Merge ath-next from git://git.kernel.org/pub/scm/linux/kernel/git/kvalo/ath.git
[linux-2.6-block.git] / net / mptcp / pm.c
CommitLineData
1b1c7a0e
PK
1// SPDX-License-Identifier: GPL-2.0
2/* Multipath TCP
3 *
4 * Copyright (c) 2019, Intel Corporation.
5 */
c85adced
GT
6#define pr_fmt(fmt) "MPTCP: " fmt
7
1b1c7a0e
PK
8#include <linux/kernel.h>
9#include <net/tcp.h>
10#include <net/mptcp.h>
11#include "protocol.h"
12
fc1b4e3b
PA
13#include "mib.h"
14
1b1c7a0e
PK
15/* path manager command handlers */
16
17int mptcp_pm_announce_addr(struct mptcp_sock *msk,
6a6c05a8 18 const struct mptcp_addr_info *addr,
f7efc777 19 bool echo)
1b1c7a0e 20{
13ad9f01 21 u8 add_addr = READ_ONCE(msk->pm.addr_signal);
d91d322a 22
18fc1a92 23 pr_debug("msk=%p, local_id=%d, echo=%d", msk, addr->id, echo);
926bdeab 24
3abc05d9
FW
25 lockdep_assert_held(&msk->pm.lock);
26
18fc1a92
YL
27 if (add_addr &
28 (echo ? BIT(MPTCP_ADD_ADDR_ECHO) : BIT(MPTCP_ADD_ADDR_SIGNAL))) {
45b1a122
PA
29 MPTCP_INC_STATS(sock_net((struct sock *)msk),
30 echo ? MPTCP_MIB_ECHOADDTXDROP : MPTCP_MIB_ADDADDRTXDROP);
42842a42
GT
31 return -EINVAL;
32 }
33
18fc1a92
YL
34 if (echo) {
35 msk->pm.remote = *addr;
d91d322a 36 add_addr |= BIT(MPTCP_ADD_ADDR_ECHO);
18fc1a92
YL
37 } else {
38 msk->pm.local = *addr;
39 add_addr |= BIT(MPTCP_ADD_ADDR_SIGNAL);
40 }
13ad9f01 41 WRITE_ONCE(msk->pm.addr_signal, add_addr);
926bdeab 42 return 0;
1b1c7a0e
PK
43}
44
cbde2787 45int mptcp_pm_remove_addr(struct mptcp_sock *msk, const struct mptcp_rm_list *rm_list)
1b1c7a0e 46{
13ad9f01 47 u8 rm_addr = READ_ONCE(msk->pm.addr_signal);
42842a42 48
cbde2787 49 pr_debug("msk=%p, rm_list_nr=%d", msk, rm_list->nr);
b6c08380 50
42842a42 51 if (rm_addr) {
45b1a122
PA
52 MPTCP_ADD_STATS(sock_net((struct sock *)msk),
53 MPTCP_MIB_RMADDRTXDROP, rm_list->nr);
42842a42
GT
54 return -EINVAL;
55 }
56
cbde2787 57 msk->pm.rm_list_tx = *rm_list;
42842a42 58 rm_addr |= BIT(MPTCP_RM_ADDR_SIGNAL);
13ad9f01 59 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
b46a0238 60 mptcp_pm_nl_addr_send_ack(msk);
b6c08380 61 return 0;
1b1c7a0e
PK
62}
63
ddd14bb8 64int mptcp_pm_remove_subflow(struct mptcp_sock *msk, const struct mptcp_rm_list *rm_list)
1b1c7a0e 65{
ddd14bb8 66 pr_debug("msk=%p, rm_list_nr=%d", msk, rm_list->nr);
0ee4261a
GT
67
68 spin_lock_bh(&msk->pm.lock);
ddd14bb8 69 mptcp_pm_nl_rm_subflow_received(msk, rm_list);
0ee4261a
GT
70 spin_unlock_bh(&msk->pm.lock);
71 return 0;
1b1c7a0e
PK
72}
73
74/* path manager event handlers */
75
6c714f1b 76void mptcp_pm_new_connection(struct mptcp_sock *msk, const struct sock *ssk, int server_side)
1b1c7a0e
PK
77{
78 struct mptcp_pm_data *pm = &msk->pm;
79
80 pr_debug("msk=%p, token=%u side=%d", msk, msk->token, server_side);
81
82 WRITE_ONCE(pm->server_side, server_side);
b911c97c 83 mptcp_event(MPTCP_EVENT_CREATED, msk, ssk, GFP_ATOMIC);
1b1c7a0e
PK
84}
85
86bool mptcp_pm_allow_new_subflow(struct mptcp_sock *msk)
87{
926bdeab 88 struct mptcp_pm_data *pm = &msk->pm;
a914e586 89 unsigned int subflows_max;
f58f065a 90 int ret = 0;
926bdeab 91
