drm/vc4: mark vc4_bo_cache_purge() static
[linux-2.6-block.git] / net / rxrpc / ar-internal.h
1 /* AF_RXRPC internal definitions
2  *
3  * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
4  * Written by David Howells (dhowells@redhat.com)
5  *
6  * This program is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU General Public License
8  * as published by the Free Software Foundation; either version
9  * 2 of the License, or (at your option) any later version.
10  */
11
12 #include <linux/atomic.h>
13 #include <linux/seqlock.h>
14 #include <net/sock.h>
15 #include <net/af_rxrpc.h>
16 #include <rxrpc/packet.h>
17
18 #if 0
19 #define CHECK_SLAB_OKAY(X)                                   \
20         BUG_ON(atomic_read((X)) >> (sizeof(atomic_t) - 2) == \
21                (POISON_FREE << 8 | POISON_FREE))
22 #else
23 #define CHECK_SLAB_OKAY(X) do {} while (0)
24 #endif
25
26 #define FCRYPT_BSIZE 8
27 struct rxrpc_crypt {
28         union {
29                 u8      x[FCRYPT_BSIZE];
30                 __be32  n[2];
31         };
32 } __attribute__((aligned(8)));
33
34 #define rxrpc_queue_work(WS)    queue_work(rxrpc_workqueue, (WS))
35 #define rxrpc_queue_delayed_work(WS,D)  \
36         queue_delayed_work(rxrpc_workqueue, (WS), (D))
37
38 #define rxrpc_queue_call(CALL)  rxrpc_queue_work(&(CALL)->processor)
39
40 struct rxrpc_connection;
41
42 /*
43  * sk_state for RxRPC sockets
44  */
45 enum {
46         RXRPC_UNBOUND = 0,
47         RXRPC_CLIENT_UNBOUND,           /* Unbound socket used as client */
48         RXRPC_CLIENT_BOUND,             /* client local address bound */
49         RXRPC_SERVER_BOUND,             /* server local address bound */
50         RXRPC_SERVER_LISTENING,         /* server listening for connections */
51         RXRPC_CLOSE,                    /* socket is being closed */
52 };
53
54 /*
55  * RxRPC socket definition
56  */
57 struct rxrpc_sock {
58         /* WARNING: sk has to be the first member */
59         struct sock             sk;
60         rxrpc_interceptor_t     interceptor;    /* kernel service Rx interceptor function */
61         struct rxrpc_local      *local;         /* local endpoint */
62         struct list_head        listen_link;    /* link in the local endpoint's listen list */
63         struct list_head        secureq;        /* calls awaiting connection security clearance */
64         struct list_head        acceptq;        /* calls awaiting acceptance */
65         struct key              *key;           /* security for this socket */
66         struct key              *securities;    /* list of server security descriptors */
67         struct rb_root          calls;          /* outstanding calls on this socket */
68         unsigned long           flags;
69 #define RXRPC_SOCK_CONNECTED            0       /* connect_srx is set */
70         rwlock_t                call_lock;      /* lock for calls */
71         u32                     min_sec_level;  /* minimum security level */
72 #define RXRPC_SECURITY_MAX      RXRPC_SECURITY_ENCRYPT
73         bool                    exclusive;      /* Exclusive connection for a client socket */
74         sa_family_t             family;         /* Protocol family created with */
75         struct sockaddr_rxrpc   srx;            /* local address */
76         struct sockaddr_rxrpc   connect_srx;    /* Default client address from connect() */
77 };
78
79 #define rxrpc_sk(__sk) container_of((__sk), struct rxrpc_sock, sk)
80
81 /*
82  * CPU-byteorder normalised Rx packet header.
83  */
84 struct rxrpc_host_header {
85         u32             epoch;          /* client boot timestamp */
86         u32             cid;            /* connection and channel ID */
87         u32             callNumber;     /* call ID (0 for connection-level packets) */
88         u32             seq;            /* sequence number of pkt in call stream */
89         u32             serial;         /* serial number of pkt sent to network */
90         u8              type;           /* packet type */
91         u8              flags;          /* packet flags */
92         u8              userStatus;     /* app-layer defined status */
93         u8              securityIndex;  /* security protocol ID */
94         union {
95                 u16     _rsvd;          /* reserved */
96                 u16     cksum;          /* kerberos security checksum */
97         };
98         u16             serviceId;      /* service ID */
99 } __packed;
100
101 /*
102  * RxRPC socket buffer private variables
103  * - max 48 bytes (struct sk_buff::cb)
104  */
105 struct rxrpc_skb_priv {
106         struct rxrpc_call       *call;          /* call with which associated */
107         unsigned long           resend_at;      /* time in jiffies at which to resend */
108         union {
109                 unsigned int    offset;         /* offset into buffer of next read */
110                 int             remain;         /* amount of space remaining for next write */
111                 u32             error;          /* network error code */
112                 bool            need_resend;    /* T if needs resending */
113         };
114
115         struct rxrpc_host_header hdr;           /* RxRPC packet header from this packet */
116 };
117
118 #define rxrpc_skb(__skb) ((struct rxrpc_skb_priv *) &(__skb)->cb)
119
120 enum rxrpc_command {
121         RXRPC_CMD_SEND_DATA,            /* send data message */
122         RXRPC_CMD_SEND_ABORT,           /* request abort generation */
123         RXRPC_CMD_ACCEPT,               /* [server] accept incoming call */
124         RXRPC_CMD_REJECT_BUSY,          /* [server] reject a call as busy */
125 };
126
127 /*
128  * RxRPC security module interface
129  */
130 struct rxrpc_security {
