naccyde / rpms / iproute

Forked from rpms/iproute 7 months ago
Clone

Blame SOURCES/0039-ss-add-AF_VSOCK-support.patch

36cfb7
From fe898bd10be2bc527f81421f06afff77e8ba42eb Mon Sep 17 00:00:00 2001
36cfb7
From: Stefano Brivio <sbrivio@redhat.com>
36cfb7
Date: Sun, 22 Oct 2017 21:44:27 +0200
36cfb7
Subject: [PATCH] ss: add AF_VSOCK support
36cfb7
36cfb7
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1472759
36cfb7
Upstream Status: iproute2.git commit c759116a0b2b
36cfb7
36cfb7
commit c759116a0b2b6da8df9687b0a40ac69050132c77
36cfb7
Author: Stefan Hajnoczi <stefanha@redhat.com>
36cfb7
Date:   Fri Oct 6 11:48:41 2017 -0400
36cfb7
36cfb7
    ss: add AF_VSOCK support
36cfb7
36cfb7
    The AF_VSOCK address family is a host<->guest communications channel
36cfb7
    supported by VMware, KVM, and Hyper-V.  Initial VMware support was
36cfb7
    released in Linux 3.9 in 2013 and transports for other hypervisors were
36cfb7
    added later.
36cfb7
36cfb7
    AF_VSOCK addresses are <u32 cid, u32 port> tuples.  The 32-bit cid
36cfb7
    integer is comparable to an IP address.  AF_VSOCK ports work like
36cfb7
    TCP/UDP ports.
36cfb7
36cfb7
    Both SOCK_STREAM and SOCK_DGRAM socket types are available.
36cfb7
36cfb7
    This patch adds AF_VSOCK support to ss(8) so that sockets can be
36cfb7
    observed.
36cfb7
36cfb7
    Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
36cfb7
36cfb7
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
36cfb7
---
36cfb7
 man/man8/ss.8 |   8 ++-
e138d9
 misc/ss.c     | 184 +++++++++++++++++++++++++++++++++++++++++++++++++-
36cfb7
 2 files changed, 188 insertions(+), 4 deletions(-)
36cfb7
36cfb7
diff --git a/man/man8/ss.8 b/man/man8/ss.8
e138d9
index 81de69de8042e..4323eee3c8687 100644
36cfb7
--- a/man/man8/ss.8
36cfb7
+++ b/man/man8/ss.8
36cfb7
@@ -125,14 +125,18 @@ Display Unix domain sockets (alias for -f unix).
36cfb7
 .B \-S, \-\-sctp
36cfb7
 Display SCTP sockets.
36cfb7
 .TP
36cfb7
+.B \-\-vsock
36cfb7
+Display vsock sockets (alias for -f vsock).
36cfb7
+.TP
36cfb7
 .B \-f FAMILY, \-\-family=FAMILY
36cfb7
 Display sockets of type FAMILY.
36cfb7
-Currently the following families are supported: unix, inet, inet6, link, netlink.
36cfb7
+Currently the following families are supported: unix, inet, inet6, link, netlink, vsock.
36cfb7
 .TP
36cfb7
 .B \-A QUERY, \-\-query=QUERY, \-\-socket=QUERY
36cfb7
 List of socket tables to dump, separated by commas. The following identifiers
36cfb7
 are understood: all, inet, tcp, udp, raw, unix, packet, netlink, unix_dgram,
36cfb7
-unix_stream, unix_seqpacket, packet_raw, packet_dgram, dccp, sctp.
36cfb7
+unix_stream, unix_seqpacket, packet_raw, packet_dgram, dccp, sctp,
36cfb7
+vsock_stream, vsock_dgram.
36cfb7
 .TP
36cfb7
 .B \-D FILE, \-\-diag=FILE
36cfb7
 Do not display anything, just dump raw information about TCP sockets to FILE after applying filters. If FILE is - stdout is used.
36cfb7
diff --git a/misc/ss.c b/misc/ss.c
e138d9
index 0d6452777f7b6..e92266539e6b5 100644
36cfb7
--- a/misc/ss.c
36cfb7
+++ b/misc/ss.c
36cfb7
@@ -44,6 +44,7 @@
36cfb7
 #include <linux/packet_diag.h>
36cfb7
 #include <linux/netlink_diag.h>
36cfb7
 #include <linux/sctp.h>
36cfb7
+#include <linux/vm_sockets_diag.h>
36cfb7
 
