lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame] | 1 | /* SCTP kernel implementation |
| 2 | * Copyright (c) 2003 International Business Machines, Corp. |
| 3 | * |
| 4 | * This file is part of the SCTP kernel implementation |
| 5 | * |
| 6 | * This SCTP implementation is free software; |
| 7 | * you can redistribute it and/or modify it under the terms of |
| 8 | * the GNU General Public License as published by |
| 9 | * the Free Software Foundation; either version 2, or (at your option) |
| 10 | * any later version. |
| 11 | * |
| 12 | * This SCTP implementation is distributed in the hope that it |
| 13 | * will be useful, but WITHOUT ANY WARRANTY; without even the implied |
| 14 | * ************************ |
| 15 | * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
| 16 | * See the GNU General Public License for more details. |
| 17 | * |
| 18 | * You should have received a copy of the GNU General Public License |
| 19 | * along with GNU CC; see the file COPYING. If not, write to |
| 20 | * the Free Software Foundation, 59 Temple Place - Suite 330, |
| 21 | * Boston, MA 02111-1307, USA. |
| 22 | * |
| 23 | * Please send any bug reports or fixes you make to the |
| 24 | * email address(es): |
| 25 | * lksctp developers <lksctp-developers@lists.sourceforge.net> |
| 26 | * |
| 27 | * Or submit a bug report through the following website: |
| 28 | * http://www.sf.net/projects/lksctp |
| 29 | * |
| 30 | * Written or modified by: |
| 31 | * Sridhar Samudrala <sri@us.ibm.com> |
| 32 | * |
| 33 | * Any bugs reported given to us we will try to fix... any fixes shared will |
| 34 | * be incorporated into the next SCTP release. |
| 35 | */ |
| 36 | |
| 37 | #include <linux/types.h> |
| 38 | #include <linux/seq_file.h> |
| 39 | #include <linux/init.h> |
| 40 | #include <linux/export.h> |
| 41 | #include <net/sctp/sctp.h> |
| 42 | #include <net/ip.h> /* for snmp_fold_field */ |
| 43 | |
| 44 | static const struct snmp_mib sctp_snmp_list[] = { |
| 45 | SNMP_MIB_ITEM("SctpCurrEstab", SCTP_MIB_CURRESTAB), |
| 46 | SNMP_MIB_ITEM("SctpActiveEstabs", SCTP_MIB_ACTIVEESTABS), |
| 47 | SNMP_MIB_ITEM("SctpPassiveEstabs", SCTP_MIB_PASSIVEESTABS), |
| 48 | SNMP_MIB_ITEM("SctpAborteds", SCTP_MIB_ABORTEDS), |
| 49 | SNMP_MIB_ITEM("SctpShutdowns", SCTP_MIB_SHUTDOWNS), |
| 50 | SNMP_MIB_ITEM("SctpOutOfBlues", SCTP_MIB_OUTOFBLUES), |
| 51 | SNMP_MIB_ITEM("SctpChecksumErrors", SCTP_MIB_CHECKSUMERRORS), |
| 52 | SNMP_MIB_ITEM("SctpOutCtrlChunks", SCTP_MIB_OUTCTRLCHUNKS), |
| 53 | SNMP_MIB_ITEM("SctpOutOrderChunks", SCTP_MIB_OUTORDERCHUNKS), |
| 54 | SNMP_MIB_ITEM("SctpOutUnorderChunks", SCTP_MIB_OUTUNORDERCHUNKS), |
| 55 | SNMP_MIB_ITEM("SctpInCtrlChunks", SCTP_MIB_INCTRLCHUNKS), |
| 56 | SNMP_MIB_ITEM("SctpInOrderChunks", SCTP_MIB_INORDERCHUNKS), |
| 57 | SNMP_MIB_ITEM("SctpInUnorderChunks", SCTP_MIB_INUNORDERCHUNKS), |
| 58 | SNMP_MIB_ITEM("SctpFragUsrMsgs", SCTP_MIB_FRAGUSRMSGS), |
| 59 | SNMP_MIB_ITEM("SctpReasmUsrMsgs", SCTP_MIB_REASMUSRMSGS), |
| 60 | SNMP_MIB_ITEM("SctpOutSCTPPacks", SCTP_MIB_OUTSCTPPACKS), |
