pm_netlink.c 63 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470
  1. // SPDX-License-Identifier: GPL-2.0
  2. /* Multipath TCP
  3. *
  4. * Copyright (c) 2020, Red Hat, Inc.
  5. */
  6. #define pr_fmt(fmt) "MPTCP: " fmt
  7. #include <linux/inet.h>
  8. #include <linux/kernel.h>
  9. #include <net/inet_common.h>
  10. #include <net/netns/generic.h>
  11. #include <net/mptcp.h>
  12. #include "protocol.h"
  13. #include "mib.h"
  14. #include "mptcp_pm_gen.h"
  15. static int pm_nl_pernet_id;
  16. struct mptcp_pm_add_entry {
  17. struct list_head list;
  18. struct mptcp_addr_info addr;
  19. u8 retrans_times;
  20. struct timer_list add_timer;
  21. struct mptcp_sock *sock;
  22. };
  23. struct pm_nl_pernet {
  24. /* protects pernet updates */
  25. spinlock_t lock;
  26. struct list_head local_addr_list;
  27. unsigned int addrs;
  28. unsigned int stale_loss_cnt;
  29. unsigned int add_addr_signal_max;
  30. unsigned int add_addr_accept_max;
  31. unsigned int local_addr_max;
  32. unsigned int subflows_max;
  33. unsigned int next_id;
  34. DECLARE_BITMAP(id_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
  35. };
  36. #define MPTCP_PM_ADDR_MAX 8
  37. #define ADD_ADDR_RETRANS_MAX 3
  38. static struct pm_nl_pernet *pm_nl_get_pernet(const struct net *net)
  39. {
  40. return net_generic(net, pm_nl_pernet_id);
  41. }
  42. static struct pm_nl_pernet *
  43. pm_nl_get_pernet_from_msk(const struct mptcp_sock *msk)
  44. {
  45. return pm_nl_get_pernet(sock_net((struct sock *)msk));
  46. }
  47. bool mptcp_addresses_equal(const struct mptcp_addr_info *a,
  48. const struct mptcp_addr_info *b, bool use_port)
  49. {
  50. bool addr_equals = false;
  51. if (a->family == b->family) {
  52. if (a->family == AF_INET)
  53. addr_equals = a->addr.s_addr == b->addr.s_addr;
  54. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  55. else
  56. addr_equals = !ipv6_addr_cmp(&a->addr6, &b->addr6);
  57. } else if (a->family == AF_INET) {
  58. if (ipv6_addr_v4mapped(&b->addr6))
  59. addr_equals = a->addr.s_addr == b->addr6.s6_addr32[3];
  60. } else if (b->family == AF_INET) {
  61. if (ipv6_addr_v4mapped(&a->addr6))
  62. addr_equals = a->addr6.s6_addr32[3] == b->addr.s_addr;
  63. #endif
  64. }
  65. if (!addr_equals)
  66. return false;
  67. if (!use_port)
  68. return true;
  69. return a->port == b->port;
  70. }
  71. void mptcp_local_address(const struct sock_common *skc, struct mptcp_addr_info *addr)
  72. {
  73. addr->family = skc->skc_family;
  74. addr->port = htons(skc->skc_num);
  75. if (addr->family == AF_INET)
  76. addr->addr.s_addr = skc->skc_rcv_saddr;
  77. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  78. else if (addr->family == AF_INET6)
  79. addr->addr6 = skc->skc_v6_rcv_saddr;
  80. #endif
  81. }
  82. static void remote_address(const struct sock_common *skc,
  83. struct mptcp_addr_info *addr)
  84. {
  85. addr->family = skc->skc_family;
  86. addr->port = skc->skc_dport;
  87. if (addr->family == AF_INET)
  88. addr->addr.s_addr = skc->skc_daddr;
  89. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  90. else if (addr->family == AF_INET6)
  91. addr->addr6 = skc->skc_v6_daddr;
  92. #endif
  93. }
  94. static bool lookup_subflow_by_saddr(const struct list_head *list,
  95. const struct mptcp_addr_info *saddr)
  96. {
  97. struct mptcp_subflow_context *subflow;
  98. struct mptcp_addr_info cur;
  99. struct sock_common *skc;
  100. list_for_each_entry(subflow, list, node) {
  101. skc = (struct sock_common *)mptcp_subflow_tcp_sock(subflow);
  102. mptcp_local_address(skc, &cur);
  103. if (mptcp_addresses_equal(&cur, saddr, saddr->port))
  104. return true;
  105. }
  106. return false;
  107. }
  108. static bool lookup_subflow_by_daddr(const struct list_head *list,
  109. const struct mptcp_addr_info *daddr)
  110. {
  111. struct mptcp_subflow_context *subflow;
  112. struct mptcp_addr_info cur;
  113. list_for_each_entry(subflow, list, node) {
  114. struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
  115. if (!((1 << inet_sk_state_load(ssk)) &
  116. (TCPF_ESTABLISHED | TCPF_SYN_SENT | TCPF_SYN_RECV)))
  117. continue;
  118. remote_address((struct sock_common *)ssk, &cur);
  119. if (mptcp_addresses_equal(&cur, daddr, daddr->port))
  120. return true;
  121. }
  122. return false;
  123. }
  124. static bool
  125. select_local_address(const struct pm_nl_pernet *pernet,
  126. const struct mptcp_sock *msk,
  127. struct mptcp_pm_local *new_local)
  128. {
  129. struct mptcp_pm_addr_entry *entry;
  130. bool found = false;
  131. msk_owned_by_me(msk);
  132. rcu_read_lock();
  133. list_for_each_entry_rcu(entry, &pernet->local_addr_list, list) {
  134. if (!(entry->flags & MPTCP_PM_ADDR_FLAG_SUBFLOW))
  135. continue;
  136. if (!test_bit(entry->addr.id, msk->pm.id_avail_bitmap))
  137. continue;
  138. new_local->addr = entry->addr;
  139. new_local->flags = entry->flags;
  140. new_local->ifindex = entry->ifindex;
  141. found = true;
  142. break;
  143. }
  144. rcu_read_unlock();
  145. return found;
  146. }
  147. static bool
  148. select_signal_address(struct pm_nl_pernet *pernet, const struct mptcp_sock *msk,
  149. struct mptcp_pm_local *new_local)
  150. {
  151. struct mptcp_pm_addr_entry *entry;
  152. bool found = false;
  153. rcu_read_lock();
  154. /* do not keep any additional per socket state, just signal
  155. * the address list in order.
  156. * Note: removal from the local address list during the msk life-cycle
  157. * can lead to additional addresses not being announced.
  158. */
  159. list_for_each_entry_rcu(entry, &pernet->local_addr_list, list) {
  160. if (!test_bit(entry->addr.id, msk->pm.id_avail_bitmap))
  161. continue;
  162. if (!(entry->flags & MPTCP_PM_ADDR_FLAG_SIGNAL))
  163. continue;
  164. new_local->addr = entry->addr;
  165. new_local->flags = entry->flags;
  166. new_local->ifindex = entry->ifindex;
  167. found = true;
  168. break;
  169. }
  170. rcu_read_unlock();
  171. return found;
  172. }
  173. unsigned int mptcp_pm_get_add_addr_signal_max(const struct mptcp_sock *msk)
  174. {
  175. const struct pm_nl_pernet *pernet = pm_nl_get_pernet_from_msk(msk);
  176. return READ_ONCE(pernet->add_addr_signal_max);
  177. }
  178. EXPORT_SYMBOL_GPL(mptcp_pm_get_add_addr_signal_max);
  179. unsigned int mptcp_pm_get_add_addr_accept_max(const struct mptcp_sock *msk)
  180. {
  181. struct pm_nl_pernet *pernet = pm_nl_get_pernet_from_msk(msk);
  182. return READ_ONCE(pernet->add_addr_accept_max);
  183. }
  184. EXPORT_SYMBOL_GPL(mptcp_pm_get_add_addr_accept_max);
  185. unsigned int mptcp_pm_get_subflows_max(const struct mptcp_sock *msk)
  186. {
  187. struct pm_nl_pernet *pernet = pm_nl_get_pernet_from_msk(msk);
  188. return READ_ONCE(pernet->subflows_max);
  189. }
  190. EXPORT_SYMBOL_GPL(mptcp_pm_get_subflows_max);
  191. unsigned int mptcp_pm_get_local_addr_max(const struct mptcp_sock *msk)
  192. {
  193. struct pm_nl_pernet *pernet = pm_nl_get_pernet_from_msk(msk);
  194. return READ_ONCE(pernet->local_addr_max);
  195. }
  196. EXPORT_SYMBOL_GPL(mptcp_pm_get_local_addr_max);
  197. bool mptcp_pm_nl_check_work_pending(struct mptcp_sock *msk)
  198. {
  199. struct pm_nl_pernet *pernet = pm_nl_get_pernet_from_msk(msk);
  200. if (msk->pm.subflows == mptcp_pm_get_subflows_max(msk) ||
  201. (find_next_and_bit(pernet->id_bitmap, msk->pm.id_avail_bitmap,
  202. MPTCP_PM_MAX_ADDR_ID + 1, 0) == MPTCP_PM_MAX_ADDR_ID + 1)) {
  203. WRITE_ONCE(msk->pm.work_pending, false);
  204. return false;
  205. }
  206. return true;
  207. }
  208. struct mptcp_pm_add_entry *
  209. mptcp_lookup_anno_list_by_saddr(const struct mptcp_sock *msk,
  210. const struct mptcp_addr_info *addr)
  211. {
  212. struct mptcp_pm_add_entry *entry;
  213. lockdep_assert_held(&msk->pm.lock);
  214. list_for_each_entry(entry, &msk->pm.anno_list, list) {
  215. if (mptcp_addresses_equal(&entry->addr, addr, true))
  216. return entry;
  217. }
  218. return NULL;
  219. }
  220. bool mptcp_pm_sport_in_anno_list(struct mptcp_sock *msk, const struct sock *sk)
  221. {
  222. struct mptcp_pm_add_entry *entry;
  223. struct mptcp_addr_info saddr;
  224. bool ret = false;
  225. mptcp_local_address((struct sock_common *)sk, &saddr);
  226. spin_lock_bh(&msk->pm.lock);
  227. list_for_each_entry(entry, &msk->pm.anno_list, list) {
  228. if (mptcp_addresses_equal(&entry->addr, &saddr, true)) {
  229. ret = true;
  230. goto out;
  231. }
  232. }
  233. out:
  234. spin_unlock_bh(&msk->pm.lock);
  235. return ret;
  236. }
  237. static void mptcp_pm_add_timer(struct timer_list *timer)
  238. {
  239. struct mptcp_pm_add_entry *entry = from_timer(entry, timer, add_timer);
  240. struct mptcp_sock *msk = entry->sock;
  241. struct sock *sk = (struct sock *)msk;
  242. pr_debug("msk=%p\n", msk);
  243. if (!msk)
  244. return;
  245. if (inet_sk_state_load(sk) == TCP_CLOSE)
  246. return;
  247. if (!entry->addr.id)
  248. return;
  249. if (mptcp_pm_should_add_signal_addr(msk)) {
  250. sk_reset_timer(sk, timer, jiffies + TCP_RTO_MAX / 8);
  251. goto out;
  252. }
  253. spin_lock_bh(&msk->pm.lock);
  254. if (!mptcp_pm_should_add_signal_addr(msk)) {
  255. pr_debug("retransmit ADD_ADDR id=%d\n", entry->addr.id);
  256. mptcp_pm_announce_addr(msk, &entry->addr, false);
  257. mptcp_pm_add_addr_send_ack(msk);
  258. entry->retrans_times++;
  259. }
  260. if (entry->retrans_times < ADD_ADDR_RETRANS_MAX)
  261. sk_reset_timer(sk, timer,
  262. jiffies + mptcp_get_add_addr_timeout(sock_net(sk)));
  263. spin_unlock_bh(&msk->pm.lock);
  264. if (entry->retrans_times == ADD_ADDR_RETRANS_MAX)
  265. mptcp_pm_subflow_established(msk);
  266. out:
  267. __sock_put(sk);
  268. }
  269. struct mptcp_pm_add_entry *
  270. mptcp_pm_del_add_timer(struct mptcp_sock *msk,
  271. const struct mptcp_addr_info *addr, bool check_id)
  272. {
  273. struct mptcp_pm_add_entry *entry;
  274. struct sock *sk = (struct sock *)msk;
  275. struct timer_list *add_timer = NULL;
  276. spin_lock_bh(&msk->pm.lock);
  277. entry = mptcp_lookup_anno_list_by_saddr(msk, addr);
  278. if (entry && (!check_id || entry->addr.id == addr->id)) {
  279. entry->retrans_times = ADD_ADDR_RETRANS_MAX;
  280. add_timer = &entry->add_timer;
  281. }
  282. if (!check_id && entry)
  283. list_del(&entry->list);
  284. spin_unlock_bh(&msk->pm.lock);
  285. /* no lock, because sk_stop_timer_sync() is calling del_timer_sync() */
  286. if (add_timer)
  287. sk_stop_timer_sync(sk, add_timer);
  288. return entry;
  289. }
  290. bool mptcp_pm_alloc_anno_list(struct mptcp_sock *msk,
  291. const struct mptcp_addr_info *addr)
  292. {
  293. struct mptcp_pm_add_entry *add_entry = NULL;
  294. struct sock *sk = (struct sock *)msk;
  295. struct net *net = sock_net(sk);
  296. lockdep_assert_held(&msk->pm.lock);
  297. add_entry = mptcp_lookup_anno_list_by_saddr(msk, addr);
  298. if (add_entry) {
  299. if (WARN_ON_ONCE(mptcp_pm_is_kernel(msk)))
  300. return false;
  301. sk_reset_timer(sk, &add_entry->add_timer,
  302. jiffies + mptcp_get_add_addr_timeout(net));
  303. return true;
  304. }
  305. add_entry = kmalloc(sizeof(*add_entry), GFP_ATOMIC);
  306. if (!add_entry)
  307. return false;
  308. list_add(&add_entry->list, &msk->pm.anno_list);
  309. add_entry->addr = *addr;
  310. add_entry->sock = msk;
  311. add_entry->retrans_times = 0;
  312. timer_setup(&add_entry->add_timer, mptcp_pm_add_timer, 0);
  313. sk_reset_timer(sk, &add_entry->add_timer,
  314. jiffies + mptcp_get_add_addr_timeout(net));
  315. return true;
  316. }
  317. void mptcp_pm_free_anno_list(struct mptcp_sock *msk)
  318. {
  319. struct mptcp_pm_add_entry *entry, *tmp;
  320. struct sock *sk = (struct sock *)msk;
  321. LIST_HEAD(free_list);
  322. pr_debug("msk=%p\n", msk);
  323. spin_lock_bh(&msk->pm.lock);
  324. list_splice_init(&msk->pm.anno_list, &free_list);
  325. spin_unlock_bh(&msk->pm.lock);
  326. list_for_each_entry_safe(entry, tmp, &free_list, list) {
  327. sk_stop_timer_sync(sk, &entry->add_timer);
  328. kfree(entry);
  329. }
  330. }
  331. /* Fill all the remote addresses into the array addrs[],
  332. * and return the array size.
