Blame view
net/l2tp/l2tp_debugfs.c
9.04 KB
0ad661404 l2tp: Add debugfs... |
1 2 3 4 5 6 7 8 9 10 |
/* * L2TP subsystem debugfs * * Copyright (c) 2010 Katalix Systems Ltd * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version * 2 of the License, or (at your option) any later version. */ |
a4ca44fa5 net: l2tp: Standa... |
11 |
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
0ad661404 l2tp: Add debugfs... |
12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 |
#include <linux/module.h> #include <linux/skbuff.h> #include <linux/socket.h> #include <linux/hash.h> #include <linux/l2tp.h> #include <linux/in.h> #include <linux/etherdevice.h> #include <linux/spinlock.h> #include <linux/debugfs.h> #include <net/sock.h> #include <net/ip.h> #include <net/icmp.h> #include <net/udp.h> #include <net/inet_common.h> #include <net/inet_hashtables.h> #include <net/tcp_states.h> #include <net/protocol.h> #include <net/xfrm.h> #include <net/net_namespace.h> #include <net/netns/generic.h> #include "l2tp_core.h" static struct dentry *rootdir; static struct dentry *tunnels; struct l2tp_dfs_seq_data { struct net *net; int tunnel_idx; /* current tunnel */ int session_idx; /* index of session within current tunnel */ struct l2tp_tunnel *tunnel; struct l2tp_session *session; /* NULL means get next tunnel */ }; static void l2tp_dfs_next_tunnel(struct l2tp_dfs_seq_data *pd) { pd->tunnel = l2tp_tunnel_find_nth(pd->net, pd->tunnel_idx); pd->tunnel_idx++; } static void l2tp_dfs_next_session(struct l2tp_dfs_seq_data *pd) { pd->session = l2tp_session_find_nth(pd->tunnel, pd->session_idx); pd->session_idx++; if (pd->session == NULL) { pd->session_idx = 0; l2tp_dfs_next_tunnel(pd); } } static void *l2tp_dfs_seq_start(struct seq_file *m, loff_t *offs) { struct l2tp_dfs_seq_data *pd = SEQ_START_TOKEN; loff_t pos = *offs; if (!pos) goto out; BUG_ON(m->private == NULL); pd = m->private; if (pd->tunnel == NULL) l2tp_dfs_next_tunnel(pd); else l2tp_dfs_next_session(pd); /* NULL tunnel and session indicates end of list */ if ((pd->tunnel == NULL) && (pd->session == NULL)) pd = NULL; out: return pd; } static void *l2tp_dfs_seq_next(struct seq_file *m, void *v, loff_t *pos) { (*pos)++; return NULL; } static void l2tp_dfs_seq_stop(struct seq_file *p, void *v) { /* nothing to do */ } static void l2tp_dfs_seq_tunnel_show(struct seq_file *m, void *v) { struct l2tp_tunnel *tunnel = v; int session_count = 0; int hash; struct hlist_node *walk; struct hlist_node *tmp; read_lock_bh(&tunnel->hlist_lock); for (hash = 0; hash < L2TP_HASH_SIZE; hash++) { hlist_for_each_safe(walk, tmp, &tunnel->session_hlist[hash]) { struct l2tp_session *session; session = hlist_entry(walk, struct l2tp_session, hlist); if (session->session_id == 0) continue; session_count++; } } read_unlock_bh(&tunnel->hlist_lock); seq_printf(m, " TUNNEL %u peer %u", tunnel->tunnel_id, tunnel->peer_tunnel_id); if (tunnel->sock) { struct inet_sock *inet = inet_sk(tunnel->sock); |
2121c3f57 l2tp: show IPv6 a... |
126 127 128 129 130 131 132 133 134 |
#if IS_ENABLED(CONFIG_IPV6) if (tunnel->sock->sk_family == AF_INET6) { struct ipv6_pinfo *np = inet6_sk(tunnel->sock); seq_printf(m, " from %pI6c to %pI6c ", &np->saddr, &np->daddr); } else #endif |
a4fbf8415 net/l2tp/l2tp_deb... |
135 136 137 |
seq_printf(m, " from %pI4 to %pI4 ", &inet->inet_saddr, &inet->inet_daddr); |