77e4b94a
GT
92 if (mptcp_pm_is_userspace(msk)) {
93 if (mptcp_userspace_pm_active(msk)) {
94 spin_lock_bh(&pm->lock);
95 pm->subflows++;
96 spin_unlock_bh(&pm->lock);
97 return true;
98 }
99 return false;
100 }
4d25247d 101
a914e586
GT
102 subflows_max = mptcp_pm_get_subflows_max(msk);
103
926bdeab 104 pr_debug("msk=%p subflows=%d max=%d allow=%d", msk, pm->subflows,
a914e586 105 subflows_max, READ_ONCE(pm->accept_subflow));
926bdeab
PK
106
107 /* try to avoid acquiring the lock below */
108 if (!READ_ONCE(pm->accept_subflow))
109 return false;
110
111 spin_lock_bh(&pm->lock);
f58f065a 112 if (READ_ONCE(pm->accept_subflow)) {
a914e586
GT
113 ret = pm->subflows < subflows_max;
114 if (ret && ++pm->subflows == subflows_max)
f58f065a
GT
115 WRITE_ONCE(pm->accept_subflow, false);
116 }
926bdeab
PK
117 spin_unlock_bh(&pm->lock);
118
119 return ret;
120}
121
122/* return true if the new status bit is currently cleared, that is, this event
123 * can be server, eventually by an already scheduled work
124 */
125static bool mptcp_pm_schedule_work(struct mptcp_sock *msk,
126 enum mptcp_pm_status new_status)
127{
128 pr_debug("msk=%p status=%x new=%lx", msk, msk->pm.status,
129 BIT(new_status));
130 if (msk->pm.status & BIT(new_status))
131 return false;
132
133 msk->pm.status |= BIT(new_status);
ba8f48f7 134 mptcp_schedule_work((struct sock *)msk);
926bdeab 135 return true;
1b1c7a0e
PK
136}
137
7a486c44 138void mptcp_pm_fully_established(struct mptcp_sock *msk, const struct sock *ssk)
1b1c7a0e 139{
926bdeab 140 struct mptcp_pm_data *pm = &msk->pm;
b911c97c 141 bool announce = false;
926bdeab 142
1b1c7a0e 143 pr_debug("msk=%p", msk);
926bdeab 144
926bdeab
PK
145 spin_lock_bh(&pm->lock);
146
5b950ff4
PA
147 /* mptcp_pm_fully_established() can be invoked by multiple
148 * racing paths - accept() and check_fully_established()
149 * be sure to serve this event only once.
150 */
151 if (READ_ONCE(pm->work_pending) &&
152 !(msk->pm.status & BIT(MPTCP_PM_ALREADY_ESTABLISHED)))
926bdeab
PK
153 mptcp_pm_schedule_work(msk, MPTCP_PM_ESTABLISHED);
154
b911c97c
FW
155 if ((msk->pm.status & BIT(MPTCP_PM_ALREADY_ESTABLISHED)) == 0)
156 announce = true;
157
158 msk->pm.status |= BIT(MPTCP_PM_ALREADY_ESTABLISHED);
926bdeab 159 spin_unlock_bh(&pm->lock);
b911c97c
FW
160
161 if (announce)
7a486c44 162 mptcp_event(MPTCP_EVENT_ESTABLISHED, msk, ssk, GFP_ATOMIC);
1b1c7a0e
PK
163}
164
165void mptcp_pm_connection_closed(struct mptcp_sock *msk)
166{
167 pr_debug("msk=%p", msk);
168}
169
62535200 170void mptcp_pm_subflow_established(struct mptcp_sock *msk)
1b1c7a0e 171{
926bdeab
PK
172 struct mptcp_pm_data *pm = &msk->pm;
173
1b1c7a0e 174 pr_debug("msk=%p", msk);
926bdeab
PK
175
176 if (!READ_ONCE(pm->work_pending))
177 return;
178
179 spin_lock_bh(&pm->lock);
180
181 if (READ_ONCE(pm->work_pending))
182 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
183
184 spin_unlock_bh(&pm->lock);
1b1c7a0e
PK
185}
186
a88c9e49
PA
187void mptcp_pm_subflow_check_next(struct mptcp_sock *msk, const struct sock *ssk,
