1 // SPDX-License-Identifier: GPL-2.0
4 * Copyright (c) 2019, Intel Corporation.
6 #define pr_fmt(fmt) "MPTCP: " fmt
8 #include <linux/kernel.h>
14 /* path manager command handlers */
16 int mptcp_pm_announce_addr(struct mptcp_sock *msk,
17 const struct mptcp_addr_info *addr,
20 u8 add_addr = READ_ONCE(msk->pm.addr_signal);
22 pr_debug("msk=%p, local_id=%d, echo=%d", msk, addr->id, echo);
24 lockdep_assert_held(&msk->pm.lock);
27 (echo ? BIT(MPTCP_ADD_ADDR_ECHO) : BIT(MPTCP_ADD_ADDR_SIGNAL))) {
28 MPTCP_INC_STATS(sock_net((struct sock *)msk),
29 echo ? MPTCP_MIB_ECHOADDTXDROP : MPTCP_MIB_ADDADDRTXDROP);
34 msk->pm.remote = *addr;
35 add_addr |= BIT(MPTCP_ADD_ADDR_ECHO);
37 msk->pm.local = *addr;
38 add_addr |= BIT(MPTCP_ADD_ADDR_SIGNAL);
40 WRITE_ONCE(msk->pm.addr_signal, add_addr);
44 int mptcp_pm_remove_addr(struct mptcp_sock *msk, const struct mptcp_rm_list *rm_list)
46 u8 rm_addr = READ_ONCE(msk->pm.addr_signal);
48 pr_debug("msk=%p, rm_list_nr=%d", msk, rm_list->nr);
51 MPTCP_ADD_STATS(sock_net((struct sock *)msk),
52 MPTCP_MIB_RMADDRTXDROP, rm_list->nr);
56 msk->pm.rm_list_tx = *rm_list;
57 rm_addr |= BIT(MPTCP_RM_ADDR_SIGNAL);
58 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
59 mptcp_pm_nl_addr_send_ack(msk);
63 int mptcp_pm_remove_subflow(struct mptcp_sock *msk, const struct mptcp_rm_list *rm_list)
65 pr_debug("msk=%p, rm_list_nr=%d", msk, rm_list->nr);
67 spin_lock_bh(&msk->pm.lock);
68 mptcp_pm_nl_rm_subflow_received(msk, rm_list);
69 spin_unlock_bh(&msk->pm.lock);
73 /* path manager event handlers */
75 void mptcp_pm_new_connection(struct mptcp_sock *msk, const struct sock *ssk, int server_side)
77 struct mptcp_pm_data *pm = &msk->pm;
79 pr_debug("msk=%p, token=%u side=%d", msk, READ_ONCE(msk->token), server_side);
81 WRITE_ONCE(pm->server_side, server_side);
82 mptcp_event(MPTCP_EVENT_CREATED, msk, ssk, GFP_ATOMIC);
85 bool mptcp_pm_allow_new_subflow(struct mptcp_sock *msk)
87 struct mptcp_pm_data *pm = &msk->pm;
88 unsigned int subflows_max;
91 if (mptcp_pm_is_userspace(msk)) {
92 if (mptcp_userspace_pm_active(msk)) {
93 spin_lock_bh(&pm->lock);
95 spin_unlock_bh(&pm->lock);
101 subflows_max = mptcp_pm_get_subflows_max(msk);
103 pr_debug("msk=%p subflows=%d max=%d allow=%d", msk, pm->subflows,
104 subflows_max, READ_ONCE(pm->accept_subflow));
106 /* try to avoid acquiring the lock below */
107 if (!READ_ONCE(pm->accept_subflow))
110 spin_lock_bh(&pm->lock);
111 if (READ_ONCE(pm->accept_subflow)) {
112 ret = pm->subflows < subflows_max;
113 if (ret && ++pm->subflows == subflows_max)
114 WRITE_ONCE(pm->accept_subflow, false);
116 spin_unlock_bh(&pm->lock);
121 /* return true if the new status bit is currently cleared, that is, this event
122 * can be server, eventually by an already scheduled work
124 static bool mptcp_pm_schedule_work(struct mptcp_sock *msk,
125 enum mptcp_pm_status new_status)
127 pr_debug("msk=%p status=%x new=%lx", msk, msk->pm.status,
129 if (msk->pm.status & BIT(new_status))
132 msk->pm.status |= BIT(new_status);
133 mptcp_schedule_work((struct sock *)msk);
137 void mptcp_pm_fully_established(struct mptcp_sock *msk, const struct sock *ssk)
139 struct mptcp_pm_data *pm = &msk->pm;
140 bool announce = false;
142 pr_debug("msk=%p", msk);
144 spin_lock_bh(&pm->lock);
146 /* mptcp_pm_fully_established() can be invoked by multiple
147 * racing paths - accept() and check_fully_established()
148 * be sure to serve this event only once.
