Merge tag 'pci-v6.16-fixes-3' of git://git.kernel.org/pub/scm/linux/kernel/git/pci/pci
[linux-2.6-block.git] / net / mptcp / protocol.h
CommitLineData
f870fa0b
MM
1/* SPDX-License-Identifier: GPL-2.0 */
2/* Multipath TCP
3 *
4 * Copyright (c) 2017 - 2019, Intel Corporation.
5 */
6
7#ifndef __MPTCP_PROTOCOL_H
8#define __MPTCP_PROTOCOL_H
9
79c0949e
PK
10#include <linux/random.h>
11#include <net/tcp.h>
12#include <net/inet_connection_sock.h>
b911c97c 13#include <uapi/linux/mptcp.h>
9ab4807c 14#include <net/genetlink.h>
215d4024 15#include <net/rstreason.h>
79c0949e 16
cc7972ea 17#define MPTCP_SUPPORTED_VERSION 1
eda7acdd
PK
18
19/* MPTCP option bits */
20#define OPTION_MPTCP_MPC_SYN BIT(0)
21#define OPTION_MPTCP_MPC_SYNACK BIT(1)
22#define OPTION_MPTCP_MPC_ACK BIT(2)
f296234c
PK
23#define OPTION_MPTCP_MPJ_SYN BIT(3)
24#define OPTION_MPTCP_MPJ_SYNACK BIT(4)
25#define OPTION_MPTCP_MPJ_ACK BIT(5)
3df523ab 26#define OPTION_MPTCP_ADD_ADDR BIT(6)
fef6b7ec
GT
27#define OPTION_MPTCP_RM_ADDR BIT(7)
28#define OPTION_MPTCP_FASTCLOSE BIT(8)
29#define OPTION_MPTCP_PRIO BIT(9)
30#define OPTION_MPTCP_RST BIT(10)
1bff1e43 31#define OPTION_MPTCP_DSS BIT(11)
c25aeb4e 32#define OPTION_MPTCP_FAIL BIT(12)
eda7acdd 33
74c7dfbe
PA
34#define OPTION_MPTCP_CSUMREQD BIT(13)
35
36#define OPTIONS_MPTCP_MPC (OPTION_MPTCP_MPC_SYN | OPTION_MPTCP_MPC_SYNACK | \
37 OPTION_MPTCP_MPC_ACK)
38#define OPTIONS_MPTCP_MPJ (OPTION_MPTCP_MPJ_SYN | OPTION_MPTCP_MPJ_SYNACK | \
780aa120 39 OPTION_MPTCP_MPJ_ACK)
74c7dfbe 40
eda7acdd
PK
41/* MPTCP option subtypes */
42#define MPTCPOPT_MP_CAPABLE 0
43#define MPTCPOPT_MP_JOIN 1
44#define MPTCPOPT_DSS 2
45#define MPTCPOPT_ADD_ADDR 3
46#define MPTCPOPT_RM_ADDR 4
47#define MPTCPOPT_MP_PRIO 5
48#define MPTCPOPT_MP_FAIL 6
49#define MPTCPOPT_MP_FASTCLOSE 7
dc87efdb 50#define MPTCPOPT_RST 8
eda7acdd
PK
51
52/* MPTCP suboption lengths */
cc7972ea 53#define TCPOLEN_MPTCP_MPC_SYN 4
eda7acdd
PK
54#define TCPOLEN_MPTCP_MPC_SYNACK 12
55#define TCPOLEN_MPTCP_MPC_ACK 20
cc7972ea 56#define TCPOLEN_MPTCP_MPC_ACK_DATA 22
f296234c
PK
57#define TCPOLEN_MPTCP_MPJ_SYN 12
58#define TCPOLEN_MPTCP_MPJ_SYNACK 16
59#define TCPOLEN_MPTCP_MPJ_ACK 24
6d0060f6 60#define TCPOLEN_MPTCP_DSS_BASE 4
648ef4b8 61#define TCPOLEN_MPTCP_DSS_ACK32 4
6d0060f6 62#define TCPOLEN_MPTCP_DSS_ACK64 8
648ef4b8 63#define TCPOLEN_MPTCP_DSS_MAP32 10
6d0060f6
MM
64#define TCPOLEN_MPTCP_DSS_MAP64 14
65#define TCPOLEN_MPTCP_DSS_CHECKSUM 2
3df523ab 66#define TCPOLEN_MPTCP_ADD_ADDR 16
27ab92d9 67#define TCPOLEN_MPTCP_ADD_ADDR_PORT 18
3df523ab 68#define TCPOLEN_MPTCP_ADD_ADDR_BASE 8
27ab92d9 69#define TCPOLEN_MPTCP_ADD_ADDR_BASE_PORT 10
3df523ab 70#define TCPOLEN_MPTCP_ADD_ADDR6 28
27ab92d9 71#define TCPOLEN_MPTCP_ADD_ADDR6_PORT 30
3df523ab 72#define TCPOLEN_MPTCP_ADD_ADDR6_BASE 20
27ab92d9
DC
73#define TCPOLEN_MPTCP_ADD_ADDR6_BASE_PORT 22
74#define TCPOLEN_MPTCP_PORT_LEN 2
75#define TCPOLEN_MPTCP_PORT_ALIGN 2
6445e17a 76#define TCPOLEN_MPTCP_RM_ADDR_BASE 3
ec99a470
DC
77#define TCPOLEN_MPTCP_PRIO 3
78#define TCPOLEN_MPTCP_PRIO_ALIGN 4
50c504a2 79#define TCPOLEN_MPTCP_FASTCLOSE 12
dc87efdb 80#define TCPOLEN_MPTCP_RST 4
c25aeb4e 81#define TCPOLEN_MPTCP_FAIL 12
eda7acdd 82
208e8f66
GT
83#define TCPOLEN_MPTCP_MPC_ACK_DATA_CSUM (TCPOLEN_MPTCP_DSS_CHECKSUM + TCPOLEN_MPTCP_MPC_ACK_DATA)
84
ec3edaa7 85/* MPTCP MP_JOIN flags */
f296234c 86#define MPTCPOPT_BACKUP BIT(0)
ec3edaa7 87#define MPTCPOPT_THMAC_LEN 8
f296234c 88
eda7acdd
PK
89/* MPTCP MP_CAPABLE flags */
90#define MPTCP_VERSION_MASK (0x0F)
91#define MPTCP_CAP_CHECKSUM_REQD BIT(7)
92#define MPTCP_CAP_EXTENSIBILITY BIT(6)
bab6b88e 93#define MPTCP_CAP_DENY_JOIN_ID0 BIT(5)
65492c5a 94#define MPTCP_CAP_HMAC_SHA256 BIT(0)
bab6b88e 95#define MPTCP_CAP_FLAG_MASK (0x1F)
eda7acdd 96
6d0060f6
MM
97/* MPTCP DSS flags */
98#define MPTCP_DSS_DATA_FIN BIT(4)
99#define MPTCP_DSS_DSN64 BIT(3)
100#define MPTCP_DSS_HAS_MAP BIT(2)
101#define MPTCP_DSS_ACK64 BIT(1)
102#define MPTCP_DSS_HAS_ACK BIT(0)
648ef4b8
MM
103#define MPTCP_DSS_FLAG_MASK (0x1F)
104
3df523ab
PK
105/* MPTCP ADD_ADDR flags */
106#define MPTCP_ADDR_ECHO BIT(0)
3df523ab 107
40453a5c
GT
108/* MPTCP MP_PRIO flags */
109#define MPTCP_PRIO_BKUP BIT(0)
110
dc87efdb
FW
111/* MPTCP TCPRST flags */
112#define MPTCP_RST_TRANSIENT BIT(0)
113
e9d09bac 114/* MPTCP socket atomic flags */
037db6ea
PA
115#define MPTCP_WORK_RTX 1
116#define MPTCP_FALLBACK_DONE 2
117#define MPTCP_WORK_CLOSE_SUBFLOW 3
e9d09bac
PA
118
119/* MPTCP socket release cb flags */
120#define MPTCP_PUSH_PENDING 1
121#define MPTCP_CLEAN_UNA 2
122#define MPTCP_ERROR_REPORT 3
123#define MPTCP_RETRANSMIT 4
124#define MPTCP_FLUSH_JOIN_LIST 5
4fd19a30 125#define MPTCP_SYNC_STATE 6
8005184f 126#define MPTCP_SYNC_SNDBUF 7
bc68b0ef 127#define MPTCP_DEQUEUE 8
6d0060f6 128
dfc8d060
DS
129struct mptcp_skb_cb {
130 u64 map_seq;
131 u64 end_seq;
132 u32 offset;
f03afb3a
PA
133 u8 has_rxtstamp;
134 u8 cant_coalesce;
dfc8d060
DS
135};
136
137#define MPTCP_SKB_CB(__skb) ((struct mptcp_skb_cb *)&((__skb)->cb[0]))
138
eaa2ffab
PA
139static inline bool before64(__u64 seq1, __u64 seq2)
140{
141 return (__s64)(seq1 - seq2) < 0;
142}
143
144#define after64(seq2, seq1) before64(seq1, seq2)
145
cfde141e
PA
146struct mptcp_options_received {
147 u64 sndr_key;
148 u64 rcvr_key;
149 u64 data_ack;
150 u64 data_seq;
151 u32 subflow_seq;
152 u16 data_len;
208e8f66 153 __sum16 csum;
c86b0007
PA
154 struct_group(status,
155 u16 suboptions;
156 u16 use_map:1,
157 dsn64:1,
158 data_fin:1,
159 use_ack:1,
160 ack64:1,
161 mpc_map:1,