188 const struct mptcp_subflow_context *subflow)
1b1c7a0e 189{
a88c9e49
PA
190 struct mptcp_pm_data *pm = &msk->pm;
191 bool update_subflows;
192
77e4b94a
GT
193 update_subflows = subflow->request_join || subflow->mp_join;
194 if (mptcp_pm_is_userspace(msk)) {
195 if (update_subflows) {
196 spin_lock_bh(&pm->lock);
197 pm->subflows--;
198 spin_unlock_bh(&pm->lock);
199 }
200 return;
201 }
202
a88c9e49
PA
203 if (!READ_ONCE(pm->work_pending) && !update_subflows)
204 return;
205
206 spin_lock_bh(&pm->lock);
207 if (update_subflows)
95d68651 208 __mptcp_pm_close_subflow(msk);
a88c9e49
PA
209
210 /* Even if this subflow is not really established, tell the PM to try
211 * to pick the next ones, if possible.
212 */
213 if (mptcp_pm_nl_check_work_pending(msk))
214 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
215
216 spin_unlock_bh(&pm->lock);
1b1c7a0e
PK
217}
218
d1ace2d9 219void mptcp_pm_add_addr_received(const struct sock *ssk,
1b1c7a0e
PK
220 const struct mptcp_addr_info *addr)
221{
d1ace2d9
KM
222 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
223 struct mptcp_sock *msk = mptcp_sk(subflow->conn);
926bdeab
PK
224 struct mptcp_pm_data *pm = &msk->pm;
225
226 pr_debug("msk=%p remote_id=%d accept=%d", msk, addr->id,
227 READ_ONCE(pm->accept_addr));
228
d1ace2d9 229 mptcp_event_addr_announced(ssk, addr);
b911c97c 230
926bdeab
PK
231 spin_lock_bh(&pm->lock);
232
4d25247d
KM
233 if (mptcp_pm_is_userspace(msk)) {
234 if (mptcp_userspace_pm_active(msk)) {
235 mptcp_pm_announce_addr(msk, addr, true);
236 mptcp_pm_add_addr_send_ack(msk);
237 } else {
238 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_ADDADDRDROP);
239 }
240 } else if (!READ_ONCE(pm->accept_addr)) {
f7efc777 241 mptcp_pm_announce_addr(msk, addr, true);
84dfe367
GT
242 mptcp_pm_add_addr_send_ack(msk);
243 } else if (mptcp_pm_schedule_work(msk, MPTCP_PM_ADD_ADDR_RECEIVED)) {
926bdeab 244 pm->remote = *addr;
f73c1194
PA
245 } else {
246 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_ADDADDRDROP);
84dfe367 247 }
926bdeab
PK
248
249 spin_unlock_bh(&pm->lock);
84dfe367
GT
250}
251
557963c3 252void mptcp_pm_add_addr_echoed(struct mptcp_sock *msk,
90d93088 253 const struct mptcp_addr_info *addr)
557963c3
GT
254{
255 struct mptcp_pm_data *pm = &msk->pm;
256
257 pr_debug("msk=%p", msk);
258
259 spin_lock_bh(&pm->lock);
260
261 if (mptcp_lookup_anno_list_by_saddr(msk, addr) && READ_ONCE(pm->work_pending))
262 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
263
264 spin_unlock_bh(&pm->lock);
265}
266
84dfe367
GT
267void mptcp_pm_add_addr_send_ack(struct mptcp_sock *msk)
268{
b5a7acd3 269 if (!mptcp_pm_should_add_signal(msk))
84dfe367
GT
270 return;
271
272 mptcp_pm_schedule_work(msk, MPTCP_PM_ADD_ADDR_SEND_ACK);
1b1c7a0e
PK
273}
274
5c4a824d
GT
275void mptcp_pm_rm_addr_received(struct mptcp_sock *msk,
276 const struct mptcp_rm_list *rm_list)
d0876b22
GT
277{
278 struct mptcp_pm_data *pm = &msk->pm;
5c4a824d 279 u8 i;
d0876b22 280
5c4a824d 281 pr_debug("msk=%p remote_ids_nr=%d", msk, rm_list->nr);
d0876b22 282
