1f870fa0bSMat Martineau // SPDX-License-Identifier: GPL-2.0 2f870fa0bSMat Martineau /* Multipath TCP 3f870fa0bSMat Martineau * 4f870fa0bSMat Martineau * Copyright (c) 2017 - 2019, Intel Corporation. 5f870fa0bSMat Martineau */ 6f870fa0bSMat Martineau 7f870fa0bSMat Martineau #define pr_fmt(fmt) "MPTCP: " fmt 8f870fa0bSMat Martineau 9f870fa0bSMat Martineau #include <linux/kernel.h> 10f870fa0bSMat Martineau #include <linux/module.h> 11f870fa0bSMat Martineau #include <linux/netdevice.h> 127a6a6cbcSPaolo Abeni #include <linux/sched/signal.h> 137a6a6cbcSPaolo Abeni #include <linux/atomic.h> 14f870fa0bSMat Martineau #include <net/sock.h> 15f870fa0bSMat Martineau #include <net/inet_common.h> 16f870fa0bSMat Martineau #include <net/inet_hashtables.h> 17f870fa0bSMat Martineau #include <net/protocol.h> 18f870fa0bSMat Martineau #include <net/tcp.h> 19cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 20cf7da0d6SPeter Krystad #include <net/transp_v6.h> 21cf7da0d6SPeter Krystad #endif 22f870fa0bSMat Martineau #include <net/mptcp.h> 23f870fa0bSMat Martineau #include "protocol.h" 24fc518953SFlorian Westphal #include "mib.h" 25f870fa0bSMat Martineau 262303f994SPeter Krystad #define MPTCP_SAME_STATE TCP_MAX_STATES 272303f994SPeter Krystad 28b0519de8SFlorian Westphal #if IS_ENABLED(CONFIG_MPTCP_IPV6) 29b0519de8SFlorian Westphal struct mptcp6_sock { 30b0519de8SFlorian Westphal struct mptcp_sock msk; 31b0519de8SFlorian Westphal struct ipv6_pinfo np; 32b0519de8SFlorian Westphal }; 33b0519de8SFlorian Westphal #endif 34b0519de8SFlorian Westphal 356771bfd9SFlorian Westphal struct mptcp_skb_cb { 366771bfd9SFlorian Westphal u32 offset; 376771bfd9SFlorian Westphal }; 386771bfd9SFlorian Westphal 396771bfd9SFlorian Westphal #define MPTCP_SKB_CB(__skb) ((struct mptcp_skb_cb *)&((__skb)->cb[0])) 406771bfd9SFlorian Westphal 41d027236cSPaolo Abeni static struct percpu_counter mptcp_sockets_allocated; 42d027236cSPaolo Abeni 432303f994SPeter Krystad /* If msk has an initial subflow socket, and the MP_CAPABLE handshake has not 442303f994SPeter Krystad * completed yet or has failed, return the subflow socket. 452303f994SPeter Krystad * Otherwise return NULL. 462303f994SPeter Krystad */ 472303f994SPeter Krystad static struct socket *__mptcp_nmpc_socket(const struct mptcp_sock *msk) 482303f994SPeter Krystad { 49d22f4988SChristoph Paasch if (!msk->subflow || READ_ONCE(msk->can_ack)) 502303f994SPeter Krystad return NULL; 512303f994SPeter Krystad 522303f994SPeter Krystad return msk->subflow; 532303f994SPeter Krystad } 542303f994SPeter Krystad 550b4f33deSFlorian Westphal static struct socket *mptcp_is_tcpsk(struct sock *sk) 560b4f33deSFlorian Westphal { 570b4f33deSFlorian Westphal struct socket *sock = sk->sk_socket; 580b4f33deSFlorian Westphal 590b4f33deSFlorian Westphal if (sock->sk != sk) 600b4f33deSFlorian Westphal return NULL; 610b4f33deSFlorian Westphal 620b4f33deSFlorian Westphal if (unlikely(sk->sk_prot == &tcp_prot)) { 630b4f33deSFlorian Westphal /* we are being invoked after mptcp_accept() has 640b4f33deSFlorian Westphal * accepted a non-mp-capable flow: sk is a tcp_sk, 650b4f33deSFlorian Westphal * not an mptcp one. 660b4f33deSFlorian Westphal * 670b4f33deSFlorian Westphal * Hand the socket over to tcp so all further socket ops 680b4f33deSFlorian Westphal * bypass mptcp. 690b4f33deSFlorian Westphal */ 700b4f33deSFlorian Westphal sock->ops = &inet_stream_ops; 710b4f33deSFlorian Westphal return sock; 720b4f33deSFlorian Westphal #if IS_ENABLED(CONFIG_MPTCP_IPV6) 730b4f33deSFlorian Westphal } else if (unlikely(sk->sk_prot == &tcpv6_prot)) { 740b4f33deSFlorian Westphal sock->ops = &inet6_stream_ops; 750b4f33deSFlorian Westphal return sock; 760b4f33deSFlorian Westphal #endif 770b4f33deSFlorian Westphal } 780b4f33deSFlorian Westphal 790b4f33deSFlorian Westphal return NULL; 800b4f33deSFlorian Westphal } 810b4f33deSFlorian Westphal 828ab183deSPaolo Abeni static struct socket *__mptcp_tcp_fallback(struct mptcp_sock *msk) 83cec37a6eSPeter Krystad { 840b4f33deSFlorian Westphal struct socket *sock; 850b4f33deSFlorian Westphal 86cec37a6eSPeter Krystad sock_owned_by_me((const struct sock *)msk); 87cec37a6eSPeter Krystad 880b4f33deSFlorian Westphal sock = mptcp_is_tcpsk((struct sock *)msk); 890b4f33deSFlorian Westphal if (unlikely(sock)) 900b4f33deSFlorian Westphal return sock; 910b4f33deSFlorian Westphal 92*e1ff9e82SDavide Caratti if (likely(!