162 reset_reason:4,
163 reset_transient:1,
164 echo:1,
165 backup:1,
166 deny_join_id0:1,
167 __unused:2;
168 );
169 u8 join_id;
cfde141e
PA
170 u32 token;
171 u32 nonce;
a086aeba
PA
172 u64 thmac;
173 u8 hmac[MPTCPOPT_HMAC_LEN];
f7dafee1 174 struct mptcp_addr_info addr;
5c4a824d 175 struct mptcp_rm_list rm_list;
cfde141e 176 u64 ahmac;
5580d41b 177 u64 fail_seq;
cfde141e
PA
178};
179
3df523ab
PK
180static inline __be32 mptcp_option(u8 subopt, u8 len, u8 nib, u8 field)
181{
182 return htonl((TCPOPT_MPTCP << 24) | (len << 16) | (subopt << 12) |
183 ((nib & 0xF) << 8) | field);
184}
185
1b1c7a0e
PK
186enum mptcp_pm_status {
187 MPTCP_PM_ADD_ADDR_RECEIVED,
84dfe367 188 MPTCP_PM_ADD_ADDR_SEND_ACK,
d0876b22 189 MPTCP_PM_RM_ADDR_RECEIVED,
1b1c7a0e
PK
190 MPTCP_PM_ESTABLISHED,
191 MPTCP_PM_SUBFLOW_ESTABLISHED,
86e39e04
PA
192 MPTCP_PM_ALREADY_ESTABLISHED, /* persistent status, set after ESTABLISHED event */
193 MPTCP_PM_MPC_ENDPOINT_ACCOUNTED /* persistent status, set after MPC local address is
194 * accounted int id_avail_bitmap
195 */
1b1c7a0e
PK
196};
197
d85a8fde
MM
198enum mptcp_pm_type {
199 MPTCP_PM_TYPE_KERNEL = 0,
200 MPTCP_PM_TYPE_USERSPACE,
201
202 __MPTCP_PM_TYPE_NR,
203 __MPTCP_PM_TYPE_MAX = __MPTCP_PM_TYPE_NR - 1,
204};
205
86e39e04
PA
206/* Status bits below MPTCP_PM_ALREADY_ESTABLISHED need pm worker actions */
207#define MPTCP_PM_WORK_MASK ((1 << MPTCP_PM_ALREADY_ESTABLISHED) - 1)
208
13ad9f01 209enum mptcp_addr_signal_status {
d91d322a
GT
210 MPTCP_ADD_ADDR_SIGNAL,
211 MPTCP_ADD_ADDR_ECHO,
42842a42 212 MPTCP_RM_ADDR_SIGNAL,
d91d322a
GT
213};
214
86e39e04
PA
215/* max value of mptcp_addr_info.id */
216#define MPTCP_PM_MAX_ADDR_ID U8_MAX
217
1b1c7a0e
PK
218struct mptcp_pm_data {
219 struct mptcp_addr_info local;
220 struct mptcp_addr_info remote;
b6c08380 221 struct list_head anno_list;
4638de5a 222 struct list_head userspace_pm_local_addr_list;
1b1c7a0e
PK
223
224 spinlock_t lock; /*protects the whole PM data */
225
eff5b157
GT
226 struct_group(reset,
227
13ad9f01 228 u8 addr_signal;
1b1c7a0e
PK
229 bool server_side;
230 bool work_pending;
231 bool accept_addr;
232 bool accept_subflow;
df377be3 233 bool remote_deny_join_id0;
1b1c7a0e
PK
234 u8 add_addr_signaled;
235 u8 add_addr_accepted;
236 u8 local_addr_used;
d85a8fde 237 u8 pm_type;
1b1c7a0e 238 u8 subflows;
1b1c7a0e 239 u8 status;
eff5b157
GT
240
241 );
242
86e39e04 243 DECLARE_BITMAP(id_avail_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
cbde2787 244 struct mptcp_rm_list rm_list_tx;
b5c55f33 245 struct mptcp_rm_list rm_list_rx;
1b1c7a0e
PK
246};
247
b83fbca1
MBN
248struct mptcp_pm_local {
249 struct mptcp_addr_info addr;
250 u8 flags;
251 int ifindex;
252};
253
4638de5a
KM
254struct mptcp_pm_addr_entry {
255 struct list_head list;
256 struct mptcp_addr_info addr;
257 u8 flags;
258 int ifindex;
259 struct socket *lsk;
260};
261
18b683bf
PA
262struct mptcp_data_frag {
263 struct list_head list;
264 u64 data_seq;
f0e6a4cf
PA
265 u16 data_len;
266 u16 offset;
267 u16 overhead;
268 u16 already_sent;
18b683bf
PA
269 struct page *page;
270};
271
f870fa0b
MM
272/* MPTCP connection sock */
273struct mptcp_sock {
274 /* inet_connection_sock must be the first member */
275 struct inet_connection_sock sk;
1c09d7cb
PA
276 u64 local_key; /* protected by the first subflow socket lock
277 * lockless access read
278 */
279 u64 remote_key; /* same as above */
6d0060f6 280 u64 write_seq;
38967f42 281 u64 bytes_sent;
eaa2ffab 282 u64 snd_nxt;
38967f42 283 u64 bytes_received;
6d0060f6 284 u64 ack_seq;
f3589be0 285 atomic64_t rcv_wnd_sent;
3721b9b6 286 u64 rcv_data_fin_seq;
38967f42 287 u64 bytes_retrans;
5684ab1a 288 u64 bytes_consumed;
d5f49190 289 int snd_burst;
ea4ca586 290 int old_wspace;
1e1d9d6f
PA
291 u64 recovery_snd_nxt; /* in recovery mode accept up to this seq;
292 * recovery related fields are under data_lock
293 * protection
294 */
38967f42 295 u64 bytes_acked;
7439d687
PA
296 u64 snd_una;
297 u64 wnd_end;
18d82cde
GT
298 u32 last_data_sent;
299 u32 last_data_recv;
300 u32 last_ack_recv;
b51f9b80 301 unsigned long timer_ival;
79c0949e 302 u32 token;
648ef4b8 303 unsigned long flags;
e9d09bac 304 unsigned long cb_flags;
1e1d9d6f 305 bool recovery; /* closing subflow write queue reinjected */
d22f4988 306 bool can_ack;
b93df08c 307 bool fully_established;
3721b9b6 308 bool rcv_data_fin;
7279da61 309 bool snd_data_fin_enable;
50c504a2 310 bool rcv_fastclose;
37198e93 311 bool use_64bit_ack; /* Set when we received a 64-bit DSN */
752e9067 312 bool csum_enabled;
0530020a 313 bool allow_infinite_fallback;
4fd19a30
PA
314 u8 pending_state; /* A subflow asked to set this sk_state,
315 * protected by the msk data lock
316 */
3ad14f54 317 u8 mpc_endpoint_id;
4f6e14bd
MG
318 u8 recvmsg_inq:1,
319 cork:1,
54f1944e 320 nodelay:1,
b6985b9b 321 fastopening:1,
39880bd8 322 in_accept_queue:1,
013e3179
PA
323 free_first:1,
324 rcvspace_init:1;
29b5e5ef 325 u32 notsent_lowat;
bd11dc4f
MBN
326 int keepalive_cnt;
327 int keepalive_idle;
328 int keepalive_intvl;
80992017 329 struct work_struct work;
ab174ad8
PA
330 struct sk_buff *ooo_last_skb;
331 struct rb_root out_of_order_queue;
cec37a6e 332 struct list_head conn_list;
18b683bf 333 struct list_head rtx_queue;
f0e6a4cf 334 struct mptcp_data_frag *first_pending;
ec3edaa7 335 struct list_head join_list;
39880bd8
PA
336 struct sock *first; /* The mptcp ops can safely dereference, using suitable
337 * ONCE annotation, the subflow outside the socket
338 * lock as such sock is freed after close().