5c4a824d
GT
283 for (i = 0; i < rm_list->nr; i++)
284 mptcp_event_addr_removed(msk, rm_list->ids[i]);
b911c97c 285
d0876b22 286 spin_lock_bh(&pm->lock);
f73c1194
PA
287 if (mptcp_pm_schedule_work(msk, MPTCP_PM_RM_ADDR_RECEIVED))
288 pm->rm_list_rx = *rm_list;
289 else
290 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_RMADDRDROP);
d0876b22
GT
291 spin_unlock_bh(&pm->lock);
292}
293
43f5b111 294void mptcp_pm_mp_prio_received(struct sock *ssk, u8 bkup)
40453a5c 295{
43f5b111
PA
296 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
297 struct sock *sk = subflow->conn;
298 struct mptcp_sock *msk;
40453a5c
GT
299
300 pr_debug("subflow->backup=%d, bkup=%d\n", subflow->backup, bkup);
43f5b111
PA
301 msk = mptcp_sk(sk);
302 if (subflow->backup != bkup) {
303 subflow->backup = bkup;
304 mptcp_data_lock(sk);
305 if (!sock_owned_by_user(sk))
306 msk->last_snd = NULL;
307 else
308 __set_bit(MPTCP_RESET_SCHEDULER, &msk->cb_flags);
309 mptcp_data_unlock(sk);
310 }
b911c97c 311
43f5b111 312 mptcp_event(MPTCP_EVENT_SUB_PRIORITY, msk, ssk, GFP_ATOMIC);
40453a5c
GT
313}
314
5580d41b
GT
315void mptcp_pm_mp_fail_received(struct sock *sk, u64 fail_seq)
316{
1e39e5a3
GT
317 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk);
318 struct mptcp_sock *msk = mptcp_sk(subflow->conn);
319
5580d41b 320 pr_debug("fail_seq=%llu", fail_seq);
1e39e5a3 321
7b16871f 322 if (!READ_ONCE(msk->allow_infinite_fallback))
9c81be0d
GT
323 return;
324
76a13b31 325 if (!subflow->fail_tout) {
9c81be0d
GT
326 pr_debug("send MP_FAIL response and infinite map");
327
328 subflow->send_mp_fail = 1;
1e39e5a3 329 subflow->send_infinite_map = 1;
76a13b31
GT
330 tcp_send_ack(sk);
331 } else {
49fa1919 332 pr_debug("MP_FAIL response received");
76a13b31 333 WRITE_ONCE(subflow->fail_tout, 0);
9c81be0d 334 }
5580d41b
GT
335}
336
1b1c7a0e
PK
337/* path manager helpers */
338
90d93088 339bool mptcp_pm_add_addr_signal(struct mptcp_sock *msk, const struct sk_buff *skb,
1f5e9e2f 340 unsigned int opt_size, unsigned int remaining,
f462a446 341 struct mptcp_addr_info *addr, bool *echo,
af7939f3 342 bool *drop_other_suboptions)
1b1c7a0e 343{
926bdeab 344 int ret = false;
119c0220 345 u8 add_addr;
f462a446 346 u8 family;
af7939f3 347 bool port;
926bdeab
PK
348
349 spin_lock_bh(&msk->pm.lock);
350
351 /* double check after the lock is acquired */
f643b803 352 if (!mptcp_pm_should_add_signal(msk))
926bdeab
PK
353 goto out_unlock;
354
1f5e9e2f
YL
355 /* always drop every other options for pure ack ADD_ADDR; this is a
356 * plain dup-ack from TCP perspective. The other MPTCP-relevant info,
357 * if any, will be carried by the 'original' TCP ack
358 */
359 if (skb && skb_is_tcp_pure_ack(skb)) {
360 remaining += opt_size;
361 *drop_other_suboptions = true;
362 }
363
d91d322a 364 *echo = mptcp_pm_should_add_signal_echo(msk);
af7939f3 365 port = !!(*echo ? msk->pm.remote.port : msk->pm.local.port);
456afe01 366
f462a446 367 family = *echo ? msk->pm.remote.family : msk->pm.local.family;
af7939f3 368 if (remaining < mptcp_add_addr_len(family, *echo, port))