__mptcp_check_fallback(msk))) 93cec37a6eSPeter Krystad return NULL; 94cec37a6eSPeter Krystad 952c22c06cSFlorian Westphal return msk->subflow; 968ab183deSPaolo Abeni } 978ab183deSPaolo Abeni 982303f994SPeter Krystad static bool __mptcp_can_create_subflow(const struct mptcp_sock *msk) 992303f994SPeter Krystad { 1008ab183deSPaolo Abeni return !msk->first; 1012303f994SPeter Krystad } 1022303f994SPeter Krystad 1032303f994SPeter Krystad static struct socket *__mptcp_socket_create(struct mptcp_sock *msk, int state) 1042303f994SPeter Krystad { 1052303f994SPeter Krystad struct mptcp_subflow_context *subflow; 1062303f994SPeter Krystad struct sock *sk = (struct sock *)msk; 1072303f994SPeter Krystad struct socket *ssock; 1082303f994SPeter Krystad int err; 1092303f994SPeter Krystad 1100b4f33deSFlorian Westphal ssock = __mptcp_tcp_fallback(msk); 1110b4f33deSFlorian Westphal if (unlikely(ssock)) 1120b4f33deSFlorian Westphal return ssock; 1130b4f33deSFlorian Westphal 1142303f994SPeter Krystad ssock = __mptcp_nmpc_socket(msk); 1152303f994SPeter Krystad if (ssock) 1162303f994SPeter Krystad goto set_state; 1172303f994SPeter Krystad 1182303f994SPeter Krystad if (!__mptcp_can_create_subflow(msk)) 1192303f994SPeter Krystad return ERR_PTR(-EINVAL); 1202303f994SPeter Krystad 1212303f994SPeter Krystad err = mptcp_subflow_create_socket(sk, &ssock); 1222303f994SPeter Krystad if (err) 1232303f994SPeter Krystad return ERR_PTR(err); 1242303f994SPeter Krystad 1258ab183deSPaolo Abeni msk->first = ssock->sk; 1262303f994SPeter Krystad msk->subflow = ssock; 1272303f994SPeter Krystad subflow = mptcp_subflow_ctx(ssock->sk); 128cec37a6eSPeter Krystad list_add(&subflow->node, &msk->conn_list); 1292303f994SPeter Krystad subflow->request_mptcp = 1; 1302303f994SPeter Krystad 131*e1ff9e82SDavide Caratti /* accept() will wait on first subflow sk_wq, and we always wakes up 132*e1ff9e82SDavide Caratti * via msk->sk_socket 133*e1ff9e82SDavide Caratti */ 134*e1ff9e82SDavide Caratti RCU_INIT_POINTER(msk->first->sk_wq, &sk->sk_socket->wq); 135*e1ff9e82SDavide Caratti 1362303f994SPeter Krystad set_state: 1372303f994SPeter Krystad if (state != MPTCP_SAME_STATE) 1382303f994SPeter Krystad inet_sk_state_store(sk, state); 1392303f994SPeter Krystad return ssock; 1402303f994SPeter Krystad } 1412303f994SPeter Krystad 1426771bfd9SFlorian Westphal static void __mptcp_move_skb(struct mptcp_sock *msk, struct sock *ssk, 1436771bfd9SFlorian Westphal struct sk_buff *skb, 1446771bfd9SFlorian Westphal unsigned int offset, size_t copy_len) 1456771bfd9SFlorian Westphal { 1466771bfd9SFlorian Westphal struct sock *sk = (struct sock *)msk; 1474e637c70SFlorian Westphal struct sk_buff *tail; 1486771bfd9SFlorian Westphal 1496771bfd9SFlorian Westphal __skb_unlink(skb, &ssk->sk_receive_queue); 1504e637c70SFlorian Westphal 1514e637c70SFlorian Westphal skb_ext_reset(skb); 1524e637c70SFlorian Westphal skb_orphan(skb); 1534e637c70SFlorian Westphal msk->ack_seq += copy_len; 1544e637c70SFlorian Westphal 1554e637c70SFlorian Westphal tail = skb_peek_tail(&sk->sk_receive_queue); 1564e637c70SFlorian Westphal if (offset == 0 && tail) { 1574e637c70SFlorian Westphal bool fragstolen; 1584e637c70SFlorian Westphal int delta; 1594e637c70SFlorian Westphal 1604e637c70SFlorian Westphal if (skb_try_coalesce(tail, skb, &fragstolen, &delta)) { 1614e637c70SFlorian Westphal kfree_skb_partial(skb, fragstolen); 1624e637c70SFlorian Westphal atomic_add(delta, &sk->sk_rmem_alloc); 1634e637c70SFlorian Westphal sk_mem_charge(sk, delta); 1644e637c70SFlorian Westphal return; 1654e637c70SFlorian Westphal } 1664e637c70SFlorian Westphal } 1674e637c70SFlorian Westphal 168600911ffSFlorian Westphal skb_set_owner_r(skb, sk); 