36cfb7
 #define MAGIC_SEQ 123456
36cfb7
 
36cfb7
@@ -126,6 +127,8 @@ enum {
36cfb7
 	PACKET_R_DB,
36cfb7
 	NETLINK_DB,
36cfb7
 	SCTP_DB,
36cfb7
+	VSOCK_ST_DB,
36cfb7
+	VSOCK_DG_DB,
36cfb7
 	MAX_DB
36cfb7
 };
36cfb7
 
36cfb7
@@ -134,6 +137,7 @@ enum {
36cfb7
 #define ALL_DB ((1<
36cfb7
 #define INET_L4_DBM ((1<
36cfb7
 #define INET_DBM (INET_L4_DBM | (1<
36cfb7
+#define VSOCK_DBM ((1<
36cfb7
 
36cfb7
 enum {
36cfb7
 	SS_UNKNOWN,
36cfb7
@@ -222,6 +226,14 @@ static const struct filter default_dbs[MAX_DB] = {
36cfb7
 		.states   = SS_CONN,
36cfb7
 		.families = FAMILY_MASK(AF_INET) | FAMILY_MASK(AF_INET6),
36cfb7
 	},
36cfb7
+	[VSOCK_ST_DB] = {
36cfb7
+		.states   = SS_CONN,
36cfb7
+		.families = FAMILY_MASK(AF_VSOCK),
36cfb7
+	},
36cfb7
+	[VSOCK_DG_DB] = {
36cfb7
+		.states   = SS_CONN,
36cfb7
+		.families = FAMILY_MASK(AF_VSOCK),
36cfb7
+	},
36cfb7
 };
36cfb7
 
36cfb7
 static const struct filter default_afs[AF_MAX] = {
36cfb7
@@ -245,6 +257,10 @@ static const struct filter default_afs[AF_MAX] = {
36cfb7
 		.dbs    = (1 << NETLINK_DB),
36cfb7
 		.states = (1 << SS_CLOSE),
36cfb7
 	},
36cfb7
+	[AF_VSOCK] = {
36cfb7
+		.dbs    = VSOCK_DBM,
36cfb7
+		.states = SS_CONN,
36cfb7
+	},
36cfb7
 };
36cfb7
 
36cfb7
 static int do_default = 1;
36cfb7
@@ -283,6 +299,8 @@ static void filter_default_dbs(struct filter *f)
36cfb7
 	filter_db_set(f, PACKET_DG_DB);
36cfb7
 	filter_db_set(f, NETLINK_DB);
36cfb7
 	filter_db_set(f, SCTP_DB);
36cfb7
+	filter_db_set(f, VSOCK_ST_DB);
36cfb7
+	filter_db_set(f, VSOCK_DG_DB);
36cfb7
 }
36cfb7
 
36cfb7
 static void filter_states_set(struct filter *f, int states)
36cfb7
@@ -792,6 +810,18 @@ static const char *proto_name(int protocol)
36cfb7
 	return "???";
36cfb7
 }
36cfb7
 
36cfb7
+static const char *vsock_netid_name(int type)
36cfb7
+{
36cfb7
+	switch (type) {
36cfb7
+	case SOCK_STREAM:
36cfb7
+		return "v_str";
36cfb7
+	case SOCK_DGRAM:
36cfb7
+		return "v_dgr";
36cfb7
+	default:
36cfb7
+		return "???";
36cfb7
+	}
36cfb7
+}
36cfb7
+
36cfb7
 static void sock_state_print(struct sockstat *s)
36cfb7
 {
36cfb7
 	const char *sock_name;
36cfb7
@@ -824,6 +854,9 @@ static void sock_state_print(struct sockstat *s)
36cfb7
 	case AF_NETLINK:
36cfb7
 		sock_name = "nl";
36cfb7
 		break;
36cfb7
+	case AF_VSOCK:
36cfb7
+		sock_name = vsock_netid_name(s->type);
36cfb7
+		break;
36cfb7
 	default:
36cfb7
 		sock_name = "unknown";
36cfb7
 	}
36cfb7
@@ -1139,6 +1172,8 @@ static int run_ssfilter(struct ssfilter *f, struct sockstat *s)
36cfb7
 			return s->lport == 0 && s->local.data[0] == 0;
36cfb7
 		if (s->local.family == AF_NETLINK)
36cfb7
 			return s->lport < 0;
36cfb7
+		if (s->local.family == AF_VSOCK)
36cfb7
+			return s->lport > 1023;
36cfb7
 