| 61 | SNMP_MIB_ITEM("SctpInSCTPPacks", SCTP_MIB_INSCTPPACKS), |
| 62 | SNMP_MIB_ITEM("SctpT1InitExpireds", SCTP_MIB_T1_INIT_EXPIREDS), |
| 63 | SNMP_MIB_ITEM("SctpT1CookieExpireds", SCTP_MIB_T1_COOKIE_EXPIREDS), |
| 64 | SNMP_MIB_ITEM("SctpT2ShutdownExpireds", SCTP_MIB_T2_SHUTDOWN_EXPIREDS), |
| 65 | SNMP_MIB_ITEM("SctpT3RtxExpireds", SCTP_MIB_T3_RTX_EXPIREDS), |
| 66 | SNMP_MIB_ITEM("SctpT4RtoExpireds", SCTP_MIB_T4_RTO_EXPIREDS), |
| 67 | SNMP_MIB_ITEM("SctpT5ShutdownGuardExpireds", SCTP_MIB_T5_SHUTDOWN_GUARD_EXPIREDS), |
| 68 | SNMP_MIB_ITEM("SctpDelaySackExpireds", SCTP_MIB_DELAY_SACK_EXPIREDS), |
| 69 | SNMP_MIB_ITEM("SctpAutocloseExpireds", SCTP_MIB_AUTOCLOSE_EXPIREDS), |
| 70 | SNMP_MIB_ITEM("SctpT3Retransmits", SCTP_MIB_T3_RETRANSMITS), |
| 71 | SNMP_MIB_ITEM("SctpPmtudRetransmits", SCTP_MIB_PMTUD_RETRANSMITS), |
| 72 | SNMP_MIB_ITEM("SctpFastRetransmits", SCTP_MIB_FAST_RETRANSMITS), |
| 73 | SNMP_MIB_ITEM("SctpInPktSoftirq", SCTP_MIB_IN_PKT_SOFTIRQ), |
| 74 | SNMP_MIB_ITEM("SctpInPktBacklog", SCTP_MIB_IN_PKT_BACKLOG), |
| 75 | SNMP_MIB_ITEM("SctpInPktDiscards", SCTP_MIB_IN_PKT_DISCARDS), |
| 76 | SNMP_MIB_ITEM("SctpInDataChunkDiscards", SCTP_MIB_IN_DATA_CHUNK_DISCARDS), |
| 77 | SNMP_MIB_SENTINEL |
| 78 | }; |
| 79 | |
| 80 | /* Display sctp snmp mib statistics(/proc/net/sctp/snmp). */ |
| 81 | static int sctp_snmp_seq_show(struct seq_file *seq, void *v) |
| 82 | { |
| 83 | int i; |
| 84 | |
| 85 | for (i = 0; sctp_snmp_list[i].name != NULL; i++) |
| 86 | seq_printf(seq, "%-32s\t%ld\n", sctp_snmp_list[i].name, |
| 87 | snmp_fold_field((void __percpu **)sctp_statistics, |
| 88 | sctp_snmp_list[i].entry)); |
| 89 | |
| 90 | return 0; |
| 91 | } |
| 92 | |
| 93 | /* Initialize the seq file operations for 'snmp' object. */ |
| 94 | static int sctp_snmp_seq_open(struct inode *inode, struct file *file) |
| 95 | { |
| 96 | return single_open(file, sctp_snmp_seq_show, NULL); |
| 97 | } |
| 98 | |
| 99 | static const struct file_operations sctp_snmp_seq_fops = { |
| 100 | .owner = THIS_MODULE, |
| 101 | .open = sctp_snmp_seq_open, |
| 102 | .read = seq_read, |
| 103 | .llseek = seq_lseek, |
| 104 | .release = single_release, |
| 105 | }; |
| 106 | |
| 107 | /* Set up the proc fs entry for 'snmp' object. */ |
| 108 | int __init sctp_snmp_proc_init(void) |
| 109 | { |
| 110 | struct proc_dir_entry *p; |
| 111 | |
| 112 | p = proc_create("snmp", S_IRUGO, proc_net_sctp, &sctp_snmp_seq_fops); |
| 113 | if (!p) |
| 114 | return -ENOMEM; |
| 115 | |
| 116 | return 0; |
| 117 | } |
| 118 | |
| 119 | /* Cleanup the proc fs entry for 'snmp' object. */ |
| 120 | void sctp_snmp_proc_exit(void) |
| 121 | { |
| 122 | remove_proc_entry("snmp", proc_net_sctp); |
| 123 | } |
| 124 | |
| 125 | /* Dump local addresses of an association/endpoint. */ |
| 126 | static void sctp_seq_dump_local_addrs(struct seq_file *seq, struct sctp_ep_common *epb) |
| 127 | { |
| 128 | struct sctp_association *asoc; |
| 129 | struct sctp_sockaddr_entry *laddr; |
| 130 | struct sctp_transport *peer; |
