mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2025-08-16 22:13:31 +00:00

This patch adds 'get_subflow_info' in 'mptcp_diag', which can check whether a TCP connection is an MPTCP subflow based on the "INET_ULP_INFO_MPTCP" with tcp_diag method. The helper 'print_subflow_info' in 'mptcp_diag' can print the subflow_filed of an MPTCP subflow for further checking the 'subflow_info' through inet_diag method. The example of the whole output should be: $ ./mptcp_diag -s "127.0.0.1:10000 127.0.0.1:38984" 127.0.0.1:10000 -> 127.0.0.1:38984 It's a mptcp subflow, the subflow info: flags:Mec token:0000(id:0)/4278e77e(id:0) seq:9288466187236176036 \ sfseq:1 ssnoff:2317083055 maplen:215 Co-developed-by: Geliang Tang <geliang@kernel.org> Signed-off-by: Geliang Tang <geliang@kernel.org> Signed-off-by: Gang Yan <yangang@kylinos.cn> Reviewed-by: Matthieu Baerts (NGI0) <matttbe@kernel.org> Signed-off-by: Matthieu Baerts (NGI0) <matttbe@kernel.org> Link: https://patch.msgid.link/20250502-net-next-mptcp-sft-inc-cover-v1-6-68eec95898fb@kernel.org Signed-off-by: Jakub Kicinski <kuba@kernel.org>
436 lines
11 KiB
C
436 lines
11 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2025, Kylin Software */
|
|
|
|
#include <linux/sock_diag.h>
|
|
#include <linux/rtnetlink.h>
|
|
#include <linux/inet_diag.h>
|
|
#include <linux/netlink.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <linux/tcp.h>
|
|
#include <arpa/inet.h>
|
|
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
|
|
#ifndef IPPROTO_MPTCP
|
|
#define IPPROTO_MPTCP 262
|
|
#endif
|
|
|
|
#define parse_rtattr_nested(tb, max, rta) \
|
|
(parse_rtattr_flags((tb), (max), RTA_DATA(rta), RTA_PAYLOAD(rta), \
|
|
NLA_F_NESTED))
|
|
|
|
struct params {
|
|
__u32 target_token;
|
|
char subflow_addrs[1024];
|
|
};
|
|
|
|
struct mptcp_info {
|
|
__u8 mptcpi_subflows;
|
|
__u8 mptcpi_add_addr_signal;
|
|
__u8 mptcpi_add_addr_accepted;
|
|
__u8 mptcpi_subflows_max;
|
|
__u8 mptcpi_add_addr_signal_max;
|
|
__u8 mptcpi_add_addr_accepted_max;
|
|
__u32 mptcpi_flags;
|
|
__u32 mptcpi_token;
|
|
__u64 mptcpi_write_seq;
|
|
__u64 mptcpi_snd_una;
|
|
__u64 mptcpi_rcv_nxt;
|
|
__u8 mptcpi_local_addr_used;
|
|
__u8 mptcpi_local_addr_max;
|
|
__u8 mptcpi_csum_enabled;
|
|
__u32 mptcpi_retransmits;
|
|
__u64 mptcpi_bytes_retrans;
|
|
__u64 mptcpi_bytes_sent;
|
|
__u64 mptcpi_bytes_received;
|
|
__u64 mptcpi_bytes_acked;
|
|
__u8 mptcpi_subflows_total;
|
|
__u8 reserved[3];
|
|
__u32 mptcpi_last_data_sent;
|
|
__u32 mptcpi_last_data_recv;
|
|
__u32 mptcpi_last_ack_recv;
|
|
};
|
|
|
|
enum {
|
|
MPTCP_SUBFLOW_ATTR_UNSPEC,
|
|
MPTCP_SUBFLOW_ATTR_TOKEN_REM,
|
|
MPTCP_SUBFLOW_ATTR_TOKEN_LOC,
|
|
MPTCP_SUBFLOW_ATTR_RELWRITE_SEQ,