339 */
1b1c7a0e 340 struct mptcp_pm_data pm;
1730b2b2 341 struct mptcp_sched_ops *sched;
a6b118fe
FW
342 struct {
343 u32 space; /* bytes copied in last measurement window */
344 u32 copied; /* bytes copied in this measurement window */
345 u64 time; /* start time of measurement window */
346 u64 rtt_us; /* last maximum rtt of subflows */
347 } rcvq_space;
b8dc6d6c 348 u8 scaling_ratio;
df00b087 349
6f06b4d4
PA
350 u32 subflow_id;
351 u32 setsockopt_seq;
20b5759f 352 char ca_name[TCP_CA_NAME_MAX];
f870fa0b
MM
353};
354
87952603
PA
355#define mptcp_data_lock(sk) spin_lock_bh(&(sk)->sk_lock.slock)
356#define mptcp_data_unlock(sk) spin_unlock_bh(&(sk)->sk_lock.slock)
357
cec37a6e
PK
358#define mptcp_for_each_subflow(__msk, __subflow) \
359 list_for_each_entry(__subflow, &((__msk)->conn_list), node)
5efbf6f7
MB
360#define mptcp_for_each_subflow_safe(__msk, __subflow, __tmp) \
361 list_for_each_entry_safe(__subflow, __tmp, &((__msk)->conn_list), node)
e0ca4057
PA
362#define mptcp_next_subflow(__msk, __subflow) \
363 list_next_entry_circular(__subflow, &((__msk)->conn_list), node)
cec37a6e 364
34ca91e1
GT
365extern struct genl_family mptcp_genl_family;
366
3abc05d9
FW
367static inline void msk_owned_by_me(const struct mptcp_sock *msk)
368{
369 sock_owned_by_me((const struct sock *)msk);
370}
371
dcc03f27
MBN
372#ifdef CONFIG_DEBUG_NET
373/* MPTCP-specific: we might (indirectly) call this helper with the wrong sk */
374#undef tcp_sk
375#define tcp_sk(ptr) ({ \
376 typeof(ptr) _ptr = (ptr); \
377 WARN_ON(_ptr->sk_protocol != IPPROTO_TCP); \
378 container_of_const(_ptr, struct tcp_sock, inet_conn.icsk_inet.sk); \
379})
14d29ec5
MBN
380#define mptcp_sk(ptr) ({ \
381 typeof(ptr) _ptr = (ptr); \
382 WARN_ON(_ptr->sk_protocol != IPPROTO_MPTCP); \
383 container_of_const(_ptr, struct mptcp_sock, sk.icsk_inet.sk); \
384})
dcc03f27 385
14d29ec5 386#else /* !CONFIG_DEBUG_NET */
403a40f2 387#define mptcp_sk(ptr) container_of_const(ptr, struct mptcp_sock, sk.icsk_inet.sk)
14d29ec5 388#endif
f870fa0b 389
b8dc6d6c
PA
390static inline int mptcp_win_from_space(const struct sock *sk, int space)
391{
392 return __tcp_win_from_space(mptcp_sk(sk)->scaling_ratio, space);
393}
394
5cdedad6
GT
395static inline int mptcp_space_from_win(const struct sock *sk, int win)
396{
397 return __tcp_space_from_win(mptcp_sk(sk)->scaling_ratio, win);
398}
399
ea4ca586
PA
400static inline int __mptcp_space(const struct sock *sk)
401{
51fe9cb9
PA
402 return mptcp_win_from_space(sk, READ_ONCE(sk->sk_rcvbuf) -
403 sk_rmem_alloc_get(sk));
ea4ca586
PA
404}
405
f0e6a4cf
PA
406static inline struct mptcp_data_frag *mptcp_send_head(const struct sock *sk)
407{
408 const struct mptcp_sock *msk = mptcp_sk(sk);
409
410 return READ_ONCE(msk->first_pending);
411}
412
413static inline struct mptcp_data_frag *mptcp_send_next(struct sock *sk)
414{
415 struct mptcp_sock *msk = mptcp_sk(sk);
416 struct mptcp_data_frag *cur;
417
418 cur = msk->first_pending;
419 return list_is_last(&cur->list, &msk->rtx_queue) ? NULL :
420 list_next_entry(cur, list);
421}
422
423static inline struct mptcp_data_frag *mptcp_pending_tail(const struct sock *sk)
424{
403a40f2 425 const struct mptcp_sock *msk = mptcp_sk(sk);
f0e6a4cf
PA
426
427 if (!msk->first_pending)
428 return NULL;
429
430 if (WARN_ON_ONCE(list_empty(&msk->rtx_queue)))
431 return NULL;
432
433 return list_last_entry(&msk->rtx_queue, struct mptcp_data_frag, list);
434}
435
403a40f2 436static inline struct mptcp_data_frag *mptcp_rtx_head(struct sock *sk)
18b683bf
PA
437{
438 struct mptcp_sock *msk = mptcp_sk(sk);
439
d440a4e2 440 if (msk->snd_una == msk->snd_nxt)
18b683bf
PA
441 return NULL;
442
a386bc5b 443 return list_first_entry_or_null(&msk->rtx_queue, struct mptcp_data_frag, list);
7948f6cc
FW
444}
445
d0cc2987
GT
446struct csum_pseudo_header {
447 __be64 data_seq;
448 __be32 subflow_seq;
449 __be16 data_len;
450 __sum16 csum;
451};
452
cec37a6e
PK
453struct mptcp_subflow_request_sock {
454 struct tcp_request_sock sk;
d22f4988 455 u16 mp_capable : 1,
cec37a6e 456 mp_join : 1,
06fe1719 457 backup : 1,
efd340bf 458 request_bkup : 1,
bab6b88e
GT
459 csum_reqd : 1,
460 allow_join_id0 : 1;
1b1c7a0e 461 u8 local_id;
f296234c 462 u8 remote_id;
cec37a6e 463 u64 local_key;
79c0949e
PK
464 u64 idsn;
465 u32 token;
648ef4b8 466 u32 ssn_offset;
f296234c
PK
467 u64 thmac;
468 u32 local_nonce;
469 u32 remote_nonce;
8fd4de12 470 struct mptcp_sock *msk;
2c5ebd00 471 struct hlist_nulls_node token_node;
cec37a6e
PK
472};
473
474static inline struct mptcp_subflow_request_sock *
475mptcp_subflow_rsk(const struct request_sock *rsk)
476{
477 return (struct mptcp_subflow_request_sock *)rsk;
478}
479
b19bc294
PA
480struct mptcp_delegated_action {
481 struct napi_struct napi;
82d9e6b9 482 local_lock_t bh_lock;
b19bc294
PA
483 struct list_head head;
484};
485
486DECLARE_PER_CPU(struct mptcp_delegated_action, mptcp_delegated_actions);
487
a5efdbce
PA
488#define MPTCP_DELEGATE_SCHEDULED 0
489#define MPTCP_DELEGATE_SEND 1
490#define MPTCP_DELEGATE_ACK 2
8005184f 491#define MPTCP_DELEGATE_SNDBUF 3
b19bc294 492
a5efdbce 493#define MPTCP_DELEGATE_ACTIONS_MASK (~BIT(MPTCP_DELEGATE_SCHEDULED))
2303f994
PK
494/* MPTCP subflow context */
495struct mptcp_subflow_context {
cec37a6e 496 struct list_head node;/* conn_list of subflows */
b29fcfb5 497
63ec72bd 498 struct_group(reset,
b29fcfb5 499
3ce0852c 500 unsigned long avg_pacing_rate; /* protected by msk socket lock */
cec37a6e
PK
501 u64 local_key;
502 u64 remote_key;
79c0949e 503 u64 idsn;
648ef4b8 504 u64 map_seq;
cc7972ea 505 u32 snd_isn;
79c0949e 506 u32 token;
6d0060f6 507 u32 rel_write_seq;
648ef4b8
MM
508 u32 map_subflow_seq;
509 u32 ssn_offset;
510 u32 map_data_len;
dd8bcd17
PA
511 __wsum map_data_csum;
512 u32 map_csum_len;
cec37a6e 513 u32 request_mptcp : 1, /* send MP_CAPABLE */
ec3edaa7
PK
514 request_join : 1, /* send MP_JOIN */
515 request_bkup : 1,
cec37a6e 516 mp_capable : 1, /* remote is MPTCP capable */
f296234c 517 mp_join : 1, /* remote is JOINing */
f296234c 518 pm_notified : 1, /* PM hook called for established status */
648ef4b8
MM
519 conn_finished : 1,
520 map_valid : 1,
dd8bcd17
PA
521 map_csum_reqd : 1,
522 map_data_fin : 1,
d22f4988 523 mpc_map : 1,
f296234c 524 backup : 1,
06706542 525 send_mp_prio : 1,
c25aeb4e 526 send_mp_fail : 1,
f284c0c7 527 send_fastclose : 1,
1e39e5a3 528 send_infinite_map : 1,
b3ea6b27 529 remote_key_valid : 1, /* received the peer key from */
ff5a0b42 530 disposable : 1, /* ctx can be free at ulp release time */