  333. */
  334. static unsigned int fill_remote_addresses_vec(struct mptcp_sock *msk,
  335. struct mptcp_addr_info *local,
  336. bool fullmesh,
  337. struct mptcp_addr_info *addrs)
  338. {
  339. bool deny_id0 = READ_ONCE(msk->pm.remote_deny_join_id0);
  340. struct sock *sk = (struct sock *)msk, *ssk;
  341. struct mptcp_subflow_context *subflow;
  342. struct mptcp_addr_info remote = { 0 };
  343. unsigned int subflows_max;
  344. int i = 0;
  345. subflows_max = mptcp_pm_get_subflows_max(msk);
  346. remote_address((struct sock_common *)sk, &remote);
  347. /* Non-fullmesh endpoint, fill in the single entry
  348. * corresponding to the primary MPC subflow remote address
  349. */
  350. if (!fullmesh) {
  351. if (deny_id0)
  352. return 0;
  353. if (!mptcp_pm_addr_families_match(sk, local, &remote))
  354. return 0;
  355. msk->pm.subflows++;
  356. addrs[i++] = remote;
  357. } else {
  358. DECLARE_BITMAP(unavail_id, MPTCP_PM_MAX_ADDR_ID + 1);
  359. /* Forbid creation of new subflows matching existing
  360. * ones, possibly already created by incoming ADD_ADDR
  361. */
  362. bitmap_zero(unavail_id, MPTCP_PM_MAX_ADDR_ID + 1);
  363. mptcp_for_each_subflow(msk, subflow)
  364. if (READ_ONCE(subflow->local_id) == local->id)
  365. __set_bit(subflow->remote_id, unavail_id);
  366. mptcp_for_each_subflow(msk, subflow) {
  367. ssk = mptcp_subflow_tcp_sock(subflow);
  368. remote_address((struct sock_common *)ssk, &addrs[i]);
  369. addrs[i].id = READ_ONCE(subflow->remote_id);
  370. if (deny_id0 && !addrs[i].id)
  371. continue;
  372. if (test_bit(addrs[i].id, unavail_id))
  373. continue;
  374. if (!mptcp_pm_addr_families_match(sk, local, &addrs[i]))
  375. continue;
  376. if (msk->pm.subflows < subflows_max) {
  377. /* forbid creating multiple address towards
  378. * this id
  379. */
  380. __set_bit(addrs[i].id, unavail_id);
  381. msk->pm.subflows++;
  382. i++;
  383. }
  384. }
  385. }
  386. return i;
  387. }
  388. static void __mptcp_pm_send_ack(struct mptcp_sock *msk, struct mptcp_subflow_context *subflow,
  389. bool prio, bool backup)
  390. {
  391. struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
  392. bool slow;
  393. pr_debug("send ack for %s\n",
  394. prio ? "mp_prio" : (mptcp_pm_should_add_signal(msk) ? "add_addr" : "rm_addr"));
  395. slow = lock_sock_fast(ssk);
  396. if (prio) {
  397. subflow->send_mp_prio = 1;
  398. subflow->request_bkup = backup;
  399. }
  400. __mptcp_subflow_send_ack(ssk);
  401. unlock_sock_fast(ssk, slow);
  402. }
  403. static void mptcp_pm_send_ack(struct mptcp_sock *msk, struct mptcp_subflow_context *subflow,
  404. bool prio, bool backup)
  405. {
  406. spin_unlock_bh(&msk->pm.lock);
  407. __mptcp_pm_send_ack(msk, subflow, prio, backup);
  408. spin_lock_bh(&msk->pm.lock);
  409. }
  410. static struct mptcp_pm_addr_entry *
  411. __lookup_addr_by_id(struct pm_nl_pernet *pernet, unsigned int id)
  412. {
  413. struct mptcp_pm_addr_entry *entry;
  414. list_for_each_entry(entry, &pernet->local_addr_list, list) {
  415. if (entry->addr.id == id)
  416. return entry;
  417. }
  418. return NULL;
  419. }
  420. static struct mptcp_pm_addr_entry *
  421. __lookup_addr(struct pm_nl_pernet *pernet, const struct mptcp_addr_info *info)
  422. {
  423. struct mptcp_pm_addr_entry *entry;
  424. list_for_each_entry_rcu(entry, &pernet->local_addr_list, list,
  425. lockdep_is_held(&pernet->lock)) {
  426. if (mptcp_addresses_equal(&entry->addr, info, entry->addr.port))
  427. return entry;
  428. }
  429. return NULL;
  430. }
  431. static void mptcp_pm_create_subflow_or_signal_addr(struct mptcp_sock *msk)
  432. {
  433. struct sock *sk = (struct sock *)msk;
  434. unsigned int add_addr_signal_max;
  435. bool signal_and_subflow = false;
  436. unsigned int local_addr_max;
  437. struct pm_nl_pernet *pernet;
  438. struct mptcp_pm_local local;
  439. unsigned int subflows_max;
  440. pernet = pm_nl_get_pernet(sock_net(sk));
  441. add_addr_signal_max = mptcp_pm_get_add_addr_signal_max(msk);
  442. local_addr_max = mptcp_pm_get_local_addr_max(msk);
  443. subflows_max = mptcp_pm_get_subflows_max(msk);
  444. /* do lazy endpoint usage accounting for the MPC subflows */
  445. if (unlikely(!(msk->pm.status & BIT(MPTCP_PM_MPC_ENDPOINT_ACCOUNTED))) && msk->first) {
  446. struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(msk->first);
  447. struct mptcp_pm_addr_entry *entry;
  448. struct mptcp_addr_info mpc_addr;
  449. bool backup = false;
  450. mptcp_local_address((struct sock_common *)msk->first, &mpc_addr);
  451. rcu_read_lock();
  452. entry = __lookup_addr(pernet, &mpc_addr);
  453. if (entry) {
  454. __clear_bit(entry->addr.id, msk->pm.id_avail_bitmap);
  455. msk->mpc_endpoint_id = entry->addr.id;
  456. backup = !!(entry->flags & MPTCP_PM_ADDR_FLAG_BACKUP);
  457. }
  458. rcu_read_unlock();
  459. if (backup)
  460. mptcp_pm_send_ack(msk, subflow, true, backup);
  461. msk->pm.status |= BIT(MPTCP_PM_MPC_ENDPOINT_ACCOUNTED);
  462. }
  463. pr_debug("local %d:%d signal %d:%d subflows %d:%d\n",
  464. msk->pm.local_addr_used, local_addr_max,
  465. msk->pm.add_addr_signaled, add_addr_signal_max,
  466. msk->pm.subflows, subflows_max);
  467. /* check first for announce */
  468. if (msk->pm.add_addr_signaled < add_addr_signal_max) {
  469. /* due to racing events on both ends we can reach here while
  470. * previous add address is still running: if we invoke now
  471. * mptcp_pm_announce_addr(), that will fail and the
  472. * corresponding id will be marked as used.
  473. * Instead let the PM machinery reschedule us when the
  474. * current address announce will be completed.
  475. */
  476. if (msk->pm.addr_signal & BIT(MPTCP_ADD_ADDR_SIGNAL))
  477. return;
  478. if (!select_signal_address(pernet, msk, &local))
  479. goto subflow;
  480. /* If the alloc fails, we are on memory pressure, not worth
  481. * continuing, and trying to create subflows.
  482. */
  483. if (!mptcp_pm_alloc_anno_list(msk, &local.addr))
  484. return;
  485. __clear_bit(local.addr.id, msk->pm.id_avail_bitmap);
  486. msk->pm.add_addr_signaled++;
  487. /* Special case for ID0: set the correct ID */
  488. if (local.addr.id == msk->mpc_endpoint_id)
  489. local.addr.id = 0;
  490. mptcp_pm_announce_addr(msk, &local.addr, false);
  491. mptcp_pm_nl_addr_send_ack(msk);
  492. if (local.flags & MPTCP_PM_ADDR_FLAG_SUBFLOW)
  493. signal_and_subflow = true;
  494. }
  495. subflow:
  496. /* check if should create a new subflow */
  497. while (msk->pm.local_addr_used < local_addr_max &&
  498. msk->pm.subflows < subflows_max) {
  499. struct mptcp_addr_info addrs[MPTCP_PM_ADDR_MAX];
  500. bool fullmesh;
  501. int i, nr;
  502. if (signal_and_subflow)
  503. signal_and_subflow = false;
  504. else if (!select_local_address(pernet, msk, &local))
  505. break;
  506. fullmesh = !!(local.flags & MPTCP_PM_ADDR_FLAG_FULLMESH);
  507. __clear_bit(local.addr.id, msk->pm.id_avail_bitmap);
  508. /* Special case for ID0: set the correct ID */
  509. if (local.addr.id == msk->mpc_endpoint_id)
  510. local.addr.id = 0;
  511. else /* local_addr_used is not decr for ID 0 */
  512. msk->pm.local_addr_used++;
  513. nr = fill_remote_addresses_vec(msk, &local.addr, fullmesh, addrs);
  514. if (nr == 0)
  515. continue;
  516. spin_unlock_bh(&msk->pm.lock);
  517. for (i = 0; i < nr; i++)
  518. __mptcp_subflow_connect(sk, &local, &addrs[i]);
  519. spin_lock_bh(&msk->pm.lock);
  520. }
  521. mptcp_pm_nl_check_work_pending(msk);
  522. }
  523. static void mptcp_pm_nl_fully_established(struct mptcp_sock *msk)
  524. {
  525. mptcp_pm_create_subflow_or_signal_addr(msk);
  526. }
  527. static void mptcp_pm_nl_subflow_established(struct mptcp_sock *msk)
  528. {
  529. mptcp_pm_create_subflow_or_signal_addr(msk);
  530. }
  531. /* Fill all the local addresses into the array addrs[],
  532. * and return the array size.
