1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 2 /* AF_RXRPC internal definitions 3 * 4 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved. 5 * Written by David Howells (dhowells@redhat.com) 6 */ 7 8 #include <linux/atomic.h> 9 #include <linux/seqlock.h> 10 #include <linux/win_minmax.h> 11 #include <net/net_namespace.h> 12 #include <net/netns/generic.h> 13 #include <net/sock.h> 14 #include <net/af_rxrpc.h> 15 #include <keys/rxrpc-type.h> 16 #include "protocol.h" 17 18 #define FCRYPT_BSIZE 8 19 struct rxrpc_crypt { 20 union { 21 u8 x[FCRYPT_BSIZE]; 22 __be32 n[2]; 23 }; 24 } __attribute__((aligned(8))); 25 26 #define rxrpc_queue_work(WS) queue_work(rxrpc_workqueue, (WS)) 27 #define rxrpc_queue_delayed_work(WS,D) \ 28 queue_delayed_work(rxrpc_workqueue, (WS), (D)) 29 30 struct key_preparsed_payload; 31 struct rxrpc_connection; 32 struct rxrpc_txbuf; 33 struct rxrpc_txqueue; 34 struct rxgk_context; 35 36 /* 37 * Mark applied to socket buffers in skb->mark. skb->priority is used 38 * to pass supplementary information. 39 */ 40 enum rxrpc_skb_mark { 41 RXRPC_SKB_MARK_PACKET, /* Received packet */ 42 RXRPC_SKB_MARK_ERROR, /* Error notification */ 43 RXRPC_SKB_MARK_CHALLENGE, /* Challenge notification */ 44 RXRPC_SKB_MARK_SERVICE_CONN_SECURED, /* Service connection response has been verified */ 45 RXRPC_SKB_MARK_REJECT_BUSY, /* Reject with BUSY */ 46 RXRPC_SKB_MARK_REJECT_ABORT, /* Reject with ABORT (code in skb->priority) */ 47 }; 48 49 /* 50 * sk_state for RxRPC sockets 51 */ 52 enum { 53 RXRPC_UNBOUND = 0, 54 RXRPC_CLIENT_UNBOUND, /* Unbound socket used as client */ 55 RXRPC_CLIENT_BOUND, /* client local address bound */ 56 RXRPC_SERVER_BOUND, /* server local address bound */ 57 RXRPC_SERVER_BOUND2, /* second server local address bound */ 58 RXRPC_SERVER_LISTENING, /* server listening for connections */ 59 RXRPC_SERVER_LISTEN_DISABLED, /* server listening disabled */ 60 RXRPC_CLOSE, /* socket is being closed */ 61 }; 62 63 /* 64 * Per-network namespace data. 65 */ 66 struct rxrpc_net { 67 struct proc_dir_entry *proc_net; /* Subdir in /proc/net */ 68 u32 epoch; /* Local epoch for detecting local-end reset */ 69 struct list_head calls; /* List of calls active in this namespace */ 70 spinlock_t call_lock; /* Lock for ->calls */ 71 atomic_t nr_calls; /* Count of allocated calls */ 72 73 atomic_t nr_conns; 74 struct list_head bundle_proc_list; /* List of bundles for proc */ 75 struct list_head conn_proc_list; /* List of conns in this namespace for proc */ 76 struct list_head service_conns; /* Service conns in this namespace */ 77 rwlock_t conn_lock; /* Lock for ->conn_proc_list, ->service_conns */ 78 struct work_struct service_conn_reaper; 79 struct timer_list service_conn_reap_timer; 80 81 bool live; 82 83 atomic_t nr_client_conns; 84 85 struct hlist_head local_endpoints; 86 struct mutex local_mutex; /* Lock for ->local_endpoints */ 87 88 DECLARE_HASHTABLE (peer_hash, 10); 89 spinlock_t peer_hash_lock; /* Lock for ->peer_hash */ 90 91 #define RXRPC_KEEPALIVE_TIME 20 /* NAT keepalive time in seconds */ 92 u8 peer_keepalive_cursor; 93 time64_t peer_keepalive_base; 94 struct list_head peer_keepalive[32]; 95 struct list_head peer_keepalive_new; 96 struct timer_list peer_keepalive_timer; 97 struct work_struct peer_keepalive_work; 98 99 atomic_t stat_tx_data; 100 atomic_t stat_tx_data_retrans; 101 atomic_t stat_tx_data_send; 102 atomic_t stat_tx_data_send_frag; 103 atomic_t stat_tx_data_send_fail; 104 atomic_t stat_tx_data_send_msgsize; 105 atomic_t stat_tx_data_underflow; 106 atomic_t stat_tx_data_cwnd_reset; 107 atomic_t stat_rx_data; 108 atomic_t stat_rx_data_reqack; 109 atomic_t stat_rx_data_jumbo; 110 111 atomic_t stat_tx_ack_fill; 112 atomic_t stat_tx_ack_send; 113 atomic_t stat_tx_ack_skip; 114 atomic_t stat_tx_acks[256]; 115 atomic_t stat_rx_acks[256]; 116 atomic_t stat_tx_jumbo[10]; 117 atomic_t stat_rx_jumbo[10]; 118 119 atomic_t stat_why_req_ack[8]; 120 121 atomic_t stat_io_loop; 122 }; 123 124 /* 125 * Service backlog preallocation. 126 * 127 * This contains circular buffers of preallocated peers, connections and calls 128 * for incoming service calls and their head and tail pointers. This allows 129 * calls to be set up in the data_ready handler, thereby avoiding the need to 130 * shuffle packets around so much. 131 */ 132 struct rxrpc_backlog { 133 unsigned short peer_backlog_head; 134 unsigned short peer_backlog_tail; 135 unsigned short conn_backlog_head; 136 unsigned short conn_backlog_tail; 137 unsigned short call_backlog_head; 138 unsigned short call_backlog_tail; 139 #define RXRPC_BACKLOG_MAX 32 140 struct rxrpc_peer *peer_backlog[RXRPC_BACKLOG_MAX]; 141 struct rxrpc_connection *conn_backlog[RXRPC_BACKLOG_MAX]; 142 struct rxrpc_call *call_backlog[RXRPC_BACKLOG_MAX]; 143 }; 144 145 /* 146 * RxRPC socket definition 147 */ 148 struct rxrpc_sock { 149 /* WARNING: sk has to be the first member */ 150 struct sock sk; 151 const struct rxrpc_kernel_ops *app_ops; /* Table of kernel app notification funcs */ 152 struct rxrpc_local *local; /* local endpoint */ 153 struct rxrpc_backlog *backlog; /* Preallocation for services */ 154 struct sk_buff_head recvmsg_oobq; /* OOB messages for recvmsg to pick up */ 155 struct rb_root pending_oobq; /* OOB messages awaiting userspace to respond to */ 156 u64 oob_id_counter; /* OOB message ID counter */ 157 spinlock_t incoming_lock; /* Incoming call vs service shutdown lock */ 158 struct list_head sock_calls; /* List of calls owned by this socket */ 159 struct list_head to_be_accepted; /* calls awaiting acceptance */ 160 struct list_head recvmsg_q; /* Calls awaiting recvmsg's attention */ 161 spinlock_t recvmsg_lock; /* Lock for recvmsg_q */ 162 struct key *key; /* security for this socket */ 163 struct key *securities; /* list of server security descriptors */ 164 struct rb_root calls; /* User ID -> call mapping */ 165 unsigned long flags; 166 #define RXRPC_SOCK_CONNECTED 0 /* connect_srx is set */ 167 #define RXRPC_SOCK_MANAGE_RESPONSE 1 /* User wants to manage RESPONSE packets */ 168 rwlock_t call_lock; /* lock for calls */ 169 u32 min_sec_level; /* minimum security level */ 170 #define RXRPC_SECURITY_MAX RXRPC_SECURITY_ENCRYPT 171 bool exclusive; /* Exclusive connection for a client socket */ 172 u16 second_service; /* Additional service bound to the endpoint */ 173 struct { 174 /* Service upgrade information */ 175 u16 from; /* Service ID to upgrade (if not 0) */ 176 u16 to; /* service ID to upgrade to */ 177 } service_upgrade; 178 sa_family_t family; /* Protocol family created with */ 179 struct sockaddr_rxrpc srx; /* Primary Service/local addresses */ 180 struct sockaddr_rxrpc connect_srx; /* Default client address from connect() */ 181 }; 182 183 #define rxrpc_sk(__sk) container_of((__sk), struct rxrpc_sock, sk) 184 185 /* 186 * CPU-byteorder normalised Rx packet header. 187 */ 188 struct rxrpc_host_header { 189 u32 epoch; /* client boot timestamp */ 190 u32 cid; /* connection and channel ID */ 191 u32 callNumber; /* call ID (0 for connection-level packets) */ 192 u32 seq; /* sequence number of pkt in call stream */ 193 u32 serial; /* serial number of pkt sent to network */ 194 u8 type; /* packet type */ 195 u8 flags; /* packet flags */ 196 u8 userStatus; /* app-layer defined status */ 197 u8 securityIndex; /* security protocol ID */ 198 union { 199 u16 _rsvd; /* reserved */ 200 u16 cksum; /* kerberos security checksum */ 201 }; 202 u16 serviceId; /* service ID */ 203 } __packed; 204 205 /* 206 * RxRPC socket buffer private variables 207 * - max 48 bytes (struct sk_buff::cb) 208 */ 209 struct rxrpc_skb_priv { 210 union { 211 struct rxrpc_connection *poke_conn; /* Conn referred to (poke packet) */ 212 struct { 213 u16 offset; /* Offset of data */ 214 u16 len; /* Length of data */ 215 u8 flags; 216 #define RXRPC_RX_VERIFIED 0x01 217 }; 218 struct { 219 rxrpc_seq_t first_ack; /* First packet in acks table */ 220 rxrpc_seq_t prev_ack; /* Highest seq seen */ 221 rxrpc_serial_t acked_serial; /* Packet in response to (or 0) */ 222 u16 nr_acks; /* Number of acks+nacks */ 223 u8 reason; /* Reason for ack */ 224 } ack; 225 struct { 226 struct rxrpc_connection *conn; /* Connection referred to */ 227 union { 228 u32 rxkad_nonce; 229 }; 230 } chall; 231 struct { 232 rxrpc_serial_t challenge_serial; 233 u32 kvno; 234 u32 version; 235 u16 len; 236 u16 ticket_len; 237 } resp; 238 }; 239 struct rxrpc_host_header hdr; /* RxRPC packet header from this packet */ 240 }; 241 242 #define rxrpc_skb(__skb) ((struct rxrpc_skb_priv *) &(__skb)->cb) 243 244 /* 245 * RxRPC security module interface 246 */ 247 struct rxrpc_security { 248 const char *name; /* name of this service */ 249 u8 security_index; /* security type provided */ 250 u32 no_key_abort; /* Abort code indicating no key */ 251 252 /* Initialise a security service */ 253 int (*init)(void); 254 255 /* Clean up a security service */ 256 void (*exit)(void); 257 258 /* Parse the information from a server key */ 259 int (*preparse_server_key)(struct key_preparsed_payload *); 260 261 /* Clean up the preparse buffer after parsing a server key */ 262 void (*free_preparse_server_key)(struct key_preparsed_payload *); 263 264 /* Destroy the payload of a server key */ 265 void (*destroy_server_key)(struct key *); 266 267 /* Describe a server key */ 268 void (*describe_server_key)(const struct key *, struct seq_file *); 269 270 /* initialise a connection's security */ 271 int (*init_connection_security)(struct rxrpc_connection *, 272 struct rxrpc_key_token *); 273 274 /* Work out how much data we can store in a packet, given an estimate 275 * of the amount of data remaining and allocate a data buffer. 276 */ 277 struct rxrpc_txbuf *(*alloc_txbuf)(struct rxrpc_call *call, size_t remaining, gfp_t gfp); 278 279 /* impose security on a packet */ 280 int (*secure_packet)(struct rxrpc_call *, struct rxrpc_txbuf *); 281 282 /* verify the security on a received packet */ 283 int (*verify_packet)(struct rxrpc_call *, struct sk_buff *); 284 285 /* Free crypto request on a call */ 286 void (*free_call_crypto)(struct rxrpc_call *); 287 288 /* issue a challenge */ 289 int (*issue_challenge)(struct rxrpc_connection *); 290 291 /* Validate a challenge packet */ 292 bool (*validate_challenge)(struct rxrpc_connection *conn, 293 struct sk_buff *skb); 294 295 /* Fill out the cmsg for recvmsg() to pass on a challenge to userspace. 296 * The security class gets to add additional information. 297 */ 298 int (*challenge_to_recvmsg)(struct rxrpc_connection *conn, 299 struct sk_buff *challenge, 300 struct msghdr *msg); 301 302 /* Parse sendmsg() control message and respond to challenge. */ 303 int (*sendmsg_respond_to_challenge)(struct sk_buff *challenge, 304 struct msghdr *msg); 305 306 /* respond to a challenge */ 307 int (*respond_to_challenge)(struct rxrpc_connection *conn, 308 struct sk_buff *challenge); 309 310 /* verify a response */ 311 int (*verify_response)(struct rxrpc_connection *, 312 struct sk_buff *); 313 314 /* clear connection security */ 315 void (*clear)(struct rxrpc_connection *); 316 317 /* Default ticket -> key decoder */ 318 int (*default_decode_ticket)(struct rxrpc_connection *conn, struct sk_buff *skb, 319 unsigned int ticket_offset, unsigned int ticket_len, 320 struct key **_key); 321 }; 322 323 /* 324 * RxRPC local transport endpoint description 325 * - owned by a single AF_RXRPC socket 326 * - pointed to by transport socket struct sk_user_data 327 */ 328 struct rxrpc_local { 329 struct rcu_head rcu; 330 atomic_t active_users; /* Number of users of the local endpoint */ 331 refcount_t ref; /* Number of references to the structure */ 332 struct net *net; /* The network namespace */ 333 struct rxrpc_net *rxnet; /* Our bits in the network namespace */ 334 struct hlist_node link; 335 struct socket *socket; /* my UDP socket */ 336 struct task_struct *io_thread; 337 struct completion io_thread_ready; /* Indication that the I/O thread started */ 338 struct page_frag_cache tx_alloc; /* Tx control packet allocation (I/O thread only) */ 339 struct rxrpc_sock *service; /* Service(s) listening on this endpoint */ 340 #ifdef CONFIG_AF_RXRPC_INJECT_RX_DELAY 341 struct sk_buff_head rx_delay_queue; /* Delay injection queue */ 342 #endif 343 struct sk_buff_head rx_queue; /* Received packets */ 344 struct list_head conn_attend_q; /* Conns requiring immediate attention */ 345 struct list_head call_attend_q; /* Calls requiring immediate attention */ 346 347 struct rb_root client_bundles; /* Client connection bundles by socket params */ 348 spinlock_t client_bundles_lock; /* Lock for client_bundles */ 349 bool kill_all_client_conns; 350 struct list_head idle_client_conns; 351 struct timer_list client_conn_reap_timer; 352 unsigned long client_conn_flags; 353 #define RXRPC_CLIENT_CONN_REAP_TIMER 0 /* The client conn reap timer expired */ 354 355 spinlock_t lock; /* access lock */ 356 rwlock_t services_lock; /* lock for services list */ 357 int debug_id; /* debug ID for printks */ 358 bool dead; 359 bool service_closed; /* Service socket closed */ 360 struct idr conn_ids; /* List of connection IDs */ 361 struct list_head new_client_calls; /* Newly created client calls need connection */ 362 spinlock_t client_call_lock; /* Lock for ->new_client_calls */ 363 struct sockaddr_rxrpc srx; /* local address */ 364 /* Provide a kvec table sufficiently large to manage either a DATA 365 * packet with a maximum set of jumbo subpackets or a PING ACK padded 366 * out to 64K with zeropages for PMTUD. 367 */ 368 struct kvec kvec[1 + RXRPC_MAX_NR_JUMBO > 3 + 16 ? 369 1 + RXRPC_MAX_NR_JUMBO : 3 + 16]; 370 }; 371 372 /* 373 * RxRPC remote transport endpoint definition 374 * - matched by local endpoint, remote port, address and protocol type 375 */ 376 struct rxrpc_peer { 377 struct rcu_head rcu; /* This must be first */ 378 refcount_t ref; 379 unsigned long hash_key; 380 struct hlist_node hash_link; 381 struct rxrpc_local *local; 382 struct hlist_head error_targets; /* targets for net error distribution */ 383 struct rb_root service_conns; /* Service connections */ 384 struct list_head keepalive_link; /* Link in net->peer_keepalive[] */ 385 unsigned long app_data; /* Application data (e.g. afs_server) */ 386 time64_t last_tx_at; /* Last time packet sent here */ 387 seqlock_t service_conn_lock; 388 spinlock_t lock; /* access lock */ 389 int debug_id; /* debug ID for printks */ 390 struct sockaddr_rxrpc srx; /* remote address */ 391 392 /* Path MTU discovery [RFC8899] */ 393 unsigned int pmtud_trial; /* Current MTU probe size */ 394 unsigned int pmtud_good; /* Largest working MTU probe we've tried */ 395 unsigned int pmtud_bad; /* Smallest non-working MTU probe we've tried */ 396 bool pmtud_lost; /* T if MTU probe was lost */ 397 bool pmtud_probing; /* T if we have an active probe outstanding */ 398 bool pmtud_pending; /* T if a call to this peer should send a probe */ 399 u8 pmtud_jumbo; /* Max jumbo packets for the MTU */ 400 bool ackr_adv_pmtud; /* T if the peer advertises path-MTU */ 401 unsigned int ackr_max_data; /* Maximum data advertised by peer */ 402 unsigned int if_mtu; /* Local interface MTU (- hdrsize) for this peer */ 403 unsigned int max_data; /* Maximum packet data capacity for this peer */ 404 unsigned short hdrsize; /* header size (IP + UDP + RxRPC) */ 405 unsigned short tx_seg_max; /* Maximum number of transmissable segments */ 406 407 /* Calculated RTT cache */ 408 unsigned int recent_srtt_us; 409 unsigned int recent_rto_us; 410 411 u8 cong_ssthresh; /* Congestion slow-start threshold */ 412 }; 413 414 /* 415 * Keys for matching a connection. 416 */ 417 struct rxrpc_conn_proto { 418 union { 419 struct { 420 u32 epoch; /* epoch of this connection */ 421 u32 cid; /* connection ID */ 422 }; 423 u64 index_key; 424 }; 425 }; 426 427 struct rxrpc_conn_parameters { 428 struct rxrpc_local *local; /* Representation of local endpoint */ 429 struct rxrpc_peer *peer; /* Representation of remote endpoint */ 430 struct key *key; /* Security details */ 431 bool exclusive; /* T if conn is exclusive */ 432 bool upgrade; /* T if service ID can be upgraded */ 433 u16 service_id; /* Service ID for this connection */ 434 u32 security_level; /* Security level selected */ 435 }; 436 437 /* 438 * Call completion condition (state == RXRPC_CALL_COMPLETE). 