATA_CHUNK_DISCARDS), |
Vlad Yasevich | d2287f8 | 2005-08-23 10:12:04 -0700 | [diff] [blame] | 70 | SNMP_MIB_SENTINEL |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 71 | }; |
| 72 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 73 | /* Display sctp snmp mib statistics(/proc/net/sctp/snmp). */ |
| 74 | static int sctp_snmp_seq_show(struct seq_file *seq, void *v) |
| 75 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 76 | struct net *net = seq->private; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 77 | int i; |
| 78 | |
| 79 | for (i = 0; sctp_snmp_list[i].name != NULL; i++) |
| 80 | seq_printf(seq, "%-32s\t%ld\n", sctp_snmp_list[i].name, |
WANG Cong | c9f2dba | 2014-05-12 16:52:02 -0700 | [diff] [blame] | 81 | snmp_fold_field(net->sctp.sctp_statistics, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 82 | sctp_snmp_list[i].entry)); |
| 83 | |
| 84 | return 0; |
| 85 | } |
| 86 | |
| 87 | /* Initialize the seq file operations for 'snmp' object. */ |
| 88 | static int sctp_snmp_seq_open(struct inode *inode, struct file *file) |
| 89 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 90 | return single_open_net(inode, file, sctp_snmp_seq_show); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 91 | } |
| 92 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 93 | static const struct file_operations sctp_snmp_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 94 | .owner = THIS_MODULE, |
| 95 | .open = sctp_snmp_seq_open, |
| 96 | .read = seq_read, |
| 97 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 98 | .release = single_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 99 | }; |
| 100 | |
| 101 | /* Set up the proc fs entry for 'snmp' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 102 | int __net_init sctp_snmp_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 103 | { |
| 104 | struct proc_dir_entry *p; |
| 105 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 106 | p = proc_create("snmp", S_IRUGO, net->sctp.proc_net_sctp, |
| 107 | &sctp_snmp_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 108 | if (!p) |
| 109 | return -ENOMEM; |
| 110 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 111 | return 0; |
| 112 | } |
| 113 | |
| 114 | /* Cleanup the proc fs entry for 'snmp' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 115 | void sctp_snmp_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 116 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 117 | remove_proc_entry("snmp", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 118 | } |
| 119 | |
| 120 | /* Dump local addresses of an association/endpoint. */ |
| 121 | static void sctp_seq_dump_local_addrs(struct seq_file *seq, struct sctp_ep_common *epb) |
| 122 | { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 123 | struct sctp_association *asoc; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 124 | struct sctp_sockaddr_entry *laddr; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 125 | struct sctp_transport *peer; |
| 126 | union sctp_addr *addr, *primary = NULL; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 127 | struct sctp_af *af; |
| 128 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 129 | if (epb->type == SCTP_EP_TYPE_ASSOCIATION) { |
Daniel Borkmann | f9e42b8 | 2013-06-14 18:24:04 +0200 | [diff] [blame] | 130 | asoc = sctp_assoc(epb); |
| 131 | |
| 132 | peer = asoc->peer.primary_path; |
| 133 | if (unlikely(peer == NULL)) { |
Daniel Borkmann | b527fe6 | 2013-06-25 18:17:28 +0200 | [diff] [blame] | 134 | WARN(1, "Association %p with NULL primary path!\n", asoc); |
Daniel Borkmann | f9e42b8 | 2013-06-14 18:24:04 +0200 | [diff] [blame] | 135 | return; |
| 136 | } |
| 137 | |
| 138 | primary = &peer->saddr; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 139 | } |
| 140 | |
Thomas Graf | 0b0fe91 | 2012-12-06 09:25:04 +0000 | [diff] [blame] | 141 | rcu_read_lock(); |
| 142 | list_for_each_entry_rcu(laddr, &epb->bind_addr.address_list, list) { |
| 143 | if (!laddr->valid) |
| 144 | continue; |
| 145 | |
Al Viro | 5f242a1 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 146 | addr = &laddr->a; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 147 | af = sctp_get_af_specific(addr->sa.sa_family); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 148 | if (primary && af->cmp_addr(addr, primary)) { |