  533. */
  534. static unsigned int fill_local_addresses_vec(struct mptcp_sock *msk,
  535. struct mptcp_addr_info *remote,
  536. struct mptcp_pm_local *locals)
  537. {
  538. struct sock *sk = (struct sock *)msk;
  539. struct mptcp_pm_addr_entry *entry;
  540. struct mptcp_addr_info mpc_addr;
  541. struct pm_nl_pernet *pernet;
  542. unsigned int subflows_max;
  543. int i = 0;
  544. pernet = pm_nl_get_pernet_from_msk(msk);
  545. subflows_max = mptcp_pm_get_subflows_max(msk);
  546. mptcp_local_address((struct sock_common *)msk, &mpc_addr);
  547. rcu_read_lock();
  548. list_for_each_entry_rcu(entry, &pernet->local_addr_list, list) {
  549. if (!(entry->flags & MPTCP_PM_ADDR_FLAG_FULLMESH))
  550. continue;
  551. if (!mptcp_pm_addr_families_match(sk, &entry->addr, remote))
  552. continue;
  553. if (msk->pm.subflows < subflows_max) {
  554. locals[i].addr = entry->addr;
  555. locals[i].flags = entry->flags;
  556. locals[i].ifindex = entry->ifindex;
  557. /* Special case for ID0: set the correct ID */
  558. if (mptcp_addresses_equal(&locals[i].addr, &mpc_addr, locals[i].addr.port))
  559. locals[i].addr.id = 0;
  560. msk->pm.subflows++;
  561. i++;
  562. }
  563. }
  564. rcu_read_unlock();
  565. /* If the array is empty, fill in the single
  566. * 'IPADDRANY' local address
  567. */
  568. if (!i) {
  569. memset(&locals[i], 0, sizeof(locals[i]));
  570. locals[i].addr.family =
  571. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  572. remote->family == AF_INET6 &&
  573. ipv6_addr_v4mapped(&remote->addr6) ? AF_INET :
  574. #endif
  575. remote->family;
  576. if (!mptcp_pm_addr_families_match(sk, &locals[i].addr, remote))
  577. return 0;
  578. msk->pm.subflows++;
  579. i++;
  580. }
  581. return i;
  582. }
  583. static void mptcp_pm_nl_add_addr_received(struct mptcp_sock *msk)
  584. {
  585. struct mptcp_pm_local locals[MPTCP_PM_ADDR_MAX];
  586. struct sock *sk = (struct sock *)msk;
  587. unsigned int add_addr_accept_max;
  588. struct mptcp_addr_info remote;
  589. unsigned int subflows_max;
  590. bool sf_created = false;
  591. int i, nr;
  592. add_addr_accept_max = mptcp_pm_get_add_addr_accept_max(msk);
  593. subflows_max = mptcp_pm_get_subflows_max(msk);
  594. pr_debug("accepted %d:%d remote family %d\n",
  595. msk->pm.add_addr_accepted, add_addr_accept_max,
  596. msk->pm.remote.family);
  597. remote = msk->pm.remote;
  598. mptcp_pm_announce_addr(msk, &remote, true);
  599. mptcp_pm_nl_addr_send_ack(msk);
  600. if (lookup_subflow_by_daddr(&msk->conn_list, &remote))
  601. return;
  602. /* pick id 0 port, if none is provided the remote address */
  603. if (!remote.port)
  604. remote.port = sk->sk_dport;
  605. /* connect to the specified remote address, using whatever
  606. * local address the routing configuration will pick.
  607. */
  608. nr = fill_local_addresses_vec(msk, &remote, locals);
  609. if (nr == 0)
  610. return;
  611. spin_unlock_bh(&msk->pm.lock);
  612. for (i = 0; i < nr; i++)
  613. if (__mptcp_subflow_connect(sk, &locals[i], &remote) == 0)
  614. sf_created = true;
  615. spin_lock_bh(&msk->pm.lock);
  616. if (sf_created) {
  617. /* add_addr_accepted is not decr for ID 0 */
  618. if (remote.id)
  619. msk->pm.add_addr_accepted++;
  620. if (msk->pm.add_addr_accepted >= add_addr_accept_max ||
  621. msk->pm.subflows >= subflows_max)
  622. WRITE_ONCE(msk->pm.accept_addr, false);
  623. }
  624. }
  625. bool mptcp_pm_nl_is_init_remote_addr(struct mptcp_sock *msk,
  626. const struct mptcp_addr_info *remote)
  627. {
  628. struct mptcp_addr_info mpc_remote;
  629. remote_address((struct sock_common *)msk, &mpc_remote);
  630. return mptcp_addresses_equal(&mpc_remote, remote, remote->port);
  631. }
  632. void mptcp_pm_nl_addr_send_ack(struct mptcp_sock *msk)
  633. {
  634. struct mptcp_subflow_context *subflow;
  635. msk_owned_by_me(msk);
  636. lockdep_assert_held(&msk->pm.lock);
  637. if (!mptcp_pm_should_add_signal(msk) &&
  638. !mptcp_pm_should_rm_signal(msk))
  639. return;
  640. mptcp_for_each_subflow(msk, subflow) {
  641. if (__mptcp_subflow_active(subflow)) {
  642. mptcp_pm_send_ack(msk, subflow, false, false);
  643. break;
  644. }
  645. }
  646. }
  647. int mptcp_pm_nl_mp_prio_send_ack(struct mptcp_sock *msk,
  648. struct mptcp_addr_info *addr,
  649. struct mptcp_addr_info *rem,
  650. u8 bkup)
  651. {
  652. struct mptcp_subflow_context *subflow;
  653. pr_debug("bkup=%d\n", bkup);
  654. mptcp_for_each_subflow(msk, subflow) {
  655. struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
  656. struct mptcp_addr_info local, remote;
  657. mptcp_local_address((struct sock_common *)ssk, &local);
  658. if (!mptcp_addresses_equal(&local, addr, addr->port))
  659. continue;
  660. if (rem && rem->family != AF_UNSPEC) {
  661. remote_address((struct sock_common *)ssk, &remote);
  662. if (!mptcp_addresses_equal(&remote, rem, rem->port))
  663. continue;
  664. }
  665. __mptcp_pm_send_ack(msk, subflow, true, bkup);
  666. return 0;
  667. }
  668. return -EINVAL;
  669. }
  670. static void mptcp_pm_nl_rm_addr_or_subflow(struct mptcp_sock *msk,
  671. const struct mptcp_rm_list *rm_list,
  672. enum linux_mptcp_mib_field rm_type)
  673. {
  674. struct mptcp_subflow_context *subflow, *tmp;
  675. struct sock *sk = (struct sock *)msk;
  676. u8 i;
  677. pr_debug("%s rm_list_nr %d\n",
  678. rm_type == MPTCP_MIB_RMADDR ? "address" : "subflow", rm_list->nr);
  679. msk_owned_by_me(msk);
  680. if (sk->sk_state == TCP_LISTEN)
  681. return;
  682. if (!rm_list->nr)
  683. return;
  684. if (list_empty(&msk->conn_list))
  685. return;
  686. for (i = 0; i < rm_list->nr; i++) {
  687. u8 rm_id = rm_list->ids[i];
  688. bool removed = false;
  689. mptcp_for_each_subflow_safe(msk, subflow, tmp) {
  690. struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
  691. u8 remote_id = READ_ONCE(subflow->remote_id);
  692. int how = RCV_SHUTDOWN | SEND_SHUTDOWN;
  693. u8 id = subflow_get_local_id(subflow);
  694. if ((1 << inet_sk_state_load(ssk)) &
  695. (TCPF_FIN_WAIT1 | TCPF_FIN_WAIT2 | TCPF_CLOSING | TCPF_CLOSE))
  696. continue;
  697. if (rm_type == MPTCP_MIB_RMADDR && remote_id != rm_id)
  698. continue;
  699. if (rm_type == MPTCP_MIB_RMSUBFLOW && id != rm_id)
  700. continue;
  701. pr_debug(" -> %s rm_list_ids[%d]=%u local_id=%u remote_id=%u mpc_id=%u\n",
  702. rm_type == MPTCP_MIB_RMADDR ? "address" : "subflow",
  703. i, rm_id, id, remote_id, msk->mpc_endpoint_id);
  704. spin_unlock_bh(&msk->pm.lock);
  705. mptcp_subflow_shutdown(sk, ssk, how);
  706. removed |= subflow->request_join;
  707. /* the following takes care of updating the subflows counter */
  708. mptcp_close_ssk(sk, ssk, subflow);
  709. spin_lock_bh(&msk->pm.lock);
  710. if (rm_type == MPTCP_MIB_RMSUBFLOW)
  711. __MPTCP_INC_STATS(sock_net(sk), rm_type);
  712. }
  713. if (rm_type == MPTCP_MIB_RMADDR)
  714. __MPTCP_INC_STATS(sock_net(sk), rm_type);
  715. if (!removed)
  716. continue;
  717. if (!mptcp_pm_is_kernel(msk))
  718. continue;
  719. if (rm_type == MPTCP_MIB_RMADDR && rm_id &&
  720. !WARN_ON_ONCE(msk->pm.add_addr_accepted == 0)) {
  721. /* Note: if the subflow has been closed before, this
  722. * add_addr_accepted counter will not be decremented.