439 */ 440 enum rxrpc_call_completion { 441 RXRPC_CALL_SUCCEEDED, /* - Normal termination */ 442 RXRPC_CALL_REMOTELY_ABORTED, /* - call aborted by peer */ 443 RXRPC_CALL_LOCALLY_ABORTED, /* - call aborted locally on error or close */ 444 RXRPC_CALL_LOCAL_ERROR, /* - call failed due to local error */ 445 RXRPC_CALL_NETWORK_ERROR, /* - call terminated by network error */ 446 NR__RXRPC_CALL_COMPLETIONS 447 }; 448 449 /* 450 * Bits in the connection flags. 451 */ 452 enum rxrpc_conn_flag { 453 RXRPC_CONN_IN_SERVICE_CONNS, /* Conn is in peer->service_conns */ 454 RXRPC_CONN_DONT_REUSE, /* Don't reuse this connection */ 455 RXRPC_CONN_PROBING_FOR_UPGRADE, /* Probing for service upgrade */ 456 RXRPC_CONN_FINAL_ACK_0, /* Need final ACK for channel 0 */ 457 RXRPC_CONN_FINAL_ACK_1, /* Need final ACK for channel 1 */ 458 RXRPC_CONN_FINAL_ACK_2, /* Need final ACK for channel 2 */ 459 RXRPC_CONN_FINAL_ACK_3, /* Need final ACK for channel 3 */ 460 }; 461 462 #define RXRPC_CONN_FINAL_ACK_MASK ((1UL << RXRPC_CONN_FINAL_ACK_0) | \ 463 (1UL << RXRPC_CONN_FINAL_ACK_1) | \ 464 (1UL << RXRPC_CONN_FINAL_ACK_2) | \ 465 (1UL << RXRPC_CONN_FINAL_ACK_3)) 466 467 /* 468 * Events that can be raised upon a connection. 469 */ 470 enum rxrpc_conn_event { 471 RXRPC_CONN_EV_CHALLENGE, /* Send challenge packet */ 472 RXRPC_CONN_EV_ABORT_CALLS, /* Abort attached calls */ 473 }; 474 475 /* 476 * The connection protocol state. 477 */ 478 enum rxrpc_conn_proto_state { 479 RXRPC_CONN_UNUSED, /* Connection not yet attempted */ 480 RXRPC_CONN_CLIENT_UNSECURED, /* Client connection needs security init */ 481 RXRPC_CONN_CLIENT, /* Client connection */ 482 RXRPC_CONN_SERVICE_PREALLOC, /* Service connection preallocation */ 483 RXRPC_CONN_SERVICE_UNSECURED, /* Service unsecured connection */ 484 RXRPC_CONN_SERVICE_CHALLENGING, /* Service challenging for security */ 485 RXRPC_CONN_SERVICE, /* Service secured connection */ 486 RXRPC_CONN_ABORTED, /* Conn aborted */ 487 RXRPC_CONN__NR_STATES 488 }; 489 490 /* 491 * RxRPC client connection bundle. 492 */ 493 struct rxrpc_bundle { 494 struct rxrpc_local *local; /* Representation of local endpoint */ 495 struct rxrpc_peer *peer; /* Remote endpoint */ 496 struct key *key; /* Security details */ 497 struct list_head proc_link; /* Link in net->bundle_proc_list */ 498 const struct rxrpc_security *security; /* applied security module */ 499 refcount_t ref; 500 atomic_t active; /* Number of active users */ 501 unsigned int debug_id; 502 u32 security_level; /* Security level selected */ 503 u16 service_id; /* Service ID for this connection */ 504 bool try_upgrade; /* True if the bundle is attempting upgrade */ 505 bool exclusive; /* T if conn is exclusive */ 506 bool upgrade; /* T if service ID can be upgraded */ 507 unsigned short alloc_error; /* Error from last conn allocation */ 508 struct rb_node local_node; /* Node in local->client_conns */ 509 struct list_head waiting_calls; /* Calls waiting for channels */ 510 unsigned long avail_chans; /* Mask of available channels */ 511 unsigned int conn_ids[4]; /* Connection IDs. */ 512 struct rxrpc_connection *conns[4]; /* The connections in the bundle (max 4) */ 513 }; 514 515 /* 516 * RxRPC connection definition 517 * - matched by { local, peer, epoch, conn_id, direction } 518 * - each connection can only handle four simultaneous calls 519 */ 520 struct rxrpc_connection { 521 struct rxrpc_conn_proto proto; 522 struct rxrpc_local *local; /* Representation of local endpoint */ 523 struct rxrpc_peer *peer; /* Remote endpoint */ 524 struct rxrpc_net *rxnet; /* Network namespace to which call belongs */ 525 struct key *key; /* Security details */ 526 struct list_head attend_link; /* Link in local->conn_attend_q */ 527 528 refcount_t ref; 529 atomic_t active; /* Active count for service conns */ 530 struct rcu_head rcu; 531 struct list_head cache_link; 532 533 unsigned char act_chans; /* Mask of active channels */ 534 struct rxrpc_channel { 535 unsigned long final_ack_at; /* Time at which to issue final ACK */ 536 struct rxrpc_call *call; /* Active call */ 537 unsigned int call_debug_id; /* call->debug_id */ 538 u32 call_id; /* ID of current call */ 539 u32 call_counter; /* Call ID counter */ 540 u32 last_call; /* ID of last call */ 541 u8 last_type; /* Type of last packet */ 542 union { 543 u32 last_seq; 544 u32 last_abort; 545 }; 546 } channels[RXRPC_MAXCALLS]; 547 548 struct timer_list timer; /* Conn event timer */ 549 struct work_struct processor; /* connection event processor */ 550 struct work_struct destructor; /* In-process-context destroyer */ 551 struct rxrpc_bundle *bundle; /* Client connection bundle */ 552 struct rb_node service_node; /* Node in peer->service_conns */ 553 struct list_head proc_link; /* link in procfs list */ 554 struct list_head link; /* link in master connection list */ 555 struct sk_buff_head rx_queue; /* received conn-level packets */ 556 struct page_frag_cache tx_data_alloc; /* Tx DATA packet allocation */ 557 struct mutex tx_data_alloc_lock; 558 559 struct mutex security_lock; /* Lock for security management */ 560 const struct rxrpc_security *security; /* applied security module */ 561 union { 562 struct { 563 struct crypto_sync_skcipher *cipher; /* encryption handle */ 564 struct rxrpc_crypt csum_iv; /* packet checksum base */ 565 u32 nonce; /* response re-use preventer */ 566 } rxkad; 567 struct { 568 struct rxgk_context *keys[4]; /* (Re-)keying buffer */ 569 u64 start_time; /* The start time for TK derivation */ 570 u8 nonce[20]; /* Response re-use preventer */ 571 u32 enctype; /* Kerberos 5 encoding type */ 572 u32 key_number; /* Current key number */ 573 } rxgk; 574 }; 575 rwlock_t security_use_lock; /* Security use/modification lock */ 576 struct sk_buff *tx_response; /* Response packet to be transmitted */ 577 578 unsigned long flags; 579 unsigned long events; 580 unsigned long idle_timestamp; /* Time at which last became idle */ 581 spinlock_t state_lock; /* state-change lock */ 582 enum rxrpc_conn_proto_state state; /* current state of connection */ 583 enum rxrpc_call_completion completion; /* Completion condition */ 584 s32 abort_code; /* Abort code of connection abort */ 585 int debug_id; /* debug ID for printks */ 586 rxrpc_serial_t tx_serial; /* Outgoing packet serial number counter */ 587 unsigned int hi_serial; /* highest serial number received */ 588 rxrpc_serial_t pmtud_probe; /* Serial of MTU probe (or 0) */ 589 unsigned int pmtud_call; /* ID of call used for probe */ 590 u32 service_id; /* Service ID, possibly upgraded */ 591 u32 security_level; /* Security level selected */ 592 u8 security_ix; /* security type */ 593 u8 out_clientflag; /* RXRPC_CLIENT_INITIATED if we are client */ 594 u8 bundle_shift; /* Index into bundle->avail_chans */ 595 bool exclusive; /* T if conn is exclusive */ 596 bool upgrade; /* T if service ID can be upgraded */ 597 u16 orig_service_id; /* Originally requested service ID */ 598 short error; /* Local error code */ 599 }; 600 601 static inline bool rxrpc_to_server(const struct rxrpc_skb_priv *sp) 602 { 603 return sp->hdr.flags & RXRPC_CLIENT_INITIATED; 604 } 605 606 static inline bool rxrpc_to_client(const struct rxrpc_skb_priv *sp) 607 { 608 return !rxrpc_to_server(sp); 609 } 610 611 /* 612 * Flags in call->flags. 