4cf86ae8 531 stale : 1, /* unable to snd/rcv data, do not use for xmit */
dfc8d060
DS
532 valid_csum_seen : 1, /* at least one csum validated */
533 is_mptfo : 1, /* subflow is doing TFO */
d82809b6 534 close_event_done : 1, /* has done the post-closed part */
27069e7c 535 mpc_drop : 1, /* the MPC option has been dropped in a rtx */
581c8cbf 536 __unused : 9;
f1f26512 537 bool data_avail;
fce68b03 538 bool scheduled;
3d041393 539 bool pm_listener; /* a listener managed by the kernel PM? */
581c8cbf 540 bool fully_established; /* path validated */
f296234c
PK
541 u32 remote_nonce;
542 u64 thmac;
543 u32 local_nonce;
ec3edaa7 544 u32 remote_token;
b3ea6b27
PA
545 union {
546 u8 hmac[MPTCPOPT_HMAC_LEN]; /* MPJ subflow only */
547 u64 iasn; /* initial ack sequence number, MPC subflows only */
548 };
a7cfe776 549 s16 local_id; /* if negative not initialized yet */
f296234c 550 u8 remote_id;
dc87efdb
FW
551 u8 reset_seen:1;
552 u8 reset_transient:1;
553 u8 reset_reason:4;
71b7dec2 554 u8 stale_count;
648ef4b8 555
6f06b4d4
PA
556 u32 subflow_id;
557
b19bc294 558 long delegated_status;
76a13b31 559 unsigned long fail_tout;
b29fcfb5 560
63ec72bd 561 );
b29fcfb5 562
b19bc294
PA
563 struct list_head delegated_node; /* link into delegated_action, protected by local BH */
564
71b7dec2
PA
565 u32 setsockopt_seq;
566 u32 stale_rcv_tstamp;
8005184f
PA
567 int cached_sndbuf; /* sndbuf size when last synced with the msk sndbuf,
568 * protected by the msk socket lock
569 */
df00b087 570
2303f994
PK
571 struct sock *tcp_sock; /* tcp sk backpointer */
572 struct sock *conn; /* parent mptcp_sock */
cec37a6e 573 const struct inet_connection_sock_af_ops *icsk_af_ops;
648ef4b8 574 void (*tcp_state_change)(struct sock *sk);
15cc1045 575 void (*tcp_error_report)(struct sock *sk);
648ef4b8 576
2303f994
PK
577 struct rcu_head rcu;
578};
579
580static inline struct mptcp_subflow_context *
581mptcp_subflow_ctx(const struct sock *sk)
582{
58169ec9 583 const struct inet_connection_sock *icsk = inet_csk(sk);
2303f994
PK
584
585 /* Use RCU on icsk_ulp_data only for sock diag code */
586 return (__force struct mptcp_subflow_context *)icsk->icsk_ulp_data;
587}
588
589static inline struct sock *
590mptcp_subflow_tcp_sock(const struct mptcp_subflow_context *subflow)
591{
592 return subflow->tcp_sock;
593}
594
b29fcfb5
PA
595static inline void
596mptcp_subflow_ctx_reset(struct mptcp_subflow_context *subflow)
597{
63ec72bd 598 memset(&subflow->reset, 0, sizeof(subflow->reset));
b29fcfb5 599 subflow->request_mptcp = 1;
a7cfe776 600 WRITE_ONCE(subflow->local_id, -1);
b29fcfb5
PA
601}
602
3e140491
JX
603/* Convert reset reasons in MPTCP to enum sk_rst_reason type */
604static inline enum sk_rst_reason
605sk_rst_convert_mptcp_reason(u32 reason)
606{
607 switch (reason) {
608 case MPTCP_RST_EUNSPEC:
609 return SK_RST_REASON_MPTCP_RST_EUNSPEC;
610 case MPTCP_RST_EMPTCP:
611 return SK_RST_REASON_MPTCP_RST_EMPTCP;
612 case MPTCP_RST_ERESOURCE:
613 return SK_RST_REASON_MPTCP_RST_ERESOURCE;
614 case MPTCP_RST_EPROHIBIT:
615 return SK_RST_REASON_MPTCP_RST_EPROHIBIT;
616 case MPTCP_RST_EWQ2BIG:
617 return SK_RST_REASON_MPTCP_RST_EWQ2BIG;
618 case MPTCP_RST_EBADPERF:
619 return SK_RST_REASON_MPTCP_RST_EBADPERF;
620 case MPTCP_RST_EMIDDLEBOX:
621 return SK_RST_REASON_MPTCP_RST_EMIDDLEBOX;
622 default:
623 /* It should not happen, or else errors may occur
624 * in MPTCP layer
625 */
626 return SK_RST_REASON_ERROR;
627 }
628}
629
215d4024
JX
630static inline void
631mptcp_send_active_reset_reason(struct sock *sk)
632{
633 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk);
634 enum sk_rst_reason reason;
635
636 reason = sk_rst_convert_mptcp_reason(subflow->reset_reason);
637 tcp_send_active_reset(sk, GFP_ATOMIC, reason);
638}
639
648ef4b8
MM
640static inline u64
641mptcp_subflow_get_map_offset(const struct mptcp_subflow_context *subflow)
642{
643 return tcp_sk(mptcp_subflow_tcp_sock(subflow))->copied_seq -
644 subflow->ssn_offset -
645 subflow->map_subflow_seq;
646}
647
648static inline u64
649mptcp_subflow_get_mapped_dsn(const struct mptcp_subflow_context *subflow)
650{
651 return subflow->map_seq + mptcp_subflow_get_map_offset(subflow);
652}
653
a5efdbce 654void mptcp_subflow_process_delegated(struct sock *ssk, long actions);
b19bc294 655
bcd97734 656static inline void mptcp_subflow_delegate(struct mptcp_subflow_context *subflow, int action)
b19bc294 657{
a5efdbce 658 long old, set_bits = BIT(MPTCP_DELEGATE_SCHEDULED) | BIT(action);
b19bc294
PA
659 struct mptcp_delegated_action *delegated;
660 bool schedule;
661
bcd97734
PA
662 /* the caller held the subflow bh socket lock */
663 lockdep_assert_in_softirq();
664
a5efdbce
PA
665 /* The implied barrier pairs with tcp_release_cb_override()
666 * mptcp_napi_poll(), and ensures the below list check sees list
667 * updates done prior to delegated status bits changes
b19bc294 668 */
a5efdbce
PA
669 old = set_mask_bits(&subflow->delegated_status, 0, set_bits);
670 if (!(old & BIT(MPTCP_DELEGATE_SCHEDULED))) {
671 if (WARN_ON_ONCE(!list_empty(&subflow->delegated_node)))
b19bc294
PA
672 return;
673
82d9e6b9 674 local_lock_nested_bh(&mptcp_delegated_actions.bh_lock);
b19bc294
PA
675 delegated = this_cpu_ptr(&mptcp_delegated_actions);
676 schedule = list_empty(&delegated->head);
677 list_add_tail(&subflow->delegated_node, &delegated->head);
82d9e6b9 678 local_unlock_nested_bh(&mptcp_delegated_actions.bh_lock);
b19bc294
PA
679 sock_hold(mptcp_subflow_tcp_sock(subflow));
680 if (schedule)
681 napi_schedule(&delegated->napi);
682 }
683}
684
685static inline struct mptcp_subflow_context *
686mptcp_subflow_delegated_next(struct mptcp_delegated_action *delegated)
687{
688 struct mptcp_subflow_context *ret;
689
82d9e6b9
SAS
690 local_lock_nested_bh(&mptcp_delegated_actions.bh_lock);
691 if (list_empty(&delegated->head)) {
692 local_unlock_nested_bh(&mptcp_delegated_actions.bh_lock);
b19bc294 693 return NULL;
82d9e6b9 694 }
b19bc294
PA
695
696 ret = list_first_entry(&delegated->head, struct mptcp_subflow_context, delegated_node);
697 list_del_init(&ret->delegated_node);
82d9e6b9 698 local_unlock_nested_bh(&mptcp_delegated_actions.bh_lock);
b19bc294
PA
699 return ret;
700}
701
6da14d74
PA
702int mptcp_is_enabled(const struct net *net);
703unsigned int mptcp_get_add_addr_timeout(const struct net *net);
704int mptcp_is_checksum_enabled(const struct net *net);
705int mptcp_allow_join_id0(const struct net *net);
ff5a0b42 706unsigned int mptcp_stale_loss_cnt(const struct net *net);