150 if (READ_ONCE(pm->work_pending) &&
151 !(msk->pm.status & BIT(MPTCP_PM_ALREADY_ESTABLISHED)))
152 mptcp_pm_schedule_work(msk, MPTCP_PM_ESTABLISHED);
154 if ((msk->pm.status & BIT(MPTCP_PM_ALREADY_ESTABLISHED)) == 0)
157 msk->pm.status |= BIT(MPTCP_PM_ALREADY_ESTABLISHED);
158 spin_unlock_bh(&pm->lock);
161 mptcp_event(MPTCP_EVENT_ESTABLISHED, msk, ssk, GFP_ATOMIC);
164 void mptcp_pm_connection_closed(struct mptcp_sock *msk)
166 pr_debug("msk=%p", msk);
169 void mptcp_pm_subflow_established(struct mptcp_sock *msk)
171 struct mptcp_pm_data *pm = &msk->pm;
173 pr_debug("msk=%p", msk);
175 if (!READ_ONCE(pm->work_pending))
178 spin_lock_bh(&pm->lock);
180 if (READ_ONCE(pm->work_pending))
181 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
183 spin_unlock_bh(&pm->lock);
186 void mptcp_pm_subflow_check_next(struct mptcp_sock *msk,
187 const struct mptcp_subflow_context *subflow)
189 struct mptcp_pm_data *pm = &msk->pm;
190 bool update_subflows;
192 update_subflows = subflow->request_join || subflow->mp_join;
193 if (mptcp_pm_is_userspace(msk)) {
194 if (update_subflows) {
195 spin_lock_bh(&pm->lock);
197 spin_unlock_bh(&pm->lock);
202 if (!READ_ONCE(pm->work_pending) && !update_subflows)
205 spin_lock_bh(&pm->lock);
207 __mptcp_pm_close_subflow(msk);
209 /* Even if this subflow is not really established, tell the PM to try
210 * to pick the next ones, if possible.
212 if (mptcp_pm_nl_check_work_pending(msk))
213 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
215 spin_unlock_bh(&pm->lock);
218 void mptcp_pm_add_addr_received(const struct sock *ssk,
219 const struct mptcp_addr_info *addr)
221 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
222 struct mptcp_sock *msk = mptcp_sk(subflow->conn);
223 struct mptcp_pm_data *pm = &msk->pm;
225 pr_debug("msk=%p remote_id=%d accept=%d", msk, addr->id,
226 READ_ONCE(pm->accept_addr));
228 mptcp_event_addr_announced(ssk, addr);
230 spin_lock_bh(&pm->lock);
232 if (mptcp_pm_is_userspace(msk)) {
233 if (mptcp_userspace_pm_active(msk)) {
234 mptcp_pm_announce_addr(msk, addr, true);
235 mptcp_pm_add_addr_send_ack(msk);
237 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_ADDADDRDROP);
239 } else if (!READ_ONCE(pm->accept_addr)) {
240 mptcp_pm_announce_addr(msk, addr, true);
241 mptcp_pm_add_addr_send_ack(msk);
242 } else if (mptcp_pm_schedule_work(msk, MPTCP_PM_ADD_ADDR_RECEIVED)) {
245 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_ADDADDRDROP);
248 spin_unlock_bh(&pm->lock);
251 void mptcp_pm_add_addr_echoed(struct mptcp_sock *msk,
252 const struct mptcp_addr_info *addr)
254 struct mptcp_pm_data *pm = &msk->pm;
256 pr_debug("msk=%p", msk);
258 spin_lock_bh(&pm->lock);
260 if (mptcp_lookup_anno_list_by_saddr(msk, addr) && READ_ONCE(pm->work_pending))
261 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
263 spin_unlock_bh(&pm->lock);
266 void mptcp_pm_add_addr_send_ack(struct mptcp_sock *msk)
268 if (!mptcp_pm_should_add_signal(msk))
271 mptcp_pm_schedule_work(msk, MPTCP_PM_ADD_ADDR_SEND_ACK);
274 void mptcp_pm_rm_addr_received(struct mptcp_sock *msk,
275 const struct mptcp_rm_list *rm_list)
277 struct mptcp_pm_data *pm = &msk->pm;
280 pr_debug("msk=%p remote_ids_nr=%d", msk, rm_list->nr);
282 for (i = 0; i < rm_list->nr; i++)
283 mptcp_event_addr_removed(msk, rm_list->ids[i]);
285 spin_lock_bh(&pm->lock);
286 if (mptcp_pm_schedule_work(msk, MPTCP_PM_RM_ADDR_RECEIVED))
287 pm->rm_list_rx = *rm_list;
289 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_RMADDRDROP);
