pm.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559
  1. // SPDX-License-Identifier: GPL-2.0
  2. /* Multipath TCP
  3. *
  4. * Copyright (c) 2019, Intel Corporation.
  5. */
  6. #define pr_fmt(fmt) "MPTCP: " fmt
  7. #include <linux/kernel.h>
  8. #include <net/mptcp.h>
  9. #include "protocol.h"
  10. #include "mib.h"
  11. /* path manager command handlers */
  12. int mptcp_pm_announce_addr(struct mptcp_sock *msk,
  13. const struct mptcp_addr_info *addr,
  14. bool echo)
  15. {
  16. u8 add_addr = READ_ONCE(msk->pm.addr_signal);
  17. pr_debug("msk=%p, local_id=%d, echo=%d\n", msk, addr->id, echo);
  18. lockdep_assert_held(&msk->pm.lock);
  19. if (add_addr &
  20. (echo ? BIT(MPTCP_ADD_ADDR_ECHO) : BIT(MPTCP_ADD_ADDR_SIGNAL))) {
  21. MPTCP_INC_STATS(sock_net((struct sock *)msk),
  22. echo ? MPTCP_MIB_ECHOADDTXDROP : MPTCP_MIB_ADDADDRTXDROP);
  23. return -EINVAL;
  24. }
  25. if (echo) {
  26. msk->pm.remote = *addr;
  27. add_addr |= BIT(MPTCP_ADD_ADDR_ECHO);
  28. } else {
  29. msk->pm.local = *addr;
  30. add_addr |= BIT(MPTCP_ADD_ADDR_SIGNAL);
  31. }
  32. WRITE_ONCE(msk->pm.addr_signal, add_addr);
  33. return 0;
  34. }
  35. int mptcp_pm_remove_addr(struct mptcp_sock *msk, const struct mptcp_rm_list *rm_list)
  36. {
  37. u8 rm_addr = READ_ONCE(msk->pm.addr_signal);
  38. pr_debug("msk=%p, rm_list_nr=%d\n", msk, rm_list->nr);
  39. if (rm_addr) {
  40. MPTCP_ADD_STATS(sock_net((struct sock *)msk),
  41. MPTCP_MIB_RMADDRTXDROP, rm_list->nr);
  42. return -EINVAL;
  43. }
  44. msk->pm.rm_list_tx = *rm_list;
  45. rm_addr |= BIT(MPTCP_RM_ADDR_SIGNAL);
  46. WRITE_ONCE(msk->pm.addr_signal, rm_addr);
  47. mptcp_pm_nl_addr_send_ack(msk);
  48. return 0;
  49. }
  50. /* path manager event handlers */
  51. void mptcp_pm_new_connection(struct mptcp_sock *msk, const struct sock *ssk, int server_side)
  52. {
  53. struct mptcp_pm_data *pm = &msk->pm;
  54. pr_debug("msk=%p, token=%u side=%d\n", msk, READ_ONCE(msk->token), server_side);
  55. WRITE_ONCE(pm->server_side, server_side);
  56. mptcp_event(MPTCP_EVENT_CREATED, msk, ssk, GFP_ATOMIC);
  57. }
  58. bool mptcp_pm_allow_new_subflow(struct mptcp_sock *msk)
  59. {
  60. struct mptcp_pm_data *pm = &msk->pm;
  61. unsigned int subflows_max;
  62. int ret = 0;
  63. if (mptcp_pm_is_userspace(msk)) {
  64. if (mptcp_userspace_pm_active(msk)) {
  65. spin_lock_bh(&pm->lock);
  66. pm->subflows++;
  67. spin_unlock_bh(&pm->lock);
  68. return true;
  69. }
  70. return false;
  71. }
  72. subflows_max = mptcp_pm_get_subflows_max(msk);
  73. pr_debug("msk=%p subflows=%d max=%d allow=%d\n", msk, pm->subflows,
  74. subflows_max, READ_ONCE(pm->accept_subflow));
  75. /* try to avoid acquiring the lock below */
  76. if (!READ_ONCE(pm->accept_subflow))
  77. return false;
  78. spin_lock_bh(&pm->lock);
  79. if (READ_ONCE(pm->accept_subflow)) {
  80. ret = pm->subflows < subflows_max;
  81. if (ret && ++pm->subflows == subflows_max)
  82. WRITE_ONCE(pm->accept_subflow, false);
  83. }
  84. spin_unlock_bh(&pm->lock);
  85. return ret;
  86. }
  87. /* return true if the new status bit is currently cleared, that is, this event
  88. * can be server, eventually by an already scheduled work
  89. */
  90. static bool mptcp_pm_schedule_work(struct mptcp_sock *msk,
  91. enum mptcp_pm_status new_status)
  92. {
  93. pr_debug("msk=%p status=%x new=%lx\n", msk, msk->pm.status,
  94. BIT(new_status));
  95. if (msk->pm.status & BIT(new_status))
  96. return false;
  97. msk->pm.status |= BIT(new_status);
  98. mptcp_schedule_work((struct sock *)msk);
  99. return true;
  100. }
  101. void mptcp_pm_fully_established(struct mptcp_sock *msk, const struct sock *ssk)
  102. {
  103. struct mptcp_pm_data *pm = &msk->pm;
  104. bool announce = false;
  105. pr_debug("msk=%p\n", msk);
  106. spin_lock_bh(&pm->lock);
  107. /* mptcp_pm_fully_established() can be invoked by multiple
  108. * racing paths - accept() and check_fully_established()
  109. * be sure to serve this event only once.