1696771bfd9SFlorian Westphal __skb_queue_tail(&sk->sk_receive_queue, skb); 1706771bfd9SFlorian Westphal MPTCP_SKB_CB(skb)->offset = offset; 1716771bfd9SFlorian Westphal } 1726771bfd9SFlorian Westphal 173de06f573SFlorian Westphal /* both sockets must be locked */ 174de06f573SFlorian Westphal static bool mptcp_subflow_dsn_valid(const struct mptcp_sock *msk, 175de06f573SFlorian Westphal struct sock *ssk) 176de06f573SFlorian Westphal { 177de06f573SFlorian Westphal struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk); 178de06f573SFlorian Westphal u64 dsn = mptcp_subflow_get_mapped_dsn(subflow); 179de06f573SFlorian Westphal 180de06f573SFlorian Westphal /* revalidate data sequence number. 181de06f573SFlorian Westphal * 182de06f573SFlorian Westphal * mptcp_subflow_data_available() is usually called 183de06f573SFlorian Westphal * without msk lock. Its unlikely (but possible) 184de06f573SFlorian Westphal * that msk->ack_seq has been advanced since the last 185de06f573SFlorian Westphal * call found in-sequence data. 186de06f573SFlorian Westphal */ 187de06f573SFlorian Westphal if (likely(dsn == msk->ack_seq)) 188de06f573SFlorian Westphal return true; 189de06f573SFlorian Westphal 190de06f573SFlorian Westphal subflow->data_avail = 0; 191de06f573SFlorian Westphal return mptcp_subflow_data_available(ssk); 192de06f573SFlorian Westphal } 193de06f573SFlorian Westphal 1946771bfd9SFlorian Westphal static bool __mptcp_move_skbs_from_subflow(struct mptcp_sock *msk, 1956771bfd9SFlorian Westphal struct sock *ssk, 1966771bfd9SFlorian Westphal unsigned int *bytes) 1976771bfd9SFlorian Westphal { 1986771bfd9SFlorian Westphal struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk); 199600911ffSFlorian Westphal struct sock *sk = (struct sock *)msk; 2006771bfd9SFlorian Westphal unsigned int moved = 0; 2016771bfd9SFlorian Westphal bool more_data_avail; 2026771bfd9SFlorian Westphal struct tcp_sock *tp; 2036771bfd9SFlorian Westphal bool done = false; 204600911ffSFlorian Westphal 205de06f573SFlorian Westphal if (!mptcp_subflow_dsn_valid(msk, ssk)) { 206de06f573SFlorian Westphal *bytes = 0; 207de06f573SFlorian Westphal return false; 208de06f573SFlorian Westphal } 209de06f573SFlorian Westphal 210ec33916dSFlorian Westphal if (!(sk->sk_userlocks & SOCK_RCVBUF_LOCK)) { 211ec33916dSFlorian Westphal int rcvbuf = max(ssk->sk_rcvbuf, sk->sk_rcvbuf); 212ec33916dSFlorian Westphal 213600911ffSFlorian Westphal if (rcvbuf > sk->sk_rcvbuf) 214600911ffSFlorian Westphal sk->sk_rcvbuf = rcvbuf; 215ec33916dSFlorian Westphal } 2166771bfd9SFlorian Westphal 2176771bfd9SFlorian Westphal tp = tcp_sk(ssk); 2186771bfd9SFlorian Westphal do { 2196771bfd9SFlorian Westphal u32 map_remaining, offset; 2206771bfd9SFlorian Westphal u32 seq = tp->copied_seq; 2216771bfd9SFlorian Westphal struct sk_buff *skb; 2226771bfd9SFlorian Westphal bool fin; 2236771bfd9SFlorian Westphal 2246771bfd9SFlorian Westphal /* try to move as much data as available */ 2256771bfd9SFlorian Westphal map_remaining = subflow->map_data_len - 2266771bfd9SFlorian Westphal mptcp_subflow_get_map_offset(subflow); 2276771bfd9SFlorian Westphal 2286771bfd9SFlorian Westphal skb = skb_peek(&ssk->sk_receive_queue); 2296771bfd9SFlorian Westphal if (!skb) 2306771bfd9SFlorian Westphal break; 2316771bfd9SFlorian Westphal 232*e1ff9e82SDavide Caratti if (__mptcp_check_fallback(msk)) { 233*e1ff9e82SDavide Caratti /* if we are running under the workqueue, TCP could have 234*e1ff9e82SDavide Caratti * collapsed skbs between dummy map creation and now 235*e1ff9e82SDavide Caratti * be sure to adjust the size 236*e1ff9e82SDavide Caratti */ 237*e1ff9e82SDavide Caratti map_remaining = skb->len; 238*e1ff9e82SDavide Caratti subflow->map_data_len = skb->len; 239*e1ff9e82SDavide Caratti } 240*e1ff9e82SDavide Caratti 2416771bfd9SFlorian Westphal offset = seq - TCP_SKB_CB(skb)->seq; 2426771bfd9SFlorian Westphal fin = TCP_SKB_CB(skb)->tcp_flags & TCPHDR_FIN; 2436771bfd9SFlorian Westphal if (fin) { 2446771bfd9SFlorian Westphal done = true; 2456771bfd9SFlorian Westphal seq++; 