| 131 | union sctp_addr *addr, *primary = NULL; |
| 132 | struct sctp_af *af; |
| 133 | |
| 134 | if (epb->type == SCTP_EP_TYPE_ASSOCIATION) { |
| 135 | asoc = sctp_assoc(epb); |
| 136 | peer = asoc->peer.primary_path; |
| 137 | primary = &peer->saddr; |
| 138 | } |
| 139 | |
| 140 | list_for_each_entry(laddr, &epb->bind_addr.address_list, list) { |
| 141 | addr = &laddr->a; |
| 142 | af = sctp_get_af_specific(addr->sa.sa_family); |
| 143 | if (primary && af->cmp_addr(addr, primary)) { |
| 144 | seq_printf(seq, "*"); |
| 145 | } |
| 146 | af->seq_dump_addr(seq, addr); |
| 147 | } |
| 148 | } |
| 149 | |
| 150 | /* Dump remote addresses of an association. */ |
| 151 | static void sctp_seq_dump_remote_addrs(struct seq_file *seq, struct sctp_association *assoc) |
| 152 | { |
| 153 | struct sctp_transport *transport; |
| 154 | union sctp_addr *addr, *primary; |
| 155 | struct sctp_af *af; |
| 156 | |
| 157 | primary = &assoc->peer.primary_addr; |
| 158 | list_for_each_entry(transport, &assoc->peer.transport_addr_list, |
| 159 | transports) { |
| 160 | addr = &transport->ipaddr; |
| 161 | af = sctp_get_af_specific(addr->sa.sa_family); |
| 162 | if (af->cmp_addr(addr, primary)) { |
| 163 | seq_printf(seq, "*"); |
| 164 | } |
| 165 | af->seq_dump_addr(seq, addr); |
| 166 | } |
| 167 | } |
| 168 | |
| 169 | static void * sctp_eps_seq_start(struct seq_file *seq, loff_t *pos) |
| 170 | { |
| 171 | if (*pos >= sctp_ep_hashsize) |
| 172 | return NULL; |
| 173 | |
| 174 | if (*pos < 0) |
| 175 | *pos = 0; |
| 176 | |
| 177 | if (*pos == 0) |
| 178 | seq_printf(seq, " ENDPT SOCK STY SST HBKT LPORT UID INODE LADDRS\n"); |
| 179 | |
| 180 | return (void *)pos; |
| 181 | } |
| 182 | |
| 183 | static void sctp_eps_seq_stop(struct seq_file *seq, void *v) |
| 184 | { |
| 185 | } |
| 186 | |
| 187 | |
| 188 | static void * sctp_eps_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
| 189 | { |
| 190 | if (++*pos >= sctp_ep_hashsize) |
| 191 | return NULL; |
| 192 | |
| 193 | return pos; |
| 194 | } |
| 195 | |
| 196 | |
| 197 | /* Display sctp endpoints (/proc/net/sctp/eps). */ |
| 198 | static int sctp_eps_seq_show(struct seq_file *seq, void *v) |
| 199 | { |
| 200 | struct sctp_hashbucket *head; |
| 201 | struct sctp_ep_common *epb; |
| 202 | struct sctp_endpoint *ep; |
| 203 | struct sock *sk; |
| 204 | struct hlist_node *node; |
| 205 | int hash = *(loff_t *)v; |
| 206 | |
| 207 | if (hash >= sctp_ep_hashsize) |
| 208 | return -ENOMEM; |
| 209 | |
| 210 | head = &sctp_ep_hashtable[hash]; |
| 211 | sctp_local_bh_disable(); |
| 212 | read_lock(&head->lock); |
| 213 | sctp_for_each_hentry(epb, node, &head->chain) { |
| 214 | ep = sctp_ep(epb); |
| 215 | sk = epb->sk; |
| 216 | seq_printf(seq, "%8pK %8pK %-3d %-3d %-4d %-5d %5d %5lu ", ep, sk, |
| 217 | sctp_sk(sk)->type, sk->sk_state, hash, |
| 218 | epb->bind_addr.port, |
| 219 | sock_i_uid(sk), sock_i_ino(sk)); |
| 220 | |
| 221 | sctp_seq_dump_local_addrs(seq, epb); |
| 222 | seq_printf(seq, "\n"); |
| 223 | } |
| 224 | read_unlock(&head->lock); |