  723. */
  724. if (--msk->pm.add_addr_accepted < mptcp_pm_get_add_addr_accept_max(msk))
  725. WRITE_ONCE(msk->pm.accept_addr, true);
  726. }
  727. }
  728. }
  729. static void mptcp_pm_nl_rm_addr_received(struct mptcp_sock *msk)
  730. {
  731. mptcp_pm_nl_rm_addr_or_subflow(msk, &msk->pm.rm_list_rx, MPTCP_MIB_RMADDR);
  732. }
  733. static void mptcp_pm_nl_rm_subflow_received(struct mptcp_sock *msk,
  734. const struct mptcp_rm_list *rm_list)
  735. {
  736. mptcp_pm_nl_rm_addr_or_subflow(msk, rm_list, MPTCP_MIB_RMSUBFLOW);
  737. }
  738. void mptcp_pm_nl_work(struct mptcp_sock *msk)
  739. {
  740. struct mptcp_pm_data *pm = &msk->pm;
  741. msk_owned_by_me(msk);
  742. if (!(pm->status & MPTCP_PM_WORK_MASK))
  743. return;
  744. spin_lock_bh(&msk->pm.lock);
  745. pr_debug("msk=%p status=%x\n", msk, pm->status);
  746. if (pm->status & BIT(MPTCP_PM_ADD_ADDR_RECEIVED)) {
  747. pm->status &= ~BIT(MPTCP_PM_ADD_ADDR_RECEIVED);
  748. mptcp_pm_nl_add_addr_received(msk);
  749. }
  750. if (pm->status & BIT(MPTCP_PM_ADD_ADDR_SEND_ACK)) {
  751. pm->status &= ~BIT(MPTCP_PM_ADD_ADDR_SEND_ACK);
  752. mptcp_pm_nl_addr_send_ack(msk);
  753. }
  754. if (pm->status & BIT(MPTCP_PM_RM_ADDR_RECEIVED)) {
  755. pm->status &= ~BIT(MPTCP_PM_RM_ADDR_RECEIVED);
  756. mptcp_pm_nl_rm_addr_received(msk);
  757. }
  758. if (pm->status & BIT(MPTCP_PM_ESTABLISHED)) {
  759. pm->status &= ~BIT(MPTCP_PM_ESTABLISHED);
  760. mptcp_pm_nl_fully_established(msk);
  761. }
  762. if (pm->status & BIT(MPTCP_PM_SUBFLOW_ESTABLISHED)) {
  763. pm->status &= ~BIT(MPTCP_PM_SUBFLOW_ESTABLISHED);
  764. mptcp_pm_nl_subflow_established(msk);
  765. }
  766. spin_unlock_bh(&msk->pm.lock);
  767. }
  768. static bool address_use_port(struct mptcp_pm_addr_entry *entry)
  769. {
  770. return (entry->flags &
  771. (MPTCP_PM_ADDR_FLAG_SIGNAL | MPTCP_PM_ADDR_FLAG_SUBFLOW)) ==
  772. MPTCP_PM_ADDR_FLAG_SIGNAL;
  773. }
  774. /* caller must ensure the RCU grace period is already elapsed */
  775. static void __mptcp_pm_release_addr_entry(struct mptcp_pm_addr_entry *entry)
  776. {
  777. if (entry->lsk)
  778. sock_release(entry->lsk);
  779. kfree(entry);
  780. }
  781. static int mptcp_pm_nl_append_new_local_addr(struct pm_nl_pernet *pernet,
  782. struct mptcp_pm_addr_entry *entry,
  783. bool needs_id)
  784. {
  785. struct mptcp_pm_addr_entry *cur, *del_entry = NULL;
  786. unsigned int addr_max;
  787. int ret = -EINVAL;
  788. spin_lock_bh(&pernet->lock);
  789. /* to keep the code simple, don't do IDR-like allocation for address ID,
  790. * just bail when we exceed limits
  791. */
  792. if (pernet->next_id == MPTCP_PM_MAX_ADDR_ID)
  793. pernet->next_id = 1;
  794. if (pernet->addrs >= MPTCP_PM_ADDR_MAX) {
  795. ret = -ERANGE;
  796. goto out;
  797. }
  798. if (test_bit(entry->addr.id, pernet->id_bitmap)) {
  799. ret = -EBUSY;
  800. goto out;
  801. }
  802. /* do not insert duplicate address, differentiate on port only
  803. * singled addresses
  804. */
  805. if (!address_use_port(entry))
  806. entry->addr.port = 0;
  807. list_for_each_entry(cur, &pernet->local_addr_list, list) {
  808. if (mptcp_addresses_equal(&cur->addr, &entry->addr,
  809. cur->addr.port || entry->addr.port)) {
  810. /* allow replacing the exiting endpoint only if such
  811. * endpoint is an implicit one and the user-space
  812. * did not provide an endpoint id
  813. */
  814. if (!(cur->flags & MPTCP_PM_ADDR_FLAG_IMPLICIT)) {
  815. ret = -EEXIST;
  816. goto out;
  817. }
  818. if (entry->addr.id)
  819. goto out;
  820. pernet->addrs--;
  821. entry->addr.id = cur->addr.id;
  822. list_del_rcu(&cur->list);
  823. del_entry = cur;
  824. break;
  825. }
  826. }
  827. if (!entry->addr.id && needs_id) {
  828. find_next:
  829. entry->addr.id = find_next_zero_bit(pernet->id_bitmap,
  830. MPTCP_PM_MAX_ADDR_ID + 1,
  831. pernet->next_id);
  832. if (!entry->addr.id && pernet->next_id != 1) {
  833. pernet->next_id = 1;
  834. goto find_next;
  835. }
  836. }
  837. if (!entry->addr.id && needs_id)
  838. goto out;
  839. __set_bit(entry->addr.id, pernet->id_bitmap);
  840. if (entry->addr.id > pernet->next_id)
  841. pernet->next_id = entry->addr.id;
  842. if (entry->flags & MPTCP_PM_ADDR_FLAG_SIGNAL) {
  843. addr_max = pernet->add_addr_signal_max;
  844. WRITE_ONCE(pernet->add_addr_signal_max, addr_max + 1);
  845. }
  846. if (entry->flags & MPTCP_PM_ADDR_FLAG_SUBFLOW) {
  847. addr_max = pernet->local_addr_max;
  848. WRITE_ONCE(pernet->local_addr_max, addr_max + 1);
  849. }
  850. pernet->addrs++;
  851. if (!entry->addr.port)
  852. list_add_tail_rcu(&entry->list, &pernet->local_addr_list);
  853. else
  854. list_add_rcu(&entry->list, &pernet->local_addr_list);
  855. ret = entry->addr.id;
  856. out:
  857. spin_unlock_bh(&pernet->lock);
  858. /* just replaced an existing entry, free it */
  859. if (del_entry) {
  860. synchronize_rcu();
  861. __mptcp_pm_release_addr_entry(del_entry);
  862. }
  863. return ret;
  864. }
  865. static struct lock_class_key mptcp_slock_keys[2];
  866. static struct lock_class_key mptcp_keys[2];
  867. static int mptcp_pm_nl_create_listen_socket(struct sock *sk,
  868. struct mptcp_pm_addr_entry *entry)
  869. {
  870. bool is_ipv6 = sk->sk_family == AF_INET6;
  871. int addrlen = sizeof(struct sockaddr_in);
  872. struct sockaddr_storage addr;
  873. struct sock *newsk, *ssk;
  874. int backlog = 1024;
  875. int err;
  876. err = sock_create_kern(sock_net(sk), entry->addr.family,
  877. SOCK_STREAM, IPPROTO_MPTCP, &entry->lsk);
  878. if (err)
  879. return err;
  880. newsk = entry->lsk->sk;
  881. if (!newsk)
  882. return -EINVAL;
  883. /* The subflow socket lock is acquired in a nested to the msk one
  884. * in several places, even by the TCP stack, and this msk is a kernel
  885. * socket: lockdep complains. Instead of propagating the _nested
  886. * modifiers in several places, re-init the lock class for the msk
  887. * socket to an mptcp specific one.
  888. */
  889. sock_lock_init_class_and_name(newsk,
  890. is_ipv6 ? "mlock-AF_INET6" : "mlock-AF_INET",
  891. &mptcp_slock_keys[is_ipv6],
  892. is_ipv6 ? "msk_lock-AF_INET6" : "msk_lock-AF_INET",
  893. &mptcp_keys[is_ipv6]);
  894. lock_sock(newsk);
  895. ssk = __mptcp_nmpc_sk(mptcp_sk(newsk));
  896. release_sock(newsk);
  897. if (IS_ERR(ssk))
  898. return PTR_ERR(ssk);
  899. mptcp_info2sockaddr(&entry->addr, &addr, entry->addr.family);
  900. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  901. if (entry->addr.family == AF_INET6)
  902. addrlen = sizeof(struct sockaddr_in6);
  903. #endif
  904. if (ssk->sk_family == AF_INET)
  905. err = inet_bind_sk(ssk, (struct sockaddr *)&addr, addrlen);
  906. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  907. else if (ssk->sk_family == AF_INET6)
  908. err = inet6_bind_sk(ssk, (struct sockaddr *)&addr, addrlen);
  909. #endif
  910. if (err)
  911. return err;
  912. /* We don't use mptcp_set_state() here because it needs to be called
  913. * under the msk socket lock. For the moment, that will not bring
  914. * anything more than only calling inet_sk_state_store(), because the
  915. * old status is known (TCP_CLOSE).
  916. */
  917. inet_sk_state_store(newsk, TCP_LISTEN);
  918. lock_sock(ssk);
  919. WRITE_ONCE(mptcp_subflow_ctx(ssk)->pm_listener, true);
  920. err = __inet_listen_sk(ssk, backlog);
  921. if (!err)
  922. mptcp_event_pm_listener(ssk, MPTCP_EVENT_LISTENER_CREATED);
  923. release_sock(ssk);
  924. return err;
  925. }
  926. int mptcp_pm_nl_get_local_id(struct mptcp_sock *msk, struct mptcp_addr_info *skc)
  927. {
  928. struct mptcp_pm_addr_entry *entry;
  929. struct pm_nl_pernet *pernet;
  930. int ret = -1;
  931. pernet = pm_nl_get_pernet_from_msk(msk);
  932. rcu_read_lock();
  933. list_for_each_entry_rcu(entry, &pernet->local_addr_list, list) {
  934. if (mptcp_addresses_equal(&entry->addr, skc, entry->addr.port)) {
  935. ret = entry->addr.id;
  936. break;
  937. }
  938. }
  939. rcu_read_unlock();
  940. if (ret >= 0)
  941. return ret;
  942. /* address not found, add to local list */
  943. entry = kmalloc(sizeof(*entry), GFP_ATOMIC);
  944. if (!entry)
  945. return -ENOMEM;
  946. entry->addr = *skc;
  947. entry->addr.id = 0;
  948. entry->addr.port = 0;
  949. entry->ifindex = 0;
  950. entry->flags = MPTCP_PM_ADDR_FLAG_IMPLICIT;
  951. entry->lsk = NULL;
  952. ret = mptcp_pm_nl_append_new_local_addr(pernet, entry, true);
  953. if (ret < 0)
  954. kfree(entry);
  955. return ret;
  956. }
  957. bool mptcp_pm_nl_is_backup(struct mptcp_sock *msk, struct mptcp_addr_info *skc)
  958. {
  959. struct pm_nl_pernet *pernet = pm_nl_get_pernet_from_msk(msk);
  960. struct mptcp_pm_addr_entry *entry;
  961. bool backup = false;
  962. rcu_read_lock();
  963. list_for_each_entry_rcu(entry, &pernet->local_addr_list, list) {
  964. if (mptcp_addresses_equal(&entry->addr, skc, entry->addr.port)) {
  965. backup = !!(entry->flags & MPTCP_PM_ADDR_FLAG_BACKUP);
  966. break;
  967. }
  968. }
  969. rcu_read_unlock();
  970. return backup;
  971. }
  972. #define MPTCP_PM_CMD_GRP_OFFSET 0
  973. #define MPTCP_PM_EV_GRP_OFFSET 1
  974. static const struct genl_multicast_group mptcp_pm_mcgrps[] = {
  975. [MPTCP_PM_CMD_GRP_OFFSET] = { .name = MPTCP_PM_CMD_GRP_NAME, },
  976. [MPTCP_PM_EV_GRP_OFFSET] = { .name = MPTCP_PM_EV_GRP_NAME,
  977. .flags = GENL_MCAST_CAP_NET_ADMIN,
  978. },
  979. };
  980. void mptcp_pm_nl_subflow_chk_stale(const struct mptcp_sock *msk, struct sock *ssk)
  981. {
  982. struct mptcp_subflow_context *iter, *subflow = mptcp_subflow_ctx(ssk);
  983. struct sock *sk = (struct sock *)msk;
  984. unsigned int active_max_loss_cnt;
  985. struct net *net = sock_net(sk);
  986. unsigned int stale_loss_cnt;
  987. bool slow;
  988. stale_loss_cnt = mptcp_stale_loss_cnt(net);
  989. if (subflow->stale || !stale_loss_cnt || subflow->stale_count <= stale_loss_cnt)
  990. return;
  991. /* look for another available subflow not in loss state */
  992. active_max_loss_cnt = max_t(int, stale_loss_cnt - 1, 1);
  993. mptcp_for_each_subflow(msk, iter) {
  994. if (iter != subflow && mptcp_subflow_active(iter) &&
  995. iter->stale_count < active_max_loss_cnt) {
  996. /* we have some alternatives, try to mark this subflow as idle ...*/
  997. slow = lock_sock_fast(ssk);
  998. if (!tcp_rtx_and_write_queues_empty(ssk)) {
  999. subflow->stale = 1;
  1000. __mptcp_retransmit_pending_data(sk);
  1001. MPTCP_INC_STATS(net, MPTCP_MIB_SUBFLOWSTALE);
  1002. }
  1003. unlock_sock_fast(ssk, slow);
  1004. /* always try to push the pending data regardless of re-injections:
  1005. * we can possibly use backup subflows now, and subflow selection
  1006. * is cheap under the msk socket lock
  1007. */
  1008. __mptcp_push_pending(sk, 0);
  1009. return;
  1010. }
  1011. }
  1012. }
  1013. static int mptcp_pm_family_to_addr(int family)
  1014. {
  1015. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  1016. if (family == AF_INET6)
  1017. return MPTCP_PM_ADDR_ATTR_ADDR6;
  1018. #endif