d866ae9a 707unsigned int mptcp_close_timeout(const struct sock *sk);
6bb63ccc 708int mptcp_get_pm_type(const struct net *net);
595c26d1 709const char *mptcp_get_path_manager(const struct net *net);
e3b2870b 710const char *mptcp_get_scheduler(const struct net *net);
27069e7c
MBN
711
712void mptcp_active_disable(struct sock *sk);
713bool mptcp_active_should_disable(struct sock *ssk);
714void mptcp_active_enable(struct sock *sk);
715
73c900aa 716void mptcp_get_available_schedulers(char *buf, size_t maxlen);
e4a0fa47
PA
717void __mptcp_subflow_fully_established(struct mptcp_sock *msk,
718 struct mptcp_subflow_context *subflow,
719 const struct mptcp_options_received *mp_opt);
1e1d9d6f 720bool __mptcp_retransmit_pending_data(struct sock *sk);
8b38217a 721void mptcp_check_and_set_pending(struct sock *sk);
ff5a0b42 722void __mptcp_push_pending(struct sock *sk, unsigned int flags);
648ef4b8 723bool mptcp_subflow_data_available(struct sock *sk);
d39dceca 724void __init mptcp_subflow_init(void);
d0876b22 725void mptcp_subflow_shutdown(struct sock *sk, struct sock *ssk, int how);
a141e02e
FW
726void mptcp_close_ssk(struct sock *sk, struct sock *ssk,
727 struct mptcp_subflow_context *subflow);
a6574302 728void __mptcp_subflow_send_ack(struct sock *ssk);
d5824847 729void mptcp_subflow_reset(struct sock *ssk);
2a6a870e 730void mptcp_subflow_queue_clean(struct sock *sk, struct sock *ssk);
866f26f2 731void mptcp_sock_graft(struct sock *sk, struct socket *parent);
3f326a82 732struct sock *__mptcp_nmpc_sk(struct mptcp_sock *msk);
26d3e21c 733bool __mptcp_close(struct sock *sk, long timeout);
30e51b92 734void mptcp_cancel_work(struct sock *sk);
63740448 735void __mptcp_unaccepted_force_close(struct sock *sk);
d9cd27b8 736void mptcp_set_state(struct sock *sk, int state);
ec3edaa7 737
4638de5a
KM
738bool mptcp_addresses_equal(const struct mptcp_addr_info *a,
739 const struct mptcp_addr_info *b, bool use_port);
a1467312
MBN
740void mptcp_local_address(const struct sock_common *skc,
741 struct mptcp_addr_info *addr);
742void mptcp_remote_address(const struct sock_common *skc,
743 struct mptcp_addr_info *addr);
4638de5a 744
ec3edaa7 745/* called with sk socket lock held */
b83fbca1 746int __mptcp_subflow_connect(struct sock *sk, const struct mptcp_pm_local *local,
ee285257 747 const struct mptcp_addr_info *remote);
6bc1fe7d
PA
748int mptcp_subflow_create_socket(struct sock *sk, unsigned short family,
749 struct socket **new_sock);
1729cf18
GT
750void mptcp_info2sockaddr(const struct mptcp_addr_info *info,
751 struct sockaddr_storage *addr,
752 unsigned short family);
740ebe35 753struct mptcp_sched_ops *mptcp_sched_find(const char *name);
760ff076 754int mptcp_validate_scheduler(struct mptcp_sched_ops *sched);
740ebe35
GT
755int mptcp_register_scheduler(struct mptcp_sched_ops *sched);
756void mptcp_unregister_scheduler(struct mptcp_sched_ops *sched);
ed1ad86b 757void mptcp_sched_init(void);
1730b2b2
GT
758int mptcp_init_sched(struct mptcp_sock *msk,
759 struct mptcp_sched_ops *sched);
760void mptcp_release_sched(struct mptcp_sock *msk);
fce68b03
GT
761void mptcp_subflow_set_scheduled(struct mptcp_subflow_context *subflow,
762 bool scheduled);
07336a87
GT
763struct sock *mptcp_subflow_get_send(struct mptcp_sock *msk);
764struct sock *mptcp_subflow_get_retrans(struct mptcp_sock *msk);
765int mptcp_sched_get_send(struct mptcp_sock *msk);
766int mptcp_sched_get_retrans(struct mptcp_sock *msk);
2303f994 767
5684ab1a
PA
768static inline u64 mptcp_data_avail(const struct mptcp_sock *msk)
769{
770 return READ_ONCE(msk->bytes_received) - READ_ONCE(msk->bytes_consumed);
771}
772
773static inline bool mptcp_epollin_ready(const struct sock *sk)
774{
e226d925
PA
775 u64 data_avail = mptcp_data_avail(mptcp_sk(sk));
776
777 if (!data_avail)
778 return false;
779
5684ab1a 780 /* mptcp doesn't have to deal with small skbs in the receive queue,
e226d925 781 * as it can always coalesce them
5684ab1a 782 */
e226d925 783 return (data_avail >= sk->sk_rcvlowat) ||
5684ab1a
PA
784 (mem_cgroup_sockets_enabled && sk->sk_memcg &&
785 mem_cgroup_under_socket_pressure(sk->sk_memcg)) ||
786 READ_ONCE(tcp_memory_pressure);
787}
788
789int mptcp_set_rcvlowat(struct sock *sk, int val);
790
c886d702 791static inline bool __tcp_can_send(const struct sock *ssk)
43f1140b 792{
c886d702
PA
793 /* only send if our side has not closed yet */
794 return ((1 << inet_sk_state_load(ssk)) & (TCPF_ESTABLISHED | TCPF_CLOSE_WAIT));
795}
43f1140b 796
c886d702
PA
797static inline bool __mptcp_subflow_active(struct mptcp_subflow_context *subflow)
798{
43f1140b 799 /* can't send if JOIN hasn't completed yet (i.e. is usable for mptcp) */
581c8cbf 800 if (subflow->request_join && !READ_ONCE(subflow->fully_established))
43f1140b
GT
801 return false;
802
c886d702 803 return __tcp_can_send(mptcp_subflow_tcp_sock(subflow));
43f1140b
GT
804}
805
ff5a0b42
PA
806void mptcp_subflow_set_active(struct mptcp_subflow_context *subflow);
807
808bool mptcp_subflow_active(struct mptcp_subflow_context *subflow);
809
b6985b9b
PA
810void mptcp_subflow_drop_ctx(struct sock *ssk);
811
648ef4b8
MM
812static inline void mptcp_subflow_tcp_fallback(struct sock *sk,
813 struct mptcp_subflow_context *ctx)
814{
952382c6 815 sk->sk_data_ready = sock_def_readable;
648ef4b8 816 sk->sk_state_change = ctx->tcp_state_change;
952382c6 817 sk->sk_write_space = sk_stream_write_space;
15cc1045 818 sk->sk_error_report = ctx->tcp_error_report;
648ef4b8
MM
819
820 inet_csk(sk)->icsk_af_ops = ctx->icsk_af_ops;
821}
822
d39dceca 823void __init mptcp_proto_init(void);
784325e9 824#if IS_ENABLED(CONFIG_MPTCP_IPV6)
d39dceca 825int __init mptcp_proto_v6_init(void);
784325e9 826#endif
648ef4b8 827
7e8b88ec
PA
828struct sock *mptcp_sk_clone_init(const struct sock *sk,
829 const struct mptcp_options_received *mp_opt,
830 struct sock *ssk,
831 struct request_sock *req);
0799e21b 832void mptcp_get_options(const struct sk_buff *skb,
cfde141e 833 struct mptcp_options_received *mp_opt);
cec37a6e
PK
834
835void mptcp_finish_connect(struct sock *sk);
4fd19a30 836void __mptcp_sync_state(struct sock *sk, int state);
f6909dc1 837void mptcp_reset_tout_timer(struct mptcp_sock *msk, unsigned long fail_tout);
27e5ccc2
PA
838
839static inline void mptcp_stop_tout_timer(struct sock *sk)
840{
841 if (!inet_csk(sk)->icsk_mtup.probe_timestamp)
842 return;
843
844 sk_stop_timer(sk, &sk->sk_timer);
845 inet_csk(sk)->icsk_mtup.probe_timestamp = 0;
846}
847