131         const char              *name;          /* name of this service */
132         u8                      security_index; /* security type provided */
133
134         /* Initialise a security service */
135         int (*init)(void);
136
137         /* Clean up a security service */
138         void (*exit)(void);
139
140         /* initialise a connection's security */
141         int (*init_connection_security)(struct rxrpc_connection *);
142
143         /* prime a connection's packet security */
144         int (*prime_packet_security)(struct rxrpc_connection *);
145
146         /* impose security on a packet */
147         int (*secure_packet)(struct rxrpc_call *,
148                              struct sk_buff *,
149                              size_t,
150                              void *);
151
152         /* verify the security on a received packet */
153         int (*verify_packet)(struct rxrpc_call *, struct sk_buff *, u32 *);
154
155         /* issue a challenge */
156         int (*issue_challenge)(struct rxrpc_connection *);
157
158         /* respond to a challenge */
159         int (*respond_to_challenge)(struct rxrpc_connection *,
160                                     struct sk_buff *,
161                                     u32 *);
162
163         /* verify a response */
164         int (*verify_response)(struct rxrpc_connection *,
165                                struct sk_buff *,
166                                u32 *);
167
168         /* clear connection security */
169         void (*clear)(struct rxrpc_connection *);
170 };
171
172 /*
173  * RxRPC local transport endpoint description
174  * - owned by a single AF_RXRPC socket
175  * - pointed to by transport socket struct sk_user_data
176  */
177 struct rxrpc_local {
178         struct rcu_head         rcu;
179         atomic_t                usage;
180         struct list_head        link;
181         struct socket           *socket;        /* my UDP socket */
182         struct work_struct      processor;
183         struct list_head        services;       /* services listening on this endpoint */
184         struct rw_semaphore     defrag_sem;     /* control re-enablement of IP DF bit */
185         struct sk_buff_head     accept_queue;   /* incoming calls awaiting acceptance */
186         struct sk_buff_head     reject_queue;   /* packets awaiting rejection */
187         struct sk_buff_head     event_queue;    /* endpoint event packets awaiting processing */
188         struct rb_root          client_conns;   /* Client connections by socket params */
189         spinlock_t              client_conns_lock; /* Lock for client_conns */
190         spinlock_t              lock;           /* access lock */
191         rwlock_t                services_lock;  /* lock for services list */
192         int                     debug_id;       /* debug ID for printks */
193         bool                    dead;
194         struct sockaddr_rxrpc   srx;            /* local address */
195 };
196
197 /*
198  * RxRPC remote transport endpoint definition
199  * - matched by local endpoint, remote port, address and protocol type
200  */
201 struct rxrpc_peer {
202         struct rcu_head         rcu;            /* This must be first */
203         atomic_t                usage;
204         unsigned long           hash_key;
205         struct hlist_node       hash_link;
206         struct rxrpc_local      *local;
207         struct hlist_head       error_targets;  /* targets for net error distribution */
208         struct work_struct      error_distributor;
209         struct rb_root          service_conns;  /* Service connections */
210         seqlock_t               service_conn_lock;
211         spinlock_t              lock;           /* access lock */
212         unsigned int            if_mtu;         /* interface MTU for this peer */
213         unsigned int            mtu;            /* network MTU for this peer */
214         unsigned int            maxdata;        /* data size (MTU - hdrsize) */
215         unsigned short          hdrsize;        /* header size (IP + UDP + RxRPC) */
216         int                     debug_id;       /* debug ID for printks */
217         int                     error_report;   /* Net (+0) or local (+1000000) to distribute */
218 #define RXRPC_LOCAL_ERROR_OFFSET 1000000
219         struct sockaddr_rxrpc   srx;            /* remote address */
220
221         /* calculated RTT cache */
222 #define RXRPC_RTT_CACHE_SIZE 32
223         suseconds_t             rtt;            /* current RTT estimate (in uS) */
224         unsigned int            rtt_point;      /* next entry at which to insert */
225         unsigned int            rtt_usage;      /* amount of cache actually used */
226         suseconds_t             rtt_cache[RXRPC_RTT_CACHE_SIZE]; /* calculated RTT cache */
227 };
228
229 /*
230  * Keys for matching a connection.
231  */
232 struct rxrpc_conn_proto {
233         union {
234                 struct {
235                         u32     epoch;          /* epoch of this connection */
236                         u32     cid;            /* connection ID */
237                 };
238                 u64             index_key;
239         };
240 };
241
242 struct rxrpc_conn_parameters {
243         struct rxrpc_local      *local;         /* Representation of local endpoint */
244         struct rxrpc_peer       *peer;          /* Remote endpoint */
245         struct key              *key;           /* Security details */
246         bool                    exclusive;      /* T if conn is exclusive */
247         u16                     service_id;     /* Service ID for this connection */
248         u32                     security_level; /* Security level selected */
249 };
250
251 /*
252  * Bits in the connection flags.
