/* * INET An implementation of the TCP/IP protocol suite for the LINUX * operating system. INET is implemented using the BSD Socket * interface as the means of communication with the user level. * * This file implements the various access functions for the * PROC file system. It is mainly used for debugging and * statistics. * * Version: $Id: proc.c,v 1.23 1997/10/30 23:52:20 davem Exp $ * * Authors: Fred N. van Kempen, * Gerald J. Heim, * Fred Baumgarten, * Erik Schoenfelder, * * Fixes: * Alan Cox : UDP sockets show the rxqueue/txqueue * using hint flag for the netinfo. * Pauline Middelink : identd support * Alan Cox : Make /proc safer. * Erik Schoenfelder : /proc/net/snmp * Alan Cox : Handle dead sockets properly. * Gerhard Koerting : Show both timers * Alan Cox : Allow inode to be NULL (kernel socket) * Andi Kleen : Add support for open_requests and * split functions for more readibility. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version * 2 of the License, or (at your option) any later version. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include /* Format a single open_request into tmpbuf. */ static inline void get__openreq(struct sock *sk, struct open_request *req, char *tmpbuf, int i) { /* FIXME: I'm not sure if the timer fields are correct. */ sprintf(tmpbuf, "%4d: %08lX:%04X %08lX:%04X" " %02X %08X:%08X %02X:%08lX %08X %5d %8d %lu", i, (long unsigned int)req->af.v4_req.loc_addr, ntohs(sk->dummy_th.source), (long unsigned int)req->af.v4_req.rmt_addr, req->rmt_port, TCP_SYN_RECV, 0,0, /* use sizeof(struct open_request) here? */ 0, (unsigned long)(req->expires - jiffies), /* ??? */ req->retrans, sk->socket ? sk->socket->inode->i_uid : 0, 0, /* ??? */ sk->socket ? sk->socket->inode->i_ino:0); } /* Format a single socket into tmpbuf. */ static inline void get__sock(struct sock *sp, char *tmpbuf, int i, int format) { unsigned long dest, src; unsigned short destp, srcp; int timer_active, timer_active1, timer_active2; unsigned long timer_expires; struct tcp_opt *tp = &sp->tp_pinfo.af_tcp; dest = sp->daddr; src = sp->saddr; destp = sp->dummy_th.dest; srcp = sp->dummy_th.source; /* FIXME: The fact that retransmit_timer occurs as a field * in two different parts of the socket structure is, * to say the least, confusing. This code now uses the * right retransmit_timer variable, but I'm not sure * the rest of the timer stuff is still correct. * In particular I'm not sure what the timeout value * is suppose to reflect (as opposed to tm->when). -- erics */ destp = ntohs(destp); srcp = ntohs(srcp); timer_active1 = del_timer(&tp->retransmit_timer); timer_active2 = del_timer(&sp->timer); if (!timer_active1) tp->retransmit_timer.expires=0; if (!timer_active2) sp->timer.expires=0; timer_active=0; timer_expires=(unsigned)-1; if (timer_active1 && tp->retransmit_timer.expires < timer_expires) { timer_active=timer_active1; timer_expires=tp->retransmit_timer.expires; } if (timer_active2 && sp->timer.expires < timer_expires) { timer_active=timer_active2; timer_expires=sp->timer.expires; } sprintf(tmpbuf, "%4d: %08lX:%04X %08lX:%04X" " %02X %08X:%08X %02X:%08lX %08X %5d %8d %ld", i, src, srcp, dest, destp, sp->state, format==0?sp->write_seq-tp->snd_una:atomic_read(&sp->wmem_alloc), format==0?tp->rcv_nxt-sp->copied_seq:atomic_read(&sp->rmem_alloc), timer_active, timer_expires-jiffies, tp->retransmits, sp->socket ? sp->socket->inode->i_uid:0, timer_active?sp->timeout:0, sp->socket ? sp->socket->inode->i_ino:0); if (timer_active1) add_timer(&tp->retransmit_timer); if (timer_active2) add_timer(&sp->timer); } /* * Get__netinfo returns the length of that string. * * KNOWN BUGS * As in get_unix_netinfo, the buffer might be too small. If this * happens, get__netinfo returns only part of the available infos. */ static int get__netinfo(struct proto *pro, char *buffer, int format, char **start, off_t offset, int length) { struct sock *sp, *next; int len=0, i = 0; off_t pos=0; off_t begin; char tmpbuf[129]; if (offset < 128) len += sprintf(buffer, "%-127s\n", " sl local_address rem_address st tx_queue " "rx_queue tr tm->when retrnsmt uid timeout inode"); pos = 128; /* * This was very pretty but didn't work when a socket is destroyed * at the wrong moment (eg a syn recv socket getting a reset), or * a memory timer destroy. Instead of playing with timers we just * concede defeat and do a start_bh_atomic(). * Why not just use lock_sock()? As far as I can see all timer routines * check for sock_readers before doing anything. -AK * [Disabled for now again, because it hard-locked my machine, and there * is an theoretical situation then, where an user could prevent * sockets from being destroyed by constantly reading /proc/net/tcp.] */ SOCKHASH_LOCK(); sp = pro->sklist_next; while(sp != (struct sock *)pro) { if (format == 0 && sp->state == TCP_LISTEN) { struct open_request *req; for (req = sp->tp_pinfo.af_tcp.syn_wait_queue; req; i++, req = req->dl_next) { pos += 128; if (pos < offset) continue; get__openreq(sp, req, tmpbuf, i); len += sprintf(buffer+len, "%-127s\n", tmpbuf); if(len >= length) break; } } pos += 128; if (pos < offset) goto next; get__sock(sp, tmpbuf, i, format); len += sprintf(buffer+len, "%-127s\n", tmpbuf); if(len >= length) break; next: next = sp->sklist_next; sp = next; i++; } SOCKHASH_UNLOCK(); begin = len - (pos - offset); *start = buffer + begin; len -= begin; if(len>length) len = length; return len; } int tcp_get_info(char *buffer, char **start, off_t offset, int length, int dummy) { return get__netinfo(&tcp_prot, buffer,0, start, offset, length); } int udp_get_info(char *buffer, char **start, off_t offset, int length, int dummy) { return get__netinfo(&udp_prot, buffer,1, start, offset, length); } int raw_get_info(char *buffer, char **start, off_t offset, int length, int dummy) { return get__netinfo(&raw_prot, buffer,1, start, offset, length); } /* * Report socket allocation statistics [mea@utu.fi] */ int afinet_get_info(char *buffer, char **start, off_t offset, int length, int dummy) { /* From net/socket.c */ extern int socket_get_info(char *, char **, off_t, int); int len = socket_get_info(buffer,start,offset,length); len += sprintf(buffer+len,"TCP: inuse %d highest %d\n", tcp_prot.inuse, tcp_prot.highestinuse); len += sprintf(buffer+len,"UDP: inuse %d highest %d\n", udp_prot.inuse, udp_prot.highestinuse); len += sprintf(buffer+len,"RAW: inuse %d highest %d\n", raw_prot.inuse, raw_prot.highestinuse); if (offset >= len) { *start = buffer; return 0; } *start = buffer + offset; len -= offset; if (len > length) len = length; return len; } /* * Called from the PROCfs module. This outputs /proc/net/snmp. */ int snmp_get_info(char *buffer, char **start, off_t offset, int length, int dummy) { extern struct tcp_mib tcp_statistics; extern struct