| 225 | sctp_local_bh_enable(); |
| 226 | |
| 227 | return 0; |
| 228 | } |
| 229 | |
| 230 | static const struct seq_operations sctp_eps_ops = { |
| 231 | .start = sctp_eps_seq_start, |
| 232 | .next = sctp_eps_seq_next, |
| 233 | .stop = sctp_eps_seq_stop, |
| 234 | .show = sctp_eps_seq_show, |
| 235 | }; |
| 236 | |
| 237 | |
| 238 | /* Initialize the seq file operations for 'eps' object. */ |
| 239 | static int sctp_eps_seq_open(struct inode *inode, struct file *file) |
| 240 | { |
| 241 | return seq_open(file, &sctp_eps_ops); |
| 242 | } |
| 243 | |
| 244 | static const struct file_operations sctp_eps_seq_fops = { |
| 245 | .open = sctp_eps_seq_open, |
| 246 | .read = seq_read, |
| 247 | .llseek = seq_lseek, |
| 248 | .release = seq_release, |
| 249 | }; |
| 250 | |
| 251 | /* Set up the proc fs entry for 'eps' object. */ |
| 252 | int __init sctp_eps_proc_init(void) |
| 253 | { |
| 254 | struct proc_dir_entry *p; |
| 255 | |
| 256 | p = proc_create("eps", S_IRUGO, proc_net_sctp, &sctp_eps_seq_fops); |
| 257 | if (!p) |
| 258 | return -ENOMEM; |
| 259 | |
| 260 | return 0; |
| 261 | } |
| 262 | |
| 263 | /* Cleanup the proc fs entry for 'eps' object. */ |
| 264 | void sctp_eps_proc_exit(void) |
| 265 | { |
| 266 | remove_proc_entry("eps", proc_net_sctp); |
| 267 | } |
| 268 | |
| 269 | |
| 270 | static void * sctp_assocs_seq_start(struct seq_file *seq, loff_t *pos) |
| 271 | { |
| 272 | if (*pos >= sctp_assoc_hashsize) |
| 273 | return NULL; |
| 274 | |
| 275 | if (*pos < 0) |
| 276 | *pos = 0; |
| 277 | |
| 278 | if (*pos == 0) |
| 279 | seq_printf(seq, " ASSOC SOCK STY SST ST HBKT " |
| 280 | "ASSOC-ID TX_QUEUE RX_QUEUE UID INODE LPORT " |
| 281 | "RPORT LADDRS <-> RADDRS " |
| 282 | "HBINT INS OUTS MAXRT T1X T2X RTXC\n"); |
| 283 | |
| 284 | return (void *)pos; |
| 285 | } |
| 286 | |
| 287 | static void sctp_assocs_seq_stop(struct seq_file *seq, void *v) |
| 288 | { |
| 289 | } |
| 290 | |
| 291 | |
| 292 | static void * sctp_assocs_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
| 293 | { |
| 294 | if (++*pos >= sctp_assoc_hashsize) |
| 295 | return NULL; |
| 296 | |
| 297 | return pos; |
| 298 | } |
| 299 | |
| 300 | /* Display sctp associations (/proc/net/sctp/assocs). */ |
| 301 | static int sctp_assocs_seq_show(struct seq_file *seq, void *v) |
| 302 | { |
| 303 | struct sctp_hashbucket *head; |
| 304 | struct sctp_ep_common *epb; |
| 305 | struct sctp_association *assoc; |
| 306 | struct sock *sk; |
| 307 | struct hlist_node *node; |
| 308 | int hash = *(loff_t *)v; |
| 309 | |
| 310 | if (hash >= sctp_assoc_hashsize) |
| 311 | return -ENOMEM; |
| 312 | |
| 313 | head = &sctp_assoc_hashtable[hash]; |
| 314 | sctp_local_bh_disable(); |
| 315 | read_lock(&head->lock); |
| 316 | sctp_for_each_hentry(epb, node, &head->chain) { |
| 317 | assoc = sctp_assoc(epb); |
| 318 | sk = epb->sk; |
| 319 | seq_printf(seq, |
| 320 | "%8pK %8pK %-3d %-3d %-2d %-4d " |
| 321 | "%4d %8d %8d %7d %5lu %-5d %5d ", |
| 322 | assoc, sk, sctp_sk(sk)->type, sk->sk_state, |
| 323 | assoc->state, hash, |