253  */
254 enum rxrpc_conn_flag {
255         RXRPC_CONN_HAS_IDR,             /* Has a client conn ID assigned */
256         RXRPC_CONN_IN_SERVICE_CONNS,    /* Conn is in peer->service_conns */
257         RXRPC_CONN_IN_CLIENT_CONNS,     /* Conn is in local->client_conns */
258 };
259
260 /*
261  * Events that can be raised upon a connection.
262  */
263 enum rxrpc_conn_event {
264         RXRPC_CONN_EV_CHALLENGE,        /* Send challenge packet */
265 };
266
267 /*
268  * The connection protocol state.
269  */
270 enum rxrpc_conn_proto_state {
271         RXRPC_CONN_UNUSED,              /* Connection not yet attempted */
272         RXRPC_CONN_CLIENT,              /* Client connection */
273         RXRPC_CONN_SERVICE_UNSECURED,   /* Service unsecured connection */
274         RXRPC_CONN_SERVICE_CHALLENGING, /* Service challenging for security */
275         RXRPC_CONN_SERVICE,             /* Service secured connection */
276         RXRPC_CONN_REMOTELY_ABORTED,    /* Conn aborted by peer */
277         RXRPC_CONN_LOCALLY_ABORTED,     /* Conn aborted locally */
278         RXRPC_CONN_NETWORK_ERROR,       /* Conn terminated by network error */
279         RXRPC_CONN__NR_STATES
280 };
281
282 /*
283  * RxRPC connection definition
284  * - matched by { local, peer, epoch, conn_id, direction }
285  * - each connection can only handle four simultaneous calls
286  */
287 struct rxrpc_connection {
288         struct rxrpc_conn_proto proto;
289         struct rxrpc_conn_parameters params;
290
291         spinlock_t              channel_lock;
292
293         struct rxrpc_channel {
294                 struct rxrpc_call __rcu *call;          /* Active call */
295                 u32                     call_id;        /* ID of current call */
296                 u32                     call_counter;   /* Call ID counter */
297                 u32                     last_call;      /* ID of last call */
298                 u32                     last_result;    /* Result of last call (0/abort) */
299         } channels[RXRPC_MAXCALLS];
300         wait_queue_head_t       channel_wq;     /* queue to wait for channel to become available */
301
302         struct rcu_head         rcu;
303         struct work_struct      processor;      /* connection event processor */
304         union {
305                 struct rb_node  client_node;    /* Node in local->client_conns */
306                 struct rb_node  service_node;   /* Node in peer->service_conns */
307         };
308         struct list_head        link;           /* link in master connection list */
309         struct sk_buff_head     rx_queue;       /* received conn-level packets */
310         const struct rxrpc_security *security;  /* applied security module */
311         struct key              *server_key;    /* security for this service */
312         struct crypto_skcipher  *cipher;        /* encryption handle */
313         struct rxrpc_crypt      csum_iv;        /* packet checksum base */
314         unsigned long           flags;
315         unsigned long           events;
316         unsigned long           put_time;       /* Time at which last put */
317         spinlock_t              state_lock;     /* state-change lock */
318         atomic_t                usage;
319         enum rxrpc_conn_proto_state state : 8;  /* current state of connection */
320         u32                     local_abort;    /* local abort code */
321         u32                     remote_abort;   /* remote abort code */
322         int                     error;          /* local error incurred */
323         int                     debug_id;       /* debug ID for printks */
324         atomic_t                serial;         /* packet serial number counter */
325         atomic_t                hi_serial;      /* highest serial number received */
326         atomic_t                avail_chans;    /* number of channels available */
327         u8                      size_align;     /* data size alignment (for security) */
328         u8                      header_size;    /* rxrpc + security header size */
329         u8                      security_size;  /* security header size */
330         u32                     security_nonce; /* response re-use preventer */
331         u8                      security_ix;    /* security type */
332         u8                      out_clientflag; /* RXRPC_CLIENT_INITIATED if we are client */
333 };
334
335 /*
336  * Flags in call->flags.
337  */
338 enum rxrpc_call_flag {
339         RXRPC_CALL_RELEASED,            /* call has been released - no more message to userspace */
340         RXRPC_CALL_TERMINAL_MSG,        /* call has given the socket its final message */
341         RXRPC_CALL_RCVD_LAST,           /* all packets received */
342         RXRPC_CALL_RUN_RTIMER,          /* Tx resend timer started */
343         RXRPC_CALL_TX_SOFT_ACK,         /* sent some soft ACKs */
344         RXRPC_CALL_PROC_BUSY,           /* the processor is busy */
345         RXRPC_CALL_INIT_ACCEPT,         /* acceptance was initiated */
346         RXRPC_CALL_HAS_USERID,          /* has a user ID attached */
347         RXRPC_CALL_EXPECT_OOS,          /* expect out of sequence packets */
348 };
349
350 /*
351  * Events that can be raised on a call.