848static inline void mptcp_set_close_tout(struct sock *sk, unsigned long tout)
849{
850 /* avoid 0 timestamp, as that means no close timeout */
851 inet_csk(sk)->icsk_mtup.probe_timestamp = tout ? : 1;
852}
853
854static inline void mptcp_start_tout_timer(struct sock *sk)
855{
856 mptcp_set_close_tout(sk, tcp_jiffies32);
857 mptcp_reset_tout_timer(mptcp_sk(sk), 0);
858}
859
b93df08c
PA
860static inline bool mptcp_is_fully_established(struct sock *sk)
861{
862 return inet_sk_state_load(sk) == TCP_ESTABLISHED &&
863 READ_ONCE(mptcp_sk(sk)->fully_established);
864}
5684ab1a 865
a6b118fe 866void mptcp_rcv_space_init(struct mptcp_sock *msk, const struct sock *ssk);
2e52213c 867void mptcp_data_ready(struct sock *sk, struct sock *ssk);
f296234c 868bool mptcp_finish_join(struct sock *sk);
ba8f48f7 869bool mptcp_schedule_work(struct sock *sk);
0abdde82
PA
870int mptcp_setsockopt(struct sock *sk, int level, int optname,
871 sockptr_t optval, unsigned int optlen);
872int mptcp_getsockopt(struct sock *sk, int level, int optname,
873 char __user *optval, int __user *option);
874
1502328f
PA
875u64 __mptcp_expand_seq(u64 old_seq, u64 cur_seq);
876static inline u64 mptcp_expand_seq(u64 old_seq, u64 cur_seq, bool use_64bit)
877{
878 if (use_64bit)
879 return cur_seq;
880
881 return __mptcp_expand_seq(old_seq, cur_seq);
882}
219d0499 883void __mptcp_check_push(struct sock *sk, struct sock *ssk);
7439d687 884void __mptcp_data_acked(struct sock *sk);
15cc1045 885void __mptcp_error_report(struct sock *sk);
1a49b2c2 886bool mptcp_update_rcv_data_fin(struct mptcp_sock *msk, u64 data_fin_seq, bool use_64bit);
e16163b6
PA
887static inline bool mptcp_data_fin_enabled(const struct mptcp_sock *msk)
888{
889 return READ_ONCE(msk->snd_data_fin_enable) &&
890 READ_ONCE(msk->write_seq) == READ_ONCE(msk->snd_nxt);
891}
892
29b5e5ef
PA
893static inline u32 mptcp_notsent_lowat(const struct sock *sk)
894{
895 struct net *net = sock_net(sk);
896 u32 val;
897
898 val = READ_ONCE(mptcp_sk(sk)->notsent_lowat);
899 return val ?: READ_ONCE(net->ipv4.sysctl_tcp_notsent_lowat);
900}
901
902static inline bool mptcp_stream_memory_free(const struct sock *sk, int wake)
903{
904 const struct mptcp_sock *msk = mptcp_sk(sk);
905 u32 notsent_bytes;
906
907 notsent_bytes = READ_ONCE(msk->write_seq) - READ_ONCE(msk->snd_nxt);
908 return (notsent_bytes << wake) < mptcp_notsent_lowat(sk);
909}
910
911static inline bool __mptcp_stream_is_writeable(const struct sock *sk, int wake)
912{
913 return mptcp_stream_memory_free(sk, wake) &&
914 __sk_stream_is_writeable(sk, wake);
915}
916
b111d8fb
PA
917static inline void mptcp_write_space(struct sock *sk)
918{
037db6ea
PA
919 /* pairs with memory barrier in mptcp_poll */
920 smp_mb();
29b5e5ef
PA
921 if (mptcp_stream_memory_free(sk, 1))
922 sk_stream_write_space(sk);
b111d8fb
PA
923}
924
8005184f 925static inline void __mptcp_sync_sndbuf(struct sock *sk)
5cf92bba 926{
8005184f
PA
927 struct mptcp_subflow_context *subflow;
928 int ssk_sndbuf, new_sndbuf;
929
930 if (sk->sk_userlocks & SOCK_SNDBUF_LOCK)
931 return;
932
9eb430d4 933 new_sndbuf = READ_ONCE(sock_net(sk)->ipv4.sysctl_tcp_wmem[0]);
8005184f
PA
934 mptcp_for_each_subflow(mptcp_sk(sk), subflow) {
935 ssk_sndbuf = READ_ONCE(mptcp_subflow_tcp_sock(subflow)->sk_sndbuf);
936
937 subflow->cached_sndbuf = ssk_sndbuf;
938 new_sndbuf += ssk_sndbuf;
939 }
940
941 /* the msk max wmem limit is <nr_subflows> * tcp wmem[2] */
942 WRITE_ONCE(sk->sk_sndbuf, new_sndbuf);
b111d8fb 943 mptcp_write_space(sk);
8005184f
PA
944}
945
946/* The called held both the msk socket and the subflow socket locks,
947 * possibly under BH
948 */
949static inline void __mptcp_propagate_sndbuf(struct sock *sk, struct sock *ssk)
950{
951 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
952
953 if (READ_ONCE(ssk->sk_sndbuf) != subflow->cached_sndbuf)
954 __mptcp_sync_sndbuf(sk);
955}
956
957/* the caller held only the subflow socket lock, either in process or
958 * BH context. Additionally this can be called under the msk data lock,
959 * so we can't acquire such lock here: let the delegate action acquires
960 * the needed locks in suitable order.
961 */
962static inline void mptcp_propagate_sndbuf(struct sock *sk, struct sock *ssk)
963{
964 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
965
966 if (likely(READ_ONCE(ssk->sk_sndbuf) == subflow->cached_sndbuf))
967 return;
5cf92bba 968
8005184f
PA
969 local_bh_disable();
970 mptcp_subflow_delegate(subflow, MPTCP_DELEGATE_SNDBUF);
971 local_bh_enable();
5cf92bba
PA
972}
973
c0bf3c6a 974void mptcp_destroy_common(struct mptcp_sock *msk, unsigned int flags);
cec37a6e 975
c68a0cd1
JW
976#define MPTCP_TOKEN_MAX_RETRIES 4
977
2c5ebd00
PA
978void __init mptcp_token_init(void);
979static inline void mptcp_token_init_request(struct request_sock *req)
980{
981 mptcp_subflow_rsk(req)->token_node.pprev = NULL;
982}
983
79c0949e 984int mptcp_token_new_request(struct request_sock *req);
2c5ebd00 985void mptcp_token_destroy_request(struct request_sock *req);
294de909 986int mptcp_token_new_connect(struct sock *ssk);
2c5ebd00
PA
987void mptcp_token_accept(struct mptcp_subflow_request_sock *r,
988 struct mptcp_sock *msk);
c83a47e5 989bool mptcp_token_exists(u32 token);
ea1300b9 990struct mptcp_sock *mptcp_token_get_sock(struct net *net, u32 token);
96d890da
PA
991struct mptcp_sock *mptcp_token_iter_next(const struct net *net, long *s_slot,
992 long *s_num);
2c5ebd00 993void mptcp_token_destroy(struct mptcp_sock *msk);
79c0949e
PK
994
995void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn);
79c0949e 996
3df523ab 997void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
ba2c89e0 998__sum16 __mptcp_make_csum(u64 data_seq, u32 subflow_seq, u16 data_len, __wsum sum);
79c0949e 999
d39dceca 1000void __init mptcp_pm_init(void);
1b1c7a0e 1001void mptcp_pm_data_init(struct mptcp_sock *msk);
b29fcfb5 1002void mptcp_pm_data_reset(struct mptcp_sock *msk);
a17336b2 1003void mptcp_pm_destroy(struct mptcp_sock *msk);
702c2f64
FW
1004int mptcp_pm_parse_addr(struct nlattr *attr, struct genl_info *info,
1005 struct mptcp_addr_info *addr);
9ab4807c
KM
1006int mptcp_pm_parse_entry(struct nlattr *attr, struct genl_info *info,
1007 bool require_family,
1008 struct mptcp_pm_addr_entry *entry);
fb00ee4f
MB
1009bool mptcp_pm_addr_families_match(const struct sock *sk,
1010 const struct mptcp_addr_info *loc,
1011 const struct mptcp_addr_info *rem);
71b7dec2 1012void mptcp_pm_subflow_chk_stale(const struct mptcp_sock *msk, struct sock *ssk);