  110. */
  111. if (READ_ONCE(pm->work_pending) &&
  112. !(msk->pm.status & BIT(MPTCP_PM_ALREADY_ESTABLISHED)))
  113. mptcp_pm_schedule_work(msk, MPTCP_PM_ESTABLISHED);
  114. if ((msk->pm.status & BIT(MPTCP_PM_ALREADY_ESTABLISHED)) == 0)
  115. announce = true;
  116. msk->pm.status |= BIT(MPTCP_PM_ALREADY_ESTABLISHED);
  117. spin_unlock_bh(&pm->lock);
  118. if (announce)
  119. mptcp_event(MPTCP_EVENT_ESTABLISHED, msk, ssk, GFP_ATOMIC);
  120. }
  121. void mptcp_pm_connection_closed(struct mptcp_sock *msk)
  122. {
  123. pr_debug("msk=%p\n", msk);
  124. }
  125. void mptcp_pm_subflow_established(struct mptcp_sock *msk)
  126. {
  127. struct mptcp_pm_data *pm = &msk->pm;
  128. pr_debug("msk=%p\n", msk);
  129. if (!READ_ONCE(pm->work_pending))
  130. return;
  131. spin_lock_bh(&pm->lock);
  132. if (READ_ONCE(pm->work_pending))
  133. mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
  134. spin_unlock_bh(&pm->lock);
  135. }
  136. void mptcp_pm_subflow_check_next(struct mptcp_sock *msk,
  137. const struct mptcp_subflow_context *subflow)
  138. {
  139. struct mptcp_pm_data *pm = &msk->pm;
  140. bool update_subflows;
  141. update_subflows = subflow->request_join || subflow->mp_join;
  142. if (mptcp_pm_is_userspace(msk)) {
  143. if (update_subflows) {
  144. spin_lock_bh(&pm->lock);
  145. pm->subflows--;
  146. spin_unlock_bh(&pm->lock);
  147. }
  148. return;
  149. }
  150. if (!READ_ONCE(pm->work_pending) && !update_subflows)
  151. return;
  152. spin_lock_bh(&pm->lock);
  153. if (update_subflows)
  154. __mptcp_pm_close_subflow(msk);
  155. /* Even if this subflow is not really established, tell the PM to try
  156. * to pick the next ones, if possible.