352  */
353 enum rxrpc_call_event {
354         RXRPC_CALL_EV_RCVD_ACKALL,      /* ACKALL or reply received */
355         RXRPC_CALL_EV_RCVD_BUSY,        /* busy packet received */
356         RXRPC_CALL_EV_RCVD_ABORT,       /* abort packet received */
357         RXRPC_CALL_EV_RCVD_ERROR,       /* network error received */
358         RXRPC_CALL_EV_ACK_FINAL,        /* need to generate final ACK (and release call) */
359         RXRPC_CALL_EV_ACK,              /* need to generate ACK */
360         RXRPC_CALL_EV_REJECT_BUSY,      /* need to generate busy message */
361         RXRPC_CALL_EV_ABORT,            /* need to generate abort */
362         RXRPC_CALL_EV_CONN_ABORT,       /* local connection abort generated */
363         RXRPC_CALL_EV_RESEND_TIMER,     /* Tx resend timer expired */
364         RXRPC_CALL_EV_RESEND,           /* Tx resend required */
365         RXRPC_CALL_EV_DRAIN_RX_OOS,     /* drain the Rx out of sequence queue */
366         RXRPC_CALL_EV_LIFE_TIMER,       /* call's lifetimer ran out */
367         RXRPC_CALL_EV_ACCEPTED,         /* incoming call accepted by userspace app */
368         RXRPC_CALL_EV_SECURED,          /* incoming call's connection is now secure */
369         RXRPC_CALL_EV_POST_ACCEPT,      /* need to post an "accept?" message to the app */
370         RXRPC_CALL_EV_RELEASE,          /* need to release the call's resources */
371 };
372
373 /*
374  * The states that a call can be in.
375  */
376 enum rxrpc_call_state {
377         RXRPC_CALL_UNINITIALISED,
378         RXRPC_CALL_CLIENT_AWAIT_CONN,   /* - client waiting for connection to become available */
379         RXRPC_CALL_CLIENT_SEND_REQUEST, /* - client sending request phase */
380         RXRPC_CALL_CLIENT_AWAIT_REPLY,  /* - client awaiting reply */
381         RXRPC_CALL_CLIENT_RECV_REPLY,   /* - client receiving reply phase */
382         RXRPC_CALL_CLIENT_FINAL_ACK,    /* - client sending final ACK phase */
383         RXRPC_CALL_SERVER_SECURING,     /* - server securing request connection */
384         RXRPC_CALL_SERVER_ACCEPTING,    /* - server accepting request */
385         RXRPC_CALL_SERVER_RECV_REQUEST, /* - server receiving request */
386         RXRPC_CALL_SERVER_ACK_REQUEST,  /* - server pending ACK of request */
387         RXRPC_CALL_SERVER_SEND_REPLY,   /* - server sending reply */
388         RXRPC_CALL_SERVER_AWAIT_ACK,    /* - server awaiting final ACK */
389         RXRPC_CALL_COMPLETE,            /* - call completed */
390         RXRPC_CALL_SERVER_BUSY,         /* - call rejected by busy server */
391         RXRPC_CALL_REMOTELY_ABORTED,    /* - call aborted by peer */
392         RXRPC_CALL_LOCALLY_ABORTED,     /* - call aborted locally on error or close */
393         RXRPC_CALL_NETWORK_ERROR,       /* - call terminated by network error */
394         RXRPC_CALL_DEAD,                /* - call is dead */
395         NR__RXRPC_CALL_STATES
396 };
397
398 /*
399  * RxRPC call definition
400  * - matched by { connection, call_id }
401  */
402 struct rxrpc_call {
403         struct rcu_head         rcu;
404         struct rxrpc_connection *conn;          /* connection carrying call */
405         struct rxrpc_sock       *socket;        /* socket responsible */
406         struct timer_list       lifetimer;      /* lifetime remaining on call */
407         struct timer_list       deadspan;       /* reap timer for re-ACK'ing, etc  */
408         struct timer_list       ack_timer;      /* ACK generation timer */
409         struct timer_list       resend_timer;   /* Tx resend timer */
410         struct work_struct      destroyer;      /* call destroyer */
411         struct work_struct      processor;      /* packet processor and ACK generator */
412         struct list_head        link;           /* link in master call list */
413         struct hlist_node       error_link;     /* link in error distribution list */
414         struct list_head        accept_link;    /* calls awaiting acceptance */
415         struct rb_node          sock_node;      /* node in socket call tree */
416         struct sk_buff_head     rx_queue;       /* received packets */
417         struct sk_buff_head     rx_oos_queue;   /* packets received out of sequence */
418         struct sk_buff          *tx_pending;    /* Tx socket buffer being filled */
419         wait_queue_head_t       tx_waitq;       /* wait for Tx window space to become available */
420         __be32                  crypto_buf[2];  /* Temporary packet crypto buffer */
421         unsigned long           user_call_ID;   /* user-defined call ID */
422         unsigned long           creation_jif;   /* time of call creation */
423         unsigned long           flags;
424         unsigned long           events;
425         spinlock_t              lock;
426         rwlock_t                state_lock;     /* lock for state transition */
427         atomic_t                usage;
428         atomic_t                sequence;       /* Tx data packet sequence counter */