926bdeab
PK
369 goto out_unlock;
370
f462a446
YL
371 if (*echo) {
372 *addr = msk->pm.remote;
119c0220 373 add_addr = msk->pm.addr_signal & ~BIT(MPTCP_ADD_ADDR_ECHO);
f462a446
YL
374 } else {
375 *addr = msk->pm.local;
119c0220 376 add_addr = msk->pm.addr_signal & ~BIT(MPTCP_ADD_ADDR_SIGNAL);
f462a446 377 }
119c0220 378 WRITE_ONCE(msk->pm.addr_signal, add_addr);
926bdeab
PK
379 ret = true;
380
381out_unlock:
382 spin_unlock_bh(&msk->pm.lock);
383 return ret;
1b1c7a0e
PK
384}
385
5cb104ae 386bool mptcp_pm_rm_addr_signal(struct mptcp_sock *msk, unsigned int remaining,
6445e17a 387 struct mptcp_rm_list *rm_list)
5cb104ae 388{
cbde2787 389 int ret = false, len;
119c0220 390 u8 rm_addr;
5cb104ae
GT
391
392 spin_lock_bh(&msk->pm.lock);
393
394 /* double check after the lock is acquired */
395 if (!mptcp_pm_should_rm_signal(msk))
396 goto out_unlock;
397
119c0220 398 rm_addr = msk->pm.addr_signal & ~BIT(MPTCP_RM_ADDR_SIGNAL);
cbde2787
GT
399 len = mptcp_rm_addr_len(&msk->pm.rm_list_tx);
400 if (len < 0) {
119c0220 401 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
cbde2787
GT
402 goto out_unlock;
403 }
404 if (remaining < len)
5cb104ae
GT
405 goto out_unlock;
406
cbde2787 407 *rm_list = msk->pm.rm_list_tx;
119c0220 408 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
5cb104ae
GT
409 ret = true;
410
411out_unlock:
412 spin_unlock_bh(&msk->pm.lock);
413 return ret;
414}
415
1b1c7a0e
PK
416int mptcp_pm_get_local_id(struct mptcp_sock *msk, struct sock_common *skc)
417{
9bbec87e
GT
418 struct mptcp_addr_info skc_local;
419 struct mptcp_addr_info msk_local;
420
421 if (WARN_ON_ONCE(!msk))
422 return -1;
423
424 /* The 0 ID mapping is defined by the first subflow, copied into the msk
425 * addr
426 */
427 mptcp_local_address((struct sock_common *)msk, &msk_local);
428 mptcp_local_address((struct sock_common *)skc, &skc_local);
429 if (mptcp_addresses_equal(&msk_local, &skc_local, false))
430 return 0;
431
432 if (mptcp_pm_is_userspace(msk))
433 return mptcp_userspace_pm_get_local_id(msk, &skc_local);
434 return mptcp_pm_nl_get_local_id(msk, &skc_local);
1b1c7a0e
PK
435}
436
f40be0db
GT
437int mptcp_pm_get_flags_and_ifindex_by_id(struct mptcp_sock *msk, unsigned int id,
438 u8 *flags, int *ifindex)
439{
440 *flags = 0;
441 *ifindex = 0;
442
443 if (!id)
444 return 0;
445
446 if (mptcp_pm_is_userspace(msk))
447 return mptcp_userspace_pm_get_flags_and_ifindex_by_id(msk, id, flags, ifindex);
448 return mptcp_pm_nl_get_flags_and_ifindex_by_id(msk, id, flags, ifindex);
449}
450
6ba7ce89
GT
451int mptcp_pm_set_flags(struct net *net, struct nlattr *token,
452 struct mptcp_pm_addr_entry *loc,
453 struct mptcp_pm_addr_entry *rem, u8 bkup)
454{
455 if (token)
456 return mptcp_userspace_pm_set_flags(net, token, loc, rem, bkup);
457 return mptcp_pm_nl_set_flags(net, loc, bkup);
458}
459
71b7dec2
PA
460void mptcp_pm_subflow_chk_stale(const struct mptcp_sock *msk, struct sock *ssk)
461{
462 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
463 u32 rcv_tstamp = READ_ONCE(tcp_sk(ssk)->rcv_tstamp);