| 149 | seq_printf(seq, "*"); |
| 150 | } |
Al Viro | 5f242a1 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 151 | af->seq_dump_addr(seq, addr); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 152 | } |
Thomas Graf | 0b0fe91 | 2012-12-06 09:25:04 +0000 | [diff] [blame] | 153 | rcu_read_unlock(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 154 | } |
| 155 | |
| 156 | /* Dump remote addresses of an association. */ |
| 157 | static void sctp_seq_dump_remote_addrs(struct seq_file *seq, struct sctp_association *assoc) |
| 158 | { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 159 | struct sctp_transport *transport; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 160 | union sctp_addr *addr, *primary; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 161 | struct sctp_af *af; |
| 162 | |
Al Viro | acd2bc9 | 2006-11-20 17:06:04 -0800 | [diff] [blame] | 163 | primary = &assoc->peer.primary_addr; |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 164 | rcu_read_lock(); |
| 165 | list_for_each_entry_rcu(transport, &assoc->peer.transport_addr_list, |
Robert P. J. Day | 9dbc15f | 2008-04-12 18:54:24 -0700 | [diff] [blame] | 166 | transports) { |
Al Viro | 5f242a1 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 167 | addr = &transport->ipaddr; |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 168 | if (transport->dead) |
| 169 | continue; |
| 170 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 171 | af = sctp_get_af_specific(addr->sa.sa_family); |
Al Viro | acd2bc9 | 2006-11-20 17:06:04 -0800 | [diff] [blame] | 172 | if (af->cmp_addr(addr, primary)) { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 173 | seq_printf(seq, "*"); |
| 174 | } |
Al Viro | 5f242a1 | 2006-11-20 17:05:23 -0800 | [diff] [blame] | 175 | af->seq_dump_addr(seq, addr); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 176 | } |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 177 | rcu_read_unlock(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 178 | } |
| 179 | |
wangweidong | 26ac8e5 | 2013-12-23 12:16:51 +0800 | [diff] [blame] | 180 | static void *sctp_eps_seq_start(struct seq_file *seq, loff_t *pos) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 181 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 182 | if (*pos >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 183 | return NULL; |
| 184 | |
| 185 | if (*pos < 0) |
| 186 | *pos = 0; |
| 187 | |
| 188 | if (*pos == 0) |
| 189 | seq_printf(seq, " ENDPT SOCK STY SST HBKT LPORT UID INODE LADDRS\n"); |
| 190 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 191 | return (void *)pos; |
| 192 | } |
| 193 | |
| 194 | static void sctp_eps_seq_stop(struct seq_file *seq, void *v) |
| 195 | { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 196 | } |
| 197 | |
| 198 | |
wangweidong | 26ac8e5 | 2013-12-23 12:16:51 +0800 | [diff] [blame] | 199 | static void *sctp_eps_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 200 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 201 | if (++*pos >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 202 | return NULL; |
| 203 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 204 | return pos; |
| 205 | } |
| 206 | |
| 207 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 208 | /* Display sctp endpoints (/proc/net/sctp/eps). */ |
| 209 | static int sctp_eps_seq_show(struct seq_file *seq, void *v) |
| 210 | { |
| 211 | struct sctp_hashbucket *head; |
| 212 | struct sctp_ep_common *epb; |
| 213 | struct sctp_endpoint *ep; |
| 214 | struct sock *sk; |
Vlad Yasevich | 38b0e42 | 2006-01-17 11:54:06 -0800 | [diff] [blame] | 215 | int hash = *(loff_t *)v; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 216 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 217 | if (hash >= sctp_ep_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 218 | return -ENOMEM; |
| 219 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 220 | head = &sctp_ep_hashtable[hash]; |
wangweidong | 79b9113 | 2014-01-21 15:44:07 +0800 | [diff] [blame] | 221 | local_bh_disable(); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 222 | read_lock(&head->lock); |