613 */ 614 enum rxrpc_call_flag { 615 RXRPC_CALL_RELEASED, /* call has been released - no more message to userspace */ 616 RXRPC_CALL_HAS_USERID, /* has a user ID attached */ 617 RXRPC_CALL_IS_SERVICE, /* Call is service call */ 618 RXRPC_CALL_EXPOSED, /* The call was exposed to the world */ 619 RXRPC_CALL_RX_LAST, /* Received the last packet (at rxtx_top) */ 620 RXRPC_CALL_TX_LAST, /* Last packet in Tx buffer (at rxtx_top) */ 621 RXRPC_CALL_TX_ALL_ACKED, /* Last packet has been hard-acked */ 622 RXRPC_CALL_TX_NO_MORE, /* No more data to transmit (MSG_MORE deasserted) */ 623 RXRPC_CALL_SEND_PING, /* A ping will need to be sent */ 624 RXRPC_CALL_RETRANS_TIMEOUT, /* Retransmission due to timeout occurred */ 625 RXRPC_CALL_BEGAN_RX_TIMER, /* We began the expect_rx_by timer */ 626 RXRPC_CALL_RX_HEARD, /* The peer responded at least once to this call */ 627 RXRPC_CALL_DISCONNECTED, /* The call has been disconnected */ 628 RXRPC_CALL_KERNEL, /* The call was made by the kernel */ 629 RXRPC_CALL_UPGRADE, /* Service upgrade was requested for the call */ 630 RXRPC_CALL_EXCLUSIVE, /* The call uses a once-only connection */ 631 RXRPC_CALL_RX_IS_IDLE, /* recvmsg() is idle - send an ACK */ 632 RXRPC_CALL_RECVMSG_READ_ALL, /* recvmsg() read all of the received data */ 633 RXRPC_CALL_CONN_CHALLENGING, /* The connection is being challenged */ 634 }; 635 636 /* 637 * Events that can be raised on a call. 638 */ 639 enum rxrpc_call_event { 640 RXRPC_CALL_EV_ACK_LOST, /* ACK may be lost, send ping */ 641 RXRPC_CALL_EV_INITIAL_PING, /* Send initial ping for a new service call */ 642 }; 643 644 /* 645 * The states that a call can be in. 646 */ 647 enum rxrpc_call_state { 648 RXRPC_CALL_UNINITIALISED, 649 RXRPC_CALL_CLIENT_AWAIT_CONN, /* - client waiting for connection to become available */ 650 RXRPC_CALL_CLIENT_SEND_REQUEST, /* - client sending request phase */ 651 RXRPC_CALL_CLIENT_AWAIT_REPLY, /* - client awaiting reply */ 652 RXRPC_CALL_CLIENT_RECV_REPLY, /* - client receiving reply phase */ 653 RXRPC_CALL_SERVER_PREALLOC, /* - service preallocation */ 654 RXRPC_CALL_SERVER_RECV_REQUEST, /* - server receiving request */ 655 RXRPC_CALL_SERVER_ACK_REQUEST, /* - server pending ACK of request */ 656 RXRPC_CALL_SERVER_SEND_REPLY, /* - server sending reply */ 657 RXRPC_CALL_SERVER_AWAIT_ACK, /* - server awaiting final ACK */ 658 RXRPC_CALL_COMPLETE, /* - call complete */ 659 NR__RXRPC_CALL_STATES 660 }; 661 662 /* 663 * Call Tx congestion management modes. 664 */ 665 enum rxrpc_ca_state { 666 RXRPC_CA_SLOW_START, 667 RXRPC_CA_CONGEST_AVOIDANCE, 668 RXRPC_CA_PACKET_LOSS, 669 RXRPC_CA_FAST_RETRANSMIT, 670 NR__RXRPC_CA_STATES 671 } __mode(byte); 672 673 /* 674 * Current purpose of call RACK timer. According to the RACK-TLP protocol 675 * [RFC8985], the transmission timer (call->rack_timo_at) may only be used for 676 * one of these at once. 677 */ 678 enum rxrpc_rack_timer_mode { 679 RXRPC_CALL_RACKTIMER_OFF, /* Timer not running */ 680 RXRPC_CALL_RACKTIMER_RACK_REORDER, /* RACK reordering timer */ 681 RXRPC_CALL_RACKTIMER_TLP_PTO, /* TLP timeout */ 682 RXRPC_CALL_RACKTIMER_RTO, /* Retransmission timeout */ 683 } __mode(byte); 684 685 /* 686 * RxRPC call definition 687 * - matched by { connection, call_id } 688 */ 689 struct rxrpc_call { 690 struct rcu_head rcu; 691 struct rxrpc_connection *conn; /* connection carrying call */ 692 struct rxrpc_bundle *bundle; /* Connection bundle to use */ 693 struct rxrpc_peer *peer; /* Peer record for remote address */ 694 struct rxrpc_local *local; /* Representation of local endpoint */ 695 struct rxrpc_sock __rcu *socket; /* socket responsible */ 696 struct rxrpc_net *rxnet; /* Network namespace to which call belongs */ 697 struct key *key; /* Security details */ 698 const struct rxrpc_security *security; /* applied security module */ 699 struct mutex user_mutex; /* User access mutex */ 700 struct sockaddr_rxrpc dest_srx; /* Destination address */ 701 ktime_t delay_ack_at; /* When DELAY ACK needs to happen */ 702 ktime_t rack_timo_at; /* When ACK is figured as lost */ 703 ktime_t ping_at; /* When next to send a ping */ 704 ktime_t keepalive_at; /* When next to send a keepalive ping */ 705 ktime_t expect_rx_by; /* When we expect to get a packet by */ 706 ktime_t expect_req_by; /* When we expect to get a request DATA packet by */ 707 ktime_t expect_term_by; /* When we expect call termination by */ 708 u32 next_rx_timo; /* Timeout for next Rx packet (ms) */ 709 u32 next_req_timo; /* Timeout for next Rx request packet (ms) */ 710 u32 hard_timo; /* Maximum lifetime or 0 (s) */ 711 struct timer_list timer; /* Combined event timer */ 712 struct work_struct destroyer; /* In-process-context destroyer */ 713 rxrpc_notify_rx_t notify_rx; /* kernel service Rx notification function */ 714 struct list_head link; /* link in master call list */ 715 struct list_head wait_link; /* Link in local->new_client_calls */ 716 struct hlist_node error_link; /* link in error distribution list */ 717 struct list_head accept_link; /* Link in rx->acceptq */ 718 struct list_head recvmsg_link; /* Link in rx->recvmsg_q */ 719 struct list_head sock_link; /* Link in rx->sock_calls */ 720 struct rb_node sock_node; /* Node in rx->calls */ 721 struct list_head attend_link; /* Link in local->call_attend_q */ 722 struct rxrpc_txbuf *tx_pending; /* Tx buffer being filled */ 723 wait_queue_head_t waitq; /* Wait queue for channel or Tx */ 724 s64 tx_total_len; /* Total length left to be transmitted (or -1) */ 725 unsigned long user_call_ID; /* user-defined call ID */ 726 unsigned long flags; 727 unsigned long events; 728 spinlock_t notify_lock; /* Kernel notification lock */ 729 unsigned int send_abort_why; /* Why the abort [enum rxrpc_abort_reason] */ 730 s32 send_abort; /* Abort code to be sent */ 731 short send_abort_err; /* Error to be associated with the abort */ 732 rxrpc_seq_t send_abort_seq; /* DATA packet that incurred the abort (or 0) */ 733 s32 abort_code; /* Local/remote abort code */ 734 int error; /* Local error incurred */ 735 enum rxrpc_call_state _state; /* Current state of call (needs barrier) */ 736 enum rxrpc_call_completion completion; /* Call completion condition */ 737 refcount_t ref; 738 u8 security_ix; /* Security type */ 739 enum rxrpc_interruptibility interruptibility; /* At what point call may be interrupted */ 740 u32 call_id; /* call ID on connection */ 741 u32 cid; /* connection ID plus channel index */ 742 u32 security_level; /* Security level selected */ 743 u32 security_enctype; /* Security-specific encoding type (or 0) */ 744 int debug_id; /* debug ID for printks */ 745 unsigned short rx_pkt_offset; /* Current recvmsg packet offset */ 746 unsigned short rx_pkt_len; /* Current recvmsg packet len */ 747 748 /* Sendmsg data tracking. */ 749 rxrpc_seq_t send_top; /* Highest Tx slot filled by sendmsg. */ 750 struct rxrpc_txqueue *send_queue; /* Queue that sendmsg is writing into */ 751 752 /* Transmitted data tracking. */ 753 struct rxrpc_txqueue *tx_queue; /* Start of transmission buffers */ 754 struct rxrpc_txqueue *tx_qtail; /* End of transmission buffers */ 755 rxrpc_seq_t tx_qbase; /* First slot in tx_queue */ 756 rxrpc_seq_t tx_bottom; /* First packet in buffer */ 757 rxrpc_seq_t tx_transmitted; /* Highest packet transmitted */ 758 rxrpc_seq_t tx_top; /* Highest Tx slot allocated. */ 759 rxrpc_serial_t tx_last_serial; /* Serial of last DATA transmitted */ 760 u16 tx_backoff; /* Delay to insert due to Tx failure (ms) */ 761 u16 tx_nr_sent; /* Number of packets sent, but unacked */ 762 u16 tx_nr_lost; /* Number of packets marked lost */ 763 u16 tx_nr_resent; /* Number of packets resent, but unacked */ 764 u16 tx_winsize; /* Maximum size of Tx window */ 765 #define RXRPC_TX_MAX_WINDOW 128 766 u8 tx_jumbo_max; /* Maximum subpkts peer will accept */ 767 ktime_t tx_last_sent; /* Last time a transmission occurred */ 768 769 /* Received data tracking */ 770 struct sk_buff_head recvmsg_queue; /* Queue of packets ready for recvmsg() */ 771 struct sk_buff_head rx_queue; /* Queue of packets for this call to receive */ 772 struct sk_buff_head rx_oos_queue; /* Queue of out of sequence packets */ 773 774 rxrpc_seq_t rx_highest_seq; /* Higest sequence number received */ 775 rxrpc_seq_t rx_consumed; /* Highest packet consumed */ 776 rxrpc_serial_t rx_serial; /* Highest serial received for this call */ 777 u8 rx_winsize; /* Size of Rx window */ 778 779 /* TCP-style slow-start congestion control [RFC5681]. Since the SMSS 780 * is fixed, we keep these numbers in terms of segments (ie. DATA 781 * packets) rather than bytes. 