  1019. return MPTCP_PM_ADDR_ATTR_ADDR4;
  1020. }
  1021. static int mptcp_pm_parse_pm_addr_attr(struct nlattr *tb[],
  1022. const struct nlattr *attr,
  1023. struct genl_info *info,
  1024. struct mptcp_addr_info *addr,
  1025. bool require_family)
  1026. {
  1027. int err, addr_addr;
  1028. if (!attr) {
  1029. GENL_SET_ERR_MSG(info, "missing address info");
  1030. return -EINVAL;
  1031. }
  1032. /* no validation needed - was already done via nested policy */
  1033. err = nla_parse_nested_deprecated(tb, MPTCP_PM_ADDR_ATTR_MAX, attr,
  1034. mptcp_pm_address_nl_policy, info->extack);
  1035. if (err)
  1036. return err;
  1037. if (tb[MPTCP_PM_ADDR_ATTR_ID])
  1038. addr->id = nla_get_u8(tb[MPTCP_PM_ADDR_ATTR_ID]);
  1039. if (!tb[MPTCP_PM_ADDR_ATTR_FAMILY]) {
  1040. if (!require_family)
  1041. return 0;
  1042. NL_SET_ERR_MSG_ATTR(info->extack, attr,
  1043. "missing family");
  1044. return -EINVAL;
  1045. }
  1046. addr->family = nla_get_u16(tb[MPTCP_PM_ADDR_ATTR_FAMILY]);
  1047. if (addr->family != AF_INET
  1048. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  1049. && addr->family != AF_INET6
  1050. #endif
  1051. ) {
  1052. NL_SET_ERR_MSG_ATTR(info->extack, attr,
  1053. "unknown address family");
  1054. return -EINVAL;
  1055. }
  1056. addr_addr = mptcp_pm_family_to_addr(addr->family);
  1057. if (!tb[addr_addr]) {
  1058. NL_SET_ERR_MSG_ATTR(info->extack, attr,
  1059. "missing address data");
  1060. return -EINVAL;
  1061. }
  1062. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  1063. if (addr->family == AF_INET6)
  1064. addr->addr6 = nla_get_in6_addr(tb[addr_addr]);
  1065. else
  1066. #endif
  1067. addr->addr.s_addr = nla_get_in_addr(tb[addr_addr]);
  1068. if (tb[MPTCP_PM_ADDR_ATTR_PORT])
  1069. addr->port = htons(nla_get_u16(tb[MPTCP_PM_ADDR_ATTR_PORT]));
  1070. return 0;
  1071. }
  1072. int mptcp_pm_parse_addr(struct nlattr *attr, struct genl_info *info,
  1073. struct mptcp_addr_info *addr)
  1074. {
  1075. struct nlattr *tb[MPTCP_PM_ADDR_ATTR_MAX + 1];
  1076. memset(addr, 0, sizeof(*addr));
  1077. return mptcp_pm_parse_pm_addr_attr(tb, attr, info, addr, true);
  1078. }
  1079. int mptcp_pm_parse_entry(struct nlattr *attr, struct genl_info *info,
  1080. bool require_family,
  1081. struct mptcp_pm_addr_entry *entry)
  1082. {
  1083. struct nlattr *tb[MPTCP_PM_ADDR_ATTR_MAX + 1];
  1084. int err;
  1085. memset(entry, 0, sizeof(*entry));
  1086. err = mptcp_pm_parse_pm_addr_attr(tb, attr, info, &entry->addr, require_family);
  1087. if (err)
  1088. return err;
  1089. if (tb[MPTCP_PM_ADDR_ATTR_IF_IDX]) {
  1090. u32 val = nla_get_s32(tb[MPTCP_PM_ADDR_ATTR_IF_IDX]);
  1091. entry->ifindex = val;
  1092. }
  1093. if (tb[MPTCP_PM_ADDR_ATTR_FLAGS])
  1094. entry->flags = nla_get_u32(tb[MPTCP_PM_ADDR_ATTR_FLAGS]);
  1095. if (tb[MPTCP_PM_ADDR_ATTR_PORT])
  1096. entry->addr.port = htons(nla_get_u16(tb[MPTCP_PM_ADDR_ATTR_PORT]));
  1097. return 0;
  1098. }
  1099. static struct pm_nl_pernet *genl_info_pm_nl(struct genl_info *info)
  1100. {
  1101. return pm_nl_get_pernet(genl_info_net(info));
  1102. }
  1103. static int mptcp_nl_add_subflow_or_signal_addr(struct net *net,
  1104. struct mptcp_addr_info *addr)
  1105. {
  1106. struct mptcp_sock *msk;
  1107. long s_slot = 0, s_num = 0;
  1108. while ((msk = mptcp_token_iter_next(net, &s_slot, &s_num)) != NULL) {
  1109. struct sock *sk = (struct sock *)msk;
  1110. struct mptcp_addr_info mpc_addr;
  1111. if (!READ_ONCE(msk->fully_established) ||
  1112. mptcp_pm_is_userspace(msk))
  1113. goto next;
  1114. /* if the endp linked to the init sf is re-added with a != ID */
  1115. mptcp_local_address((struct sock_common *)msk, &mpc_addr);
  1116. lock_sock(sk);
  1117. spin_lock_bh(&msk->pm.lock);
  1118. if (mptcp_addresses_equal(addr, &mpc_addr, addr->port))
  1119. msk->mpc_endpoint_id = addr->id;
  1120. mptcp_pm_create_subflow_or_signal_addr(msk);
  1121. spin_unlock_bh(&msk->pm.lock);
  1122. release_sock(sk);
  1123. next:
  1124. sock_put(sk);
  1125. cond_resched();
  1126. }
  1127. return 0;
  1128. }
  1129. static bool mptcp_pm_has_addr_attr_id(const struct nlattr *attr,
  1130. struct genl_info *info)
  1131. {
  1132. struct nlattr *tb[MPTCP_PM_ADDR_ATTR_MAX + 1];
  1133. if (!nla_parse_nested_deprecated(tb, MPTCP_PM_ADDR_ATTR_MAX, attr,
  1134. mptcp_pm_address_nl_policy, info->extack) &&
  1135. tb[MPTCP_PM_ADDR_ATTR_ID])
  1136. return true;
  1137. return false;
  1138. }
  1139. int mptcp_pm_nl_add_addr_doit(struct sk_buff *skb, struct genl_info *info)
  1140. {
  1141. struct nlattr *attr = info->attrs[MPTCP_PM_ENDPOINT_ADDR];
  1142. struct pm_nl_pernet *pernet = genl_info_pm_nl(info);
  1143. struct mptcp_pm_addr_entry addr, *entry;
  1144. int ret;
  1145. ret = mptcp_pm_parse_entry(attr, info, true, &addr);
  1146. if (ret < 0)
  1147. return ret;
  1148. if (addr.addr.port && !address_use_port(&addr)) {
  1149. GENL_SET_ERR_MSG(info, "flags must have signal and not subflow when using port");
  1150. return -EINVAL;
  1151. }
  1152. if (addr.flags & MPTCP_PM_ADDR_FLAG_SIGNAL &&
  1153. addr.flags & MPTCP_PM_ADDR_FLAG_FULLMESH) {
  1154. GENL_SET_ERR_MSG(info, "flags mustn't have both signal and fullmesh");
  1155. return -EINVAL;
  1156. }
  1157. if (addr.flags & MPTCP_PM_ADDR_FLAG_IMPLICIT) {
  1158. GENL_SET_ERR_MSG(info, "can't create IMPLICIT endpoint");
  1159. return -EINVAL;
  1160. }
  1161. entry = kzalloc(sizeof(*entry), GFP_KERNEL_ACCOUNT);
  1162. if (!entry) {
  1163. GENL_SET_ERR_MSG(info, "can't allocate addr");
  1164. return -ENOMEM;
  1165. }
  1166. *entry = addr;
  1167. if (entry->addr.port) {
  1168. ret = mptcp_pm_nl_create_listen_socket(skb->sk, entry);
  1169. if (ret) {
  1170. GENL_SET_ERR_MSG_FMT(info, "create listen socket error: %d", ret);
  1171. goto out_free;
  1172. }
  1173. }
  1174. ret = mptcp_pm_nl_append_new_local_addr(pernet, entry,
  1175. !mptcp_pm_has_addr_attr_id(attr, info));
  1176. if (ret < 0) {
  1177. GENL_SET_ERR_MSG_FMT(info, "too many addresses or duplicate one: %d", ret);
  1178. goto out_free;
  1179. }
  1180. mptcp_nl_add_subflow_or_signal_addr(sock_net(skb->sk), &entry->addr);
  1181. return 0;
  1182. out_free:
  1183. __mptcp_pm_release_addr_entry(entry);
  1184. return ret;
  1185. }
  1186. static bool remove_anno_list_by_saddr(struct mptcp_sock *msk,
  1187. const struct mptcp_addr_info *addr)
  1188. {
  1189. struct mptcp_pm_add_entry *entry;
  1190. entry = mptcp_pm_del_add_timer(msk, addr, false);
  1191. if (entry) {
  1192. kfree(entry);
  1193. return true;
  1194. }
  1195. return false;
  1196. }
  1197. static u8 mptcp_endp_get_local_id(struct mptcp_sock *msk,
  1198. const struct mptcp_addr_info *addr)
  1199. {
  1200. return msk->mpc_endpoint_id == addr->id ? 0 : addr->id;
  1201. }
  1202. static bool mptcp_pm_remove_anno_addr(struct mptcp_sock *msk,
  1203. const struct mptcp_addr_info *addr,
  1204. bool force)
  1205. {
  1206. struct mptcp_rm_list list = { .nr = 0 };
  1207. bool ret;
  1208. list.ids[list.nr++] = mptcp_endp_get_local_id(msk, addr);
  1209. ret = remove_anno_list_by_saddr(msk, addr);
  1210. if (ret || force) {
  1211. spin_lock_bh(&msk->pm.lock);
  1212. if (ret) {
  1213. __set_bit(addr->id, msk->pm.id_avail_bitmap);
  1214. msk->pm.add_addr_signaled--;
  1215. }
  1216. mptcp_pm_remove_addr(msk, &list);
  1217. spin_unlock_bh(&msk->pm.lock);
  1218. }
  1219. return ret;
  1220. }
  1221. static void __mark_subflow_endp_available(struct mptcp_sock *msk, u8 id)
  1222. {
  1223. /* If it was marked as used, and not ID 0, decrement local_addr_used */
  1224. if (!__test_and_set_bit(id ? : msk->mpc_endpoint_id, msk->pm.id_avail_bitmap) &&
  1225. id && !WARN_ON_ONCE(msk->pm.local_addr_used == 0))
  1226. msk->pm.local_addr_used--;
  1227. }
  1228. static int mptcp_nl_remove_subflow_and_signal_addr(struct net *net,
  1229. const struct mptcp_pm_addr_entry *entry)
  1230. {
  1231. const struct mptcp_addr_info *addr = &entry->addr;
  1232. struct mptcp_rm_list list = { .nr = 1 };
  1233. long s_slot = 0, s_num = 0;
  1234. struct mptcp_sock *msk;
  1235. pr_debug("remove_id=%d\n", addr->id);
  1236. while ((msk = mptcp_token_iter_next(net, &s_slot, &s_num)) != NULL) {
  1237. struct sock *sk = (struct sock *)msk;
  1238. bool remove_subflow;
  1239. if (mptcp_pm_is_userspace(msk))
  1240. goto next;
  1241. if (list_empty(&msk->conn_list)) {
  1242. mptcp_pm_remove_anno_addr(msk, addr, false);
  1243. goto next;
  1244. }
  1245. lock_sock(sk);
  1246. remove_subflow = lookup_subflow_by_saddr(&msk->conn_list, addr);
  1247. mptcp_pm_remove_anno_addr(msk, addr, remove_subflow &&
  1248. !(entry->flags & MPTCP_PM_ADDR_FLAG_IMPLICIT));
  1249. list.ids[0] = mptcp_endp_get_local_id(msk, addr);
  1250. if (remove_subflow) {
  1251. spin_lock_bh(&msk->pm.lock);
  1252. mptcp_pm_nl_rm_subflow_received(msk, &list);
  1253. spin_unlock_bh(&msk->pm.lock);
  1254. }
  1255. if (entry->flags & MPTCP_PM_ADDR_FLAG_SUBFLOW) {
  1256. spin_lock_bh(&msk->pm.lock);
  1257. __mark_subflow_endp_available(msk, list.ids[0]);
  1258. spin_unlock_bh(&msk->pm.lock);
  1259. }
  1260. if (msk->mpc_endpoint_id == entry->addr.id)
  1261. msk->mpc_endpoint_id = 0;
  1262. release_sock(sk);
  1263. next:
  1264. sock_put(sk);
  1265. cond_resched();
  1266. }
  1267. return 0;
  1268. }
  1269. static int mptcp_nl_remove_id_zero_address(struct net *net,
  1270. struct mptcp_addr_info *addr)
  1271. {
  1272. struct mptcp_rm_list list = { .nr = 0 };
  1273. long s_slot = 0, s_num = 0;
  1274. struct mptcp_sock *msk;
  1275. list.ids[list.nr++] = 0;
  1276. while ((msk = mptcp_token_iter_next(net, &s_slot, &s_num)) != NULL) {
  1277. struct sock *sk = (struct sock *)msk;
  1278. struct mptcp_addr_info msk_local;
  1279. if (list_empty(&msk->conn_list) || mptcp_pm_is_userspace(msk))
  1280. goto next;
  1281. mptcp_local_address((struct sock_common *)msk, &msk_local);
  1282. if (!mptcp_addresses_equal(&msk_local, addr, addr->port))
  1283. goto next;
  1284. lock_sock(sk);
  1285. spin_lock_bh(&msk->pm.lock);
  1286. mptcp_pm_remove_addr(msk, &list);
  1287. mptcp_pm_nl_rm_subflow_received(msk, &list);
  1288. __mark_subflow_endp_available(msk, 0);
  1289. spin_unlock_bh(&msk->pm.lock);
  1290. release_sock(sk);
  1291. next:
  1292. sock_put(sk);
  1293. cond_resched();
  1294. }
  1295. return 0;
  1296. }
  1297. int mptcp_pm_nl_del_addr_doit(struct sk_buff *skb, struct genl_info *info)
  1298. {
  1299. struct nlattr *attr = info->attrs[MPTCP_PM_ENDPOINT_ADDR];
  1300. struct pm_nl_pernet *pernet = genl_info_pm_nl(info);
  1301. struct mptcp_pm_addr_entry addr, *entry;
  1302. unsigned int addr_max;
  1303. int ret;
  1304. ret = mptcp_pm_parse_entry(attr, info, false, &addr);
  1305. if (ret < 0)
  1306. return ret;
  1307. /* the zero id address is special: the first address used by the msk
  1308. * always gets such an id, so different subflows can have different zero
  1309. * id addresses. Additionally zero id is not accounted for in id_bitmap.