  157. */
  158. if (mptcp_pm_nl_check_work_pending(msk))
  159. mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
  160. spin_unlock_bh(&pm->lock);
  161. }
  162. void mptcp_pm_add_addr_received(const struct sock *ssk,
  163. const struct mptcp_addr_info *addr)
  164. {
  165. struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
  166. struct mptcp_sock *msk = mptcp_sk(subflow->conn);
  167. struct mptcp_pm_data *pm = &msk->pm;
  168. pr_debug("msk=%p remote_id=%d accept=%d\n", msk, addr->id,
  169. READ_ONCE(pm->accept_addr));
  170. mptcp_event_addr_announced(ssk, addr);
  171. spin_lock_bh(&pm->lock);
  172. if (mptcp_pm_is_userspace(msk)) {
  173. if (mptcp_userspace_pm_active(msk)) {
  174. mptcp_pm_announce_addr(msk, addr, true);
  175. mptcp_pm_add_addr_send_ack(msk);
  176. } else {
  177. __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_ADDADDRDROP);
  178. }
  179. /* - id0 should not have a different address
  180. * - special case for C-flag: linked to fill_local_addresses_vec()
  181. */
  182. } else if ((addr->id == 0 && !mptcp_pm_nl_is_init_remote_addr(msk, addr)) ||
  183. (addr->id > 0 && !READ_ONCE(pm->accept_addr) &&
  184. !mptcp_pm_add_addr_c_flag_case(msk))) {
  185. mptcp_pm_announce_addr(msk, addr, true);
  186. mptcp_pm_add_addr_send_ack(msk);
  187. } else if (mptcp_pm_schedule_work(msk, MPTCP_PM_ADD_ADDR_RECEIVED)) {
  188. pm->remote = *addr;
  189. } else {
  190. __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_ADDADDRDROP);
  191. }
  192. spin_unlock_bh(&pm->lock);
  193. }
  194. void mptcp_pm_add_addr_echoed(struct mptcp_sock *msk,
  195. const struct mptcp_addr_info *addr)
  196. {
  197. struct mptcp_pm_data *pm = &msk->pm;
  198. pr_debug("msk=%p\n", msk);
  199. spin_lock_bh(&pm->lock);
  200. if (mptcp_lookup_anno_list_by_saddr(msk, addr) && READ_ONCE(pm->work_pending))
  201. mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
  202. spin_unlock_bh(&pm->lock);
  203. }
  204. void mptcp_pm_add_addr_send_ack(struct mptcp_sock *msk)
  205. {
  206. if (!mptcp_pm_should_add_signal(msk))
  207. return;
  208. mptcp_pm_schedule_work(msk, MPTCP_PM_ADD_ADDR_SEND_ACK);
  209. }
  210. void mptcp_pm_rm_addr_received(struct mptcp_sock *msk,
  211. const struct mptcp_rm_list *rm_list)
  212. {
  213. struct mptcp_pm_data *pm = &msk->pm;
  214. u8 i;
  215. pr_debug("msk=%p remote_ids_nr=%d\n", msk, rm_list->nr);
  216. for (i = 0; i < rm_list->nr; i++)
  217. mptcp_event_addr_removed(msk, rm_list->ids[i]);
  218. spin_lock_bh(&pm->lock);
  219. if (mptcp_pm_schedule_work(msk, MPTCP_PM_RM_ADDR_RECEIVED))
  220. pm->rm_list_rx = *rm_list;
  221. else
  222. __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_RMADDRDROP);
  223. spin_unlock_bh(&pm->lock);
  224. }
  225. void mptcp_pm_mp_prio_received(struct sock *ssk, u8 bkup)
  226. {
  227. struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
  228. struct sock *sk = subflow->conn;
  229. struct mptcp_sock *msk;
  230. pr_debug("subflow->backup=%d, bkup=%d\n", subflow->backup, bkup);
  231. msk = mptcp_sk(sk);
  232. if (subflow->backup != bkup)
  233. subflow->backup = bkup;
  234. mptcp_event(MPTCP_EVENT_SUB_PRIORITY, msk, ssk, GFP_ATOMIC);
  235. }
  236. void mptcp_pm_mp_fail_received(struct sock *sk, u64 fail_seq)
  237. {
  238. struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk);
  239. struct mptcp_sock *msk = mptcp_sk(subflow->conn);
  240. pr_debug("fail_seq=%llu\n", fail_seq);
  241. /* After accepting the fail, we can't create any other subflows */
  242. spin_lock_bh(&msk->fallback_lock);
  243. if (!msk->allow_infinite_fallback) {
  244. spin_unlock_bh(&msk->fallback_lock);
  245. return;
  246. }
  247. msk->allow_subflows = false;
  248. spin_unlock_bh(&msk->fallback_lock);
  249. if (!subflow->fail_tout) {