|
|
MPTCP_SUBFLOW_ATTR_MAP_SEQ,
|
|
MPTCP_SUBFLOW_ATTR_MAP_SFSEQ,
|
|
MPTCP_SUBFLOW_ATTR_SSN_OFFSET,
|
|
MPTCP_SUBFLOW_ATTR_MAP_DATALEN,
|
|
MPTCP_SUBFLOW_ATTR_FLAGS,
|
|
MPTCP_SUBFLOW_ATTR_ID_REM,
|
|
MPTCP_SUBFLOW_ATTR_ID_LOC,
|
|
MPTCP_SUBFLOW_ATTR_PAD,
|
|
|
|
__MPTCP_SUBFLOW_ATTR_MAX
|
|
};
|
|
|
|
#define MPTCP_SUBFLOW_ATTR_MAX (__MPTCP_SUBFLOW_ATTR_MAX - 1)
|
|
|
|
#define MPTCP_SUBFLOW_FLAG_MCAP_REM _BITUL(0)
|
|
#define MPTCP_SUBFLOW_FLAG_MCAP_LOC _BITUL(1)
|
|
#define MPTCP_SUBFLOW_FLAG_JOIN_REM _BITUL(2)
|
|
#define MPTCP_SUBFLOW_FLAG_JOIN_LOC _BITUL(3)
|
|
#define MPTCP_SUBFLOW_FLAG_BKUP_REM _BITUL(4)
|
|
#define MPTCP_SUBFLOW_FLAG_BKUP_LOC _BITUL(5)
|
|
#define MPTCP_SUBFLOW_FLAG_FULLY_ESTABLISHED _BITUL(6)
|
|
#define MPTCP_SUBFLOW_FLAG_CONNECTED _BITUL(7)
|
|
#define MPTCP_SUBFLOW_FLAG_MAPVALID _BITUL(8)
|
|
|
|
#define rta_getattr(type, value) (*(type *)RTA_DATA(value))
|
|
|
|
static void die_perror(const char *msg)
|
|
{
|
|
perror(msg);
|
|
exit(1);
|
|
}
|
|
|
|
static void die_usage(int r)
|
|
{
|
|
fprintf(stderr, "Usage:\n"
|
|
"mptcp_diag -t <token>\n"
|
|
"mptcp_diag -s \"<saddr>:<sport> <daddr>:<dport>\"\n");
|
|
exit(r);
|
|
}
|
|
|
|
static void send_query(int fd, struct inet_diag_req_v2 *r, __u32 proto)
|
|
{
|
|
struct sockaddr_nl nladdr = {
|
|
.nl_family = AF_NETLINK
|
|
};
|
|
struct {
|
|
struct nlmsghdr nlh;
|
|
struct inet_diag_req_v2 r;
|
|
} req = {
|
|
.nlh = {
|
|
.nlmsg_len = sizeof(req),
|
|
.nlmsg_type = SOCK_DIAG_BY_FAMILY,
|
|
.nlmsg_flags = NLM_F_REQUEST
|
|
},
|
|
.r = *r
|
|
};
|
|
struct rtattr rta_proto;
|
|
struct iovec iov[6];
|
|
int iovlen = 0;
|
|
|
|
iov[iovlen++] = (struct iovec) {
|
|
.iov_base = &req,
|
|
.iov_len = sizeof(req)
|
|
};
|
|
|
|
if (proto == IPPROTO_MPTCP) {
|
|
rta_proto.rta_type = INET_DIAG_REQ_PROTOCOL;
|
|
rta_proto.rta_len = RTA_LENGTH(sizeof(proto));
|
|
|
|
iov[iovlen++] = (struct iovec){ &rta_proto, sizeof(rta_proto)};
|
|
iov[iovlen++] = (struct iovec){ &proto, sizeof(proto)};
|
|
req.nlh.nlmsg_len += RTA_LENGTH(sizeof(proto));
|
|
}
|
|
|
|
struct msghdr msg = {
|
|
.msg_name = &nladdr,
|
|
.msg_namelen = sizeof(nladdr),
|
|
.msg_iov = iov,
|
|
.msg_iovlen = iovlen
|
|
};
|
|
|
|
for (;;) {
|
|
if (sendmsg(fd, &msg, 0) < 0) {
|
|
if (errno == EINTR)
|
|
continue;
|
|
die_perror("sendmsg");
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void parse_rtattr_flags(struct rtattr *tb[], int max, struct rtattr *rta,
|
|
int len, unsigned short flags)
|
|
{
|
|
unsigned short type;
|
|
|
|
memset(tb, 0, sizeof(struct rtattr *) * (max + 1));
|
|
while (RTA_OK(rta, len)) {
|
|
type = rta->rta_type & ~flags;
|
|
if (type <= max && !tb[type])
|
|
tb[type] = rta;
|
|