0ad661404 l2tp: Add debugfs... |
138 139 140 141 142 143 144 145 146 147 148 149 150 151 |
if (tunnel->encap == L2TP_ENCAPTYPE_UDP) seq_printf(m, " source port %hu, dest port %hu ", ntohs(inet->inet_sport), ntohs(inet->inet_dport)); } seq_printf(m, " L2TPv%d, %s ", tunnel->version, tunnel->encap == L2TP_ENCAPTYPE_UDP ? "UDP" : tunnel->encap == L2TP_ENCAPTYPE_IP ? "IP" : ""); seq_printf(m, " %d sessions, refcnt %d/%d ", session_count, tunnel->sock ? atomic_read(&tunnel->sock->sk_refcnt) : 0, atomic_read(&tunnel->ref_count)); |
7b7c0719c l2tp: avoid deadl... |
152 153 |
seq_printf(m, " %08x rx %ld/%ld/%ld rx %ld/%ld/%ld ", |
0ad661404 l2tp: Add debugfs... |
154 |
tunnel->debug, |
7b7c0719c l2tp: avoid deadl... |
155 156 157 158 159 160 |
atomic_long_read(&tunnel->stats.tx_packets), atomic_long_read(&tunnel->stats.tx_bytes), atomic_long_read(&tunnel->stats.tx_errors), atomic_long_read(&tunnel->stats.rx_packets), atomic_long_read(&tunnel->stats.rx_bytes), atomic_long_read(&tunnel->stats.rx_errors)); |
0ad661404 l2tp: Add debugfs... |
161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 |
if (tunnel->show != NULL) tunnel->show(m, tunnel); } static void l2tp_dfs_seq_session_show(struct seq_file *m, void *v) { struct l2tp_session *session = v; seq_printf(m, " SESSION %u, peer %u, %s ", session->session_id, session->peer_session_id, session->pwtype == L2TP_PWTYPE_ETH ? "ETH" : session->pwtype == L2TP_PWTYPE_PPP ? "PPP" : ""); if (session->send_seq || session->recv_seq) seq_printf(m, " nr %hu, ns %hu ", session->nr, session->ns); seq_printf(m, " refcnt %d ", atomic_read(&session->ref_count)); seq_printf(m, " config %d/%d/%c/%c/%s/%s %08x %u ", session->mtu, session->mru, session->recv_seq ? 'R' : '-', session->send_seq ? 'S' : '-', session->data_seq == 1 ? "IPSEQ" : session->data_seq == 2 ? "DATASEQ" : "-", session->lns_mode ? "LNS" : "LAC", session->debug, jiffies_to_msecs(session->reorder_timeout)); seq_printf(m, " offset %hu l2specific %hu/%hu ", session->offset, session->l2specific_type, session->l2specific_len); if (session->cookie_len) { seq_printf(m, " cookie %02x%02x%02x%02x", session->cookie[0], session->cookie[1], session->cookie[2], session->cookie[3]); if (session->cookie_len == 8) seq_printf(m, "%02x%02x%02x%02x", session->cookie[4], session->cookie[5], session->cookie[6], session->cookie[7]); seq_printf(m, " "); } if (session->peer_cookie_len) { seq_printf(m, " peer cookie %02x%02x%02x%02x", session->peer_cookie[0], session->peer_cookie[1], session->peer_cookie[2], session->peer_cookie[3]); if (session->peer_cookie_len == 8) seq_printf(m, "%02x%02x%02x%02x", session->peer_cookie[4], session->peer_cookie[5], session->peer_cookie[6], session->peer_cookie[7]); seq_printf(m, " "); } |
7b7c0719c l2tp: avoid deadl... |
216 217 |
seq_printf(m, " %hu/%hu tx %ld/%ld/%ld rx %ld/%ld/%ld ", |
0ad661404 l2tp: Add debugfs... |
218 |
session->nr, session->ns, |
7b7c0719c l2tp: avoid deadl... |
219 220 221 222 223 224 |
atomic_long_read(&session->stats.tx_packets), atomic_long_read(&session->stats.tx_bytes), atomic_long_read(&session->stats.tx_errors), atomic_long_read(&session->stats.rx_packets), atomic_long_read(&session->stats.rx_bytes), atomic_long_read(&session->stats.rx_errors)); |
0ad661404 l2tp: Add debugfs... |