  250. pr_debug("send MP_FAIL response and infinite map\n");
  251. subflow->send_mp_fail = 1;
  252. subflow->send_infinite_map = 1;
  253. tcp_send_ack(sk);
  254. } else {
  255. pr_debug("MP_FAIL response received\n");
  256. WRITE_ONCE(subflow->fail_tout, 0);
  257. }
  258. }
  259. /* path manager helpers */
  260. bool mptcp_pm_add_addr_signal(struct mptcp_sock *msk, const struct sk_buff *skb,
  261. unsigned int opt_size, unsigned int remaining,
  262. struct mptcp_addr_info *addr, bool *echo,
  263. bool *drop_other_suboptions)
  264. {
  265. int ret = false;
  266. u8 add_addr;
  267. u8 family;
  268. bool port;
  269. spin_lock_bh(&msk->pm.lock);
  270. /* double check after the lock is acquired */
  271. if (!mptcp_pm_should_add_signal(msk))
  272. goto out_unlock;
  273. /* always drop every other options for pure ack ADD_ADDR; this is a
  274. * plain dup-ack from TCP perspective. The other MPTCP-relevant info,
  275. * if any, will be carried by the 'original' TCP ack
  276. */
  277. if (skb && skb_is_tcp_pure_ack(skb)) {
  278. remaining += opt_size;
  279. *drop_other_suboptions = true;
  280. }
  281. *echo = mptcp_pm_should_add_signal_echo(msk);
  282. port = !!(*echo ? msk->pm.remote.port : msk->pm.local.port);
  283. family = *echo ? msk->pm.remote.family : msk->pm.local.family;
  284. if (remaining < mptcp_add_addr_len(family, *echo, port))
  285. goto out_unlock;
  286. if (*echo) {
  287. *addr = msk->pm.remote;
  288. add_addr = msk->pm.addr_signal & ~BIT(MPTCP_ADD_ADDR_ECHO);
  289. } else {
  290. *addr = msk->pm.local;
  291. add_addr = msk->pm.addr_signal & ~BIT(MPTCP_ADD_ADDR_SIGNAL);
  292. }
  293. WRITE_ONCE(msk->pm.addr_signal, add_addr);
  294. ret = true;
  295. out_unlock:
  296. spin_unlock_bh(&msk->pm.lock);
  297. return ret;
  298. }
  299. bool mptcp_pm_rm_addr_signal(struct mptcp_sock *msk, unsigned int remaining,
  300. struct mptcp_rm_list *rm_list)
  301. {
  302. int ret = false, len;
  303. u8 rm_addr;
  304. spin_lock_bh(&msk->pm.lock);
  305. /* double check after the lock is acquired */
  306. if (!mptcp_pm_should_rm_signal(msk))
  307. goto out_unlock;
  308. rm_addr = msk->pm.addr_signal & ~BIT(MPTCP_RM_ADDR_SIGNAL);
  309. len = mptcp_rm_addr_len(&msk->pm.rm_list_tx);
  310. if (len < 0) {
  311. WRITE_ONCE(msk->pm.addr_signal, rm_addr);
  312. goto out_unlock;
  313. }
  314. if (remaining < len)
  315. goto out_unlock;
  316. *rm_list = msk->pm.rm_list_tx;
  317. WRITE_ONCE(msk->pm.addr_signal, rm_addr);
  318. ret = true;
  319. out_unlock:
  320. spin_unlock_bh(&msk->pm.lock);
  321. return ret;
  322. }
  323. int mptcp_pm_get_local_id(struct mptcp_sock *msk, struct sock_common *skc)
  324. {
  325. struct mptcp_addr_info skc_local;
  326. struct mptcp_addr_info msk_local;
  327. if (WARN_ON_ONCE(!msk))
  328. return -1;
  329. /* The 0 ID mapping is defined by the first subflow, copied into the msk
  330. * addr
  331. */
  332. mptcp_local_address((struct sock_common *)msk, &msk_local);
  333. mptcp_local_address((struct sock_common *)skc, &skc_local);
  334. if (mptcp_addresses_equal(&msk_local, &skc_local, false))
  335. return 0;
  336. if (mptcp_pm_is_userspace(msk))
  337. return mptcp_userspace_pm_get_local_id(msk, &skc_local);
  338. return mptcp_pm_nl_get_local_id(msk, &skc_local);
  339. }
  340. bool mptcp_pm_is_backup(struct mptcp_sock *msk, struct sock_common *skc)
  341. {
  342. struct mptcp_addr_info skc_local;
  343. mptcp_local_address((struct sock_common *)skc, &skc_local);
  344. if (mptcp_pm_is_userspace(msk))
  345. return mptcp_userspace_pm_is_backup(msk, &skc_local);
  346. return mptcp_pm_nl_is_backup(msk, &skc_local);
  347. }
  348. int mptcp_pm_get_addr(struct sk_buff *skb, struct genl_info *info)
  349. {
  350. if (info->attrs[MPTCP_PM_ATTR_TOKEN])
  351. return mptcp_userspace_pm_get_addr(skb, info);