36cfb7
 		return is_ephemeral(s->lport);
36cfb7
 	}
36cfb7
@@ -1515,6 +1550,15 @@ void *parse_devcond(char *name)
36cfb7
 	return res;
36cfb7
 }
36cfb7
 
36cfb7
+static void vsock_set_inet_prefix(inet_prefix *a, __u32 cid)
36cfb7
+{
36cfb7
+	*a = (inet_prefix){
36cfb7
+		.bytelen = sizeof(cid),
36cfb7
+		.family = AF_VSOCK,
36cfb7
+	};
36cfb7
+	memcpy(a->data, &cid, sizeof(cid));
36cfb7
+}
36cfb7
+
36cfb7
 void *parse_hostcond(char *addr, bool is_port)
36cfb7
 {
36cfb7
 	char *port = NULL;
36cfb7
@@ -1589,6 +1633,37 @@ void *parse_hostcond(char *addr, bool is_port)
36cfb7
 		goto out;
36cfb7
 	}
36cfb7
 
36cfb7
+	if (fam == AF_VSOCK || strncmp(addr, "vsock:", 6) == 0) {
36cfb7
+		__u32 cid = ~(__u32)0;
36cfb7
+
36cfb7
+		a.addr.family = AF_VSOCK;
36cfb7
+		if (strncmp(addr, "vsock:", 6) == 0)
36cfb7
+			addr += 6;
36cfb7
+
36cfb7
+		if (is_port)
36cfb7
+			port = addr;
36cfb7
+		else {
36cfb7
+			port = strchr(addr, ':');
36cfb7
+			if (port) {
36cfb7
+				*port = '\0';
36cfb7
+				port++;
36cfb7
+			}
36cfb7
+		}
36cfb7
+
36cfb7
+		if (port && strcmp(port, "*") &&
36cfb7
+		    get_u32((__u32 *)&a.port, port, 0))
36cfb7
+			return NULL;
36cfb7
+
36cfb7
+		if (addr[0] && strcmp(addr, "*")) {
36cfb7
+			a.addr.bitlen = 32;
36cfb7
+			if (get_u32(&cid, addr, 0))
36cfb7
+				return NULL;
36cfb7
+		}
36cfb7
+		vsock_set_inet_prefix(&a.addr, cid);
36cfb7
+		fam = AF_VSOCK;
36cfb7
+		goto out;
36cfb7
+	}
36cfb7
+
36cfb7
 	if (fam == AF_INET || !strncmp(addr, "inet:", 5)) {
36cfb7
 		fam = AF_INET;
36cfb7
 		if (!strncmp(addr, "inet:", 5))
36cfb7
@@ -3653,6 +3728,88 @@ static int netlink_show(struct filter *f)
36cfb7
 	return 0;
36cfb7
 }
36cfb7
 