rta = RTA_NEXT(rta, len);
|
|
}
|
|
}
|
|
|
|
static void print_info_msg(struct mptcp_info *info)
|
|
{
|
|
printf("Token & Flags\n");
|
|
printf("token: %x\n", info->mptcpi_token);
|
|
printf("flags: %x\n", info->mptcpi_flags);
|
|
printf("csum_enabled: %u\n", info->mptcpi_csum_enabled);
|
|
|
|
printf("\nBasic Info\n");
|
|
printf("subflows: %u\n", info->mptcpi_subflows);
|
|
printf("subflows_max: %u\n", info->mptcpi_subflows_max);
|
|
printf("subflows_total: %u\n", info->mptcpi_subflows_total);
|
|
printf("local_addr_used: %u\n", info->mptcpi_local_addr_used);
|
|
printf("local_addr_max: %u\n", info->mptcpi_local_addr_max);
|
|
printf("add_addr_signal: %u\n", info->mptcpi_add_addr_signal);
|
|
printf("add_addr_accepted: %u\n", info->mptcpi_add_addr_accepted);
|
|
printf("add_addr_signal_max: %u\n", info->mptcpi_add_addr_signal_max);
|
|
printf("add_addr_accepted_max: %u\n", info->mptcpi_add_addr_accepted_max);
|
|
|
|
printf("\nTransmission Info\n");
|
|
printf("write_seq: %llu\n", info->mptcpi_write_seq);
|
|
printf("snd_una: %llu\n", info->mptcpi_snd_una);
|
|
printf("rcv_nxt: %llu\n", info->mptcpi_rcv_nxt);
|
|
printf("last_data_sent: %u\n", info->mptcpi_last_data_sent);
|
|
printf("last_data_recv: %u\n", info->mptcpi_last_data_recv);
|
|
printf("last_ack_recv: %u\n", info->mptcpi_last_ack_recv);
|
|
printf("retransmits: %u\n", info->mptcpi_retransmits);
|
|
printf("retransmit bytes: %llu\n", info->mptcpi_bytes_retrans);
|
|
printf("bytes_sent: %llu\n", info->mptcpi_bytes_sent);
|
|
printf("bytes_received: %llu\n", info->mptcpi_bytes_received);
|
|
printf("bytes_acked: %llu\n", info->mptcpi_bytes_acked);
|
|
}
|
|
|
|
/*
|
|
* 'print_subflow_info' is from 'mptcp_subflow_info'
|
|
* which is a function in 'misc/ss.c' of iproute2.
|
|
*/
|
|
static void print_subflow_info(struct rtattr *tb[])
|
|
{
|
|
u_int32_t flags = 0;
|
|
|
|
printf("It's a mptcp subflow, the subflow info:\n");
|
|
if (tb[MPTCP_SUBFLOW_ATTR_FLAGS]) {
|
|
char caps[32 + 1] = { 0 }, *cap = &caps[0];
|
|
|
|
flags = rta_getattr(__u32, tb[MPTCP_SUBFLOW_ATTR_FLAGS]);
|
|
|
|
if (flags & MPTCP_SUBFLOW_FLAG_MCAP_REM)
|
|
*cap++ = 'M';
|
|
if (flags & MPTCP_SUBFLOW_FLAG_MCAP_LOC)
|
|
*cap++ = 'm';
|
|
if (flags & MPTCP_SUBFLOW_FLAG_JOIN_REM)
|
|
*cap++ = 'J';
|
|
if (flags & MPTCP_SUBFLOW_FLAG_JOIN_LOC)
|
|
*cap++ = 'j';
|
|
if (flags & MPTCP_SUBFLOW_FLAG_BKUP_REM)
|
|
*cap++ = 'B';
|
|
if (flags & MPTCP_SUBFLOW_FLAG_BKUP_LOC)
|
|
*cap++ = 'b';
|
|
if (flags & MPTCP_SUBFLOW_FLAG_FULLY_ESTABLISHED)
|
|
*cap++ = 'e';
|
|
if (flags & MPTCP_SUBFLOW_FLAG_CONNECTED)
|
|
*cap++ = 'c';
|
|
if (flags & MPTCP_SUBFLOW_FLAG_MAPVALID)
|
|
*cap++ = 'v';
|
|
|
|
if (flags)
|
|
printf(" flags:%s", caps);