464
465 /* keep track of rtx periods with no progress */
466 if (!subflow->stale_count) {
467 subflow->stale_rcv_tstamp = rcv_tstamp;
468 subflow->stale_count++;
469 } else if (subflow->stale_rcv_tstamp == rcv_tstamp) {
470 if (subflow->stale_count < U8_MAX)
471 subflow->stale_count++;
ff5a0b42 472 mptcp_pm_nl_subflow_chk_stale(msk, ssk);
71b7dec2
PA
473 } else {
474 subflow->stale_count = 0;
ff5a0b42 475 mptcp_subflow_set_active(subflow);
71b7dec2
PA
476 }
477}
478
fb00ee4f
MB
479/* if sk is ipv4 or ipv6_only allows only same-family local and remote addresses,
480 * otherwise allow any matching local/remote pair
481 */
482bool mptcp_pm_addr_families_match(const struct sock *sk,
483 const struct mptcp_addr_info *loc,
484 const struct mptcp_addr_info *rem)
485{
486 bool mptcp_is_v4 = sk->sk_family == AF_INET;
487
488#if IS_ENABLED(CONFIG_MPTCP_IPV6)
489 bool loc_is_v4 = loc->family == AF_INET || ipv6_addr_v4mapped(&loc->addr6);
490 bool rem_is_v4 = rem->family == AF_INET || ipv6_addr_v4mapped(&rem->addr6);
491
492 if (mptcp_is_v4)
493 return loc_is_v4 && rem_is_v4;
494
495 if (ipv6_only_sock(sk))
496 return !loc_is_v4 && !rem_is_v4;
497
498 return loc_is_v4 == rem_is_v4;
499#else
500 return mptcp_is_v4 && loc->family == AF_INET && rem->family == AF_INET;
501#endif
502}
503
b29fcfb5 504void mptcp_pm_data_reset(struct mptcp_sock *msk)
1b1c7a0e 505{
6bb63ccc 506 u8 pm_type = mptcp_get_pm_type(sock_net((struct sock *)msk));
9273b9d5 507 struct mptcp_pm_data *pm = &msk->pm;
1b1c7a0e 508
9273b9d5
MM
509 pm->add_addr_signaled = 0;
510 pm->add_addr_accepted = 0;
511 pm->local_addr_used = 0;
512 pm->subflows = 0;
513 pm->rm_list_tx.nr = 0;
514 pm->rm_list_rx.nr = 0;
6bb63ccc
MM
515 WRITE_ONCE(pm->pm_type, pm_type);
516
517 if (pm_type == MPTCP_PM_TYPE_KERNEL) {
518 bool subflows_allowed = !!mptcp_pm_get_subflows_max(msk);
519
520 /* pm->work_pending must be only be set to 'true' when
521 * pm->pm_type is set to MPTCP_PM_TYPE_KERNEL
522 */
523 WRITE_ONCE(pm->work_pending,
524 (!!mptcp_pm_get_local_addr_max(msk) &&
525 subflows_allowed) ||
526 !!mptcp_pm_get_add_addr_signal_max(msk));
527 WRITE_ONCE(pm->accept_addr,
528 !!mptcp_pm_get_add_addr_accept_max(msk) &&
529 subflows_allowed);
530 WRITE_ONCE(pm->accept_subflow, subflows_allowed);
531 } else {
532 WRITE_ONCE(pm->work_pending, 0);
533 WRITE_ONCE(pm->accept_addr, 0);
534 WRITE_ONCE(pm->accept_subflow, 0);
535 }
536
9273b9d5 537 WRITE_ONCE(pm->addr_signal, 0);
9273b9d5
MM
538 WRITE_ONCE(pm->remote_deny_join_id0, false);
539 pm->status = 0;
540 bitmap_fill(msk->pm.id_avail_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
b29fcfb5
PA
541}
542
543void mptcp_pm_data_init(struct mptcp_sock *msk)
544{
1b1c7a0e 545 spin_lock_init(&msk->pm.lock);
b6c08380 546 INIT_LIST_HEAD(&msk->pm.anno_list);
4638de5a 547 INIT_LIST_HEAD(&msk->pm.userspace_pm_local_addr_list);
b29fcfb5 548 mptcp_pm_data_reset(msk);
1b1c7a0e
PK
549}
550
d39dceca 551void __init mptcp_pm_init(void)
1b1c7a0e 552{
01cacb00 553 mptcp_pm_nl_init();
1b1c7a0e 554}