  1310. * Let's use an 'mptcp_rm_list' instead of the common remove code.
  1311. */
  1312. if (addr.addr.id == 0)
  1313. return mptcp_nl_remove_id_zero_address(sock_net(skb->sk), &addr.addr);
  1314. spin_lock_bh(&pernet->lock);
  1315. entry = __lookup_addr_by_id(pernet, addr.addr.id);
  1316. if (!entry) {
  1317. GENL_SET_ERR_MSG(info, "address not found");
  1318. spin_unlock_bh(&pernet->lock);
  1319. return -EINVAL;
  1320. }
  1321. if (entry->flags & MPTCP_PM_ADDR_FLAG_SIGNAL) {
  1322. addr_max = pernet->add_addr_signal_max;
  1323. WRITE_ONCE(pernet->add_addr_signal_max, addr_max - 1);
  1324. }
  1325. if (entry->flags & MPTCP_PM_ADDR_FLAG_SUBFLOW) {
  1326. addr_max = pernet->local_addr_max;
  1327. WRITE_ONCE(pernet->local_addr_max, addr_max - 1);
  1328. }
  1329. pernet->addrs--;
  1330. list_del_rcu(&entry->list);
  1331. __clear_bit(entry->addr.id, pernet->id_bitmap);
  1332. spin_unlock_bh(&pernet->lock);
  1333. mptcp_nl_remove_subflow_and_signal_addr(sock_net(skb->sk), entry);
  1334. synchronize_rcu();
  1335. __mptcp_pm_release_addr_entry(entry);
  1336. return ret;
  1337. }
  1338. /* Called from the userspace PM only */
  1339. void mptcp_pm_remove_addrs(struct mptcp_sock *msk, struct list_head *rm_list)
  1340. {
  1341. struct mptcp_rm_list alist = { .nr = 0 };
  1342. struct mptcp_pm_addr_entry *entry;
  1343. int anno_nr = 0;
  1344. list_for_each_entry(entry, rm_list, list) {
  1345. if (alist.nr >= MPTCP_RM_IDS_MAX)
  1346. break;
  1347. /* only delete if either announced or matching a subflow */
  1348. if (remove_anno_list_by_saddr(msk, &entry->addr))
  1349. anno_nr++;
  1350. else if (!lookup_subflow_by_saddr(&msk->conn_list,
  1351. &entry->addr))
  1352. continue;
  1353. alist.ids[alist.nr++] = entry->addr.id;
  1354. }
  1355. if (alist.nr) {
  1356. spin_lock_bh(&msk->pm.lock);
  1357. msk->pm.add_addr_signaled -= anno_nr;
  1358. mptcp_pm_remove_addr(msk, &alist);
  1359. spin_unlock_bh(&msk->pm.lock);
  1360. }
  1361. }
  1362. /* Called from the in-kernel PM only */
  1363. static void mptcp_pm_flush_addrs_and_subflows(struct mptcp_sock *msk,
  1364. struct list_head *rm_list)
  1365. {
  1366. struct mptcp_rm_list alist = { .nr = 0 }, slist = { .nr = 0 };
  1367. struct mptcp_pm_addr_entry *entry;
  1368. list_for_each_entry(entry, rm_list, list) {
  1369. if (slist.nr < MPTCP_RM_IDS_MAX &&
  1370. lookup_subflow_by_saddr(&msk->conn_list, &entry->addr))
  1371. slist.ids[slist.nr++] = mptcp_endp_get_local_id(msk, &entry->addr);
  1372. if (alist.nr < MPTCP_RM_IDS_MAX &&
  1373. remove_anno_list_by_saddr(msk, &entry->addr))
  1374. alist.ids[alist.nr++] = mptcp_endp_get_local_id(msk, &entry->addr);
  1375. }
  1376. spin_lock_bh(&msk->pm.lock);
  1377. if (alist.nr) {
  1378. msk->pm.add_addr_signaled -= alist.nr;
  1379. mptcp_pm_remove_addr(msk, &alist);
  1380. }
  1381. if (slist.nr)
  1382. mptcp_pm_nl_rm_subflow_received(msk, &slist);
  1383. /* Reset counters: maybe some subflows have been removed before */
  1384. bitmap_fill(msk->pm.id_avail_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
  1385. msk->pm.local_addr_used = 0;
  1386. spin_unlock_bh(&msk->pm.lock);
  1387. }
  1388. static void mptcp_nl_flush_addrs_list(struct net *net,
  1389. struct list_head *rm_list)
  1390. {
  1391. long s_slot = 0, s_num = 0;
  1392. struct mptcp_sock *msk;
  1393. if (list_empty(rm_list))
  1394. return;
  1395. while ((msk = mptcp_token_iter_next(net, &s_slot, &s_num)) != NULL) {
  1396. struct sock *sk = (struct sock *)msk;
  1397. if (!mptcp_pm_is_userspace(msk)) {
  1398. lock_sock(sk);
  1399. mptcp_pm_flush_addrs_and_subflows(msk, rm_list);
  1400. release_sock(sk);
  1401. }
  1402. sock_put(sk);
  1403. cond_resched();
  1404. }
  1405. }
  1406. /* caller must ensure the RCU grace period is already elapsed */
  1407. static void __flush_addrs(struct list_head *list)
  1408. {
  1409. while (!list_empty(list)) {
  1410. struct mptcp_pm_addr_entry *cur;
  1411. cur = list_entry(list->next,
  1412. struct mptcp_pm_addr_entry, list);
  1413. list_del_rcu(&cur->list);
  1414. __mptcp_pm_release_addr_entry(cur);
  1415. }
  1416. }
  1417. static void __reset_counters(struct pm_nl_pernet *pernet)
  1418. {
  1419. WRITE_ONCE(pernet->add_addr_signal_max, 0);
  1420. WRITE_ONCE(pernet->add_addr_accept_max, 0);
  1421. WRITE_ONCE(pernet->local_addr_max, 0);
  1422. pernet->addrs = 0;
  1423. }
  1424. int mptcp_pm_nl_flush_addrs_doit(struct sk_buff *skb, struct genl_info *info)
  1425. {
  1426. struct pm_nl_pernet *pernet = genl_info_pm_nl(info);
  1427. LIST_HEAD(free_list);
  1428. spin_lock_bh(&pernet->lock);
  1429. list_splice_init(&pernet->local_addr_list, &free_list);
  1430. __reset_counters(pernet);
  1431. pernet->next_id = 1;
  1432. bitmap_zero(pernet->id_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
  1433. spin_unlock_bh(&pernet->lock);
  1434. mptcp_nl_flush_addrs_list(sock_net(skb->sk), &free_list);
  1435. synchronize_rcu();
  1436. __flush_addrs(&free_list);
  1437. return 0;
  1438. }
  1439. int mptcp_nl_fill_addr(struct sk_buff *skb,
  1440. struct mptcp_pm_addr_entry *entry)
  1441. {
  1442. struct mptcp_addr_info *addr = &entry->addr;
  1443. struct nlattr *attr;
  1444. attr = nla_nest_start(skb, MPTCP_PM_ATTR_ADDR);
  1445. if (!attr)
  1446. return -EMSGSIZE;
  1447. if (nla_put_u16(skb, MPTCP_PM_ADDR_ATTR_FAMILY, addr->family))
  1448. goto nla_put_failure;
  1449. if (nla_put_u16(skb, MPTCP_PM_ADDR_ATTR_PORT, ntohs(addr->port)))
  1450. goto nla_put_failure;
  1451. if (nla_put_u8(skb, MPTCP_PM_ADDR_ATTR_ID, addr->id))
  1452. goto nla_put_failure;
  1453. if (nla_put_u32(skb, MPTCP_PM_ADDR_ATTR_FLAGS, entry->flags))
  1454. goto nla_put_failure;
  1455. if (entry->ifindex &&
  1456. nla_put_s32(skb, MPTCP_PM_ADDR_ATTR_IF_IDX, entry->ifindex))
  1457. goto nla_put_failure;
  1458. if (addr->family == AF_INET &&
  1459. nla_put_in_addr(skb, MPTCP_PM_ADDR_ATTR_ADDR4,
  1460. addr->addr.s_addr))
  1461. goto nla_put_failure;
  1462. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  1463. else if (addr->family == AF_INET6 &&
  1464. nla_put_in6_addr(skb, MPTCP_PM_ADDR_ATTR_ADDR6, &addr->addr6))
  1465. goto nla_put_failure;
  1466. #endif
  1467. nla_nest_end(skb, attr);
  1468. return 0;
  1469. nla_put_failure:
  1470. nla_nest_cancel(skb, attr);
  1471. return -EMSGSIZE;
  1472. }
  1473. int mptcp_pm_nl_get_addr(struct sk_buff *skb, struct genl_info *info)
  1474. {
  1475. struct nlattr *attr = info->attrs[MPTCP_PM_ENDPOINT_ADDR];
  1476. struct pm_nl_pernet *pernet = genl_info_pm_nl(info);
  1477. struct mptcp_pm_addr_entry addr, *entry;
  1478. struct sk_buff *msg;
  1479. void *reply;
  1480. int ret;
  1481. ret = mptcp_pm_parse_entry(attr, info, false, &addr);
  1482. if (ret < 0)
  1483. return ret;
  1484. msg = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
  1485. if (!msg)
  1486. return -ENOMEM;
  1487. reply = genlmsg_put_reply(msg, info, &mptcp_genl_family, 0,
  1488. info->genlhdr->cmd);
  1489. if (!reply) {
  1490. GENL_SET_ERR_MSG(info, "not enough space in Netlink message");
  1491. ret = -EMSGSIZE;
  1492. goto fail;
  1493. }
  1494. spin_lock_bh(&pernet->lock);
  1495. entry = __lookup_addr_by_id(pernet, addr.addr.id);
  1496. if (!entry) {
  1497. GENL_SET_ERR_MSG(info, "address not found");
  1498. ret = -EINVAL;
  1499. goto unlock_fail;
  1500. }
  1501. ret = mptcp_nl_fill_addr(msg, entry);
  1502. if (ret)
  1503. goto unlock_fail;
  1504. genlmsg_end(msg, reply);
  1505. ret = genlmsg_reply(msg, info);
  1506. spin_unlock_bh(&pernet->lock);
  1507. return ret;
  1508. unlock_fail:
  1509. spin_unlock_bh(&pernet->lock);
  1510. fail:
  1511. nlmsg_free(msg);
  1512. return ret;
  1513. }
  1514. int mptcp_pm_nl_get_addr_doit(struct sk_buff *skb, struct genl_info *info)
  1515. {
  1516. return mptcp_pm_get_addr(skb, info);
  1517. }
  1518. int mptcp_pm_nl_dump_addr(struct sk_buff *msg,
  1519. struct netlink_callback *cb)
  1520. {
  1521. struct net *net = sock_net(msg->sk);
  1522. struct mptcp_pm_addr_entry *entry;
  1523. struct pm_nl_pernet *pernet;
  1524. int id = cb->args[0];
  1525. void *hdr;
  1526. int i;
  1527. pernet = pm_nl_get_pernet(net);
  1528. spin_lock_bh(&pernet->lock);
  1529. for (i = id; i < MPTCP_PM_MAX_ADDR_ID + 1; i++) {
  1530. if (test_bit(i, pernet->id_bitmap)) {
  1531. entry = __lookup_addr_by_id(pernet, i);
  1532. if (!entry)
  1533. break;
  1534. if (entry->addr.id <= id)
  1535. continue;
  1536. hdr = genlmsg_put(msg, NETLINK_CB(cb->skb).portid,
  1537. cb->nlh->nlmsg_seq, &mptcp_genl_family,
  1538. NLM_F_MULTI, MPTCP_PM_CMD_GET_ADDR);
  1539. if (!hdr)
  1540. break;
  1541. if (mptcp_nl_fill_addr(msg, entry) < 0) {