6c714f1b 1013void mptcp_pm_new_connection(struct mptcp_sock *msk, const struct sock *ssk, int server_side);
7a486c44 1014void mptcp_pm_fully_established(struct mptcp_sock *msk, const struct sock *ssk);
1b1c7a0e
PK
1015bool mptcp_pm_allow_new_subflow(struct mptcp_sock *msk);
1016void mptcp_pm_connection_closed(struct mptcp_sock *msk);
62535200 1017void mptcp_pm_subflow_established(struct mptcp_sock *msk);
a88c9e49 1018bool mptcp_pm_nl_check_work_pending(struct mptcp_sock *msk);
74cbb0c6 1019void mptcp_pm_subflow_check_next(struct mptcp_sock *msk,
a88c9e49 1020 const struct mptcp_subflow_context *subflow);
d1ace2d9 1021void mptcp_pm_add_addr_received(const struct sock *ssk,
1b1c7a0e 1022 const struct mptcp_addr_info *addr);
557963c3 1023void mptcp_pm_add_addr_echoed(struct mptcp_sock *msk,
90d93088 1024 const struct mptcp_addr_info *addr);
84dfe367 1025void mptcp_pm_add_addr_send_ack(struct mptcp_sock *msk);
e4c28e3d
MBN
1026void mptcp_pm_send_ack(struct mptcp_sock *msk,
1027 struct mptcp_subflow_context *subflow,
1028 bool prio, bool backup);
fac7a6dd 1029void mptcp_pm_addr_send_ack(struct mptcp_sock *msk);
e4c28e3d
MBN
1030void mptcp_pm_nl_rm_addr(struct mptcp_sock *msk, u8 rm_id);
1031void mptcp_pm_rm_subflow(struct mptcp_sock *msk,
1032 const struct mptcp_rm_list *rm_list);
5c4a824d
GT
1033void mptcp_pm_rm_addr_received(struct mptcp_sock *msk,
1034 const struct mptcp_rm_list *rm_list);
40453a5c 1035void mptcp_pm_mp_prio_received(struct sock *sk, u8 bkup);
5580d41b 1036void mptcp_pm_mp_fail_received(struct sock *sk, u64 fail_seq);
d1734987
MBN
1037int mptcp_pm_mp_prio_send_ack(struct mptcp_sock *msk,
1038 struct mptcp_addr_info *addr,
1039 struct mptcp_addr_info *rem,
1040 u8 bkup);
9ab4807c 1041bool mptcp_pm_alloc_anno_list(struct mptcp_sock *msk,
528cb5f2 1042 const struct mptcp_addr_info *addr);
5bc56388 1043bool mptcp_pm_sport_in_anno_list(struct mptcp_sock *msk, const struct sock *sk);
00cfd77b
GT
1044struct mptcp_pm_add_entry *
1045mptcp_pm_del_add_timer(struct mptcp_sock *msk,
90d93088 1046 const struct mptcp_addr_info *addr, bool check_id);
8008e77e
GT
1047bool mptcp_lookup_subflow_by_saddr(const struct list_head *list,
1048 const struct mptcp_addr_info *saddr);
1049bool mptcp_remove_anno_list_by_saddr(struct mptcp_sock *msk,
1050 const struct mptcp_addr_info *addr);
c7f25f79
GT
1051int mptcp_pm_nl_set_flags(struct mptcp_pm_addr_entry *local,
1052 struct genl_info *info);
1053int mptcp_userspace_pm_set_flags(struct mptcp_pm_addr_entry *local,
1054 struct genl_info *info);
1b1c7a0e 1055int mptcp_pm_announce_addr(struct mptcp_sock *msk,
6a6c05a8 1056 const struct mptcp_addr_info *addr,
f7efc777 1057 bool echo);
cbde2787 1058int mptcp_pm_remove_addr(struct mptcp_sock *msk, const struct mptcp_rm_list *rm_list);
88d09731
GT
1059void mptcp_pm_remove_addr_entry(struct mptcp_sock *msk,
1060 struct mptcp_pm_addr_entry *entry);
d9a4594e 1061
770170b4
GT
1062/* the default path manager, used in mptcp_pm_unregister */
1063extern struct mptcp_pm_ops mptcp_pm_kernel;
1064
1305b0c2
GT
1065struct mptcp_pm_ops *mptcp_pm_find(const char *name);
1066int mptcp_pm_register(struct mptcp_pm_ops *pm_ops);
1067void mptcp_pm_unregister(struct mptcp_pm_ops *pm_ops);
1068int mptcp_pm_validate(struct mptcp_pm_ops *pm_ops);
fa3ee9dd 1069void mptcp_pm_get_available(char *buf, size_t maxlen);
1305b0c2 1070
a17336b2 1071void mptcp_userspace_pm_free_local_addr_list(struct mptcp_sock *msk);
1b1c7a0e 1072
b911c97c
FW
1073void mptcp_event(enum mptcp_event_type type, const struct mptcp_sock *msk,
1074 const struct sock *ssk, gfp_t gfp);
d1ace2d9 1075void mptcp_event_addr_announced(const struct sock *ssk, const struct mptcp_addr_info *info);
b911c97c 1076void mptcp_event_addr_removed(const struct mptcp_sock *msk, u8 id);
f8c9dfbd
GT
1077void mptcp_event_pm_listener(const struct sock *ssk,
1078 enum mptcp_event_type event);
4d25247d 1079bool mptcp_userspace_pm_active(const struct mptcp_sock *msk);
b911c97c 1080
36b122ba
DS
1081void mptcp_fastopen_subflow_synack_set_params(struct mptcp_subflow_context *subflow,
1082 struct request_sock *req);
f8fe8174
GT
1083int mptcp_pm_genl_fill_addr(struct sk_buff *msg,
1084 struct netlink_callback *cb,
1085 struct mptcp_pm_addr_entry *entry);
dfc8d060 1086
f643b803 1087static inline bool mptcp_pm_should_add_signal(struct mptcp_sock *msk)
18fc1a92
YL
1088{
1089 return READ_ONCE(msk->pm.addr_signal) &
1090 (BIT(MPTCP_ADD_ADDR_SIGNAL) | BIT(MPTCP_ADD_ADDR_ECHO));
1091}
1092
1093static inline bool mptcp_pm_should_add_signal_addr(struct mptcp_sock *msk)
1b1c7a0e 1094{
13ad9f01 1095 return READ_ONCE(msk->pm.addr_signal) & BIT(MPTCP_ADD_ADDR_SIGNAL);
d91d322a
GT
1096}
1097
1098static inline bool mptcp_pm_should_add_signal_echo(struct mptcp_sock *msk)
1099{
13ad9f01 1100 return READ_ONCE(msk->pm.addr_signal) & BIT(MPTCP_ADD_ADDR_ECHO);
1b1c7a0e
PK
1101}
1102
5cb104ae
GT
1103static inline bool mptcp_pm_should_rm_signal(struct mptcp_sock *msk)
1104{
13ad9f01 1105 return READ_ONCE(msk->pm.addr_signal) & BIT(MPTCP_RM_ADDR_SIGNAL);
5cb104ae
GT
1106}
1107
14b06811
MM
1108static inline bool mptcp_pm_is_userspace(const struct mptcp_sock *msk)
1109{
1110 return READ_ONCE(msk->pm.pm_type) == MPTCP_PM_TYPE_USERSPACE;
1111}
1112
4d25247d
KM
1113static inline bool mptcp_pm_is_kernel(const struct mptcp_sock *msk)
1114{
1115 return READ_ONCE(msk->pm.pm_type) == MPTCP_PM_TYPE_KERNEL;
1116}
1117
4a2777a8 1118static inline unsigned int mptcp_add_addr_len(int family, bool echo, bool port)
1b1c7a0e 1119{
2ec72fae
GT
1120 u8 len = TCPOLEN_MPTCP_ADD_ADDR_BASE;
1121
1122 if (family == AF_INET6)
1123 len = TCPOLEN_MPTCP_ADD_ADDR6_BASE;
1124 if (!echo)
1125 len += MPTCPOPT_THMAC_LEN;
27ab92d9 1126 /* account for 2 trailing 'nop' options */
4a2777a8 1127 if (port)
27ab92d9 1128 len += TCPOLEN_MPTCP_PORT_LEN + TCPOLEN_MPTCP_PORT_ALIGN;
2ec72fae
GT
1129
1130 return len;
1b1c7a0e
PK
1131}
1132
6445e17a
GT
1133static inline int mptcp_rm_addr_len(const struct mptcp_rm_list *rm_list)
1134{
1135 if (rm_list->nr == 0 || rm_list->nr > MPTCP_RM_IDS_MAX)
1136 return -EINVAL;
1137
1138 return TCPOLEN_MPTCP_RM_ADDR_BASE + roundup(rm_list->nr - 1, 4) + 1;
1139}
1140
90d93088 1141bool mptcp_pm_add_addr_signal(struct mptcp_sock *msk, const struct sk_buff *skb,
1f5e9e2f 1142 unsigned int opt_size, unsigned int remaining,
f462a446 1143 struct mptcp_addr_info *addr, bool *echo,
af7939f3 1144 bool *drop_other_suboptions);
5cb104ae 1145bool mptcp_pm_rm_addr_signal(struct mptcp_sock *msk, unsigned int remaining,