udp_mib udp_statistics; int len; /* extern unsigned long tcp_rx_miss, tcp_rx_hit1,tcp_rx_hit2; */ len = sprintf (buffer, "Ip: Forwarding DefaultTTL InReceives InHdrErrors InAddrErrors ForwDatagrams InUnknownProtos InDiscards InDelivers OutRequests OutDiscards OutNoRoutes ReasmTimeout ReasmReqds ReasmOKs ReasmFails FragOKs FragFails FragCreates\n" "Ip: %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu\n", ip_statistics.IpForwarding, ip_statistics.IpDefaultTTL, ip_statistics.IpInReceives, ip_statistics.IpInHdrErrors, ip_statistics.IpInAddrErrors, ip_statistics.IpForwDatagrams, ip_statistics.IpInUnknownProtos, ip_statistics.IpInDiscards, ip_statistics.IpInDelivers, ip_statistics.IpOutRequests, ip_statistics.IpOutDiscards, ip_statistics.IpOutNoRoutes, ip_statistics.IpReasmTimeout, ip_statistics.IpReasmReqds, ip_statistics.IpReasmOKs, ip_statistics.IpReasmFails, ip_statistics.IpFragOKs, ip_statistics.IpFragFails, ip_statistics.IpFragCreates); len += sprintf (buffer + len, "Icmp: InMsgs InErrors InDestUnreachs InTimeExcds InParmProbs InSrcQuenchs InRedirects InEchos InEchoReps InTimestamps InTimestampReps InAddrMasks InAddrMaskReps OutMsgs OutErrors OutDestUnreachs OutTimeExcds OutParmProbs OutSrcQuenchs OutRedirects OutEchos OutEchoReps OutTimestamps OutTimestampReps OutAddrMasks OutAddrMaskReps\n" "Icmp: %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu\n", icmp_statistics.IcmpInMsgs, icmp_statistics.IcmpInErrors, icmp_statistics.IcmpInDestUnreachs, icmp_statistics.IcmpInTimeExcds, icmp_statistics.IcmpInParmProbs, icmp_statistics.IcmpInSrcQuenchs, icmp_statistics.IcmpInRedirects, icmp_statistics.IcmpInEchos, icmp_statistics.IcmpInEchoReps, icmp_statistics.IcmpInTimestamps, icmp_statistics.IcmpInTimestampReps, icmp_statistics.IcmpInAddrMasks, icmp_statistics.IcmpInAddrMaskReps, icmp_statistics.IcmpOutMsgs, icmp_statistics.IcmpOutErrors, icmp_statistics.IcmpOutDestUnreachs, icmp_statistics.IcmpOutTimeExcds, icmp_statistics.IcmpOutParmProbs, icmp_statistics.IcmpOutSrcQuenchs, icmp_statistics.IcmpOutRedirects, icmp_statistics.IcmpOutEchos, icmp_statistics.IcmpOutEchoReps, icmp_statistics.IcmpOutTimestamps, icmp_statistics.IcmpOutTimestampReps, icmp_statistics.IcmpOutAddrMasks, icmp_statistics.IcmpOutAddrMaskReps); len += sprintf (buffer + len, "Tcp: RtoAlgorithm RtoMin RtoMax MaxConn ActiveOpens PassiveOpens AttemptFails EstabResets CurrEstab InSegs OutSegs RetransSegs InErrs OutRsts\n" "Tcp: %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu\n", tcp_statistics.TcpRtoAlgorithm, tcp_statistics.TcpRtoMin, tcp_statistics.TcpRtoMax, tcp_statistics.TcpMaxConn, tcp_statistics.TcpActiveOpens, tcp_statistics.TcpPassiveOpens, tcp_statistics.TcpAttemptFails, tcp_statistics.TcpEstabResets, tcp_statistics.TcpCurrEstab, tcp_statistics.TcpInSegs, tcp_statistics.TcpOutSegs, tcp_statistics.TcpRetransSegs, tcp_statistics.TcpInErrs, tcp_statistics.TcpOutRsts); len += sprintf (buffer + len, "Udp: InDatagrams NoPorts InErrors OutDatagrams\nUdp: %lu %lu %lu %lu\n", udp_statistics.UdpInDatagrams, udp_statistics.UdpNoPorts, udp_statistics.UdpInErrors, udp_statistics.UdpOutDatagrams); /* len += sprintf( buffer + len, "TCP fast path RX: H2: %ul H1: %ul L: %ul\n", tcp_rx_hit2,tcp_rx_hit1,tcp_rx_miss); */ if (offset >= len) { *start = buffer; return 0; } *start = buffer + offset; len -= offset; if (len > length) len = length; return len; }