782 */ 783 #define RXRPC_TX_SMSS RXRPC_JUMBO_DATALEN 784 #define RXRPC_MIN_CWND 4 785 enum rxrpc_ca_state cong_ca_state; /* Congestion control state */ 786 u8 cong_extra; /* Extra to send for congestion management */ 787 u16 cong_cwnd; /* Congestion window size */ 788 u16 cong_ssthresh; /* Slow-start threshold */ 789 u16 cong_dup_acks; /* Count of ACKs showing missing packets */ 790 u16 cong_cumul_acks; /* Cumulative ACK count */ 791 ktime_t cong_tstamp; /* Last time cwnd was changed */ 792 793 /* RACK-TLP [RFC8985] state. */ 794 ktime_t rack_xmit_ts; /* Latest transmission timestamp */ 795 ktime_t rack_rtt; /* RTT of most recently ACK'd segment */ 796 ktime_t rack_rtt_ts; /* Timestamp of rack_rtt */ 797 ktime_t rack_reo_wnd; /* Reordering window */ 798 unsigned int rack_reo_wnd_mult; /* Multiplier applied to rack_reo_wnd */ 799 int rack_reo_wnd_persist; /* Num loss recoveries before reset reo_wnd */ 800 rxrpc_seq_t rack_fack; /* Highest sequence so far ACK'd */ 801 rxrpc_seq_t rack_end_seq; /* Highest sequence seen */ 802 rxrpc_seq_t rack_dsack_round; /* DSACK opt recv'd in latest roundtrip */ 803 bool rack_dsack_round_none; /* T if dsack_round is "None" */ 804 bool rack_reordering_seen; /* T if detected reordering event */ 805 enum rxrpc_rack_timer_mode rack_timer_mode; /* Current mode of RACK timer */ 806 bool tlp_is_retrans; /* T if unacked TLP retransmission */ 807 rxrpc_serial_t tlp_serial; /* Serial of TLP probe (or 0 if none in progress) */ 808 rxrpc_seq_t tlp_seq; /* Sequence of TLP probe */ 809 unsigned int tlp_rtt_taken; /* Last time RTT taken */ 810 ktime_t tlp_max_ack_delay; /* Sender budget for max delayed ACK interval */ 811 812 /* Receive-phase ACK management (ACKs we send). */ 813 u8 ackr_reason; /* reason to ACK */ 814 u16 ackr_sack_base; /* Starting slot in SACK table ring */ 815 rxrpc_seq_t ackr_window; /* Base of SACK window */ 816 rxrpc_seq_t ackr_wtop; /* Base of SACK window */ 817 unsigned int ackr_nr_unacked; /* Number of unacked packets */ 818 atomic_t ackr_nr_consumed; /* Number of packets needing hard ACK */ 819 struct { 820 #define RXRPC_SACK_SIZE 256 821 /* SACK table for soft-acked packets */ 822 u8 ackr_sack_table[RXRPC_SACK_SIZE]; 823 } __aligned(8); 824 825 /* RTT management */ 826 rxrpc_serial_t rtt_serial[4]; /* Serial number of DATA or PING sent */ 827 ktime_t rtt_sent_at[4]; /* Time packet sent */ 828 unsigned long rtt_avail; /* Mask of available slots in bits 0-3, 829 * Mask of pending samples in 8-11 */ 830 #define RXRPC_CALL_RTT_AVAIL_MASK 0xf 831 #define RXRPC_CALL_RTT_PEND_SHIFT 8 832 833 /* Transmission-phase ACK management (ACKs we've received). */ 834 ktime_t acks_latest_ts; /* Timestamp of latest ACK received */ 835 rxrpc_seq_t acks_hard_ack; /* Highest sequence hard acked */ 836 rxrpc_seq_t acks_prev_seq; /* Highest previousPacket received */ 837 rxrpc_seq_t acks_lowest_nak; /* Lowest NACK in the buffer (or ==tx_hard_ack) */ 838 rxrpc_serial_t acks_highest_serial; /* Highest serial number ACK'd */ 839 unsigned short acks_nr_sacks; /* Number of soft acks recorded */ 840 unsigned short acks_nr_snacks; /* Number of soft nacks recorded */ 841 842 /* Calculated RTT cache */ 843 ktime_t rtt_last_req; /* Time of last RTT request */ 844 unsigned int rtt_count; /* Number of samples we've got */ 845 unsigned int rtt_taken; /* Number of samples taken (wrapping) */ 846 struct minmax min_rtt; /* Estimated minimum RTT */ 847 u32 srtt_us; /* smoothed round trip time << 3 in usecs */ 848 u32 mdev_us; /* medium deviation */ 849 u32 mdev_max_us; /* maximal mdev for the last rtt period */ 850 u32 rttvar_us; /* smoothed mdev_max */ 851 u32 rto_us; /* Retransmission timeout in usec */ 852 u8 backoff; /* Backoff timeout (as shift) */ 853 }; 854 855 /* 856 * Summary of a new ACK and the changes it made to the Tx buffer packet states. 857 */ 858 struct rxrpc_ack_summary { 859 rxrpc_serial_t ack_serial; /* Serial number of ACK */ 860 rxrpc_serial_t acked_serial; /* Serial number ACK'd */ 861 u16 in_flight; /* Number of unreceived transmissions */ 862 u16 nr_new_hacks; /* Number of rotated new ACKs */ 863 u16 nr_new_sacks; /* Number of new soft ACKs in packet */ 864 u16 nr_new_snacks; /* Number of new soft nacks in packet */ 865 u8 ack_reason; 866 bool new_low_snack:1; /* T if new low soft NACK found */ 867 bool retrans_timeo:1; /* T if reTx due to timeout happened */ 868 bool need_retransmit:1; /* T if we need transmission */ 869 bool rtt_sample_avail:1; /* T if RTT sample available */ 870 bool in_fast_or_rto_recovery:1; 871 bool exiting_fast_or_rto_recovery:1; 872 bool tlp_probe_acked:1; /* T if the TLP probe seq was acked */ 873 u8 /*enum rxrpc_congest_change*/ change; 874 }; 875 876 /* 877 * sendmsg() cmsg-specified parameters. 878 */ 879 enum rxrpc_command { 880 RXRPC_CMD_SEND_DATA, /* send data message */ 881 RXRPC_CMD_SEND_ABORT, /* request abort generation */ 882 RXRPC_CMD_REJECT_BUSY, /* [server] reject a call as busy */ 883 RXRPC_CMD_CHARGE_ACCEPT, /* [server] charge accept preallocation */ 884 }; 885 886 struct rxrpc_call_params { 887 s64 tx_total_len; /* Total Tx data length (if send data) */ 888 unsigned long user_call_ID; /* User's call ID */ 889 struct { 890 u32 hard; /* Maximum lifetime (sec) */ 891 u32 idle; /* Max time since last data packet (msec) */ 892 u32 normal; /* Max time since last call packet (msec) */ 893 } timeouts; 894 u8 nr_timeouts; /* Number of timeouts specified */ 895 bool kernel; /* T if kernel is making the call */ 896 enum rxrpc_interruptibility interruptibility; /* How is interruptible is the call? */ 897 }; 898 899 struct rxrpc_send_params { 900 struct rxrpc_call_params call; 901 u32 abort_code; /* Abort code to Tx (if abort) */ 902 enum rxrpc_command command : 8; /* The command to implement */ 903 bool exclusive; /* Shared or exclusive call */ 904 bool upgrade; /* If the connection is upgradeable */ 905 }; 906 907 /* 908 * Buffer of data to be output as a packet. 909 */ 910 struct rxrpc_txbuf { 911 refcount_t ref; 912 rxrpc_seq_t seq; /* Sequence number of this packet */ 913 rxrpc_serial_t serial; /* Last serial number transmitted with */ 914 unsigned int call_debug_id; 915 unsigned int debug_id; 916 unsigned short len; /* Amount of data in buffer */ 917 unsigned short space; /* Remaining data space */ 918 unsigned short offset; /* Offset of fill point */ 919 unsigned short crypto_header; /* Size of crypto header */ 920 unsigned short sec_header; /* Size of security header */ 921 unsigned short pkt_len; /* Size of packet content */ 922 unsigned short alloc_size; /* Amount of bufferage allocated */ 923 unsigned int flags; 924 #define RXRPC_TXBUF_WIRE_FLAGS 0xff /* The wire protocol flags */ 925 #define RXRPC_TXBUF_RESENT 0x100 /* Set if has been resent */ 926 __be16 cksum; /* Checksum to go in header */ 927 bool jumboable; /* Can be non-terminal jumbo subpacket */ 928 void *data; /* Data with preceding jumbo header */ 929 }; 930 931 static inline bool rxrpc_sending_to_server(const struct rxrpc_txbuf *txb) 932 { 933 return txb->flags & RXRPC_CLIENT_INITIATED; 934 } 935 936 static inline bool rxrpc_sending_to_client(const struct rxrpc_txbuf *txb) 937 { 938 return !rxrpc_sending_to_server(txb); 939 } 940 941 /* 942 * Transmit queue element, including RACK [RFC8985] per-segment metadata. The 943 * transmission timestamp is in usec from the base. 944 */ 945 struct rxrpc_txqueue { 946 /* Start with the members we want to prefetch. */ 947 struct rxrpc_txqueue *next; 948 ktime_t xmit_ts_base; 949 rxrpc_seq_t qbase; 950 u8 nr_reported_acks; /* Number of segments explicitly acked/nacked */ 951 unsigned long segment_acked; /* Bit-per-buf: Set if ACK'd */ 952 unsigned long segment_lost; /* Bit-per-buf: Set if declared lost */ 953 unsigned long segment_retransmitted; /* Bit-per-buf: Set if retransmitted */ 954 unsigned long rtt_samples; /* Bit-per-buf: Set if available for RTT */ 955 unsigned long ever_retransmitted; /* Bit-per-buf: Set if ever retransmitted */ 956 957 /* The arrays we want to pack into as few cache lines as possible. */ 958 struct { 959 #define RXRPC_NR_TXQUEUE BITS_PER_LONG 960 #define RXRPC_TXQ_MASK (RXRPC_NR_TXQUEUE - 1) 961 struct rxrpc_txbuf *bufs[RXRPC_NR_TXQUEUE]; 962 unsigned int segment_serial[RXRPC_NR_TXQUEUE]; 963 unsigned int segment_xmit_ts[RXRPC_NR_TXQUEUE]; 964 } ____cacheline_aligned; 965 }; 966 967 /* 968 * Data transmission request. 969 */ 970 struct rxrpc_send_data_req { 971 ktime_t now; /* Current time */ 972 struct rxrpc_txqueue *tq; /* Tx queue segment holding first DATA */ 973 rxrpc_seq_t seq; /* Sequence of first data */ 974 int n; /* Number of DATA packets to glue into jumbo */ 975 bool retrans; /* T if this is a retransmission */ 976 bool did_send; /* T if did actually send */ 977 bool tlp_probe; /* T if this is a TLP probe */ 978 int /* enum rxrpc_txdata_trace */ trace; 979 }; 980 981 #include <trace/events/rxrpc.h> 982 983 /* 984 * Allocate the next serial number on a connection. 