2466771bfd9SFlorian Westphal } 2476771bfd9SFlorian Westphal 2486771bfd9SFlorian Westphal if (offset < skb->len) { 2496771bfd9SFlorian Westphal size_t len = skb->len - offset; 2506771bfd9SFlorian Westphal 2516771bfd9SFlorian Westphal if (tp->urg_data) 2526771bfd9SFlorian Westphal done = true; 2536771bfd9SFlorian Westphal 2546771bfd9SFlorian Westphal __mptcp_move_skb(msk, ssk, skb, offset, len); 2556771bfd9SFlorian Westphal seq += len; 2566771bfd9SFlorian Westphal moved += len; 2576771bfd9SFlorian Westphal 2586771bfd9SFlorian Westphal if (WARN_ON_ONCE(map_remaining < len)) 2596771bfd9SFlorian Westphal break; 2606771bfd9SFlorian Westphal } else { 2616771bfd9SFlorian Westphal WARN_ON_ONCE(!fin); 2626771bfd9SFlorian Westphal sk_eat_skb(ssk, skb); 2636771bfd9SFlorian Westphal done = true; 2646771bfd9SFlorian Westphal } 2656771bfd9SFlorian Westphal 2666771bfd9SFlorian Westphal WRITE_ONCE(tp->copied_seq, seq); 2676771bfd9SFlorian Westphal more_data_avail = mptcp_subflow_data_available(ssk); 268600911ffSFlorian Westphal 269600911ffSFlorian Westphal if (atomic_read(&sk->sk_rmem_alloc) > READ_ONCE(sk->sk_rcvbuf)) { 270600911ffSFlorian Westphal done = true; 271600911ffSFlorian Westphal break; 272600911ffSFlorian Westphal } 2736771bfd9SFlorian Westphal } while (more_data_avail); 2746771bfd9SFlorian Westphal 2756771bfd9SFlorian Westphal *bytes = moved; 2766771bfd9SFlorian Westphal 2776771bfd9SFlorian Westphal return done; 2786771bfd9SFlorian Westphal } 2796771bfd9SFlorian Westphal 2802e52213cSFlorian Westphal /* In most cases we will be able to lock the mptcp socket. If its already 2812e52213cSFlorian Westphal * owned, we need to defer to the work queue to avoid ABBA deadlock. 2822e52213cSFlorian Westphal */ 2832e52213cSFlorian Westphal static bool move_skbs_to_msk(struct mptcp_sock *msk, struct sock *ssk) 2842e52213cSFlorian Westphal { 2852e52213cSFlorian Westphal struct sock *sk = (struct sock *)msk; 2862e52213cSFlorian Westphal unsigned int moved = 0; 2872e52213cSFlorian Westphal 2882e52213cSFlorian Westphal if (READ_ONCE(sk->sk_lock.owned)) 2892e52213cSFlorian Westphal return false; 2902e52213cSFlorian Westphal 2912e52213cSFlorian Westphal if (unlikely(!spin_trylock_bh(&sk->sk_lock.slock))) 2922e52213cSFlorian Westphal return false; 2932e52213cSFlorian Westphal 2942e52213cSFlorian Westphal /* must re-check after taking the lock */ 2952e52213cSFlorian Westphal if (!READ_ONCE(sk->sk_lock.owned)) 2962e52213cSFlorian Westphal __mptcp_move_skbs_from_subflow(msk, ssk, &moved); 2972e52213cSFlorian Westphal 2982e52213cSFlorian Westphal spin_unlock_bh(&sk->sk_lock.slock); 2992e52213cSFlorian Westphal 3002e52213cSFlorian Westphal return moved > 0; 3012e52213cSFlorian Westphal } 3022e52213cSFlorian Westphal 3032e52213cSFlorian Westphal void mptcp_data_ready(struct sock *sk, struct sock *ssk) 304101f6f85SFlorian Westphal { 305101f6f85SFlorian Westphal struct mptcp_sock *msk = mptcp_sk(sk); 306101f6f85SFlorian Westphal 307101f6f85SFlorian Westphal set_bit(MPTCP_DATA_READY, &msk->flags); 3086771bfd9SFlorian Westphal 3092e52213cSFlorian Westphal if (atomic_read(&sk->sk_rmem_alloc) < READ_ONCE(sk->sk_rcvbuf) && 3102e52213cSFlorian Westphal move_skbs_to_msk(msk, ssk)) 3112e52213cSFlorian Westphal goto wake; 3122e52213cSFlorian Westphal 313600911ffSFlorian Westphal /* don't schedule if mptcp sk is (still) over limit */ 314600911ffSFlorian Westphal if (atomic_read(&sk->sk_rmem_alloc) > READ_ONCE(sk->sk_rcvbuf)) 315600911ffSFlorian Westphal goto wake; 316600911ffSFlorian Westphal 31714c441b5SPaolo Abeni /* mptcp socket is owned, release_cb should retry */ 31814c441b5SPaolo Abeni if (!test_and_set_bit(TCP_DELACK_TIMER_DEFERRED, 31914c441b5SPaolo Abeni &sk->sk_tsq_flags)) { 32014c441b5SPaolo Abeni sock_hold(sk); 3216771bfd9SFlorian Westphal 32214c441b5SPaolo Abeni /* need to try again, its possible release_cb() has already 32314c441b5SPaolo Abeni * been called after the test_and_set_bit() above. 