  1542. genlmsg_cancel(msg, hdr);
  1543. break;
  1544. }
  1545. id = entry->addr.id;
  1546. genlmsg_end(msg, hdr);
  1547. }
  1548. }
  1549. spin_unlock_bh(&pernet->lock);
  1550. cb->args[0] = id;
  1551. return msg->len;
  1552. }
  1553. int mptcp_pm_nl_get_addr_dumpit(struct sk_buff *msg,
  1554. struct netlink_callback *cb)
  1555. {
  1556. return mptcp_pm_dump_addr(msg, cb);
  1557. }
  1558. static int parse_limit(struct genl_info *info, int id, unsigned int *limit)
  1559. {
  1560. struct nlattr *attr = info->attrs[id];
  1561. if (!attr)
  1562. return 0;
  1563. *limit = nla_get_u32(attr);
  1564. if (*limit > MPTCP_PM_ADDR_MAX) {
  1565. GENL_SET_ERR_MSG(info, "limit greater than maximum");
  1566. return -EINVAL;
  1567. }
  1568. return 0;
  1569. }
  1570. int mptcp_pm_nl_set_limits_doit(struct sk_buff *skb, struct genl_info *info)
  1571. {
  1572. struct pm_nl_pernet *pernet = genl_info_pm_nl(info);
  1573. unsigned int rcv_addrs, subflows;
  1574. int ret;
  1575. spin_lock_bh(&pernet->lock);
  1576. rcv_addrs = pernet->add_addr_accept_max;
  1577. ret = parse_limit(info, MPTCP_PM_ATTR_RCV_ADD_ADDRS, &rcv_addrs);
  1578. if (ret)
  1579. goto unlock;
  1580. subflows = pernet->subflows_max;
  1581. ret = parse_limit(info, MPTCP_PM_ATTR_SUBFLOWS, &subflows);
  1582. if (ret)
  1583. goto unlock;
  1584. WRITE_ONCE(pernet->add_addr_accept_max, rcv_addrs);
  1585. WRITE_ONCE(pernet->subflows_max, subflows);
  1586. unlock:
  1587. spin_unlock_bh(&pernet->lock);
  1588. return ret;
  1589. }
  1590. int mptcp_pm_nl_get_limits_doit(struct sk_buff *skb, struct genl_info *info)
  1591. {
  1592. struct pm_nl_pernet *pernet = genl_info_pm_nl(info);
  1593. struct sk_buff *msg;
  1594. void *reply;
  1595. msg = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
  1596. if (!msg)
  1597. return -ENOMEM;
  1598. reply = genlmsg_put_reply(msg, info, &mptcp_genl_family, 0,
  1599. MPTCP_PM_CMD_GET_LIMITS);
  1600. if (!reply)
  1601. goto fail;
  1602. if (nla_put_u32(msg, MPTCP_PM_ATTR_RCV_ADD_ADDRS,
  1603. READ_ONCE(pernet->add_addr_accept_max)))
  1604. goto fail;
  1605. if (nla_put_u32(msg, MPTCP_PM_ATTR_SUBFLOWS,
  1606. READ_ONCE(pernet->subflows_max)))
  1607. goto fail;
  1608. genlmsg_end(msg, reply);
  1609. return genlmsg_reply(msg, info);
  1610. fail:
  1611. GENL_SET_ERR_MSG(info, "not enough space in Netlink message");
  1612. nlmsg_free(msg);
  1613. return -EMSGSIZE;
  1614. }
  1615. static void mptcp_pm_nl_fullmesh(struct mptcp_sock *msk,
  1616. struct mptcp_addr_info *addr)
  1617. {
  1618. struct mptcp_rm_list list = { .nr = 0 };
  1619. list.ids[list.nr++] = mptcp_endp_get_local_id(msk, addr);
  1620. spin_lock_bh(&msk->pm.lock);
  1621. mptcp_pm_nl_rm_subflow_received(msk, &list);
  1622. __mark_subflow_endp_available(msk, list.ids[0]);
  1623. mptcp_pm_create_subflow_or_signal_addr(msk);
  1624. spin_unlock_bh(&msk->pm.lock);
  1625. }
  1626. static int mptcp_nl_set_flags(struct net *net,
  1627. struct mptcp_addr_info *addr,
  1628. u8 bkup, u8 changed)
  1629. {
  1630. long s_slot = 0, s_num = 0;
  1631. struct mptcp_sock *msk;
  1632. int ret = -EINVAL;
  1633. while ((msk = mptcp_token_iter_next(net, &s_slot, &s_num)) != NULL) {
  1634. struct sock *sk = (struct sock *)msk;
  1635. if (list_empty(&msk->conn_list) || mptcp_pm_is_userspace(msk))
  1636. goto next;
  1637. lock_sock(sk);
  1638. if (changed & MPTCP_PM_ADDR_FLAG_BACKUP)
  1639. ret = mptcp_pm_nl_mp_prio_send_ack(msk, addr, NULL, bkup);
  1640. if (changed & MPTCP_PM_ADDR_FLAG_FULLMESH)
  1641. mptcp_pm_nl_fullmesh(msk, addr);
  1642. release_sock(sk);
  1643. next:
  1644. sock_put(sk);
  1645. cond_resched();
  1646. }
  1647. return ret;
  1648. }
  1649. int mptcp_pm_nl_set_flags(struct sk_buff *skb, struct genl_info *info)
  1650. {
  1651. struct mptcp_pm_addr_entry addr = { .addr = { .family = AF_UNSPEC }, };
  1652. struct nlattr *attr = info->attrs[MPTCP_PM_ATTR_ADDR];
  1653. u8 changed, mask = MPTCP_PM_ADDR_FLAG_BACKUP |
  1654. MPTCP_PM_ADDR_FLAG_FULLMESH;
  1655. struct net *net = sock_net(skb->sk);
  1656. struct mptcp_pm_addr_entry *entry;
  1657. struct pm_nl_pernet *pernet;
  1658. u8 lookup_by_id = 0;
  1659. u8 bkup = 0;
  1660. int ret;
  1661. pernet = pm_nl_get_pernet(net);
  1662. ret = mptcp_pm_parse_entry(attr, info, false, &addr);
  1663. if (ret < 0)
  1664. return ret;
  1665. if (addr.addr.family == AF_UNSPEC) {
  1666. lookup_by_id = 1;
  1667. if (!addr.addr.id) {
  1668. GENL_SET_ERR_MSG(info, "missing required inputs");
  1669. return -EOPNOTSUPP;
  1670. }
  1671. }
  1672. if (addr.flags & MPTCP_PM_ADDR_FLAG_BACKUP)
  1673. bkup = 1;
  1674. spin_lock_bh(&pernet->lock);
  1675. entry = lookup_by_id ? __lookup_addr_by_id(pernet, addr.addr.id) :
  1676. __lookup_addr(pernet, &addr.addr);
  1677. if (!entry) {
  1678. spin_unlock_bh(&pernet->lock);
  1679. GENL_SET_ERR_MSG(info, "address not found");
  1680. return -EINVAL;
  1681. }
  1682. if ((addr.flags & MPTCP_PM_ADDR_FLAG_FULLMESH) &&
  1683. (entry->flags & (MPTCP_PM_ADDR_FLAG_SIGNAL |
  1684. MPTCP_PM_ADDR_FLAG_IMPLICIT))) {
  1685. spin_unlock_bh(&pernet->lock);
  1686. GENL_SET_ERR_MSG(info, "invalid addr flags");
  1687. return -EINVAL;
  1688. }
  1689. changed = (addr.flags ^ entry->flags) & mask;
  1690. entry->flags = (entry->flags & ~mask) | (addr.flags & mask);
  1691. addr = *entry;
  1692. spin_unlock_bh(&pernet->lock);
  1693. mptcp_nl_set_flags(net, &addr.addr, bkup, changed);
  1694. return 0;
  1695. }
  1696. int mptcp_pm_nl_set_flags_doit(struct sk_buff *skb, struct genl_info *info)
  1697. {
  1698. return mptcp_pm_set_flags(skb, info);
  1699. }
  1700. static void mptcp_nl_mcast_send(struct net *net, struct sk_buff *nlskb, gfp_t gfp)
  1701. {
  1702. genlmsg_multicast_netns(&mptcp_genl_family, net,
  1703. nlskb, 0, MPTCP_PM_EV_GRP_OFFSET, gfp);
  1704. }
  1705. bool mptcp_userspace_pm_active(const struct mptcp_sock *msk)
  1706. {
  1707. return genl_has_listeners(&mptcp_genl_family,
  1708. sock_net((const struct sock *)msk),
  1709. MPTCP_PM_EV_GRP_OFFSET);
  1710. }
  1711. static int mptcp_event_add_subflow(struct sk_buff *skb, const struct sock *ssk)
  1712. {
  1713. const struct inet_sock *issk = inet_sk(ssk);
  1714. const struct mptcp_subflow_context *sf;
  1715. if (nla_put_u16(skb, MPTCP_ATTR_FAMILY, ssk->sk_family))
  1716. return -EMSGSIZE;
  1717. switch (ssk->sk_family) {
  1718. case AF_INET:
  1719. if (nla_put_in_addr(skb, MPTCP_ATTR_SADDR4, issk->inet_saddr))
  1720. return -EMSGSIZE;
  1721. if (nla_put_in_addr(skb, MPTCP_ATTR_DADDR4, issk->inet_daddr))
  1722. return -EMSGSIZE;
  1723. break;
  1724. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  1725. case AF_INET6: {
  1726. const struct ipv6_pinfo *np = inet6_sk(ssk);
  1727. if (nla_put_in6_addr(skb, MPTCP_ATTR_SADDR6, &np->saddr))
  1728. return -EMSGSIZE;
  1729. if (nla_put_in6_addr(skb, MPTCP_ATTR_DADDR6, &ssk->sk_v6_daddr))
  1730. return -EMSGSIZE;
  1731. break;
  1732. }
  1733. #endif
  1734. default:
  1735. WARN_ON_ONCE(1);
  1736. return -EMSGSIZE;
  1737. }
  1738. if (nla_put_be16(skb, MPTCP_ATTR_SPORT, issk->inet_sport))
  1739. return -EMSGSIZE;
  1740. if (nla_put_be16(skb, MPTCP_ATTR_DPORT, issk->inet_dport))
  1741. return -EMSGSIZE;
  1742. sf = mptcp_subflow_ctx(ssk);
  1743. if (WARN_ON_ONCE(!sf))
  1744. return -EINVAL;
  1745. if (nla_put_u8(skb, MPTCP_ATTR_LOC_ID, subflow_get_local_id(sf)))
  1746. return -EMSGSIZE;
  1747. if (nla_put_u8(skb, MPTCP_ATTR_REM_ID, sf->remote_id))
  1748. return -EMSGSIZE;
  1749. return 0;
  1750. }
  1751. static int mptcp_event_put_token_and_ssk(struct sk_buff *skb,
  1752. const struct mptcp_sock *msk,
  1753. const struct sock *ssk)
  1754. {
  1755. const struct sock *sk = (const struct sock *)msk;
  1756. const struct mptcp_subflow_context *sf;
  1757. u8 sk_err;
  1758. if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token)))
  1759. return -EMSGSIZE;
  1760. if (mptcp_event_add_subflow(skb, ssk))
  1761. return -EMSGSIZE;
  1762. sf = mptcp_subflow_ctx(ssk);
  1763. if (WARN_ON_ONCE(!sf))
  1764. return -EINVAL;
  1765. if (nla_put_u8(skb, MPTCP_ATTR_BACKUP, sf->backup))
  1766. return -EMSGSIZE;
  1767. if (ssk->sk_bound_dev_if &&
  1768. nla_put_s32(skb, MPTCP_ATTR_IF_IDX, ssk->sk_bound_dev_if))
  1769. return -EMSGSIZE;
  1770. sk_err = READ_ONCE(ssk->sk_err);
  1771. if (sk_err && sk->sk_state == TCP_ESTABLISHED &&
  1772. nla_put_u8(skb, MPTCP_ATTR_ERROR, sk_err))
  1773. return -EMSGSIZE;
  1774. return 0;
  1775. }
  1776. static int mptcp_event_sub_established(struct sk_buff *skb,
  1777. const struct mptcp_sock *msk,
  1778. const struct sock *ssk)
  1779. {