290 spin_unlock_bh(&pm->lock);
293 void mptcp_pm_mp_prio_received(struct sock *ssk, u8 bkup)
295 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
296 struct sock *sk = subflow->conn;
297 struct mptcp_sock *msk;
299 pr_debug("subflow->backup=%d, bkup=%d\n", subflow->backup, bkup);
301 if (subflow->backup != bkup)
302 subflow->backup = bkup;
304 mptcp_event(MPTCP_EVENT_SUB_PRIORITY, msk, ssk, GFP_ATOMIC);
307 void mptcp_pm_mp_fail_received(struct sock *sk, u64 fail_seq)
309 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk);
310 struct mptcp_sock *msk = mptcp_sk(subflow->conn);
312 pr_debug("fail_seq=%llu", fail_seq);
314 if (!READ_ONCE(msk->allow_infinite_fallback))
317 if (!subflow->fail_tout) {
318 pr_debug("send MP_FAIL response and infinite map");
320 subflow->send_mp_fail = 1;
321 subflow->send_infinite_map = 1;
324 pr_debug("MP_FAIL response received");
325 WRITE_ONCE(subflow->fail_tout, 0);
329 /* path manager helpers */
331 bool mptcp_pm_add_addr_signal(struct mptcp_sock *msk, const struct sk_buff *skb,
332 unsigned int opt_size, unsigned int remaining,
333 struct mptcp_addr_info *addr, bool *echo,
334 bool *drop_other_suboptions)
341 spin_lock_bh(&msk->pm.lock);
343 /* double check after the lock is acquired */
344 if (!mptcp_pm_should_add_signal(msk))
347 /* always drop every other options for pure ack ADD_ADDR; this is a
348 * plain dup-ack from TCP perspective. The other MPTCP-relevant info,
349 * if any, will be carried by the 'original' TCP ack
351 if (skb && skb_is_tcp_pure_ack(skb)) {
352 remaining += opt_size;
353 *drop_other_suboptions = true;
356 *echo = mptcp_pm_should_add_signal_echo(msk);
357 port = !!(*echo ? msk->pm.remote.port : msk->pm.local.port);
359 family = *echo ? msk->pm.remote.family : msk->pm.local.family;
360 if (remaining < mptcp_add_addr_len(family, *echo, port))
364 *addr = msk->pm.remote;
365 add_addr = msk->pm.addr_signal & ~BIT(MPTCP_ADD_ADDR_ECHO);
367 *addr = msk->pm.local;
368 add_addr = msk->pm.addr_signal & ~BIT(MPTCP_ADD_ADDR_SIGNAL);
370 WRITE_ONCE(msk->pm.addr_signal, add_addr);
374 spin_unlock_bh(&msk->pm.lock);
378 bool mptcp_pm_rm_addr_signal(struct mptcp_sock *msk, unsigned int remaining,
379 struct mptcp_rm_list *rm_list)
381 int ret = false, len;
384 spin_lock_bh(&msk->pm.lock);
386 /* double check after the lock is acquired */
387 if (!mptcp_pm_should_rm_signal(msk))
390 rm_addr = msk->pm.addr_signal & ~BIT(MPTCP_RM_ADDR_SIGNAL);
391 len = mptcp_rm_addr_len(&msk->pm.rm_list_tx);
393 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
399 *rm_list = msk->pm.rm_list_tx;
400 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
404 spin_unlock_bh(&msk->pm.lock);
408 int mptcp_pm_get_local_id(struct mptcp_sock *msk, struct sock_common *skc)
410 struct mptcp_addr_info skc_local;
411 struct mptcp_addr_info msk_local;
413 if (WARN_ON_ONCE(!msk))
416 /* The 0 ID mapping is defined by the first subflow, copied into the msk
419 mptcp_local_address((struct sock_common *)msk, &msk_local);
420 mptcp_local_address((struct sock_common *)skc, &skc_local);
421 if (mptcp_addresses_equal(&msk_local, &skc_local, false))
424 if (mptcp_pm_is_userspace(msk))
425 return mptcp_userspace_pm_get_local_id(msk, &skc_local);
426 return mptcp_pm_nl_get_local_id(msk, &skc_local);
429 int mptcp_pm_get_flags_and_ifindex_by_id(struct mptcp_sock *msk, unsigned int id,
430 u8 *flags, int *ifindex)
438 if (mptcp_pm_is_userspace(msk))