| 324 | assoc->assoc_id, |
| 325 | assoc->sndbuf_used, |
| 326 | atomic_read(&assoc->rmem_alloc), |
| 327 | sock_i_uid(sk), sock_i_ino(sk), |
| 328 | epb->bind_addr.port, |
| 329 | assoc->peer.port); |
| 330 | seq_printf(seq, " "); |
| 331 | sctp_seq_dump_local_addrs(seq, epb); |
| 332 | seq_printf(seq, "<-> "); |
| 333 | sctp_seq_dump_remote_addrs(seq, assoc); |
| 334 | seq_printf(seq, "\t%8lu %5d %5d %4d %4d %4d %8d ", |
| 335 | assoc->hbinterval, assoc->c.sinit_max_instreams, |
| 336 | assoc->c.sinit_num_ostreams, assoc->max_retrans, |
| 337 | assoc->init_retries, assoc->shutdown_retries, |
| 338 | assoc->rtx_data_chunks); |
| 339 | seq_printf(seq, "\n"); |
| 340 | } |
| 341 | read_unlock(&head->lock); |
| 342 | sctp_local_bh_enable(); |
| 343 | |
| 344 | return 0; |
| 345 | } |
| 346 | |
| 347 | static const struct seq_operations sctp_assoc_ops = { |
| 348 | .start = sctp_assocs_seq_start, |
| 349 | .next = sctp_assocs_seq_next, |
| 350 | .stop = sctp_assocs_seq_stop, |
| 351 | .show = sctp_assocs_seq_show, |
| 352 | }; |
| 353 | |
| 354 | /* Initialize the seq file operations for 'assocs' object. */ |
| 355 | static int sctp_assocs_seq_open(struct inode *inode, struct file *file) |
| 356 | { |
| 357 | return seq_open(file, &sctp_assoc_ops); |
| 358 | } |
| 359 | |
| 360 | static const struct file_operations sctp_assocs_seq_fops = { |
| 361 | .open = sctp_assocs_seq_open, |
| 362 | .read = seq_read, |
| 363 | .llseek = seq_lseek, |
| 364 | .release = seq_release, |
| 365 | }; |
| 366 | |
| 367 | /* Set up the proc fs entry for 'assocs' object. */ |
| 368 | int __init sctp_assocs_proc_init(void) |
| 369 | { |
| 370 | struct proc_dir_entry *p; |
| 371 | |
| 372 | p = proc_create("assocs", S_IRUGO, proc_net_sctp, |
| 373 | &sctp_assocs_seq_fops); |
| 374 | if (!p) |
| 375 | return -ENOMEM; |
| 376 | |
| 377 | return 0; |
| 378 | } |
| 379 | |
| 380 | /* Cleanup the proc fs entry for 'assocs' object. */ |
| 381 | void sctp_assocs_proc_exit(void) |
| 382 | { |
| 383 | remove_proc_entry("assocs", proc_net_sctp); |
| 384 | } |
| 385 | |
| 386 | static void *sctp_remaddr_seq_start(struct seq_file *seq, loff_t *pos) |
| 387 | { |
| 388 | if (*pos >= sctp_assoc_hashsize) |
| 389 | return NULL; |
| 390 | |
| 391 | if (*pos < 0) |
| 392 | *pos = 0; |
| 393 | |
| 394 | if (*pos == 0) |
| 395 | seq_printf(seq, "ADDR ASSOC_ID HB_ACT RTO MAX_PATH_RTX " |
| 396 | "REM_ADDR_RTX START\n"); |
| 397 | |
| 398 | return (void *)pos; |
| 399 | } |
| 400 | |
| 401 | static void *sctp_remaddr_seq_next(struct seq_file *seq, void *v, loff_t *pos) |
| 402 | { |
| 403 | if (++*pos >= sctp_assoc_hashsize) |
| 404 | return NULL; |
| 405 | |
| 406 | return pos; |
| 407 | } |
| 408 | |
| 409 | static void sctp_remaddr_seq_stop(struct seq_file *seq, void *v) |
| 410 | { |
| 411 | } |
| 412 | |
| 413 | static int sctp_remaddr_seq_show(struct seq_file *seq, void *v) |
| 414 | { |
| 415 | struct sctp_hashbucket *head; |
| 416 | struct sctp_ep_common *epb; |
| 417 | struct sctp_association *assoc; |
| 418 | struct hlist_node *node; |