32414c441b5SPaolo Abeni */ 32514c441b5SPaolo Abeni move_skbs_to_msk(msk, ssk); 32614c441b5SPaolo Abeni } 327600911ffSFlorian Westphal wake: 328101f6f85SFlorian Westphal sk->sk_data_ready(sk); 329101f6f85SFlorian Westphal } 330101f6f85SFlorian Westphal 331ec3edaa7SPeter Krystad static void __mptcp_flush_join_list(struct mptcp_sock *msk) 332ec3edaa7SPeter Krystad { 333ec3edaa7SPeter Krystad if (likely(list_empty(&msk->join_list))) 334ec3edaa7SPeter Krystad return; 335ec3edaa7SPeter Krystad 336ec3edaa7SPeter Krystad spin_lock_bh(&msk->join_list_lock); 337ec3edaa7SPeter Krystad list_splice_tail_init(&msk->join_list, &msk->conn_list); 338ec3edaa7SPeter Krystad spin_unlock_bh(&msk->join_list_lock); 339ec3edaa7SPeter Krystad } 340ec3edaa7SPeter Krystad 341b51f9b80SPaolo Abeni static void mptcp_set_timeout(const struct sock *sk, const struct sock *ssk) 342b51f9b80SPaolo Abeni { 343b51f9b80SPaolo Abeni long tout = ssk && inet_csk(ssk)->icsk_pending ? 344b51f9b80SPaolo Abeni inet_csk(ssk)->icsk_timeout - jiffies : 0; 345b51f9b80SPaolo Abeni 346b51f9b80SPaolo Abeni if (tout <= 0) 347b51f9b80SPaolo Abeni tout = mptcp_sk(sk)->timer_ival; 348b51f9b80SPaolo Abeni mptcp_sk(sk)->timer_ival = tout > 0 ? tout : TCP_RTO_MIN; 349b51f9b80SPaolo Abeni } 350b51f9b80SPaolo Abeni 351b51f9b80SPaolo Abeni static bool mptcp_timer_pending(struct sock *sk) 352b51f9b80SPaolo Abeni { 353b51f9b80SPaolo Abeni return timer_pending(&inet_csk(sk)->icsk_retransmit_timer); 354b51f9b80SPaolo Abeni } 355b51f9b80SPaolo Abeni 356b51f9b80SPaolo Abeni static void mptcp_reset_timer(struct sock *sk) 357b51f9b80SPaolo Abeni { 358b51f9b80SPaolo Abeni struct inet_connection_sock *icsk = inet_csk(sk); 359b51f9b80SPaolo Abeni unsigned long tout; 360b51f9b80SPaolo Abeni 361b51f9b80SPaolo Abeni /* should never be called with mptcp level timer cleared */ 362b51f9b80SPaolo Abeni tout = READ_ONCE(mptcp_sk(sk)->timer_ival); 363b51f9b80SPaolo Abeni if (WARN_ON_ONCE(!tout)) 364b51f9b80SPaolo Abeni tout = TCP_RTO_MIN; 365b51f9b80SPaolo Abeni sk_reset_timer(sk, &icsk->icsk_retransmit_timer, jiffies + tout); 366b51f9b80SPaolo Abeni } 367b51f9b80SPaolo Abeni 368b51f9b80SPaolo Abeni void mptcp_data_acked(struct sock *sk) 369b51f9b80SPaolo Abeni { 370b51f9b80SPaolo Abeni mptcp_reset_timer(sk); 3713b1d6210SPaolo Abeni 3723b1d6210SPaolo Abeni if (!sk_stream_is_writeable(sk) && 3733b1d6210SPaolo Abeni schedule_work(&mptcp_sk(sk)->work)) 3743b1d6210SPaolo Abeni sock_hold(sk); 375b51f9b80SPaolo Abeni } 376b51f9b80SPaolo Abeni 37759832e24SFlorian Westphal void mptcp_subflow_eof(struct sock *sk) 37859832e24SFlorian Westphal { 37959832e24SFlorian Westphal struct mptcp_sock *msk = mptcp_sk(sk); 38059832e24SFlorian Westphal 38159832e24SFlorian Westphal if (!test_and_set_bit(MPTCP_WORK_EOF, &msk->flags) && 38259832e24SFlorian Westphal schedule_work(&msk->work)) 38359832e24SFlorian Westphal sock_hold(sk); 38459832e24SFlorian Westphal } 38559832e24SFlorian Westphal 3865969856aSPaolo Abeni static void mptcp_check_for_eof(struct mptcp_sock *msk) 3875969856aSPaolo Abeni { 3885969856aSPaolo Abeni struct mptcp_subflow_context *subflow; 3895969856aSPaolo Abeni struct sock *sk = (struct sock *)msk; 3905969856aSPaolo Abeni int receivers = 0; 3915969856aSPaolo Abeni 3925969856aSPaolo Abeni mptcp_for_each_subflow(msk, subflow) 3935969856aSPaolo Abeni receivers += !subflow->rx_eof; 3945969856aSPaolo Abeni 3955969856aSPaolo Abeni if (!receivers && !(sk->sk_shutdown & RCV_SHUTDOWN)) { 3965969856aSPaolo Abeni /* hopefully temporary hack: propagate shutdown status 3975969856aSPaolo Abeni * to msk, when all subflows agree on it 3985969856aSPaolo Abeni */ 3995969856aSPaolo Abeni sk->sk_shutdown |= RCV_SHUTDOWN; 4005969856aSPaolo Abeni 4015969856aSPaolo Abeni smp_mb__before_atomic(); /* SHUTDOWN must be visible first */ 4025969856aSPaolo Abeni set_bit(MPTCP_DATA_READY, &msk->flags); 4035969856aSPaolo Abeni sk->sk_data_ready(sk); 4045969856aSPaolo Abeni } 4055969856aSPaolo Abeni } 4065969856aSPaolo Abeni 407b51f9b80SPaolo Abeni static void mptcp_stop_timer(struct sock *sk) 408b51f9b80SPaolo Abeni { 409b51f9b80SPaolo Abeni struct inet_connection_sock *icsk = inet_csk(sk); 410b51f9b80SPaolo Abeni 411b51f9b80SPaolo Abeni sk_stop_timer(sk, &icsk->icsk_retransmit_timer); 412b51f9b80SPaolo Abeni mptcp_sk(sk)->timer_ival = 0; 413b51f9b80SPaolo Abeni } 414b51f9b80SPaolo Abeni 4156d0060f6SMat Martineau static bool mptcp_ext_cache_refill(struct mptcp_sock *msk) 4166d0060f6SMat Martineau { 4174930f483SFlorian Westphal const struct sock *sk = (const struct sock *)msk; 4184930f483SFlorian Westphal 4196d0060f6SMat Martineau if (!msk->cached_ext) 4204930f483SFlorian Westphal msk->cached_ext = __skb_ext_alloc(sk->sk_allocation); 4216d0060f6SMat Martineau 4226d0060f6SMat Martineau return !!msk->cached_ext; 4236d0060f6SMat Martineau } 4246d0060f6SMat Martineau 4257a6a6cbcSPaolo Abeni static struct sock *mptcp_subflow_recv_lookup(const struct mptcp_sock *msk) 4267a6a6cbcSPaolo Abeni { 4277a6a6cbcSPaolo Abeni struct mptcp_subflow_context *subflow; 4287a6a6cbcSPaolo Abeni struct sock *sk = (struct sock *)msk; 4297a6a6cbcSPaolo Abeni 4307a6a6cbcSPaolo Abeni sock_owned_by_me(sk); 4317a6a6cbcSPaolo Abeni 4327a6a6cbcSPaolo Abeni mptcp_for_each_subflow(msk, subflow) { 4337a6a6cbcSPaolo Abeni if (subflow->data_avail) 4347a6a6cbcSPaolo Abeni return mptcp_subflow_tcp_sock(subflow); 4357a6a6cbcSPaolo Abeni } 4367a6a6cbcSPaolo Abeni 4377a6a6cbcSPaolo Abeni return NULL; 4387a6a6cbcSPaolo Abeni } 4397a6a6cbcSPaolo Abeni 4403f8e0aaeSPaolo Abeni static bool mptcp_skb_can_collapse_to(u64 write_seq, 44157040755SPaolo Abeni const struct sk_buff *skb, 44257040755SPaolo Abeni const struct mptcp_ext *mpext) 4436d0060f6SMat Martineau { 44457040755SPaolo Abeni if (!tcp_skb_can_collapse_to(skb)) 44557040755SPaolo Abeni return false; 44657040755SPaolo Abeni 44757040755SPaolo Abeni /* can collapse only if MPTCP level sequence is in order */ 4483f8e0aaeSPaolo Abeni return mpext && mpext->data_seq + mpext->data_len == write_seq; 44957040755SPaolo Abeni } 45057040755SPaolo Abeni 45118b683bfSPaolo Abeni static bool mptcp_frag_can_collapse_to(const struct mptcp_sock *msk, 45218b683bfSPaolo Abeni const struct page_frag *pfrag, 45318b683bfSPaolo Abeni const struct mptcp_data_frag *df) 45418b683bfSPaolo Abeni { 45518b683bfSPaolo Abeni return df && pfrag->page == df->page && 45618b683bfSPaolo Abeni df->data_seq + df->data_len == msk->write_seq; 45718b683bfSPaolo Abeni } 45818b683bfSPaolo Abeni 459d027236cSPaolo Abeni static void dfrag_uncharge(struct sock *sk, int len) 46018b683bfSPaolo Abeni { 461d027236cSPaolo Abeni sk_mem_uncharge(sk, len); 4627948f6ccSFlorian Westphal sk_wmem_queued_add(sk, -len); 463d027236cSPaolo Abeni } 464d027236cSPaolo Abeni 465d027236cSPaolo Abeni static void dfrag_clear(struct sock *sk, struct mptcp_data_frag *dfrag) 466d027236cSPaolo Abeni { 467d027236cSPaolo Abeni int len = dfrag->data_len + dfrag->overhead; 468d027236cSPaolo Abeni 46918b683bfSPaolo Abeni list_del(&dfrag->list); 470d027236cSPaolo Abeni dfrag_uncharge(sk, len); 47118b683bfSPaolo Abeni put_page(dfrag->page); 47218b683bfSPaolo Abeni } 47318b683bfSPaolo Abeni 47418b683bfSPaolo Abeni static void mptcp_clean_una(struct sock *sk) 47518b683bfSPaolo Abeni { 47618b683bfSPaolo Abeni struct mptcp_sock *msk = mptcp_sk(sk); 47718b683bfSPaolo Abeni struct mptcp_data_frag *dtmp, *dfrag; 478d027236cSPaolo Abeni bool cleaned = false; 479*e1ff9e82SDavide Caratti u64 snd_una; 480*e1ff9e82SDavide Caratti 481*e1ff9e82SDavide Caratti /* on fallback we just need to ignore snd_una, as this is really 482*e1ff9e82SDavide Caratti * plain TCP 483*e1ff9e82SDavide Caratti */ 484*e1ff9e82SDavide Caratti if (__mptcp_check_fallback(msk)) 485*e1ff9e82SDavide Caratti atomic64_set(&msk->snd_una, msk->write_seq); 486*e1ff9e82SDavide Caratti snd_una = atomic64_read(&msk->snd_una); 48718b683bfSPaolo Abeni 48818b683bfSPaolo Abeni list_for_each_entry_safe(dfrag, dtmp, &msk->rtx_queue, list) { 48918b683bfSPaolo Abeni if (after64(dfrag->data_seq + dfrag->data_len, snd_una)) 49018b683bfSPaolo Abeni break; 49118b683bfSPaolo Abeni 492d027236cSPaolo Abeni dfrag_clear(sk, dfrag); 493d027236cSPaolo Abeni