439 return mptcp_userspace_pm_get_flags_and_ifindex_by_id(msk, id, flags, ifindex);
440 return mptcp_pm_nl_get_flags_and_ifindex_by_id(msk, id, flags, ifindex);
443 int mptcp_pm_get_addr(struct sk_buff *skb, struct genl_info *info)
445 if (info->attrs[MPTCP_PM_ATTR_TOKEN])
446 return mptcp_userspace_pm_get_addr(skb, info);
447 return mptcp_pm_nl_get_addr(skb, info);
450 int mptcp_pm_dump_addr(struct sk_buff *msg, struct netlink_callback *cb)
452 const struct genl_info *info = genl_info_dump(cb);
454 if (info->attrs[MPTCP_PM_ATTR_TOKEN])
455 return mptcp_userspace_pm_dump_addr(msg, cb);
456 return mptcp_pm_nl_dump_addr(msg, cb);
459 int mptcp_pm_set_flags(struct sk_buff *skb, struct genl_info *info)
461 if (info->attrs[MPTCP_PM_ATTR_TOKEN])
462 return mptcp_userspace_pm_set_flags(skb, info);
463 return mptcp_pm_nl_set_flags(skb, info);
466 void mptcp_pm_subflow_chk_stale(const struct mptcp_sock *msk, struct sock *ssk)
468 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
469 u32 rcv_tstamp = READ_ONCE(tcp_sk(ssk)->rcv_tstamp);
471 /* keep track of rtx periods with no progress */
472 if (!subflow->stale_count) {
473 subflow->stale_rcv_tstamp = rcv_tstamp;
474 subflow->stale_count++;
475 } else if (subflow->stale_rcv_tstamp == rcv_tstamp) {
476 if (subflow->stale_count < U8_MAX)
477 subflow->stale_count++;
478 mptcp_pm_nl_subflow_chk_stale(msk, ssk);
480 subflow->stale_count = 0;
481 mptcp_subflow_set_active(subflow);
485 /* if sk is ipv4 or ipv6_only allows only same-family local and remote addresses,
486 * otherwise allow any matching local/remote pair
488 bool mptcp_pm_addr_families_match(const struct sock *sk,
489 const struct mptcp_addr_info *loc,
490 const struct mptcp_addr_info *rem)
492 bool mptcp_is_v4 = sk->sk_family == AF_INET;
494 #if IS_ENABLED(CONFIG_MPTCP_IPV6)
495 bool loc_is_v4 = loc->family == AF_INET || ipv6_addr_v4mapped(&loc->addr6);
496 bool rem_is_v4 = rem->family == AF_INET || ipv6_addr_v4mapped(&rem->addr6);
499 return loc_is_v4 && rem_is_v4;
501 if (ipv6_only_sock(sk))
502 return !loc_is_v4 && !rem_is_v4;
504 return loc_is_v4 == rem_is_v4;
506 return mptcp_is_v4 && loc->family == AF_INET && rem->family == AF_INET;
510 void mptcp_pm_data_reset(struct mptcp_sock *msk)
512 u8 pm_type = mptcp_get_pm_type(sock_net((struct sock *)msk));
513 struct mptcp_pm_data *pm = &msk->pm;
515 pm->add_addr_signaled = 0;
516 pm->add_addr_accepted = 0;
517 pm->local_addr_used = 0;
519 pm->rm_list_tx.nr = 0;
520 pm->rm_list_rx.nr = 0;
521 WRITE_ONCE(pm->pm_type, pm_type);
523 if (pm_type == MPTCP_PM_TYPE_KERNEL) {
524 bool subflows_allowed = !!mptcp_pm_get_subflows_max(msk);
526 /* pm->work_pending must be only be set to 'true' when
527 * pm->pm_type is set to MPTCP_PM_TYPE_KERNEL
529 WRITE_ONCE(pm->work_pending,
530 (!!mptcp_pm_get_local_addr_max(msk) &&
532 !!mptcp_pm_get_add_addr_signal_max(msk));
533 WRITE_ONCE(pm->accept_addr,
534 !!mptcp_pm_get_add_addr_accept_max(msk) &&
536 WRITE_ONCE(pm->accept_subflow, subflows_allowed);
538 WRITE_ONCE(pm->work_pending, 0);
539 WRITE_ONCE(pm->accept_addr, 0);
540 WRITE_ONCE(pm->accept_subflow, 0);
543 WRITE_ONCE(pm->addr_signal, 0);
544 WRITE_ONCE(pm->remote_deny_join_id0, false);
546 bitmap_fill(msk->pm.id_avail_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
549 void mptcp_pm_data_init(struct mptcp_sock *msk)
551 spin_lock_init(&msk->pm.lock);
552 INIT_LIST_HEAD(&msk->pm.anno_list);
553 INIT_LIST_HEAD(&msk->pm.userspace_pm_local_addr_list);
554 mptcp_pm_data_reset(msk);
557 void __init mptcp_pm_init(void)