  1780. return mptcp_event_put_token_and_ssk(skb, msk, ssk);
  1781. }
  1782. static int mptcp_event_sub_closed(struct sk_buff *skb,
  1783. const struct mptcp_sock *msk,
  1784. const struct sock *ssk)
  1785. {
  1786. const struct mptcp_subflow_context *sf;
  1787. if (mptcp_event_put_token_and_ssk(skb, msk, ssk))
  1788. return -EMSGSIZE;
  1789. sf = mptcp_subflow_ctx(ssk);
  1790. if (!sf->reset_seen)
  1791. return 0;
  1792. if (nla_put_u32(skb, MPTCP_ATTR_RESET_REASON, sf->reset_reason))
  1793. return -EMSGSIZE;
  1794. if (nla_put_u32(skb, MPTCP_ATTR_RESET_FLAGS, sf->reset_transient))
  1795. return -EMSGSIZE;
  1796. return 0;
  1797. }
  1798. static int mptcp_event_created(struct sk_buff *skb,
  1799. const struct mptcp_sock *msk,
  1800. const struct sock *ssk)
  1801. {
  1802. int err = nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token));
  1803. if (err)
  1804. return err;
  1805. if (nla_put_u8(skb, MPTCP_ATTR_SERVER_SIDE, READ_ONCE(msk->pm.server_side)))
  1806. return -EMSGSIZE;
  1807. return mptcp_event_add_subflow(skb, ssk);
  1808. }
  1809. void mptcp_event_addr_removed(const struct mptcp_sock *msk, uint8_t id)
  1810. {
  1811. struct net *net = sock_net((const struct sock *)msk);
  1812. struct nlmsghdr *nlh;
  1813. struct sk_buff *skb;
  1814. if (!genl_has_listeners(&mptcp_genl_family, net, MPTCP_PM_EV_GRP_OFFSET))
  1815. return;
  1816. skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
  1817. if (!skb)
  1818. return;
  1819. nlh = genlmsg_put(skb, 0, 0, &mptcp_genl_family, 0, MPTCP_EVENT_REMOVED);
  1820. if (!nlh)
  1821. goto nla_put_failure;
  1822. if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token)))
  1823. goto nla_put_failure;
  1824. if (nla_put_u8(skb, MPTCP_ATTR_REM_ID, id))
  1825. goto nla_put_failure;
  1826. genlmsg_end(skb, nlh);
  1827. mptcp_nl_mcast_send(net, skb, GFP_ATOMIC);
  1828. return;
  1829. nla_put_failure:
  1830. nlmsg_free(skb);
  1831. }
  1832. void mptcp_event_addr_announced(const struct sock *ssk,
  1833. const struct mptcp_addr_info *info)
  1834. {
  1835. struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
  1836. struct mptcp_sock *msk = mptcp_sk(subflow->conn);
  1837. struct net *net = sock_net(ssk);
  1838. struct nlmsghdr *nlh;
  1839. struct sk_buff *skb;
  1840. if (!genl_has_listeners(&mptcp_genl_family, net, MPTCP_PM_EV_GRP_OFFSET))
  1841. return;
  1842. skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
  1843. if (!skb)
  1844. return;
  1845. nlh = genlmsg_put(skb, 0, 0, &mptcp_genl_family, 0,
  1846. MPTCP_EVENT_ANNOUNCED);
  1847. if (!nlh)
  1848. goto nla_put_failure;
  1849. if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token)))
  1850. goto nla_put_failure;
  1851. if (nla_put_u8(skb, MPTCP_ATTR_REM_ID, info->id))
  1852. goto nla_put_failure;
  1853. if (nla_put_be16(skb, MPTCP_ATTR_DPORT,
  1854. info->port == 0 ?
  1855. inet_sk(ssk)->inet_dport :
  1856. info->port))
  1857. goto nla_put_failure;
  1858. switch (info->family) {
  1859. case AF_INET:
  1860. if (nla_put_in_addr(skb, MPTCP_ATTR_DADDR4, info->addr.s_addr))
  1861. goto nla_put_failure;
  1862. break;
  1863. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  1864. case AF_INET6:
  1865. if (nla_put_in6_addr(skb, MPTCP_ATTR_DADDR6, &info->addr6))
  1866. goto nla_put_failure;
  1867. break;
  1868. #endif
  1869. default:
  1870. WARN_ON_ONCE(1);
  1871. goto nla_put_failure;
  1872. }
  1873. genlmsg_end(skb, nlh);
  1874. mptcp_nl_mcast_send(net, skb, GFP_ATOMIC);
  1875. return;
  1876. nla_put_failure:
  1877. nlmsg_free(skb);
  1878. }
  1879. void mptcp_event_pm_listener(const struct sock *ssk,
  1880. enum mptcp_event_type event)
  1881. {
  1882. const struct inet_sock *issk = inet_sk(ssk);
  1883. struct net *net = sock_net(ssk);
  1884. struct nlmsghdr *nlh;
  1885. struct sk_buff *skb;
  1886. if (!genl_has_listeners(&mptcp_genl_family, net, MPTCP_PM_EV_GRP_OFFSET))
  1887. return;
  1888. skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
  1889. if (!skb)
  1890. return;
  1891. nlh = genlmsg_put(skb, 0, 0, &mptcp_genl_family, 0, event);
  1892. if (!nlh)
  1893. goto nla_put_failure;
  1894. if (nla_put_u16(skb, MPTCP_ATTR_FAMILY, ssk->sk_family))
  1895. goto nla_put_failure;
  1896. if (nla_put_be16(skb, MPTCP_ATTR_SPORT, issk->inet_sport))
  1897. goto nla_put_failure;
  1898. switch (ssk->sk_family) {
  1899. case AF_INET:
  1900. if (nla_put_in_addr(skb, MPTCP_ATTR_SADDR4, issk->inet_saddr))
  1901. goto nla_put_failure;
  1902. break;
  1903. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  1904. case AF_INET6: {
  1905. const struct ipv6_pinfo *np = inet6_sk(ssk);
  1906. if (nla_put_in6_addr(skb, MPTCP_ATTR_SADDR6, &np->saddr))
  1907. goto nla_put_failure;
  1908. break;
  1909. }
  1910. #endif
  1911. default:
  1912. WARN_ON_ONCE(1);
  1913. goto nla_put_failure;
  1914. }
  1915. genlmsg_end(skb, nlh);
  1916. mptcp_nl_mcast_send(net, skb, GFP_KERNEL);
  1917. return;
  1918. nla_put_failure:
  1919. nlmsg_free(skb);
  1920. }
  1921. void mptcp_event(enum mptcp_event_type type, const struct mptcp_sock *msk,
  1922. const struct sock *ssk, gfp_t gfp)
  1923. {
  1924. struct net *net = sock_net((const struct sock *)msk);
  1925. struct nlmsghdr *nlh;
  1926. struct sk_buff *skb;
  1927. if (!genl_has_listeners(&mptcp_genl_family, net, MPTCP_PM_EV_GRP_OFFSET))
  1928. return;
  1929. skb = nlmsg_new(NLMSG_DEFAULT_SIZE, gfp);
  1930. if (!skb)
  1931. return;
  1932. nlh = genlmsg_put(skb, 0, 0, &mptcp_genl_family, 0, type);
  1933. if (!nlh)
  1934. goto nla_put_failure;
  1935. switch (type) {
  1936. case MPTCP_EVENT_UNSPEC:
  1937. WARN_ON_ONCE(1);
  1938. break;
  1939. case MPTCP_EVENT_CREATED:
  1940. case MPTCP_EVENT_ESTABLISHED:
  1941. if (mptcp_event_created(skb, msk, ssk) < 0)
  1942. goto nla_put_failure;
  1943. break;
  1944. case MPTCP_EVENT_CLOSED:
  1945. if (nla_put_u32(skb, MPTCP_ATTR_TOKEN, READ_ONCE(msk->token)) < 0)
  1946. goto nla_put_failure;
  1947. break;
  1948. case MPTCP_EVENT_ANNOUNCED:
  1949. case MPTCP_EVENT_REMOVED:
  1950. /* call mptcp_event_addr_announced()/removed instead */
  1951. WARN_ON_ONCE(1);
  1952. break;
  1953. case MPTCP_EVENT_SUB_ESTABLISHED:
  1954. case MPTCP_EVENT_SUB_PRIORITY:
  1955. if (mptcp_event_sub_established(skb, msk, ssk) < 0)
  1956. goto nla_put_failure;
  1957. break;
  1958. case MPTCP_EVENT_SUB_CLOSED:
  1959. if (mptcp_event_sub_closed(skb, msk, ssk) < 0)
  1960. goto nla_put_failure;
  1961. break;
  1962. case MPTCP_EVENT_LISTENER_CREATED:
  1963. case MPTCP_EVENT_LISTENER_CLOSED:
  1964. break;
  1965. }
  1966. genlmsg_end(skb, nlh);
  1967. mptcp_nl_mcast_send(net, skb, gfp);
  1968. return;
  1969. nla_put_failure:
  1970. nlmsg_free(skb);
  1971. }
  1972. struct genl_family mptcp_genl_family __ro_after_init = {
  1973. .name = MPTCP_PM_NAME,
  1974. .version = MPTCP_PM_VER,
  1975. .netnsok = true,
  1976. .module = THIS_MODULE,
  1977. .ops = mptcp_pm_nl_ops,
  1978. .n_ops = ARRAY_SIZE(mptcp_pm_nl_ops),
  1979. .resv_start_op = MPTCP_PM_CMD_SUBFLOW_DESTROY + 1,
  1980. .mcgrps = mptcp_pm_mcgrps,
  1981. .n_mcgrps = ARRAY_SIZE(mptcp_pm_mcgrps),
  1982. };
  1983. static int __net_init pm_nl_init_net(struct net *net)
  1984. {
  1985. struct pm_nl_pernet *pernet = pm_nl_get_pernet(net);
  1986. INIT_LIST_HEAD_RCU(&pernet->local_addr_list);
  1987. /* Cit. 2 subflows ought to be enough for anybody. */
  1988. pernet->subflows_max = 2;
  1989. pernet->next_id = 1;
  1990. pernet->stale_loss_cnt = 4;
  1991. spin_lock_init(&pernet->lock);
  1992. /* No need to initialize other pernet fields, the struct is zeroed at
  1993. * allocation time.
  1994. */
  1995. return 0;
  1996. }
  1997. static void __net_exit pm_nl_exit_net(struct list_head *net_list)
  1998. {
  1999. struct net *net;
  2000. list_for_each_entry(net, net_list, exit_list) {
  2001. struct pm_nl_pernet *pernet = pm_nl_get_pernet(net);
  2002. /* net is removed from namespace list, can't race with
  2003. * other modifiers, also netns core already waited for a
  2004. * RCU grace period.
  2005. */
  2006. __flush_addrs(&pernet->local_addr_list);
  2007. }
  2008. }
  2009. static struct pernet_operations mptcp_pm_pernet_ops = {
  2010. .init = pm_nl_init_net,
  2011. .exit_batch = pm_nl_exit_net,
  2012. .id = &pm_nl_pernet_id,
  2013. .size = sizeof(struct pm_nl_pernet),
  2014. };
  2015. void __init mptcp_pm_nl_init(void)
  2016. {
  2017. if (register_pernet_subsys(&mptcp_pm_pernet_ops) < 0)
  2018. panic("Failed to register MPTCP PM pernet subsystem.\n");
  2019. if (genl_register_family(&mptcp_genl_family))
  2020. panic("Failed to register MPTCP PM netlink family\n");
  2021. }