225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 |
if (session->show != NULL) session->show(m, session); } static int l2tp_dfs_seq_show(struct seq_file *m, void *v) { struct l2tp_dfs_seq_data *pd = v; /* display header on line 1 */ if (v == SEQ_START_TOKEN) { seq_puts(m, "TUNNEL ID, peer ID from IP to IP "); seq_puts(m, " L2TPv2/L2TPv3, UDP/IP "); seq_puts(m, " sessions session-count, refcnt refcnt/sk->refcnt "); seq_puts(m, " debug tx-pkts/bytes/errs rx-pkts/bytes/errs "); seq_puts(m, " SESSION ID, peer ID, PWTYPE "); seq_puts(m, " refcnt cnt "); seq_puts(m, " offset OFFSET l2specific TYPE/LEN "); seq_puts(m, " [ cookie ] "); seq_puts(m, " [ peer cookie ] "); seq_puts(m, " config mtu/mru/rcvseq/sendseq/dataseq/lns debug reorderto "); seq_puts(m, " nr/ns tx-pkts/bytes/errs rx-pkts/bytes/errs "); goto out; } /* Show the tunnel or session context */ if (pd->session == NULL) l2tp_dfs_seq_tunnel_show(m, pd->tunnel); else l2tp_dfs_seq_session_show(m, pd->session); out: return 0; } static const struct seq_operations l2tp_dfs_seq_ops = { .start = l2tp_dfs_seq_start, .next = l2tp_dfs_seq_next, .stop = l2tp_dfs_seq_stop, .show = l2tp_dfs_seq_show, }; static int l2tp_dfs_seq_open(struct inode *inode, struct file *file) { struct l2tp_dfs_seq_data *pd; struct seq_file *seq; int rc = -ENOMEM; |
6f9b90182 l2tp: kzalloc wit... |
283 |
pd = kzalloc(sizeof(*pd), GFP_KERNEL); |
0ad661404 l2tp: Add debugfs... |
284 285 286 287 288 289 290 291 |
if (pd == NULL) goto out; /* Derive the network namespace from the pid opening the * file. */ pd->net = get_net_ns_by_pid(current->pid); if (IS_ERR(pd->net)) { |
b8f07a063 fix return values... |
292 |
rc = PTR_ERR(pd->net); |
0ad661404 l2tp: Add debugfs... |
293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 |
goto err_free_pd; } rc = seq_open(file, &l2tp_dfs_seq_ops); if (rc) goto err_free_net; seq = file->private_data; seq->private = pd; out: return rc; err_free_net: put_net(pd->net); err_free_pd: kfree(pd); goto out; } static int l2tp_dfs_seq_release(struct inode *inode, struct file *file) { struct l2tp_dfs_seq_data *pd; struct seq_file *seq; seq = file->private_data; pd = seq->private; if (pd->net) put_net(pd->net); kfree(pd); seq_release(inode, file); return 0; } static const struct file_operations l2tp_dfs_fops = { .owner = THIS_MODULE, .open = l2tp_dfs_seq_open, .read = seq_read, .llseek = seq_lseek, .release = l2tp_dfs_seq_release, }; static int __init l2tp_debugfs_init(void) { int rc = 0; rootdir = debugfs_create_dir("l2tp", NULL); if (IS_ERR(rootdir)) { rc = PTR_ERR(rootdir); rootdir = NULL; goto out; } tunnels = debugfs_create_file("tunnels", 0600, rootdir, NULL, &l2tp_dfs_fops); if (tunnels == NULL) rc = -EIO; |
a4ca44fa5 net: l2tp: Standa... |
350 351 |
pr_info("L2TP debugfs support "); |
0ad661404 l2tp: Add debugfs... |
352 353 354 |
out: if (rc) |
a4ca44fa5 net: l2tp: Standa... |
355 356 |
pr_warn("unable to init "); |
0ad661404 l2tp: Add debugfs... |
357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 |
return rc; } static void __exit l2tp_debugfs_exit(void) { debugfs_remove(tunnels); debugfs_remove(rootdir); } module_init(l2tp_debugfs_init); module_exit(l2tp_debugfs_exit); MODULE_LICENSE("GPL"); MODULE_AUTHOR("James Chapman <jchapman@katalix.com>"); MODULE_DESCRIPTION("L2TP debugfs driver"); MODULE_VERSION("1.0"); |