|
|
}
|
|
if (tb[MPTCP_SUBFLOW_ATTR_TOKEN_REM] &&
|
|
tb[MPTCP_SUBFLOW_ATTR_TOKEN_LOC] &&
|
|
tb[MPTCP_SUBFLOW_ATTR_ID_REM] &&
|
|
tb[MPTCP_SUBFLOW_ATTR_ID_LOC])
|
|
printf(" token:%04x(id:%u)/%04x(id:%u)",
|
|
rta_getattr(__u32, tb[MPTCP_SUBFLOW_ATTR_TOKEN_REM]),
|
|
rta_getattr(__u8, tb[MPTCP_SUBFLOW_ATTR_ID_REM]),
|
|
rta_getattr(__u32, tb[MPTCP_SUBFLOW_ATTR_TOKEN_LOC]),
|
|
rta_getattr(__u8, tb[MPTCP_SUBFLOW_ATTR_ID_LOC]));
|
|
if (tb[MPTCP_SUBFLOW_ATTR_MAP_SEQ])
|
|
printf(" seq:%llu",
|
|
rta_getattr(__u64, tb[MPTCP_SUBFLOW_ATTR_MAP_SEQ]));
|
|
if (tb[MPTCP_SUBFLOW_ATTR_MAP_SFSEQ])
|
|
printf(" sfseq:%u",
|
|
rta_getattr(__u32, tb[MPTCP_SUBFLOW_ATTR_MAP_SFSEQ]));
|
|
if (tb[MPTCP_SUBFLOW_ATTR_SSN_OFFSET])
|
|
printf(" ssnoff:%u",
|
|
rta_getattr(__u32, tb[MPTCP_SUBFLOW_ATTR_SSN_OFFSET]));
|
|
if (tb[MPTCP_SUBFLOW_ATTR_MAP_DATALEN])
|
|
printf(" maplen:%u",
|
|
rta_getattr(__u32, tb[MPTCP_SUBFLOW_ATTR_MAP_DATALEN]));
|
|
printf("\n");
|
|
}
|
|
|
|
static void parse_nlmsg(struct nlmsghdr *nlh, __u32 proto)
|
|
{
|
|
struct inet_diag_msg *r = NLMSG_DATA(nlh);
|
|
struct rtattr *tb[INET_DIAG_MAX + 1];
|
|
|
|
parse_rtattr_flags(tb, INET_DIAG_MAX, (struct rtattr *)(r + 1),
|
|
nlh->nlmsg_len - NLMSG_LENGTH(sizeof(*r)),
|
|
NLA_F_NESTED);
|
|
|
|
if (proto == IPPROTO_MPTCP && tb[INET_DIAG_INFO]) {
|
|
int len = RTA_PAYLOAD(tb[INET_DIAG_INFO]);
|
|
struct mptcp_info *info;
|
|
|
|
/* workaround fort older kernels with less fields */
|
|
if (len < sizeof(*info)) {
|
|
info = alloca(sizeof(*info));
|
|
memcpy(info, RTA_DATA(tb[INET_DIAG_INFO]), len);
|
|
memset((char *)info + len, 0, sizeof(*info) - len);
|
|
} else {
|
|
info = RTA_DATA(tb[INET_DIAG_INFO]);
|
|
}
|
|
print_info_msg(info);
|
|
}
|
|
if (proto == IPPROTO_TCP && tb[INET_DIAG_ULP_INFO]) {
|
|
struct rtattr *ulpinfo[INET_ULP_INFO_MAX + 1] = { 0 };
|
|
|
|
parse_rtattr_nested(ulpinfo, INET_ULP_INFO_MAX,
|
|
tb[INET_DIAG_ULP_INFO]);
|
|
|
|
if (ulpinfo[INET_ULP_INFO_MPTCP]) {
|
|
struct rtattr *sfinfo[MPTCP_SUBFLOW_ATTR_MAX + 1] = { 0 };
|
|
|
|
parse_rtattr_nested(sfinfo, MPTCP_SUBFLOW_ATTR_MAX,
|
|
ulpinfo[INET_ULP_INFO_MPTCP]);
|
|
print_subflow_info(sfinfo);
|
|
} else {
|
|
printf("It's a normal TCP!\n");
|
|
}
|
|
}
|
|
}
|
|
|
|
static void recv_nlmsg(int fd, __u32 proto)
|
|
{
|
|
char rcv_buff[8192];
|
|
struct nlmsghdr *nlh = (struct nlmsghdr *)rcv_buff;
|
|
struct sockaddr_nl rcv_nladdr = {
|
|
.nl_family = AF_NETLINK
|
|
};
|
|
struct iovec rcv_iov = {
|
|
.iov_base = rcv_buff,
|
|
.iov_len = sizeof(rcv_buff)
|
|
};
|
|
struct msghdr rcv_msg = {
|
|
.msg_name = &rcv_nladdr,
|
|
.msg_namelen = sizeof(rcv_nladdr),
|
|
.msg_iov = &rcv_iov,
|
|
.msg_iovlen = 1
|
|
};
|
|
int len;