Sasha Levin | b67bfe0 | 2013-02-27 17:06:00 -0800 | [diff] [blame] | 223 | sctp_for_each_hentry(epb, &head->chain) { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 224 | ep = sctp_ep(epb); |
| 225 | sk = epb->sk; |
Ulrich Weber | 6932f11 | 2012-08-16 01:24:49 +0000 | [diff] [blame] | 226 | if (!net_eq(sock_net(sk), seq_file_net(seq))) |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 227 | continue; |
Francesco Fusco | d14c5ab | 2013-08-15 13:42:14 +0200 | [diff] [blame] | 228 | seq_printf(seq, "%8pK %8pK %-3d %-3d %-4d %-5d %5u %5lu ", ep, sk, |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 229 | sctp_sk(sk)->type, sk->sk_state, hash, |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 230 | epb->bind_addr.port, |
Eric W. Biederman | a7cb5a4 | 2012-05-24 01:10:10 -0600 | [diff] [blame] | 231 | from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), |
| 232 | sock_i_ino(sk)); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 233 | |
| 234 | sctp_seq_dump_local_addrs(seq, epb); |
| 235 | seq_printf(seq, "\n"); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 236 | } |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 237 | read_unlock(&head->lock); |
wangweidong | 79b9113 | 2014-01-21 15:44:07 +0800 | [diff] [blame] | 238 | local_bh_enable(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 239 | |
| 240 | return 0; |
| 241 | } |
| 242 | |
Philippe De Muyter | 56b3d97 | 2007-07-10 23:07:31 -0700 | [diff] [blame] | 243 | static const struct seq_operations sctp_eps_ops = { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 244 | .start = sctp_eps_seq_start, |
| 245 | .next = sctp_eps_seq_next, |
| 246 | .stop = sctp_eps_seq_stop, |
| 247 | .show = sctp_eps_seq_show, |
| 248 | }; |
| 249 | |
| 250 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 251 | /* Initialize the seq file operations for 'eps' object. */ |
| 252 | static int sctp_eps_seq_open(struct inode *inode, struct file *file) |
| 253 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 254 | return seq_open_net(inode, file, &sctp_eps_ops, |
| 255 | sizeof(struct seq_net_private)); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 256 | } |
| 257 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 258 | static const struct file_operations sctp_eps_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 259 | .open = sctp_eps_seq_open, |
| 260 | .read = seq_read, |
| 261 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 262 | .release = seq_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 263 | }; |
| 264 | |
| 265 | /* Set up the proc fs entry for 'eps' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 266 | int __net_init sctp_eps_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 267 | { |
| 268 | struct proc_dir_entry *p; |
| 269 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 270 | p = proc_create("eps", S_IRUGO, net->sctp.proc_net_sctp, |
| 271 | &sctp_eps_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 272 | if (!p) |
| 273 | return -ENOMEM; |
| 274 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 275 | return 0; |
| 276 | } |
| 277 | |
| 278 | /* Cleanup the proc fs entry for 'eps' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 279 | void sctp_eps_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 280 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 281 | remove_proc_entry("eps", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 282 | } |
| 283 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 284 | |
wangweidong | 26ac8e5 | 2013-12-23 12:16:51 +0800 | [diff] [blame] | 285 | static void *sctp_assocs_seq_start(struct seq_file *seq, loff_t *pos) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 286 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 287 | if (*pos >= sctp_assoc_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 288 | return NULL; |
| 289 | |
| 290 | if (*pos < 0) |
| 291 | *pos = 0; |
| 292 | |
| 293 | if (*pos == 0) |
Neil Horman | 58fbbed | 2008-02-29 11:40:56 -0800 | [diff] [blame] | 294 | seq_printf(seq, " ASSOC SOCK STY SST ST HBKT " |
| 295 | "ASSOC-ID TX_QUEUE RX_QUEUE UID INODE LPORT " |
| 296 | "RPORT LADDRS <-> RADDRS " |
Dilip Daya | f406c8b | 2013-04-16 01:39:07 +0000 | [diff] [blame] | 297 | "HBINT INS OUTS MAXRT T1X T2X RTXC " |