0 must be skipped. 985 */ 986 static inline rxrpc_serial_t rxrpc_get_next_serial(struct rxrpc_connection *conn) 987 { 988 rxrpc_serial_t serial; 989 990 serial = conn->tx_serial; 991 if (serial == 0) 992 serial = 1; 993 conn->tx_serial = serial + 1; 994 return serial; 995 } 996 997 /* 998 * Allocate the next serial n numbers on a connection. 0 must be skipped. 999 */ 1000 static inline rxrpc_serial_t rxrpc_get_next_serials(struct rxrpc_connection *conn, 1001 unsigned int n) 1002 { 1003 rxrpc_serial_t serial; 1004 1005 serial = conn->tx_serial; 1006 if (serial + n <= n) 1007 serial = 1; 1008 conn->tx_serial = serial + n; 1009 return serial; 1010 } 1011 1012 /* 1013 * af_rxrpc.c 1014 */ 1015 extern atomic_t rxrpc_n_rx_skbs; 1016 extern struct workqueue_struct *rxrpc_workqueue; 1017 1018 /* 1019 * call_accept.c 1020 */ 1021 int rxrpc_service_prealloc(struct rxrpc_sock *, gfp_t); 1022 void rxrpc_discard_prealloc(struct rxrpc_sock *); 1023 bool rxrpc_new_incoming_call(struct rxrpc_local *local, 1024 struct rxrpc_peer *peer, 1025 struct rxrpc_connection *conn, 1026 struct sockaddr_rxrpc *peer_srx, 1027 struct sk_buff *skb); 1028 int rxrpc_user_charge_accept(struct rxrpc_sock *, unsigned long); 1029 1030 /* 1031 * call_event.c 1032 */ 1033 void rxrpc_propose_ping(struct rxrpc_call *call, u32 serial, 1034 enum rxrpc_propose_ack_trace why); 1035 void rxrpc_propose_delay_ACK(struct rxrpc_call *, rxrpc_serial_t, 1036 enum rxrpc_propose_ack_trace); 1037 void rxrpc_resend_tlp(struct rxrpc_call *call); 1038 void rxrpc_transmit_some_data(struct rxrpc_call *call, unsigned int limit, 1039 enum rxrpc_txdata_trace trace); 1040 bool rxrpc_input_call_event(struct rxrpc_call *call); 1041 1042 /* 1043 * call_object.c 1044 */ 1045 extern const char *const rxrpc_call_states[]; 1046 extern const char *const rxrpc_call_completions[]; 1047 extern struct kmem_cache *rxrpc_call_jar; 1048 1049 void rxrpc_poke_call(struct rxrpc_call *call, enum rxrpc_call_poke_trace what); 1050 struct rxrpc_call *rxrpc_find_call_by_user_ID(struct rxrpc_sock *, unsigned long); 1051 struct rxrpc_call *rxrpc_alloc_call(struct rxrpc_sock *, gfp_t, unsigned int); 1052 struct rxrpc_call *rxrpc_new_client_call(struct rxrpc_sock *, 1053 struct rxrpc_conn_parameters *, 1054 struct rxrpc_call_params *, gfp_t, 1055 unsigned int) 1056 __releases(&rx->sk.sk_lock) 1057 __acquires(&call->user_mutex); 1058 void rxrpc_start_call_timer(struct rxrpc_call *call); 1059 void rxrpc_incoming_call(struct rxrpc_sock *, struct rxrpc_call *, 1060 struct sk_buff *); 1061 void rxrpc_release_call(struct rxrpc_sock *, struct rxrpc_call *); 1062 void rxrpc_release_calls_on_socket(struct rxrpc_sock *); 1063 void rxrpc_see_call(struct rxrpc_call *, enum rxrpc_call_trace); 1064 struct rxrpc_call *rxrpc_try_get_call(struct rxrpc_call *, enum rxrpc_call_trace); 1065 void rxrpc_get_call(struct rxrpc_call *, enum rxrpc_call_trace); 1066 void rxrpc_put_call(struct rxrpc_call *, enum rxrpc_call_trace); 1067 void rxrpc_cleanup_call(struct rxrpc_call *); 1068 void rxrpc_destroy_all_calls(struct rxrpc_net *); 1069 1070 static inline bool rxrpc_is_service_call(const struct rxrpc_call *call) 1071 { 1072 return test_bit(RXRPC_CALL_IS_SERVICE, &call->flags); 1073 } 1074 1075 static inline bool rxrpc_is_client_call(const struct rxrpc_call *call) 1076 { 1077 return !rxrpc_is_service_call(call); 1078 } 1079 1080 /* 1081 * call_state.c 1082 */ 1083 bool rxrpc_set_call_completion(struct rxrpc_call *call, 1084 enum rxrpc_call_completion compl, 1085 u32 abort_code, 1086 int error); 1087 bool rxrpc_call_completed(struct rxrpc_call *call); 1088 bool rxrpc_abort_call(struct rxrpc_call *call, rxrpc_seq_t seq, 1089 u32 abort_code, int error, enum rxrpc_abort_reason why); 1090 void rxrpc_prefail_call(struct rxrpc_call *call, enum rxrpc_call_completion compl, 1091 int error); 1092 1093 static inline void rxrpc_set_call_state(struct rxrpc_call *call, 1094 enum rxrpc_call_state state) 1095 { 1096 /* Order write of completion info before write of ->state. */ 1097 smp_store_release(&call->_state, state); 1098 wake_up(&call->waitq); 1099 } 1100 1101 static inline enum rxrpc_call_state __rxrpc_call_state(const struct rxrpc_call *call) 1102 { 1103 return call->_state; /* Only inside I/O thread */ 1104 } 1105 1106 static inline bool __rxrpc_call_is_complete(const struct rxrpc_call *call) 1107 { 1108 return __rxrpc_call_state(call) == RXRPC_CALL_COMPLETE; 1109 } 1110 1111 static inline enum rxrpc_call_state rxrpc_call_state(const struct rxrpc_call *call) 1112 { 1113 /* Order read ->state before read of completion info. */ 1114 return smp_load_acquire(&call->_state); 1115 } 1116 1117 static inline bool rxrpc_call_is_complete(const struct rxrpc_call *call) 1118 { 1119 return rxrpc_call_state(call) == RXRPC_CALL_COMPLETE; 1120 } 1121 1122 static inline bool rxrpc_call_has_failed(const struct rxrpc_call *call) 1123 { 1124 return rxrpc_call_is_complete(call) && call->completion != RXRPC_CALL_SUCCEEDED; 1125 } 1126 1127 /* 1128 * conn_client.c 1129 */ 1130 extern unsigned int rxrpc_reap_client_connections; 1131 extern unsigned long rxrpc_conn_idle_client_expiry; 1132 extern unsigned long rxrpc_conn_idle_client_fast_expiry; 1133 1134 void rxrpc_purge_client_connections(struct rxrpc_local *local); 1135 struct rxrpc_bundle *rxrpc_get_bundle(struct rxrpc_bundle *, enum rxrpc_bundle_trace); 1136 void rxrpc_put_bundle(struct rxrpc_bundle *, enum rxrpc_bundle_trace); 1137 int rxrpc_look_up_bundle(struct rxrpc_call *call, gfp_t gfp); 1138 void rxrpc_connect_client_calls(struct rxrpc_local *local); 1139 void rxrpc_expose_client_call(struct rxrpc_call *); 1140 void rxrpc_disconnect_client_call(struct rxrpc_bundle *, struct rxrpc_call *); 1141 void rxrpc_deactivate_bundle(struct rxrpc_bundle *bundle); 1142 void rxrpc_discard_expired_client_conns(struct rxrpc_local *local); 1143 void rxrpc_clean_up_local_conns(struct rxrpc_local *); 1144 1145 /* 1146 * conn_event.c 1147 */ 1148 void rxrpc_conn_retransmit_call(struct rxrpc_connection *conn, struct sk_buff *skb, 1149 unsigned int channel); 1150 int rxrpc_abort_conn(struct rxrpc_connection *conn, struct sk_buff *skb, 1151 s32 abort_code, int err, enum rxrpc_abort_reason why); 1152 void rxrpc_process_connection(struct work_struct *); 1153 void rxrpc_process_delayed_final_acks(struct rxrpc_connection *, bool); 1154 bool rxrpc_input_conn_packet(struct rxrpc_connection *conn, struct sk_buff *skb); 1155 void rxrpc_input_conn_event(struct rxrpc_connection *conn, struct sk_buff *skb); 1156 1157 static inline bool rxrpc_is_conn_aborted(const struct rxrpc_connection *conn) 1158 { 1159 /* Order reading the abort info after the state check. */ 1160 return smp_load_acquire(&conn->state) == RXRPC_CONN_ABORTED; 1161 } 1162 1163 /* 1164 * conn_object.c 1165 */ 1166 extern unsigned int rxrpc_connection_expiry; 1167 extern unsigned int rxrpc_closed_conn_expiry; 1168 1169 void rxrpc_poke_conn(struct rxrpc_connection *conn, enum rxrpc_conn_trace why); 1170 struct rxrpc_connection *rxrpc_alloc_connection(struct rxrpc_net *, gfp_t); 1171 struct rxrpc_connection *rxrpc_find_client_connection_rcu(struct rxrpc_local *, 1172 struct sockaddr_rxrpc *, 1173 struct sk_buff *); 1174 void __rxrpc_disconnect_call(struct rxrpc_connection *, struct rxrpc_call *); 1175 void rxrpc_disconnect_call(struct rxrpc_call *); 1176 void rxrpc_kill_client_conn(struct rxrpc_connection *); 1177 void rxrpc_queue_conn(struct rxrpc_connection *, enum rxrpc_conn_trace); 1178 void rxrpc_see_connection(struct rxrpc_connection *, enum rxrpc_conn_trace); 1179 struct rxrpc_connection *rxrpc_get_connection(struct rxrpc_connection *, 1180 enum rxrpc_conn_trace); 1181 struct rxrpc_connection *rxrpc_get_connection_maybe(struct rxrpc_connection *, 1182 enum rxrpc_conn_trace); 1183 void rxrpc_put_connection(struct rxrpc_connection *, enum rxrpc_conn_trace); 1184 void rxrpc_service_connection_reaper(struct work_struct *); 1185 