| 419 | struct sctp_transport *tsp; |
| 420 | int hash = *(loff_t *)v; |
| 421 | |
| 422 | if (hash >= sctp_assoc_hashsize) |
| 423 | return -ENOMEM; |
| 424 | |
| 425 | head = &sctp_assoc_hashtable[hash]; |
| 426 | sctp_local_bh_disable(); |
| 427 | read_lock(&head->lock); |
| 428 | sctp_for_each_hentry(epb, node, &head->chain) { |
| 429 | assoc = sctp_assoc(epb); |
| 430 | list_for_each_entry(tsp, &assoc->peer.transport_addr_list, |
| 431 | transports) { |
| 432 | /* |
| 433 | * The remote address (ADDR) |
| 434 | */ |
| 435 | tsp->af_specific->seq_dump_addr(seq, &tsp->ipaddr); |
| 436 | seq_printf(seq, " "); |
| 437 | |
| 438 | /* |
| 439 | * The association ID (ASSOC_ID) |
| 440 | */ |
| 441 | seq_printf(seq, "%d ", tsp->asoc->assoc_id); |
| 442 | |
| 443 | /* |
| 444 | * If the Heartbeat is active (HB_ACT) |
| 445 | * Note: 1 = Active, 0 = Inactive |
| 446 | */ |
| 447 | seq_printf(seq, "%d ", timer_pending(&tsp->hb_timer)); |
| 448 | |
| 449 | /* |
| 450 | * Retransmit time out (RTO) |
| 451 | */ |
| 452 | seq_printf(seq, "%lu ", tsp->rto); |
| 453 | |
| 454 | /* |
| 455 | * Maximum path retransmit count (PATH_MAX_RTX) |
| 456 | */ |
| 457 | seq_printf(seq, "%d ", tsp->pathmaxrxt); |
| 458 | |
| 459 | /* |
| 460 | * remote address retransmit count (REM_ADDR_RTX) |
| 461 | * Note: We don't have a way to tally this at the moment |
| 462 | * so lets just leave it as zero for the moment |
| 463 | */ |
| 464 | seq_printf(seq, "0 "); |
| 465 | |
| 466 | /* |
| 467 | * remote address start time (START). This is also not |
| 468 | * currently implemented, but we can record it with a |
| 469 | * jiffies marker in a subsequent patch |
| 470 | */ |
| 471 | seq_printf(seq, "0"); |
| 472 | |
| 473 | seq_printf(seq, "\n"); |
| 474 | } |
| 475 | } |
| 476 | |
| 477 | read_unlock(&head->lock); |
| 478 | sctp_local_bh_enable(); |
| 479 | |
| 480 | return 0; |
| 481 | |
| 482 | } |
| 483 | |
| 484 | static const struct seq_operations sctp_remaddr_ops = { |
| 485 | .start = sctp_remaddr_seq_start, |
| 486 | .next = sctp_remaddr_seq_next, |
| 487 | .stop = sctp_remaddr_seq_stop, |
| 488 | .show = sctp_remaddr_seq_show, |
| 489 | }; |
| 490 | |
| 491 | /* Cleanup the proc fs entry for 'remaddr' object. */ |
| 492 | void sctp_remaddr_proc_exit(void) |
| 493 | { |
| 494 | remove_proc_entry("remaddr", proc_net_sctp); |
| 495 | } |
| 496 | |
| 497 | static int sctp_remaddr_seq_open(struct inode *inode, struct file *file) |
| 498 | { |
| 499 | return seq_open(file, &sctp_remaddr_ops); |
| 500 | } |
| 501 | |
| 502 | static const struct file_operations sctp_remaddr_seq_fops = { |
| 503 | .open = sctp_remaddr_seq_open, |
| 504 | .read = seq_read, |
| 505 | .llseek = seq_lseek, |
| 506 | .release = seq_release, |
| 507 | }; |
| 508 | |
| 509 | int __init sctp_remaddr_proc_init(void) |
| 510 | { |
| 511 | struct proc_dir_entry *p; |
| 512 | |
| 513 | p = proc_create("remaddr", S_IRUGO, proc_net_sctp, &sctp_remaddr_seq_fops); |
| 514 | if (!p) |
| 515 | return -ENOMEM; |
| 516 | return 0; |
| 517 | } |