| 298 | "wmema wmemq sndbuf rcvbuf\n"); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 299 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 300 | return (void *)pos; |
| 301 | } |
| 302 | |
| 303 | static void sctp_assocs_seq_stop(struct seq_file *seq, void *v) |
| 304 | { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 305 | } |
| 306 | |
| 307 | |
wangweidong | 26ac8e5 | 2013-12-23 12:16:51 +0800 | [diff] [blame] | 308 | static void *sctp_assocs_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 309 | { |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 310 | if (++*pos >= sctp_assoc_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 311 | return NULL; |
| 312 | |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 313 | return pos; |
| 314 | } |
| 315 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 316 | /* Display sctp associations (/proc/net/sctp/assocs). */ |
| 317 | static int sctp_assocs_seq_show(struct seq_file *seq, void *v) |
| 318 | { |
| 319 | struct sctp_hashbucket *head; |
| 320 | struct sctp_ep_common *epb; |
| 321 | struct sctp_association *assoc; |
| 322 | struct sock *sk; |
Vlad Yasevich | 38b0e42 | 2006-01-17 11:54:06 -0800 | [diff] [blame] | 323 | int hash = *(loff_t *)v; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 324 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 325 | if (hash >= sctp_assoc_hashsize) |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 326 | return -ENOMEM; |
| 327 | |
Vlad Yasevich | 49392e5 | 2006-01-17 11:53:06 -0800 | [diff] [blame] | 328 | head = &sctp_assoc_hashtable[hash]; |
wangweidong | 79b9113 | 2014-01-21 15:44:07 +0800 | [diff] [blame] | 329 | local_bh_disable(); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 330 | read_lock(&head->lock); |
Sasha Levin | b67bfe0 | 2013-02-27 17:06:00 -0800 | [diff] [blame] | 331 | sctp_for_each_hentry(epb, &head->chain) { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 332 | assoc = sctp_assoc(epb); |
| 333 | sk = epb->sk; |
Ulrich Weber | 6932f11 | 2012-08-16 01:24:49 +0000 | [diff] [blame] | 334 | if (!net_eq(sock_net(sk), seq_file_net(seq))) |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 335 | continue; |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 336 | seq_printf(seq, |
Dan Rosenberg | 71338aa | 2011-05-23 12:17:35 +0000 | [diff] [blame] | 337 | "%8pK %8pK %-3d %-3d %-2d %-4d " |
Francesco Fusco | d14c5ab | 2013-08-15 13:42:14 +0200 | [diff] [blame] | 338 | "%4d %8d %8d %7u %5lu %-5d %5d ", |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 339 | assoc, sk, sctp_sk(sk)->type, sk->sk_state, |
Neil Horman | 58fbbed | 2008-02-29 11:40:56 -0800 | [diff] [blame] | 340 | assoc->state, hash, |
| 341 | assoc->assoc_id, |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 342 | assoc->sndbuf_used, |
Vlad Yasevich | 6aa2551 | 2006-10-09 21:34:26 -0700 | [diff] [blame] | 343 | atomic_read(&assoc->rmem_alloc), |
Eric W. Biederman | a7cb5a4 | 2012-05-24 01:10:10 -0600 | [diff] [blame] | 344 | from_kuid_munged(seq_user_ns(seq), sock_i_uid(sk)), |
| 345 | sock_i_ino(sk), |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 346 | epb->bind_addr.port, |
Neil Horman | 30e9356 | 2008-04-12 18:53:48 -0700 | [diff] [blame] | 347 | assoc->peer.port); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 348 | seq_printf(seq, " "); |
| 349 | sctp_seq_dump_local_addrs(seq, epb); |
| 350 | seq_printf(seq, "<-> "); |
| 351 | sctp_seq_dump_remote_addrs(seq, assoc); |
Dilip Daya | f406c8b | 2013-04-16 01:39:07 +0000 | [diff] [blame] | 352 | seq_printf(seq, "\t%8lu %5d %5d %4d %4d %4d %8d " |
| 353 | "%8d %8d %8d %8d", |
Neil Horman | 30e9356 | 2008-04-12 18:53:48 -0700 | [diff] [blame] | 354 | assoc->hbinterval, assoc->c.sinit_max_instreams, |
| 355 | assoc->c.sinit_num_ostreams, assoc->max_retrans, |
| 356 | assoc->init_retries, assoc->shutdown_retries, |
Dilip Daya | f406c8b | 2013-04-16 01:39:07 +0000 | [diff] [blame] | 357 | assoc->rtx_data_chunks, |
| 358 | atomic_read(&sk->sk_wmem_alloc), |
| 359 | sk->sk_wmem_queued, |
| 360 | sk->sk_sndbuf, |
| 361 | sk->sk_rcvbuf); |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 362 | seq_printf(seq, "\n"); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 363 | } |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 364 | read_unlock(&head->lock); |