void rxrpc_destroy_all_connections(struct rxrpc_net *); 1186 1187 static inline bool rxrpc_conn_is_client(const struct rxrpc_connection *conn) 1188 { 1189 return conn->out_clientflag; 1190 } 1191 1192 static inline bool rxrpc_conn_is_service(const struct rxrpc_connection *conn) 1193 { 1194 return !rxrpc_conn_is_client(conn); 1195 } 1196 1197 static inline void rxrpc_reduce_conn_timer(struct rxrpc_connection *conn, 1198 unsigned long expire_at) 1199 { 1200 timer_reduce(&conn->timer, expire_at); 1201 } 1202 1203 /* 1204 * conn_service.c 1205 */ 1206 struct rxrpc_connection *rxrpc_find_service_conn_rcu(struct rxrpc_peer *, 1207 struct sk_buff *); 1208 struct rxrpc_connection *rxrpc_prealloc_service_connection(struct rxrpc_net *, gfp_t); 1209 void rxrpc_new_incoming_connection(struct rxrpc_sock *, struct rxrpc_connection *, 1210 const struct rxrpc_security *, struct sk_buff *); 1211 void rxrpc_unpublish_service_conn(struct rxrpc_connection *); 1212 1213 /* 1214 * input.c 1215 */ 1216 void rxrpc_congestion_degrade(struct rxrpc_call *); 1217 void rxrpc_input_call_packet(struct rxrpc_call *, struct sk_buff *); 1218 void rxrpc_implicit_end_call(struct rxrpc_call *, struct sk_buff *); 1219 1220 /* 1221 * input_rack.c 1222 */ 1223 void rxrpc_input_rack_one(struct rxrpc_call *call, 1224 struct rxrpc_ack_summary *summary, 1225 struct rxrpc_txqueue *tq, 1226 unsigned int ix); 1227 void rxrpc_input_rack(struct rxrpc_call *call, 1228 struct rxrpc_ack_summary *summary, 1229 struct rxrpc_txqueue *tq, 1230 unsigned long new_acks); 1231 void rxrpc_rack_detect_loss_and_arm_timer(struct rxrpc_call *call, 1232 struct rxrpc_ack_summary *summary); 1233 ktime_t rxrpc_tlp_calc_pto(struct rxrpc_call *call, ktime_t now); 1234 void rxrpc_tlp_send_probe(struct rxrpc_call *call); 1235 void rxrpc_tlp_process_ack(struct rxrpc_call *call, struct rxrpc_ack_summary *summary); 1236 void rxrpc_rack_timer_expired(struct rxrpc_call *call, ktime_t overran_by); 1237 1238 /* Initialise TLP state [RFC8958 7.1]. */ 1239 static inline void rxrpc_tlp_init(struct rxrpc_call *call) 1240 { 1241 call->tlp_serial = 0; 1242 call->tlp_seq = call->acks_hard_ack; 1243 call->tlp_is_retrans = false; 1244 } 1245 1246 /* 1247 * io_thread.c 1248 */ 1249 int rxrpc_encap_rcv(struct sock *, struct sk_buff *); 1250 void rxrpc_error_report(struct sock *); 1251 bool rxrpc_direct_abort(struct sk_buff *skb, enum rxrpc_abort_reason why, 1252 s32 abort_code, int err); 1253 int rxrpc_io_thread(void *data); 1254 void rxrpc_post_response(struct rxrpc_connection *conn, struct sk_buff *skb); 1255 static inline void rxrpc_wake_up_io_thread(struct rxrpc_local *local) 1256 { 1257 if (!local->io_thread) 1258 return; 1259 wake_up_process(READ_ONCE(local->io_thread)); 1260 } 1261 1262 static inline bool rxrpc_protocol_error(struct sk_buff *skb, enum rxrpc_abort_reason why) 1263 { 1264 return rxrpc_direct_abort(skb, why, RX_PROTOCOL_ERROR, -EPROTO); 1265 } 1266 1267 /* 1268 * insecure.c 1269 */ 1270 extern const struct rxrpc_security rxrpc_no_security; 1271 1272 /* 1273 * key.c 1274 */ 1275 extern struct key_type key_type_rxrpc; 1276 1277 int rxrpc_request_key(struct rxrpc_sock *, sockptr_t , int); 1278 int rxrpc_get_server_data_key(struct rxrpc_connection *, const void *, time64_t, 1279 u32); 1280 1281 /* 1282 * local_event.c 1283 */ 1284 void rxrpc_gen_version_string(void); 1285 void rxrpc_send_version_request(struct rxrpc_local *local, 1286 struct rxrpc_host_header *hdr, 1287 struct sk_buff *skb); 1288 1289 /* 1290 * local_object.c 1291 */ 1292 void rxrpc_local_dont_fragment(const struct rxrpc_local *local, bool set); 1293 struct rxrpc_local *rxrpc_lookup_local(struct net *, const struct sockaddr_rxrpc *); 1294 struct rxrpc_local *rxrpc_get_local(struct rxrpc_local *, enum rxrpc_local_trace); 1295 struct rxrpc_local *rxrpc_get_local_maybe(struct rxrpc_local *, enum rxrpc_local_trace); 1296 void rxrpc_put_local(struct rxrpc_local *, enum rxrpc_local_trace); 1297 struct rxrpc_local *rxrpc_use_local(struct rxrpc_local *, enum rxrpc_local_trace); 1298 void rxrpc_unuse_local(struct rxrpc_local *, enum rxrpc_local_trace); 1299 void rxrpc_destroy_local(struct rxrpc_local *local); 1300 void rxrpc_destroy_all_locals(struct rxrpc_net *); 1301 1302 static inline bool __rxrpc_use_local(struct rxrpc_local *local, 1303 enum rxrpc_local_trace why) 1304 { 1305 int r, u; 1306 1307 r = refcount_read(&local->ref); 1308 u = atomic_fetch_add_unless(&local->active_users, 1, 0); 1309 trace_rxrpc_local(local->debug_id, why, r, u); 1310 return u != 0; 1311 } 1312 1313 static inline void rxrpc_see_local(struct rxrpc_local *local, 1314 enum rxrpc_local_trace why) 1315 { 1316 int r, u; 1317 1318 r = refcount_read(&local->ref); 1319 u = atomic_read(&local->active_users); 1320 trace_rxrpc_local(local->debug_id, why, r, u); 1321 } 1322 1323 /* 1324 * misc.c 1325 */ 1326 extern unsigned int rxrpc_max_backlog __read_mostly; 1327 extern unsigned long rxrpc_soft_ack_delay; 1328 extern unsigned long rxrpc_idle_ack_delay; 1329 extern unsigned int rxrpc_rx_window_size; 1330 extern unsigned int rxrpc_rx_mtu; 1331 extern unsigned int rxrpc_rx_jumbo_max; 1332 #ifdef CONFIG_AF_RXRPC_INJECT_RX_DELAY 1333 extern unsigned long rxrpc_inject_rx_delay; 1334 #endif 1335 1336 /* 1337 * net_ns.c 1338 */ 1339 extern unsigned int rxrpc_net_id; 1340 extern struct pernet_operations rxrpc_net_ops; 1341 1342 static inline struct rxrpc_net *rxrpc_net(struct net *net) 1343 { 1344 return net_generic(net, rxrpc_net_id); 1345 } 1346 1347 /* 1348 * out_of_band.c 1349 */ 1350 void rxrpc_notify_socket_oob(struct rxrpc_call *call, struct sk_buff *skb); 1351 void rxrpc_add_pending_oob(struct rxrpc_sock *rx, struct sk_buff *skb); 1352 int rxrpc_sendmsg_oob(struct rxrpc_sock *rx, struct msghdr *msg, size_t len); 1353 1354 /* 1355 * output.c 1356 */ 1357 ssize_t do_udp_sendmsg(struct socket *socket, struct msghdr *msg, size_t len); 1358 void rxrpc_send_ACK(struct rxrpc_call *call, u8 ack_reason, 1359 rxrpc_serial_t serial, enum rxrpc_propose_ack_trace why); 1360 void rxrpc_send_probe_for_pmtud(struct rxrpc_call *call); 1361 int rxrpc_send_abort_packet(struct rxrpc_call *); 1362 void rxrpc_send_data_packet(struct rxrpc_call *call, struct rxrpc_send_data_req *req); 1363 void rxrpc_send_conn_abort(struct rxrpc_connection *conn); 1364 void rxrpc_reject_packet(struct rxrpc_local *local, struct sk_buff *skb); 1365 void rxrpc_send_keepalive(struct rxrpc_peer *); 1366 void rxrpc_send_response(struct rxrpc_connection *conn, struct sk_buff *skb); 1367 1368 /* 1369 * peer_event.c 1370 */ 1371 void rxrpc_input_error(struct rxrpc_local *, struct sk_buff *); 1372 void rxrpc_peer_keepalive_worker(struct work_struct *); 1373 void rxrpc_input_probe_for_pmtud(struct rxrpc_connection *conn, rxrpc_serial_t acked_serial, 1374 bool sendmsg_fail); 1375 1376 /* 1377 * peer_object.c 1378 */ 1379 struct rxrpc_peer *rxrpc_lookup_peer_rcu(struct rxrpc_local *, 1380 const struct sockaddr_rxrpc *); 1381 struct rxrpc_peer *rxrpc_lookup_peer(struct rxrpc_local *local, 1382 struct sockaddr_rxrpc *srx, gfp_t gfp); 1383 struct rxrpc_peer *rxrpc_alloc_peer(struct rxrpc_local *, gfp_t, 1384 enum rxrpc_peer_trace); 1385 void rxrpc_new_incoming_peer(struct rxrpc_local *local, struct rxrpc_peer *peer); 1386 void rxrpc_destroy_all_peers(struct rxrpc_net *); 1387 struct rxrpc_peer *rxrpc_get_peer(struct rxrpc_peer *, enum rxrpc_peer_trace); 1388 struct rxrpc_peer *rxrpc_get_peer_maybe(struct rxrpc_peer *, enum rxrpc_peer_trace); 1389 void rxrpc_put_peer(struct rxrpc_peer *, enum rxrpc_peer_trace); 1390 1391 /* 1392 * proc.c 1393 */ 1394 extern const struct seq_operations rxrpc_call_seq_ops; 1395 extern const struct seq_operations rxrpc_connection_seq_ops; 1396 extern const struct seq_operations rxrpc_bundle_seq_ops; 1397 extern const struct seq_operations rxrpc_peer_seq_ops; 1398 extern const struct seq_operations rxrpc_local_seq_ops; 1399 1400 /* 1401 * recvmsg.c 1402 */ 1403 void rxrpc_notify_socket(struct rxrpc_call *); 1404 int rxrpc_recvmsg(struct socket *, struct msghdr *, size_t, int); 1405 1406 /* 1407 * Abort a call due to a protocol error. 