|
|
|
|
len = recvmsg(fd, &rcv_msg, 0);
|
|
|
|
while (NLMSG_OK(nlh, len)) {
|
|
if (nlh->nlmsg_type == NLMSG_DONE) {
|
|
printf("NLMSG_DONE\n");
|
|
break;
|
|
} else if (nlh->nlmsg_type == NLMSG_ERROR) {
|
|
struct nlmsgerr *err;
|
|
|
|
err = (struct nlmsgerr *)NLMSG_DATA(nlh);
|
|
printf("Error %d:%s\n",
|
|
-(err->error), strerror(-(err->error)));
|
|
break;
|
|
}
|
|
parse_nlmsg(nlh, proto);
|
|
nlh = NLMSG_NEXT(nlh, len);
|
|
}
|
|
}
|
|
|
|
static void get_mptcpinfo(__u32 token)
|
|
{
|
|
struct inet_diag_req_v2 r = {
|
|
.sdiag_family = AF_INET,
|
|
/* Real proto is set via INET_DIAG_REQ_PROTOCOL */
|
|
.sdiag_protocol = IPPROTO_TCP,
|
|
.idiag_ext = 1 << (INET_DIAG_INFO - 1),
|
|
.id.idiag_cookie[0] = token,
|
|
};
|
|
__u32 proto = IPPROTO_MPTCP;
|
|
int fd;
|
|
|
|
fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_SOCK_DIAG);
|
|
if (fd < 0)
|
|
die_perror("Netlink socket");
|
|
|
|
send_query(fd, &r, proto);
|
|
recv_nlmsg(fd, proto);
|
|
|
|
close(fd);
|
|
}
|
|
|
|
static void get_subflow_info(char *subflow_addrs)
|
|
{
|
|
struct inet_diag_req_v2 r = {
|
|
.sdiag_family = AF_INET,
|
|
.sdiag_protocol = IPPROTO_TCP,
|
|
.idiag_ext = 1 << (INET_DIAG_INFO - 1),
|
|
.id.idiag_cookie[0] = INET_DIAG_NOCOOKIE,
|
|
.id.idiag_cookie[1] = INET_DIAG_NOCOOKIE,
|
|
};
|
|
char saddr[64], daddr[64];
|
|
int sport, dport;
|
|
int ret;
|
|
int fd;
|
|
|
|
ret = sscanf(subflow_addrs, "%[^:]:%d %[^:]:%d", saddr, &sport, daddr, &dport);
|
|
if (ret != 4)
|
|
die_perror("IP PORT Pairs has style problems!");
|
|
|
|
printf("%s:%d -> %s:%d\n", saddr, sport, daddr, dport);
|
|
|
|
fd = socket(AF_NETLINK, SOCK_RAW, NETLINK_SOCK_DIAG);
|
|
if (fd < 0)
|
|
die_perror("Netlink socket");
|
|
|
|
r.id.idiag_sport = htons(sport);
|
|
r.id.idiag_dport = htons(dport);
|
|
|
|
inet_pton(AF_INET, saddr, &r.id.idiag_src);
|
|
inet_pton(AF_INET, daddr, &r.id.idiag_dst);
|
|
send_query(fd, &r, IPPROTO_TCP);
|
|
recv_nlmsg(fd, IPPROTO_TCP);
|
|
}
|
|
|
|
static void parse_opts(int argc, char **argv, struct params *p)
|
|
{
|
|
int c;
|
|
|
|
if (argc < 2)
|
|
die_usage(1);
|
|
|
|
while ((c = getopt(argc, argv, "ht:s:")) != -1) {
|
|
switch (c) {
|
|
case 'h':
|
|
die_usage(0);
|
|
break;
|
|
case 't':
|
|
sscanf(optarg, "%x", &p->target_token);
|
|
break;
|
|
case 's':
|
|
strncpy(p->subflow_addrs, optarg,
|
|
sizeof(p->subflow_addrs) - 1);
|
|
break;
|
|
default:
|
|
die_usage(1);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
struct params p = { 0 };
|
|
|
|
parse_opts(argc, argv, &p);
|
|
|
|
if (p.target_token)
|
|
get_mptcpinfo(p.target_token);
|
|
|
|
if (p.subflow_addrs[0] != '\0')
|
|
get_subflow_info(p.subflow_addrs);
|
|
|
|
return 0;
|
|
}
|
|
|