wangweidong | 79b9113 | 2014-01-21 15:44:07 +0800 | [diff] [blame] | 365 | local_bh_enable(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 366 | |
| 367 | return 0; |
| 368 | } |
| 369 | |
Philippe De Muyter | 56b3d97 | 2007-07-10 23:07:31 -0700 | [diff] [blame] | 370 | static const struct seq_operations sctp_assoc_ops = { |
Vladislav Yasevich | bca735b | 2005-06-13 15:11:57 -0700 | [diff] [blame] | 371 | .start = sctp_assocs_seq_start, |
| 372 | .next = sctp_assocs_seq_next, |
| 373 | .stop = sctp_assocs_seq_stop, |
| 374 | .show = sctp_assocs_seq_show, |
| 375 | }; |
| 376 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 377 | /* Initialize the seq file operations for 'assocs' object. */ |
| 378 | static int sctp_assocs_seq_open(struct inode *inode, struct file *file) |
| 379 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 380 | return seq_open_net(inode, file, &sctp_assoc_ops, |
| 381 | sizeof(struct seq_net_private)); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 382 | } |
| 383 | |
Arjan van de Ven | da7071d | 2007-02-12 00:55:36 -0800 | [diff] [blame] | 384 | static const struct file_operations sctp_assocs_seq_fops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 385 | .open = sctp_assocs_seq_open, |
| 386 | .read = seq_read, |
| 387 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 388 | .release = seq_release_net, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 389 | }; |
| 390 | |
| 391 | /* Set up the proc fs entry for 'assocs' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 392 | int __net_init sctp_assocs_proc_init(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 393 | { |
| 394 | struct proc_dir_entry *p; |
| 395 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 396 | p = proc_create("assocs", S_IRUGO, net->sctp.proc_net_sctp, |
Pavel Emelyanov | 459eea7 | 2008-02-29 11:24:45 -0800 | [diff] [blame] | 397 | &sctp_assocs_seq_fops); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 398 | if (!p) |
| 399 | return -ENOMEM; |
| 400 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 401 | return 0; |
| 402 | } |
| 403 | |
| 404 | /* Cleanup the proc fs entry for 'assocs' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 405 | void sctp_assocs_proc_exit(struct net *net) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 406 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 407 | remove_proc_entry("assocs", net->sctp.proc_net_sctp); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 408 | } |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 409 | |
| 410 | static void *sctp_remaddr_seq_start(struct seq_file *seq, loff_t *pos) |
| 411 | { |
| 412 | if (*pos >= sctp_assoc_hashsize) |
| 413 | return NULL; |
| 414 | |
| 415 | if (*pos < 0) |
| 416 | *pos = 0; |
| 417 | |
| 418 | if (*pos == 0) |
| 419 | seq_printf(seq, "ADDR ASSOC_ID HB_ACT RTO MAX_PATH_RTX " |
| 420 | "REM_ADDR_RTX START\n"); |
| 421 | |
| 422 | return (void *)pos; |
| 423 | } |
| 424 | |
| 425 | static void *sctp_remaddr_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
| 426 | { |
| 427 | if (++*pos >= sctp_assoc_hashsize) |
| 428 | return NULL; |
| 429 | |
| 430 | return pos; |
| 431 | } |
| 432 | |
| 433 | static void sctp_remaddr_seq_stop(struct seq_file *seq, void *v) |
| 434 | { |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 435 | } |
| 436 | |
| 437 | static int sctp_remaddr_seq_show(struct seq_file *seq, void *v) |
| 438 | { |
| 439 | struct sctp_hashbucket *head; |
| 440 | struct sctp_ep_common *epb; |
| 441 | struct sctp_association *assoc; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 442 | struct sctp_transport *tsp; |
| 443 | int hash = *(loff_t *)v; |
| 444 | |
| 445 | if (hash >= sctp_assoc_hashsize) |
| 446 | return -ENOMEM; |
| 447 | |
| 448 | head = &sctp_assoc_hashtable[hash]; |
wangweidong | 79b9113 | 2014-01-21 15:44:07 +0800 | [diff] [blame] | 449 | local_bh_disable(); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 450 | read_lock(&head->lock); |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 451 | rcu_read_lock(); |
Sasha Levin | b67bfe0 | 2013-02-27 17:06:00 -0800 | [diff] [blame] | 452 | sctp_for_each_hentry(epb, &head->chain) { |