cleaned = true; 494d027236cSPaolo Abeni } 495d027236cSPaolo Abeni 4967948f6ccSFlorian Westphal dfrag = mptcp_rtx_head(sk); 4977948f6ccSFlorian Westphal if (dfrag && after64(snd_una, dfrag->data_seq)) { 4987948f6ccSFlorian Westphal u64 delta = dfrag->data_seq + dfrag->data_len - snd_una; 4997948f6ccSFlorian Westphal 5007948f6ccSFlorian Westphal dfrag->data_seq += delta; 5017948f6ccSFlorian Westphal dfrag->data_len -= delta; 5027948f6ccSFlorian Westphal 5037948f6ccSFlorian Westphal dfrag_uncharge(sk, delta); 5047948f6ccSFlorian Westphal cleaned = true; 5057948f6ccSFlorian Westphal } 5067948f6ccSFlorian Westphal 507d027236cSPaolo Abeni if (cleaned) { 508d027236cSPaolo Abeni sk_mem_reclaim_partial(sk); 5097948f6ccSFlorian Westphal 5107948f6ccSFlorian Westphal /* Only wake up writers if a subflow is ready */ 5117948f6ccSFlorian Westphal if (test_bit(MPTCP_SEND_SPACE, &msk->flags)) 5127948f6ccSFlorian Westphal sk_stream_write_space(sk); 51318b683bfSPaolo Abeni } 51418b683bfSPaolo Abeni } 51518b683bfSPaolo Abeni 51618b683bfSPaolo Abeni /* ensure we get enough memory for the frag hdr, beyond some minimal amount of 51718b683bfSPaolo Abeni * data 51818b683bfSPaolo Abeni */ 51918b683bfSPaolo Abeni static bool mptcp_page_frag_refill(struct sock *sk, struct page_frag *pfrag) 52018b683bfSPaolo Abeni { 52118b683bfSPaolo Abeni if (likely(skb_page_frag_refill(32U + sizeof(struct mptcp_data_frag), 52218b683bfSPaolo Abeni pfrag, sk->sk_allocation))) 52318b683bfSPaolo Abeni return true; 52418b683bfSPaolo Abeni 52518b683bfSPaolo Abeni sk->sk_prot->enter_memory_pressure(sk); 52618b683bfSPaolo Abeni sk_stream_moderate_sndbuf(sk); 52718b683bfSPaolo Abeni return false; 52818b683bfSPaolo Abeni } 52918b683bfSPaolo Abeni 53018b683bfSPaolo Abeni static struct mptcp_data_frag * 53118b683bfSPaolo Abeni mptcp_carve_data_frag(const struct mptcp_sock *msk, struct page_frag *pfrag, 53218b683bfSPaolo Abeni int orig_offset) 53318b683bfSPaolo Abeni { 53418b683bfSPaolo Abeni int offset = ALIGN(orig_offset, sizeof(long)); 53518b683bfSPaolo Abeni struct mptcp_data_frag *dfrag; 53618b683bfSPaolo Abeni 53718b683bfSPaolo Abeni dfrag = (struct mptcp_data_frag *)(page_to_virt(pfrag->page) + offset); 53818b683bfSPaolo Abeni dfrag->data_len = 0; 53918b683bfSPaolo Abeni dfrag->data_seq = msk->write_seq; 54018b683bfSPaolo Abeni dfrag->overhead = offset - orig_offset + sizeof(struct mptcp_data_frag); 54118b683bfSPaolo Abeni dfrag->offset = offset + sizeof(struct mptcp_data_frag); 54218b683bfSPaolo Abeni dfrag->page = pfrag->page; 54318b683bfSPaolo Abeni 54418b683bfSPaolo Abeni return dfrag; 54518b683bfSPaolo Abeni } 54618b683bfSPaolo Abeni 54757040755SPaolo Abeni static int mptcp_sendmsg_frag(struct sock *sk, struct sock *ssk, 5483f8e0aaeSPaolo Abeni struct msghdr *msg, struct mptcp_data_frag *dfrag, 5493f8e0aaeSPaolo Abeni long *timeo, int *pmss_now, 55057040755SPaolo Abeni int *ps_goal) 55157040755SPaolo Abeni { 55218b683bfSPaolo Abeni int mss_now, avail_size, size_goal, offset, ret, frag_truesize = 0; 55318b683bfSPaolo Abeni bool dfrag_collapsed, can_collapse = false; 5546d0060f6SMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 5556d0060f6SMat Martineau struct mptcp_ext *mpext = NULL; 5563f8e0aaeSPaolo Abeni bool retransmission = !!dfrag; 55757040755SPaolo Abeni struct sk_buff *skb, *tail; 5586d0060f6SMat Martineau struct page_frag *pfrag; 5593f8e0aaeSPaolo Abeni struct page *page; 5603f8e0aaeSPaolo Abeni u64 *write_seq; 5616d0060f6SMat Martineau size_t psize; 5626d0060f6SMat Martineau 5636d0060f6SMat Martineau /* use the mptcp page cache so that we can easily move the data 5646d0060f6SMat Martineau * from one substream to another, but do per subflow memory accounting 5653f8e0aaeSPaolo Abeni * Note: pfrag is used only !retransmission, but the compiler if 5663f8e0aaeSPaolo Abeni * fooled into a warning if we don't init here 5676d0060f6SMat Martineau */ 5686d0060f6SMat Martineau pfrag = sk_page_frag(sk); 5693f8e0aaeSPaolo Abeni if (!retransmission) { 5703f8e0aaeSPaolo Abeni write_seq = &msk->write_seq; 