429         u32                     local_abort;    /* local abort code */
430         u32                     remote_abort;   /* remote abort code */
431         int                     error_report;   /* Network error (ICMP/local transport) */
432         int                     error;          /* Local error incurred */
433         enum rxrpc_call_state   state : 8;      /* current state of call */
434         int                     debug_id;       /* debug ID for printks */
435         u8                      channel;        /* connection channel occupied by this call */
436
437         /* transmission-phase ACK management */
438         u8                      acks_head;      /* offset into window of first entry */
439         u8                      acks_tail;      /* offset into window of last entry */
440         u8                      acks_winsz;     /* size of un-ACK'd window */
441         u8                      acks_unacked;   /* lowest unacked packet in last ACK received */
442         int                     acks_latest;    /* serial number of latest ACK received */
443         rxrpc_seq_t             acks_hard;      /* highest definitively ACK'd msg seq */
444         unsigned long           *acks_window;   /* sent packet window
445                                                  * - elements are pointers with LSB set if ACK'd
446                                                  */
447
448         /* receive-phase ACK management */
449         rxrpc_seq_t             rx_data_expect; /* next data seq ID expected to be received */
450         rxrpc_seq_t             rx_data_post;   /* next data seq ID expected to be posted */
451         rxrpc_seq_t             rx_data_recv;   /* last data seq ID encountered by recvmsg */
452         rxrpc_seq_t             rx_data_eaten;  /* last data seq ID consumed by recvmsg */
453         rxrpc_seq_t             rx_first_oos;   /* first packet in rx_oos_queue (or 0) */
454         rxrpc_seq_t             ackr_win_top;   /* top of ACK window (rx_data_eaten is bottom) */
455         rxrpc_seq_t             ackr_prev_seq;  /* previous sequence number received */
456         u8                      ackr_reason;    /* reason to ACK */
457         rxrpc_serial_t          ackr_serial;    /* serial of packet being ACK'd */
458         atomic_t                ackr_not_idle;  /* number of packets in Rx queue */
459
460         /* received packet records, 1 bit per record */
461 #define RXRPC_ACKR_WINDOW_ASZ DIV_ROUND_UP(RXRPC_MAXACKS, BITS_PER_LONG)
462         unsigned long           ackr_window[RXRPC_ACKR_WINDOW_ASZ + 1];
463
464         u8                      in_clientflag;  /* Copy of conn->in_clientflag */
465         struct rxrpc_local      *local;         /* Local endpoint. */
466         u32                     call_id;        /* call ID on connection  */
467         u32                     cid;            /* connection ID plus channel index */
468         u32                     epoch;          /* epoch of this connection */
469         u16                     service_id;     /* service ID */
470 };
471
472 /*
473  * locally abort an RxRPC call
474  */
475 static inline void rxrpc_abort_call(struct rxrpc_call *call, u32 abort_code)
476 {
477         write_lock_bh(&call->state_lock);
478         if (call->state < RXRPC_CALL_COMPLETE) {
479                 call->local_abort = abort_code;
480                 call->state = RXRPC_CALL_LOCALLY_ABORTED;
481                 set_bit(RXRPC_CALL_EV_ABORT, &call->events);
482         }
483         write_unlock_bh(&call->state_lock);
484 }
485
486 /*
487  * af_rxrpc.c
488  */
489 extern atomic_t rxrpc_n_skbs;
490 extern u32 rxrpc_epoch;
491 extern atomic_t rxrpc_debug_id;
492 extern struct workqueue_struct *rxrpc_workqueue;
493
494 /*
495  * call_accept.c
496  */
497 void rxrpc_accept_incoming_calls(struct rxrpc_local *);
498 struct rxrpc_call *rxrpc_accept_call(struct rxrpc_sock *, unsigned long);
499 int rxrpc_reject_call(struct rxrpc_sock *);
500
501 /*
502  * call_event.c
503  */
504 void __rxrpc_propose_ACK(struct rxrpc_call *, u8, u32, bool);
505 void rxrpc_propose_ACK(struct rxrpc_call *, u8, u32, bool);
506 void rxrpc_process_call(struct work_struct *);
507
508 /*
509  * call_object.c
510  */
511 extern unsigned int rxrpc_max_call_lifetime;
512 extern unsigned int rxrpc_dead_call_expiry;
513 extern struct kmem_cache *rxrpc_call_jar;
514 extern struct list_head rxrpc_calls;
515 extern rwlock_t rxrpc_call_lock;
516
517 struct rxrpc_call *rxrpc_find_call_by_user_ID(struct rxrpc_sock *, unsigned long);
518 struct rxrpc_call *rxrpc_new_client_call(struct rxrpc_sock *,
519                                          struct rxrpc_conn_parameters *,
520                                          struct sockaddr_rxrpc *,
521                                          unsigned long, gfp_t);
522 struct rxrpc_call *rxrpc_incoming_call(struct rxrpc_sock *,
523                                        struct rxrpc_connection *,
524                                        struct sk_buff *);