36cfb7
+static bool vsock_type_skip(struct sockstat *s, struct filter *f)
36cfb7
+{
36cfb7
+	if (s->type == SOCK_STREAM && !(f->dbs & (1 << VSOCK_ST_DB)))
36cfb7
+		return true;
36cfb7
+	if (s->type == SOCK_DGRAM && !(f->dbs & (1 << VSOCK_DG_DB)))
36cfb7
+		return true;
36cfb7
+	return false;
36cfb7
+}
36cfb7
+
36cfb7
+static void vsock_addr_print(inet_prefix *a, __u32 port)
36cfb7
+{
36cfb7
+	char cid_str[sizeof("4294967295")];
36cfb7
+	char port_str[sizeof("4294967295")];
36cfb7
+	__u32 cid;
36cfb7
+
36cfb7
+	memcpy(&cid, a->data, sizeof(cid));
36cfb7
+
36cfb7
+	if (cid == ~(__u32)0)
36cfb7
+		snprintf(cid_str, sizeof(cid_str), "*");
36cfb7
+	else
36cfb7
+		snprintf(cid_str, sizeof(cid_str), "%u", cid);
36cfb7
+
36cfb7
+	if (port == ~(__u32)0)
36cfb7
+		snprintf(port_str, sizeof(port_str), "*");
36cfb7
+	else
36cfb7
+		snprintf(port_str, sizeof(port_str), "%u", port);
36cfb7
+
36cfb7
+	sock_addr_print(cid_str, ":", port_str, NULL);
36cfb7
+}
36cfb7
+
36cfb7
+static void vsock_stats_print(struct sockstat *s, struct filter *f)
36cfb7
+{
36cfb7
+	sock_state_print(s);
36cfb7
+
36cfb7
+	vsock_addr_print(&s->local, s->lport);
36cfb7
+	vsock_addr_print(&s->remote, s->rport);
36cfb7
+
36cfb7
+	proc_ctx_print(s);
36cfb7
+
36cfb7
+	printf("\n");
36cfb7
+}
36cfb7
+
36cfb7
+static int vsock_show_sock(const struct sockaddr_nl *addr,
36cfb7
+			   struct nlmsghdr *nlh, void *arg)
36cfb7
+{
36cfb7
+	struct filter *f = (struct filter *)arg;
36cfb7
+	struct vsock_diag_msg *r = NLMSG_DATA(nlh);
36cfb7
+	struct sockstat stat = {
36cfb7
+		.type = r->vdiag_type,
36cfb7
+		.lport = r->vdiag_src_port,
36cfb7
+		.rport = r->vdiag_dst_port,
36cfb7
+		.state = r->vdiag_state,
36cfb7
+		.ino = r->vdiag_ino,
36cfb7
+	};
36cfb7
+
36cfb7
+	vsock_set_inet_prefix(&stat.local, r->vdiag_src_cid);
36cfb7
+	vsock_set_inet_prefix(&stat.remote, r->vdiag_dst_cid);
36cfb7
+
36cfb7
+	if (vsock_type_skip(&stat, f))
36cfb7
+		return 0;
36cfb7
+
36cfb7
+	if (f->f && run_ssfilter(f->f, &stat) == 0)
36cfb7
+		return 0;
36cfb7
+
36cfb7
+	vsock_stats_print(&stat, f);
36cfb7
+
36cfb7
+	return 0;
36cfb7
+}
36cfb7
+
36cfb7
+static int vsock_show(struct filter *f)
36cfb7
+{
36cfb7
+	DIAG_REQUEST(req, struct vsock_diag_req r);
36cfb7
+
36cfb7
+	if (!filter_af_get(f, AF_VSOCK))
36cfb7
+		return 0;
36cfb7
+
36cfb7
+	req.r.sdiag_family = AF_VSOCK;
36cfb7
+	req.r.vdiag_states = f->states;
36cfb7
+
36cfb7
+	return handle_netlink_request(f, &req.nlh, sizeof(req), vsock_show_sock);
36cfb7
+}
36cfb7
+
36cfb7
 struct sock_diag_msg {
36cfb7
 	__u8 sdiag_family;
36cfb7
 };
36cfb7
@@ -3673,6 +3830,8 @@ static int generic_show_sock(const struct sockaddr_nl *addr,
36cfb7
 		return packet_show_sock(addr, nlh, arg);
36cfb7
 	case AF_NETLINK:
36cfb7
 		return netlink_show_sock(addr, nlh, arg);
36cfb7
+	case AF_VSOCK:
36cfb7
+		return vsock_show_sock(addr, nlh, arg);
36cfb7
 	default:
36cfb7
 		return -1;
36cfb7
 	}
36cfb7
@@ -3900,14 +4059,15 @@ static void _usage(FILE *dest)
36cfb7
 "   -d, --dccp          display only DCCP sockets\n"
36cfb7
 "   -w, --raw           display only RAW sockets\n"
36cfb7
 "   -x, --unix          display only Unix domain sockets\n"
36cfb7
+"       --vsock         display only vsock sockets\n"
36cfb7
 "   -f, --family=FAMILY display sockets of type FAMILY\n"
36cfb7
-"       FAMILY := {inet|inet6|link|unix|netlink|help}\n"
36cfb7
+"       FAMILY := {inet|inet6|link|unix|netlink|vsock|help}\n"
36cfb7
 "\n"
36cfb7
 "   -K, --kill          forcibly close sockets, display what was closed\n"
36cfb7
 "   -H, --no-header     Suppress header line\n"
36cfb7
 "\n"
36cfb7
 "   -A, --query=QUERY, --socket=QUERY\n"
36cfb7
-"       QUERY := {all|inet|tcp|udp|raw|unix|unix_dgram|unix_stream|unix_seqpacket|packet|netlink}[,QUERY]\n"
36cfb7
+"       QUERY := {all|inet|tcp|udp|raw|unix|unix_dgram|unix_stream|unix_seqpacket|packet|netlink|vsock_stream|vsock_dgram}[,QUERY]\n"
36cfb7
 "\n"
36cfb7
 "   -D, --diag=FILE     Dump raw information about TCP sockets to FILE\n"
36cfb7
 "   -F, --filter=FILE   read filter information from FILE\n"
36cfb7
@@ -3980,6 +4140,9 @@ static int scan_state(const char *state)
36cfb7
 	exit(-1);
36cfb7
 }
36cfb7
 