1408 */ 1409 static inline int rxrpc_abort_eproto(struct rxrpc_call *call, 1410 struct sk_buff *skb, 1411 s32 abort_code, 1412 enum rxrpc_abort_reason why) 1413 { 1414 struct rxrpc_skb_priv *sp = rxrpc_skb(skb); 1415 1416 rxrpc_abort_call(call, sp->hdr.seq, abort_code, -EPROTO, why); 1417 return -EPROTO; 1418 } 1419 1420 /* 1421 * rtt.c 1422 */ 1423 void rxrpc_call_add_rtt(struct rxrpc_call *call, enum rxrpc_rtt_rx_trace why, 1424 int rtt_slot, 1425 rxrpc_serial_t send_serial, rxrpc_serial_t resp_serial, 1426 ktime_t send_time, ktime_t resp_time); 1427 ktime_t rxrpc_get_rto_backoff(struct rxrpc_call *call, bool retrans); 1428 void rxrpc_call_init_rtt(struct rxrpc_call *call); 1429 1430 /* 1431 * rxgk.c 1432 */ 1433 extern const struct rxrpc_security rxgk_yfs; 1434 1435 /* 1436 * rxkad.c 1437 */ 1438 #ifdef CONFIG_RXKAD 1439 extern const struct rxrpc_security rxkad; 1440 #endif 1441 1442 /* 1443 * security.c 1444 */ 1445 int __init rxrpc_init_security(void); 1446 const struct rxrpc_security *rxrpc_security_lookup(u8); 1447 void rxrpc_exit_security(void); 1448 int rxrpc_init_client_call_security(struct rxrpc_call *); 1449 int rxrpc_init_client_conn_security(struct rxrpc_connection *); 1450 const struct rxrpc_security *rxrpc_get_incoming_security(struct rxrpc_sock *, 1451 struct sk_buff *); 1452 struct key *rxrpc_look_up_server_security(struct rxrpc_connection *, 1453 struct sk_buff *, u32, u32); 1454 1455 /* 1456 * sendmsg.c 1457 */ 1458 bool rxrpc_propose_abort(struct rxrpc_call *call, s32 abort_code, int error, 1459 enum rxrpc_abort_reason why); 1460 int rxrpc_do_sendmsg(struct rxrpc_sock *, struct msghdr *, size_t); 1461 1462 /* 1463 * server_key.c 1464 */ 1465 extern struct key_type key_type_rxrpc_s; 1466 1467 int rxrpc_server_keyring(struct rxrpc_sock *, sockptr_t, int); 1468 1469 /* 1470 * skbuff.c 1471 */ 1472 void rxrpc_kernel_data_consumed(struct rxrpc_call *, struct sk_buff *); 1473 void rxrpc_new_skb(struct sk_buff *, enum rxrpc_skb_trace); 1474 void rxrpc_see_skb(struct sk_buff *, enum rxrpc_skb_trace); 1475 void rxrpc_eaten_skb(struct sk_buff *, enum rxrpc_skb_trace); 1476 void rxrpc_get_skb(struct sk_buff *, enum rxrpc_skb_trace); 1477 void rxrpc_free_skb(struct sk_buff *, enum rxrpc_skb_trace); 1478 void rxrpc_purge_queue(struct sk_buff_head *); 1479 1480 /* 1481 * stats.c 1482 */ 1483 int rxrpc_stats_show(struct seq_file *seq, void *v); 1484 int rxrpc_stats_clear(struct file *file, char *buf, size_t size); 1485 1486 #define rxrpc_inc_stat(rxnet, s) atomic_inc(&(rxnet)->s) 1487 #define rxrpc_dec_stat(rxnet, s) atomic_dec(&(rxnet)->s) 1488 1489 /* 1490 * sysctl.c 1491 */ 1492 #ifdef CONFIG_SYSCTL 1493 extern int __init rxrpc_sysctl_init(void); 1494 extern void rxrpc_sysctl_exit(void); 1495 #else 1496 static inline int __init rxrpc_sysctl_init(void) { return 0; } 1497 static inline void rxrpc_sysctl_exit(void) {} 1498 #endif 1499 1500 /* 1501 * txbuf.c 1502 */ 1503 extern atomic_t rxrpc_nr_txbuf; 1504 struct rxrpc_txbuf *rxrpc_alloc_data_txbuf(struct rxrpc_call *call, size_t data_size, 1505 size_t data_align, gfp_t gfp); 1506 void rxrpc_see_txbuf(struct rxrpc_txbuf *txb, enum rxrpc_txbuf_trace what); 1507 void rxrpc_put_txbuf(struct rxrpc_txbuf *txb, enum rxrpc_txbuf_trace what); 1508 1509 /* 1510 * utils.c 1511 */ 1512 int rxrpc_extract_addr_from_skb(struct sockaddr_rxrpc *, struct sk_buff *); 1513 1514 static inline bool before(u32 seq1, u32 seq2) 1515 { 1516 return (s32)(seq1 - seq2) < 0; 1517 } 1518 static inline bool before_eq(u32 seq1, u32 seq2) 1519 { 1520 return (s32)(seq1 - seq2) <= 0; 1521 } 1522 static inline bool after(u32 seq1, u32 seq2) 1523 { 1524 return (s32)(seq1 - seq2) > 0; 1525 } 1526 static inline bool after_eq(u32 seq1, u32 seq2) 1527 { 1528 return (s32)(seq1 - seq2) >= 0; 1529 } 1530 1531 static inline u32 earliest(u32 seq1, u32 seq2) 1532 { 1533 return before(seq1, seq2) ? seq1 : seq2; 1534 } 1535 1536 static inline u32 latest(u32 seq1, u32 seq2) 1537 { 1538 return after(seq1, seq2) ? seq1 : seq2; 1539 } 1540 1541 static inline bool rxrpc_seq_in_txq(const struct rxrpc_txqueue *tq, rxrpc_seq_t seq) 1542 { 1543 return (seq & (RXRPC_NR_TXQUEUE - 1)) == tq->qbase; 1544 } 1545 1546 static inline void rxrpc_queue_rx_call_packet(struct rxrpc_call *call, struct sk_buff *skb) 1547 { 1548 rxrpc_get_skb(skb, rxrpc_skb_get_call_rx); 1549 __skb_queue_tail(&call->rx_queue, skb); 1550 rxrpc_poke_call(call, rxrpc_call_poke_rx_packet); 1551 } 1552 1553 /* 1554 * Calculate how much space there is for transmitting more DATA packets. 1555 */ 1556 static inline unsigned int rxrpc_tx_window_space(const struct rxrpc_call *call) 1557 { 1558 int winsize = umin(call->tx_winsize, call->cong_cwnd + call->cong_extra); 1559 int transmitted = call->tx_top - call->tx_bottom; 1560 1561 return max(winsize - transmitted, 0); 1562 } 1563 1564 static inline unsigned int rxrpc_left_out(const struct rxrpc_call *call) 1565 { 1566 return call->acks_nr_sacks + call->tx_nr_lost; 1567 } 1568 1569 /* 1570 * Calculate the number of transmitted DATA packets assumed to be in flight 1571 * [approx RFC6675]. 1572 */ 1573 static inline unsigned int rxrpc_tx_in_flight(const struct rxrpc_call *call) 1574 { 1575 return call->tx_nr_sent - rxrpc_left_out(call) + call->tx_nr_resent; 1576 } 1577 1578 /* 1579 * debug tracing 1580 */ 1581 extern unsigned int rxrpc_debug; 1582 1583 #define dbgprintk(FMT,...) \ 1584 printk("[%-6.6s] "FMT"\n", current->comm ,##__VA_ARGS__) 1585 1586 #define kenter(FMT,...) dbgprintk("==> %s("FMT")",__func__ ,##__VA_ARGS__) 1587 #define kleave(FMT,...) dbgprintk("<== %s()"FMT"",__func__ ,##__VA_ARGS__) 1588 #define kdebug(FMT,...) dbgprintk(" "FMT ,##__VA_ARGS__) 1589 1590 1591 #if defined(__KDEBUG) 1592 #define _enter(FMT,...) kenter(FMT,##__VA_ARGS__) 1593 #define _leave(FMT,...) kleave(FMT,##__VA_ARGS__) 1594 #define _debug(FMT,...) kdebug(FMT,##__VA_ARGS__) 1595 1596 #elif defined(CONFIG_AF_RXRPC_DEBUG) 1597 #define RXRPC_DEBUG_KENTER 0x01 1598 #define RXRPC_DEBUG_KLEAVE 0x02 1599 #define RXRPC_DEBUG_KDEBUG 0x04 1600 1601 #define _enter(FMT,...) \ 1602 do { \ 1603 if (unlikely(rxrpc_debug & RXRPC_DEBUG_KENTER)) \ 1604 kenter(FMT,##__VA_ARGS__); \ 1605 } while (0) 1606 1607 #define _leave(FMT,...) \ 1608 do { \ 1609 if (unlikely(rxrpc_debug & RXRPC_DEBUG_KLEAVE)) \ 1610 kleave(FMT,##__VA_ARGS__); \ 1611 } while (0) 1612 1613 #define _debug(FMT,...) \ 1614 do { \ 1615 if (unlikely(rxrpc_debug & RXRPC_DEBUG_KDEBUG)) \ 1616 kdebug(FMT,##__VA_ARGS__); \ 1617 } while (0) 1618 1619 #else 1620 #define _enter(FMT,...) no_printk("==> %s("FMT")",__func__ ,##__VA_ARGS__) 1621 #define _leave(FMT,...) no_printk("<== %s()"FMT"",__func__ ,##__VA_ARGS__) 1622 #define _debug(FMT,...) no_printk(" "FMT ,##__VA_ARGS__) 1623 #endif 1624 1625 /* 1626 * debug assertion checking 1627 */ 1628 #if 1 // defined(__KDEBUGALL) 1629 1630 #define ASSERT(X) \ 1631 do { \ 1632 if (unlikely(!(X))) { \ 1633 pr_err("Assertion failed\n"); \ 1634 BUG(); \ 1635 } \ 1636 } while (0) 1637 1638 #define ASSERTCMP(X, OP, Y) \ 1639 do { \ 1640 __typeof__(X) _x = (X); \ 1641 __typeof__(Y) _y = (__typeof__(X))(Y); \ 1642 if (unlikely(!(_x OP _y))) { \ 1643 pr_err("Assertion failed - %lu(0x%lx) %s %lu(0x%lx) is false\n", \ 1644 (unsigned long)_x, (unsigned long)_x, #OP, \ 1645 (unsigned long)_y, (unsigned long)_y); \ 1646 BUG(); \ 1647 } \ 1648 } while (0) 1649 1650 #define ASSERTIF(C, X) \ 1651 do { \ 1652 if (unlikely((C) && !(X))) { \ 1653 pr_err("Assertion failed\n"); \ 1654 BUG(); \ 1655 } \ 1656 } while (0) 1657 1658 #define ASSERTIFCMP(C, X, OP, Y) \ 1659 do { \ 1660 __typeof__(X) _x = (X); \ 1661 __typeof__(Y) _y = (__typeof__(X))(Y); \ 1662 if (unlikely((C) && !(_x OP _y))) { \ 1663 pr_err("Assertion failed - %lu(0x%lx) %s %lu(0x%lx) is false\n", \ 1664 (unsigned long)_x, (unsigned long)_x, #OP, \ 1665 (unsigned long)_y, (unsigned long)_y); \ 1666 BUG(); \ 1667 } \ 1668 } while (0) 1669 1670 #else 1671 1672 #define ASSERT(X) \ 1673 do { \ 1674 } while (0) 1675 1676 #define ASSERTCMP(X, OP, Y) \ 1677 do { \ 1678 } while (0) 1679 1680 #define ASSERTIF(C, X) \ 1681 do { \ 1682 } while (0) 1683 1684 #define ASSERTIFCMP(C, X, OP, Y) \ 1685 do { \ 1686 } while (0) 1687 1688 #endif /* __KDEBUGALL */ 1689