525 void rxrpc_release_call(struct rxrpc_call *);
526 void rxrpc_release_calls_on_socket(struct rxrpc_sock *);
527 void __rxrpc_put_call(struct rxrpc_call *);
528 void __exit rxrpc_destroy_all_calls(void);
529
530 /*
531  * conn_client.c
532  */
533 extern struct idr rxrpc_client_conn_ids;
534
535 void rxrpc_destroy_client_conn_ids(void);
536 int rxrpc_connect_call(struct rxrpc_call *, struct rxrpc_conn_parameters *,
537                        struct sockaddr_rxrpc *, gfp_t);
538 void rxrpc_unpublish_client_conn(struct rxrpc_connection *);
539
540 /*
541  * conn_event.c
542  */
543 void rxrpc_process_connection(struct work_struct *);
544 void rxrpc_reject_packet(struct rxrpc_local *, struct sk_buff *);
545 void rxrpc_reject_packets(struct rxrpc_local *);
546
547 /*
548  * conn_object.c
549  */
550 extern unsigned int rxrpc_connection_expiry;
551 extern struct list_head rxrpc_connections;
552 extern rwlock_t rxrpc_connection_lock;
553
554 int rxrpc_extract_addr_from_skb(struct sockaddr_rxrpc *, struct sk_buff *);
555 struct rxrpc_connection *rxrpc_alloc_connection(gfp_t);
556 struct rxrpc_connection *rxrpc_find_connection_rcu(struct rxrpc_local *,
557                                                    struct sk_buff *);
558 void __rxrpc_disconnect_call(struct rxrpc_call *);
559 void rxrpc_disconnect_call(struct rxrpc_call *);
560 void rxrpc_put_connection(struct rxrpc_connection *);
561 void __exit rxrpc_destroy_all_connections(void);
562
563 static inline bool rxrpc_conn_is_client(const struct rxrpc_connection *conn)
564 {
565         return conn->out_clientflag;
566 }
567
568 static inline bool rxrpc_conn_is_service(const struct rxrpc_connection *conn)
569 {
570         return !rxrpc_conn_is_client(conn);
571 }
572
573 static inline void rxrpc_get_connection(struct rxrpc_connection *conn)
574 {
575         atomic_inc(&conn->usage);
576 }
577
578 static inline
579 struct rxrpc_connection *rxrpc_get_connection_maybe(struct rxrpc_connection *conn)
580 {
581         return atomic_inc_not_zero(&conn->usage) ? conn : NULL;
582 }
583
584 static inline bool rxrpc_queue_conn(struct rxrpc_connection *conn)
585 {
586         if (!rxrpc_get_connection_maybe(conn))
587                 return false;
588         if (!rxrpc_queue_work(&conn->processor))
589                 rxrpc_put_connection(conn);
590         return true;
591 }
592
593 /*
594  * conn_service.c
595  */
596 struct rxrpc_connection *rxrpc_find_service_conn_rcu(struct rxrpc_peer *,
597                                                      struct sk_buff *);
598 struct rxrpc_connection *rxrpc_incoming_connection(struct rxrpc_local *,
599                                                    struct sockaddr_rxrpc *,
600                                                    struct sk_buff *);
601 void rxrpc_unpublish_service_conn(struct rxrpc_connection *);
602
603 /*
604  * input.c
605  */
606 void rxrpc_data_ready(struct sock *);
607 int rxrpc_queue_rcv_skb(struct rxrpc_call *, struct sk_buff *, bool, bool);
608 void rxrpc_fast_process_packet(struct rxrpc_call *, struct sk_buff *);
609
610 /*
611  * insecure.c
612  */
613 extern const struct rxrpc_security rxrpc_no_security;
614
615 /*
616  * key.c
617  */
618 extern struct key_type key_type_rxrpc;
619 extern struct key_type key_type_rxrpc_s;
620
621 int rxrpc_request_key(struct rxrpc_sock *, char __user *, int);
622 int rxrpc_server_keyring(struct rxrpc_sock *, char __user *, int);
623 int rxrpc_get_server_data_key(struct rxrpc_connection *, const void *, time_t,
624                               u32);
625
626 /*
627  * local_event.c
628  */
629 extern void rxrpc_process_local_events(struct rxrpc_local *);
630
631 /*
632  * local_object.c
633  */
634 struct rxrpc_local *rxrpc_lookup_local(const struct sockaddr_rxrpc *);
635 void __rxrpc_put_local(struct rxrpc_local *);
636 void __exit rxrpc_destroy_all_locals(void);
637
638 static inline void rxrpc_get_local(struct rxrpc_local *local)
639 {
640         atomic_inc(&local->usage);
641 }
642
643 static inline
644 struct rxrpc_local *rxrpc_get_local_maybe(struct rxrpc_local *local)
645 {
646         return atomic_inc_not_zero(&local->usage) ? local : NULL;
647 }
648
649 static inline void rxrpc_put_local(struct rxrpc_local *local)
650 {
651         if (local && atomic_dec_and_test(&local->usage))
652                 __rxrpc_put_local(local);
653 }
654
655 static inline void rxrpc_queue_local(struct rxrpc_local *local)
656 {
657         rxrpc_queue_work(&local->processor);
658 }
659
660 /*
661  * misc.c
662  */
663 extern unsigned int rxrpc_max_backlog __read_mostly;
664 extern unsigned int rxrpc_requested_ack_delay;
665 extern unsigned int rxrpc_soft_ack_delay;
666 extern unsigned int rxrpc_idle_ack_delay;
667 extern unsigned int rxrpc_rx_window_size;
668 extern unsigned int rxrpc_rx_mtu;
669 extern unsigned int rxrpc_rx_jumbo_max;
670
671 extern const char *const rxrpc_pkts[];
672 extern const s8 rxrpc_ack_priority[];
673
674 extern const char *rxrpc_acks(u8 reason);
675
676 /*
677  * output.c
678  */
679 extern unsigned int rxrpc_resend_timeout;