  352. return mptcp_pm_nl_get_addr(skb, info);
  353. }
  354. int mptcp_pm_dump_addr(struct sk_buff *msg, struct netlink_callback *cb)
  355. {
  356. const struct genl_info *info = genl_info_dump(cb);
  357. if (info->attrs[MPTCP_PM_ATTR_TOKEN])
  358. return mptcp_userspace_pm_dump_addr(msg, cb);
  359. return mptcp_pm_nl_dump_addr(msg, cb);
  360. }
  361. int mptcp_pm_set_flags(struct sk_buff *skb, struct genl_info *info)
  362. {
  363. if (info->attrs[MPTCP_PM_ATTR_TOKEN])
  364. return mptcp_userspace_pm_set_flags(skb, info);
  365. return mptcp_pm_nl_set_flags(skb, info);
  366. }
  367. void mptcp_pm_subflow_chk_stale(const struct mptcp_sock *msk, struct sock *ssk)
  368. {
  369. struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
  370. u32 rcv_tstamp = READ_ONCE(tcp_sk(ssk)->rcv_tstamp);
  371. /* keep track of rtx periods with no progress */
  372. if (!subflow->stale_count) {
  373. subflow->stale_rcv_tstamp = rcv_tstamp;
  374. subflow->stale_count++;
  375. } else if (subflow->stale_rcv_tstamp == rcv_tstamp) {
  376. if (subflow->stale_count < U8_MAX)
  377. subflow->stale_count++;
  378. mptcp_pm_nl_subflow_chk_stale(msk, ssk);
  379. } else {
  380. subflow->stale_count = 0;
  381. mptcp_subflow_set_active(subflow);
  382. }
  383. }
  384. /* if sk is ipv4 or ipv6_only allows only same-family local and remote addresses,
  385. * otherwise allow any matching local/remote pair
  386. */
  387. bool mptcp_pm_addr_families_match(const struct sock *sk,
  388. const struct mptcp_addr_info *loc,
  389. const struct mptcp_addr_info *rem)
  390. {
  391. bool mptcp_is_v4 = sk->sk_family == AF_INET;
  392. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  393. bool loc_is_v4 = loc->family == AF_INET || ipv6_addr_v4mapped(&loc->addr6);
  394. bool rem_is_v4 = rem->family == AF_INET || ipv6_addr_v4mapped(&rem->addr6);
  395. if (mptcp_is_v4)
  396. return loc_is_v4 && rem_is_v4;
  397. if (ipv6_only_sock(sk))
  398. return !loc_is_v4 && !rem_is_v4;
  399. return loc_is_v4 == rem_is_v4;
  400. #else
  401. return mptcp_is_v4 && loc->family == AF_INET && rem->family == AF_INET;
  402. #endif
  403. }
  404. void mptcp_pm_data_reset(struct mptcp_sock *msk)
  405. {
  406. u8 pm_type = mptcp_get_pm_type(sock_net((struct sock *)msk));
  407. struct mptcp_pm_data *pm = &msk->pm;
  408. pm->add_addr_signaled = 0;
  409. pm->add_addr_accepted = 0;
  410. pm->local_addr_used = 0;
  411. pm->subflows = 0;
  412. pm->rm_list_tx.nr = 0;
  413. pm->rm_list_rx.nr = 0;
  414. WRITE_ONCE(pm->pm_type, pm_type);
  415. if (pm_type == MPTCP_PM_TYPE_KERNEL) {
  416. bool subflows_allowed = !!mptcp_pm_get_subflows_max(msk);
  417. /* pm->work_pending must be only be set to 'true' when
  418. * pm->pm_type is set to MPTCP_PM_TYPE_KERNEL
  419. */
  420. WRITE_ONCE(pm->work_pending,
  421. (!!mptcp_pm_get_local_addr_max(msk) &&
  422. subflows_allowed) ||
  423. !!mptcp_pm_get_add_addr_signal_max(msk));
  424. WRITE_ONCE(pm->accept_addr,
  425. !!mptcp_pm_get_add_addr_accept_max(msk) &&
  426. subflows_allowed);
  427. WRITE_ONCE(pm->accept_subflow, subflows_allowed);
  428. } else {
  429. WRITE_ONCE(pm->work_pending, 0);
  430. WRITE_ONCE(pm->accept_addr, 0);
  431. WRITE_ONCE(pm->accept_subflow, 0);
  432. }
  433. WRITE_ONCE(pm->addr_signal, 0);
  434. WRITE_ONCE(pm->remote_deny_join_id0, false);
  435. pm->status = 0;
  436. bitmap_fill(msk->pm.id_avail_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
  437. }
  438. void mptcp_pm_data_init(struct mptcp_sock *msk)
  439. {
  440. spin_lock_init(&msk->pm.lock);
  441. INIT_LIST_HEAD(&msk->pm.anno_list);
  442. INIT_LIST_HEAD(&msk->pm.userspace_pm_local_addr_list);
  443. mptcp_pm_data_reset(msk);
  444. }
  445. void __init mptcp_pm_init(void)
  446. {
  447. mptcp_pm_nl_init();
  448. }