6445e17a 1146 struct mptcp_rm_list *rm_list);
1b1c7a0e 1147int mptcp_pm_get_local_id(struct mptcp_sock *msk, struct sock_common *skc);
7462fe22
GT
1148int mptcp_pm_nl_get_local_id(struct mptcp_sock *msk,
1149 struct mptcp_pm_addr_entry *skc);
1150int mptcp_userspace_pm_get_local_id(struct mptcp_sock *msk,
1151 struct mptcp_pm_addr_entry *skc);
6834097f
MBN
1152bool mptcp_pm_is_backup(struct mptcp_sock *msk, struct sock_common *skc);
1153bool mptcp_pm_nl_is_backup(struct mptcp_sock *msk, struct mptcp_addr_info *skc);
1154bool mptcp_userspace_pm_is_backup(struct mptcp_sock *msk, struct mptcp_addr_info *skc);
9ae7846c
GT
1155int mptcp_pm_nl_dump_addr(struct sk_buff *msg,
1156 struct netlink_callback *cb);
34e74a5c
GT
1157int mptcp_userspace_pm_dump_addr(struct sk_buff *msg,
1158 struct netlink_callback *cb);
8556f4ae
GT
1159int mptcp_pm_nl_get_addr(u8 id, struct mptcp_pm_addr_entry *addr,
1160 struct genl_info *info);
1161int mptcp_userspace_pm_get_addr(u8 id, struct mptcp_pm_addr_entry *addr,
1162 struct genl_info *info);
1b1c7a0e 1163
a7cfe776
PA
1164static inline u8 subflow_get_local_id(const struct mptcp_subflow_context *subflow)
1165{
1166 int local_id = READ_ONCE(subflow->local_id);
1167
1168 if (local_id < 0)
1169 return 0;
1170 return local_id;
1171}
1172
b97d6b68 1173void __init mptcp_pm_kernel_register(void);
770170b4 1174void __init mptcp_pm_userspace_register(void);
d39dceca 1175void __init mptcp_pm_nl_init(void);
551a9ad7 1176void mptcp_pm_worker(struct mptcp_sock *msk);
a49eb8ae 1177void __mptcp_pm_kernel_worker(struct mptcp_sock *msk);
90d93088
PA
1178unsigned int mptcp_pm_get_add_addr_signal_max(const struct mptcp_sock *msk);
1179unsigned int mptcp_pm_get_add_addr_accept_max(const struct mptcp_sock *msk);
1180unsigned int mptcp_pm_get_subflows_max(const struct mptcp_sock *msk);
1181unsigned int mptcp_pm_get_local_addr_max(const struct mptcp_sock *msk);
78962489 1182
95d68651
PA
1183/* called under PM lock */
1184static inline void __mptcp_pm_close_subflow(struct mptcp_sock *msk)
1185{
1186 if (--msk->pm.subflows < mptcp_pm_get_subflows_max(msk))
1187 WRITE_ONCE(msk->pm.accept_subflow, true);
1188}
1189
1190static inline void mptcp_pm_close_subflow(struct mptcp_sock *msk)
1191{
1192 spin_lock_bh(&msk->pm.lock);
1193 __mptcp_pm_close_subflow(msk);
1194 spin_unlock_bh(&msk->pm.lock);
1195}
1196
3e501490 1197void mptcp_sockopt_sync_locked(struct mptcp_sock *msk, struct sock *ssk);
01cacb00 1198
dc87efdb 1199static inline struct mptcp_ext *mptcp_get_ext(const struct sk_buff *skb)
6d0060f6
MM
1200{
1201 return (struct mptcp_ext *)skb_ext_find(skb, SKB_EXT_MPTCP);
1202}
1203
5147dfb5
DC
1204void mptcp_diag_subflow_init(struct tcp_ulp_ops *ops);
1205
d5f49190 1206static inline bool __mptcp_check_fallback(const struct mptcp_sock *msk)
e1ff9e82
DC
1207{
1208 return test_bit(MPTCP_FALLBACK_DONE, &msk->flags);
1209}
1210
d5f49190 1211static inline bool mptcp_check_fallback(const struct sock *sk)
e1ff9e82
DC
1212{
1213 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk);
1214 struct mptcp_sock *msk = mptcp_sk(subflow->conn);
1215
1216 return __mptcp_check_fallback(msk);
1217}
1218
1219static inline void __mptcp_do_fallback(struct mptcp_sock *msk)
1220{
83d580dd 1221 if (__mptcp_check_fallback(msk)) {
cb41b195 1222 pr_debug("TCP fallback already done (msk=%p)\n", msk);
e1ff9e82
DC
1223 return;
1224 }
db75a168
MBN
1225 if (WARN_ON_ONCE(!READ_ONCE(msk->allow_infinite_fallback)))
1226 return;
e1ff9e82
DC
1227 set_bit(MPTCP_FALLBACK_DONE, &msk->flags);
1228}
1229
6ebf6f90
GT
1230static inline bool __mptcp_has_initial_subflow(const struct mptcp_sock *msk)
1231{
1232 struct sock *ssk = READ_ONCE(msk->first);
1233
1234 return ssk && ((1 << inet_sk_state_load(ssk)) &
1235 (TCPF_ESTABLISHED | TCPF_SYN_SENT |
1236 TCPF_SYN_RECV | TCPF_LISTEN));
1237}
1238
d51991e2 1239static inline void mptcp_do_fallback(struct sock *ssk)
e1ff9e82 1240{
d51991e2
PA
1241 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
1242 struct sock *sk = subflow->conn;
1243 struct mptcp_sock *msk;
e1ff9e82 1244
d51991e2 1245 msk = mptcp_sk(sk);
e1ff9e82 1246 __mptcp_do_fallback(msk);
d51991e2
PA
1247 if (READ_ONCE(msk->snd_data_fin_enable) && !(ssk->sk_shutdown & SEND_SHUTDOWN)) {
1248 gfp_t saved_allocation = ssk->sk_allocation;
1249
1250 /* we are in a atomic (BH) scope, override ssk default for data
1251 * fin allocation
1252 */
1253 ssk->sk_allocation = GFP_ATOMIC;
1254 ssk->sk_shutdown |= SEND_SHUTDOWN;
1255 tcp_shutdown(ssk, SEND_SHUTDOWN);
1256 ssk->sk_allocation = saved_allocation;
1257 }
e1ff9e82
DC
1258}
1259
cb41b195 1260#define pr_fallback(a) pr_debug("%s:fallback to TCP (msk=%p)\n", __func__, a)
e1ff9e82 1261
65b02260
MBN
1262static inline void mptcp_subflow_early_fallback(struct mptcp_sock *msk,
1263 struct mptcp_subflow_context *subflow)
1264{
1265 pr_fallback(msk);
1266 subflow->request_mptcp = 0;
1267 __mptcp_do_fallback(msk);
1268}
1269
1e39e5a3
GT
1270static inline bool mptcp_check_infinite_map(struct sk_buff *skb)
1271{
1272 struct mptcp_ext *mpext;
1273
1274 mpext = skb ? mptcp_get_ext(skb) : NULL;
1275 if (mpext && mpext->infinite_map)
1276 return true;
1277
1278 return false;
1279}
1280
70c708e8
KM
1281static inline bool is_active_ssk(struct mptcp_subflow_context *subflow)
1282{
1283 return (subflow->request_mptcp || subflow->request_join);
1284}
1285
8fd73804
DC
1286static inline bool subflow_simultaneous_connect(struct sock *sk)
1287{
1288 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk);
8fd73804 1289
337cebbd
PA
1290 return (1 << sk->sk_state) &
1291 (TCPF_ESTABLISHED | TCPF_FIN_WAIT1 | TCPF_FIN_WAIT2 | TCPF_CLOSING) &&
70c708e8 1292 is_active_ssk(subflow) &&
8fd73804
DC
1293 !subflow->conn_finished;
1294}
1295
9466a1cc
FW
1296#ifdef CONFIG_SYN_COOKIES
1297void subflow_init_req_cookie_join_save(const struct mptcp_subflow_request_sock *subflow_req,
1298 struct sk_buff *skb);
1299bool mptcp_token_join_cookie_init_state(struct mptcp_subflow_request_sock *subflow_req,
1300 struct sk_buff *skb);
1301void __init mptcp_join_cookie_init(void);
1302#else
1303static inline void
1304subflow_init_req_cookie_join_save(const struct mptcp_subflow_request_sock *subflow_req,
1305 struct sk_buff *skb) {}
1306static inline bool
1307mptcp_token_join_cookie_init_state(struct mptcp_subflow_request_sock *subflow_req,
1308 struct sk_buff *skb)
1309{
1310 return false;
1311}
1312
1313static inline void mptcp_join_cookie_init(void) {}
1314#endif
1315
f870fa0b 1316#endif /* __MPTCP_PROTOCOL_H */