680
681 int rxrpc_send_data_packet(struct rxrpc_connection *, struct sk_buff *);
682 int rxrpc_do_sendmsg(struct rxrpc_sock *, struct msghdr *, size_t);
683
684 /*
685  * peer_event.c
686  */
687 void rxrpc_error_report(struct sock *);
688 void rxrpc_peer_error_distributor(struct work_struct *);
689
690 /*
691  * peer_object.c
692  */
693 struct rxrpc_peer *rxrpc_lookup_peer_rcu(struct rxrpc_local *,
694                                          const struct sockaddr_rxrpc *);
695 struct rxrpc_peer *rxrpc_lookup_peer(struct rxrpc_local *,
696                                      struct sockaddr_rxrpc *, gfp_t);
697 struct rxrpc_peer *rxrpc_alloc_peer(struct rxrpc_local *, gfp_t);
698
699 static inline void rxrpc_get_peer(struct rxrpc_peer *peer)
700 {
701         atomic_inc(&peer->usage);
702 }
703
704 static inline
705 struct rxrpc_peer *rxrpc_get_peer_maybe(struct rxrpc_peer *peer)
706 {
707         return atomic_inc_not_zero(&peer->usage) ? peer : NULL;
708 }
709
710 extern void __rxrpc_put_peer(struct rxrpc_peer *peer);
711 static inline void rxrpc_put_peer(struct rxrpc_peer *peer)
712 {
713         if (peer && atomic_dec_and_test(&peer->usage))
714                 __rxrpc_put_peer(peer);
715 }
716
717 /*
718  * proc.c
719  */
720 extern const char *const rxrpc_call_states[];
721 extern const struct file_operations rxrpc_call_seq_fops;
722 extern const struct file_operations rxrpc_connection_seq_fops;
723
724 /*
725  * recvmsg.c
726  */
727 void rxrpc_remove_user_ID(struct rxrpc_sock *, struct rxrpc_call *);
728 int rxrpc_recvmsg(struct socket *, struct msghdr *, size_t, int);
729
730 /*
731  * rxkad.c
732  */
733 #ifdef CONFIG_RXKAD
734 extern const struct rxrpc_security rxkad;
735 #endif
736
737 /*
738  * security.c
739  */
740 int __init rxrpc_init_security(void);
741 void rxrpc_exit_security(void);
742 int rxrpc_init_client_conn_security(struct rxrpc_connection *);
743 int rxrpc_init_server_conn_security(struct rxrpc_connection *);
744
745 /*
746  * skbuff.c
747  */
748 void rxrpc_packet_destructor(struct sk_buff *);
749
750 /*
751  * sysctl.c
752  */
753 #ifdef CONFIG_SYSCTL
754 extern int __init rxrpc_sysctl_init(void);
755 extern void rxrpc_sysctl_exit(void);
756 #else
757 static inline int __init rxrpc_sysctl_init(void) { return 0; }
758 static inline void rxrpc_sysctl_exit(void) {}
759 #endif
760
761 /*
762  * utils.c
763  */
764 int rxrpc_extract_addr_from_skb(struct sockaddr_rxrpc *, struct sk_buff *);
765
766 /*
767  * debug tracing
768  */
769 extern unsigned int rxrpc_debug;
770
771 #define dbgprintk(FMT,...) \
772         printk("[%-6.6s] "FMT"\n", current->comm ,##__VA_ARGS__)
773
774 #define kenter(FMT,...) dbgprintk("==> %s("FMT")",__func__ ,##__VA_ARGS__)
775 #define kleave(FMT,...) dbgprintk("<== %s()"FMT"",__func__ ,##__VA_ARGS__)
776 #define kdebug(FMT,...) dbgprintk("    "FMT ,##__VA_ARGS__)
777 #define kproto(FMT,...) dbgprintk("### "FMT ,##__VA_ARGS__)
778 #define knet(FMT,...)   dbgprintk("@@@ "FMT ,##__VA_ARGS__)
779
780
781 #if defined(__KDEBUG)
782 #define _enter(FMT,...) kenter(FMT,##__VA_ARGS__)
783 #define _leave(FMT,...) kleave(FMT,##__VA_ARGS__)
784 #define _debug(FMT,...) kdebug(FMT,##__VA_ARGS__)
785 #define _proto(FMT,...) kproto(FMT,##__VA_ARGS__)
786 #define _net(FMT,...)   knet(FMT,##__VA_ARGS__)
787
788 #elif defined(CONFIG_AF_RXRPC_DEBUG)
789 #define RXRPC_DEBUG_KENTER      0x01
790 #define RXRPC_DEBUG_KLEAVE      0x02
791 #define RXRPC_DEBUG_KDEBUG      0x04
792 #define RXRPC_DEBUG_KPROTO      0x08
793 #define RXRPC_DEBUG_KNET        0x10
794
795 #define _enter(FMT,...)                                 \
796 do {                                                    \
797         if (unlikely(rxrpc_debug & RXRPC_DEBUG_KENTER)) \
798                 kenter(FMT,##__VA_ARGS__);              \
799 } while (0)
800
801 #define _leave(FMT,...)                                 \
802 do {                                                    \
803         if (unlikely(rxrpc_debug & RXRPC_DEBUG_KLEAVE)) \
804                 kleave(FMT,##__VA_ARGS__);              \
805 } while (0)
806
807 #define _debug(FMT,...)                                 \
808 do {                                                    \
809         if (unlikely(rxrpc_debug & RXRPC_DEBUG_KDEBUG)) \
810                 kdebug(FMT,##__VA_ARGS__);              \
811 } while (0)
812
813 #define _proto(FMT,...)                                 \
814 do {                                                    \
815         if (unlikely(rxrpc_debug & RXRPC_DEBUG_KPROTO)) \
816                 kproto(FMT,##__VA_ARGS__);              \
817 } while (0)
818
819 #define _net(FMT,...)                                   \
820 do {                                                    \
821         if (unlikely(rxrpc_debug & RXRPC_DEBUG_KNET))   \
822                 knet(FMT,##__VA_ARGS__);                \
823 } while (0)
824
825 #else
826 #define _enter(FMT,...) no_printk("==> %s("FMT")",__func__ ,##__VA_ARGS__)
827 #define _leave(FMT,...) no_printk("<== %s()"FMT"",__func__ ,##__VA_ARGS__)