36cfb7
+/* Values 'v' and 'V' are already used so a non-character is used */
36cfb7
+#define OPT_VSOCK 256
36cfb7
+
36cfb7
 static const struct option long_opts[] = {
36cfb7
 	{ "numeric", 0, 0, 'n' },
36cfb7
 	{ "resolve", 0, 0, 'r' },
36cfb7
@@ -3996,6 +4159,7 @@ static const struct option long_opts[] = {
36cfb7
 	{ "udp", 0, 0, 'u' },
36cfb7
 	{ "raw", 0, 0, 'w' },
36cfb7
 	{ "unix", 0, 0, 'x' },
36cfb7
+	{ "vsock", 0, 0, OPT_VSOCK },
36cfb7
 	{ "all", 0, 0, 'a' },
36cfb7
 	{ "listening", 0, 0, 'l' },
36cfb7
 	{ "ipv4", 0, 0, '4' },
36cfb7
@@ -4081,6 +4245,9 @@ int main(int argc, char *argv[])
36cfb7
 		case 'x':
36cfb7
 			filter_af_set(&current_filter, AF_UNIX);
36cfb7
 			break;
36cfb7
+		case OPT_VSOCK:
36cfb7
+			filter_af_set(&current_filter, AF_VSOCK);
36cfb7
+			break;
36cfb7
 		case 'a':
36cfb7
 			state_filter = SS_ALL;
36cfb7
 			break;
36cfb7
@@ -4107,6 +4274,8 @@ int main(int argc, char *argv[])
36cfb7
 				filter_af_set(&current_filter, AF_UNIX);
36cfb7
 			else if (strcmp(optarg, "netlink") == 0)
36cfb7
 				filter_af_set(&current_filter, AF_NETLINK);
36cfb7
+			else if (strcmp(optarg, "vsock") == 0)
36cfb7
+				filter_af_set(&current_filter, AF_VSOCK);
36cfb7
 			else if (strcmp(optarg, "help") == 0)
36cfb7
 				help();
36cfb7
 			else {
36cfb7
@@ -4172,6 +4341,15 @@ int main(int argc, char *argv[])
36cfb7
 					filter_db_set(&current_filter, PACKET_DG_DB);
36cfb7
 				} else if (strcmp(p, "netlink") == 0) {
36cfb7
 					filter_db_set(&current_filter, NETLINK_DB);
36cfb7
+				} else if (strcmp(p, "vsock") == 0) {
36cfb7
+					filter_db_set(&current_filter, VSOCK_ST_DB);
36cfb7
+					filter_db_set(&current_filter, VSOCK_DG_DB);
36cfb7
+				} else if (strcmp(p, "vsock_stream") == 0 ||
36cfb7
+					   strcmp(p, "v_str") == 0) {
36cfb7
+					filter_db_set(&current_filter, VSOCK_ST_DB);
36cfb7
+				} else if (strcmp(p, "vsock_dgram") == 0 ||
36cfb7
+					   strcmp(p, "v_dgr") == 0) {
36cfb7
+					filter_db_set(&current_filter, VSOCK_DG_DB);
36cfb7
 				} else {
36cfb7
 					fprintf(stderr, "ss: \"%s\" is illegal socket table id\n", p);
36cfb7
 					usage();
36cfb7
@@ -4387,6 +4565,8 @@ int main(int argc, char *argv[])
36cfb7
 		dccp_show(&current_filter);
36cfb7
 	if (current_filter.dbs & (1<
36cfb7
 		sctp_show(&current_filter);
36cfb7
+	if (current_filter.dbs & VSOCK_DBM)
36cfb7
+		vsock_show(&current_filter);
36cfb7
 
36cfb7
 	if (show_users || show_proc_ctx || show_sock_ctx)
36cfb7
 		user_ent_destroy();
36cfb7
-- 
e138d9
2.21.0
36cfb7