Ulrich Weber | 6932f11 | 2012-08-16 01:24:49 +0000 | [diff] [blame] | 453 | if (!net_eq(sock_net(epb->sk), seq_file_net(seq))) |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 454 | continue; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 455 | assoc = sctp_assoc(epb); |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 456 | list_for_each_entry_rcu(tsp, &assoc->peer.transport_addr_list, |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 457 | transports) { |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 458 | if (tsp->dead) |
| 459 | continue; |
| 460 | |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 461 | /* |
| 462 | * The remote address (ADDR) |
| 463 | */ |
| 464 | tsp->af_specific->seq_dump_addr(seq, &tsp->ipaddr); |
| 465 | seq_printf(seq, " "); |
| 466 | |
| 467 | /* |
| 468 | * The association ID (ASSOC_ID) |
| 469 | */ |
| 470 | seq_printf(seq, "%d ", tsp->asoc->assoc_id); |
| 471 | |
| 472 | /* |
| 473 | * If the Heartbeat is active (HB_ACT) |
| 474 | * Note: 1 = Active, 0 = Inactive |
| 475 | */ |
| 476 | seq_printf(seq, "%d ", timer_pending(&tsp->hb_timer)); |
| 477 | |
| 478 | /* |
| 479 | * Retransmit time out (RTO) |
| 480 | */ |
| 481 | seq_printf(seq, "%lu ", tsp->rto); |
| 482 | |
| 483 | /* |
| 484 | * Maximum path retransmit count (PATH_MAX_RTX) |
| 485 | */ |
| 486 | seq_printf(seq, "%d ", tsp->pathmaxrxt); |
| 487 | |
| 488 | /* |
| 489 | * remote address retransmit count (REM_ADDR_RTX) |
| 490 | * Note: We don't have a way to tally this at the moment |
| 491 | * so lets just leave it as zero for the moment |
| 492 | */ |
| 493 | seq_printf(seq, "0 "); |
| 494 | |
| 495 | /* |
| 496 | * remote address start time (START). This is also not |
| 497 | * currently implemented, but we can record it with a |
| 498 | * jiffies marker in a subsequent patch |
| 499 | */ |
| 500 | seq_printf(seq, "0"); |
| 501 | |
| 502 | seq_printf(seq, "\n"); |
| 503 | } |
| 504 | } |
| 505 | |
Thomas Graf | 45122ca26 | 2012-12-06 09:25:05 +0000 | [diff] [blame] | 506 | rcu_read_unlock(); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 507 | read_unlock(&head->lock); |
wangweidong | 79b9113 | 2014-01-21 15:44:07 +0800 | [diff] [blame] | 508 | local_bh_enable(); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 509 | |
| 510 | return 0; |
| 511 | |
| 512 | } |
| 513 | |
| 514 | static const struct seq_operations sctp_remaddr_ops = { |
| 515 | .start = sctp_remaddr_seq_start, |
| 516 | .next = sctp_remaddr_seq_next, |
| 517 | .stop = sctp_remaddr_seq_stop, |
| 518 | .show = sctp_remaddr_seq_show, |
| 519 | }; |
| 520 | |
| 521 | /* Cleanup the proc fs entry for 'remaddr' object. */ |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 522 | void sctp_remaddr_proc_exit(struct net *net) |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 523 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 524 | remove_proc_entry("remaddr", net->sctp.proc_net_sctp); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 525 | } |
| 526 | |
| 527 | static int sctp_remaddr_seq_open(struct inode *inode, struct file *file) |
| 528 | { |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 529 | return seq_open_net(inode, file, &sctp_remaddr_ops, |
| 530 | sizeof(struct seq_net_private)); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 531 | } |
| 532 | |
| 533 | static const struct file_operations sctp_remaddr_seq_fops = { |
| 534 | .open = sctp_remaddr_seq_open, |
| 535 | .read = seq_read, |
| 536 | .llseek = seq_lseek, |
Tommi Rantala | 0da9a0c | 2012-11-15 03:49:05 +0000 | [diff] [blame] | 537 | .release = seq_release_net, |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 538 | }; |
| 539 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 540 | int __net_init sctp_remaddr_proc_init(struct net *net) |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 541 | { |
| 542 | struct proc_dir_entry *p; |
| 543 | |
Eric W. Biederman | 13d782f | 2012-08-06 08:45:15 +0000 | [diff] [blame] | 544 | p = proc_create("remaddr", S_IRUGO, net->sctp.proc_net_sctp, |
| 545 | &sctp_remaddr_seq_fops); |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 546 | if (!p) |
| 547 | return -ENOMEM; |
Neil Horman | 20c2c1f | 2008-05-09 15:14:50 -0700 | [diff] [blame] | 548 | return 0; |
| 549 | } |