828 #define _debug(FMT,...) no_printk("    "FMT ,##__VA_ARGS__)
829 #define _proto(FMT,...) no_printk("### "FMT ,##__VA_ARGS__)
830 #define _net(FMT,...)   no_printk("@@@ "FMT ,##__VA_ARGS__)
831 #endif
832
833 /*
834  * debug assertion checking
835  */
836 #if 1 // defined(__KDEBUGALL)
837
838 #define ASSERT(X)                                               \
839 do {                                                            \
840         if (unlikely(!(X))) {                                   \
841                 pr_err("Assertion failed\n");                   \
842                 BUG();                                          \
843         }                                                       \
844 } while (0)
845
846 #define ASSERTCMP(X, OP, Y)                                             \
847 do {                                                                    \
848         unsigned long _x = (unsigned long)(X);                          \
849         unsigned long _y = (unsigned long)(Y);                          \
850         if (unlikely(!(_x OP _y))) {                                    \
851                 pr_err("Assertion failed - %lu(0x%lx) %s %lu(0x%lx) is false\n",                        \
852                        _x, _x, #OP, _y, _y);                            \
853                 BUG();                                                  \
854         }                                                               \
855 } while (0)
856
857 #define ASSERTIF(C, X)                                          \
858 do {                                                            \
859         if (unlikely((C) && !(X))) {                            \
860                 pr_err("Assertion failed\n");                   \
861                 BUG();                                          \
862         }                                                       \
863 } while (0)
864
865 #define ASSERTIFCMP(C, X, OP, Y)                                        \
866 do {                                                                    \
867         unsigned long _x = (unsigned long)(X);                          \
868         unsigned long _y = (unsigned long)(Y);                          \
869         if (unlikely((C) && !(_x OP _y))) {                             \
870                 pr_err("Assertion failed - %lu(0x%lx) %s %lu(0x%lx) is false\n", \
871                        _x, _x, #OP, _y, _y);                            \
872                 BUG();                                                  \
873         }                                                               \
874 } while (0)
875
876 #else
877
878 #define ASSERT(X)                               \
879 do {                                            \
880 } while (0)
881
882 #define ASSERTCMP(X, OP, Y)                     \
883 do {                                            \
884 } while (0)
885
886 #define ASSERTIF(C, X)                          \
887 do {                                            \
888 } while (0)
889
890 #define ASSERTIFCMP(C, X, OP, Y)                \
891 do {                                            \
892 } while (0)
893
894 #endif /* __KDEBUGALL */
895
896 /*
897  * socket buffer accounting / leak finding
898  */
899 static inline void __rxrpc_new_skb(struct sk_buff *skb, const char *fn)
900 {
901         //_net("new skb %p %s [%d]", skb, fn, atomic_read(&rxrpc_n_skbs));
902         //atomic_inc(&rxrpc_n_skbs);
903 }
904
905 #define rxrpc_new_skb(skb) __rxrpc_new_skb((skb), __func__)
906
907 static inline void __rxrpc_kill_skb(struct sk_buff *skb, const char *fn)
908 {
909         //_net("kill skb %p %s [%d]", skb, fn, atomic_read(&rxrpc_n_skbs));
910         //atomic_dec(&rxrpc_n_skbs);
911 }
912
913 #define rxrpc_kill_skb(skb) __rxrpc_kill_skb((skb), __func__)
914
915 static inline void __rxrpc_free_skb(struct sk_buff *skb, const char *fn)
916 {
917         if (skb) {
918                 CHECK_SLAB_OKAY(&skb->users);
919                 //_net("free skb %p %s [%d]",
920                 //     skb, fn, atomic_read(&rxrpc_n_skbs));
921                 //atomic_dec(&rxrpc_n_skbs);
922                 kfree_skb(skb);
923         }
924 }
925
926 #define rxrpc_free_skb(skb) __rxrpc_free_skb((skb), __func__)
927
928 static inline void rxrpc_purge_queue(struct sk_buff_head *list)
929 {
930         struct sk_buff *skb;
931         while ((skb = skb_dequeue((list))) != NULL)
932                 rxrpc_free_skb(skb);
933 }
934
935 #define rxrpc_get_call(CALL)                            \
936 do {                                                    \
937         CHECK_SLAB_OKAY(&(CALL)->usage);                \
938         if (atomic_inc_return(&(CALL)->usage) == 1)     \
939                 BUG();                                  \
940 } while (0)
941
942 #define rxrpc_put_call(CALL)                            \
943 do {                                                    \
944         __rxrpc_put_call(CALL);                         \
945 } while (0)