5713f8e0aaeSPaolo Abeni page = pfrag->page; 5723f8e0aaeSPaolo Abeni } else { 5733f8e0aaeSPaolo Abeni write_seq = &dfrag->data_seq; 5743f8e0aaeSPaolo Abeni page = dfrag->page; 5753f8e0aaeSPaolo Abeni } 5766d0060f6SMat Martineau 5776d0060f6SMat Martineau /* compute copy limit */ 5786d0060f6SMat Martineau mss_now = tcp_send_mss(ssk, &size_goal, msg->msg_flags); 57957040755SPaolo Abeni *pmss_now = mss_now; 58057040755SPaolo Abeni *ps_goal = size_goal; 58157040755SPaolo Abeni avail_size = size_goal; 58257040755SPaolo Abeni skb = tcp_write_queue_tail(ssk); 58357040755SPaolo Abeni if (skb) { 58457040755SPaolo Abeni mpext = skb_ext_find(skb, SKB_EXT_MPTCP); 5856d0060f6SMat Martineau 58657040755SPaolo Abeni /* Limit the write to the size available in the 58757040755SPaolo Abeni * current skb, if any, so that we create at most a new skb. 58857040755SPaolo Abeni * Explicitly tells TCP internals to avoid collapsing on later 58957040755SPaolo Abeni * queue management operation, to avoid breaking the ext <-> 59057040755SPaolo Abeni * SSN association set here 59157040755SPaolo Abeni */ 59257040755SPaolo Abeni can_collapse = (size_goal - skb->len > 0) && 5933f8e0aaeSPaolo Abeni mptcp_skb_can_collapse_to(*write_seq, skb, mpext); 59457040755SPaolo Abeni if (!can_collapse) 59557040755SPaolo Abeni TCP_SKB_CB(skb)->eor = 1; 59657040755SPaolo Abeni else 59757040755SPaolo Abeni avail_size = size_goal - skb->len; 59857040755SPaolo Abeni } 59918b683bfSPaolo Abeni 6003f8e0aaeSPaolo Abeni if (!retransmission) { 6013f8e0aaeSPaolo Abeni /* reuse tail pfrag, if possible, or carve a new one from the 6023f8e0aaeSPaolo Abeni * page allocator 60318b683bfSPaolo Abeni */ 60418b683bfSPaolo Abeni dfrag = mptcp_rtx_tail(sk); 60518b683bfSPaolo Abeni offset = pfrag->offset; 60618b683bfSPaolo Abeni dfrag_collapsed = mptcp_frag_can_collapse_to(msk, pfrag, dfrag); 60718b683bfSPaolo Abeni if (!dfrag_collapsed) { 60818b683bfSPaolo Abeni dfrag = mptcp_carve_data_frag(msk, pfrag, offset); 60918b683bfSPaolo Abeni offset = dfrag->offset; 61018b683bfSPaolo Abeni frag_truesize = dfrag->overhead; 61118b683bfSPaolo Abeni } 61218b683bfSPaolo Abeni psize = min_t(size_t, pfrag->size - offset, avail_size); 61357040755SPaolo Abeni 61457040755SPaolo Abeni /* Copy to page */ 6156d0060f6SMat Martineau pr_debug("left=%zu", msg_data_left(msg)); 61618b683bfSPaolo Abeni psize = copy_page_from_iter(pfrag->page, offset, 6173f8e0aaeSPaolo Abeni min_t(size_t, msg_data_left(msg), 6183f8e0aaeSPaolo Abeni psize), 6196d0060f6SMat Martineau &msg->msg_iter); 6206d0060f6SMat Martineau pr_debug("left=%zu", msg_data_left(msg)); 6216d0060f6SMat Martineau if (!psize) 6226d0060f6SMat Martineau return -EINVAL; 6236d0060f6SMat Martineau 624d027236cSPaolo Abeni if (!sk_wmem_schedule(sk, psize + dfrag->overhead)) 625d027236cSPaolo Abeni return -ENOMEM; 6263f8e0aaeSPaolo Abeni } else { 6273f8e0aaeSPaolo Abeni offset = dfrag->offset; 6283f8e0aaeSPaolo Abeni psize = min_t(size_t, dfrag->data_len, avail_size); 6293f8e0aaeSPaolo Abeni } 630d027236cSPaolo Abeni 63157040755SPaolo Abeni /* tell the TCP stack to delay the push so that we can safely 63257040755SPaolo Abeni * access the skb after the sendpages call 6336d0060f6SMat Martineau */ 6343f8e0aaeSPaolo Abeni ret = do_tcp_sendpages(ssk, page, offset, psize, 63572511aabSFlorian Westphal msg->msg_flags | MSG_SENDPAGE_NOTLAST | MSG_DONTWAIT); 6366d0060f6SMat Martineau if (ret <= 0) 6376d0060f6SMat Martineau return ret; 63818b683bfSPaolo Abeni 63918b683bfSPaolo Abeni frag_truesize += ret; 6403f8e0aaeSPaolo Abeni if (!retransmission) { 6416d0060f6SMat Martineau if (unlikely(ret < psize)) 6426d0060f6SMat Martineau iov_iter_revert(&msg->msg_iter, psize - ret); 6436d0060f6SMat Martineau 64418b683bfSPaolo Abeni /* send successful, keep track of sent data for mptcp-level 64518b683bfSPaolo Abeni * retransmission 64618b683bfSPaolo Abeni */ 64718b683bfSPaolo Abeni dfrag->data_len += ret; 64818b683bfSPaolo Abeni if (!dfrag_collapsed) { 64918b683bfSPaolo Abeni get_page(dfrag->page); 65018b683bfSPaolo Abeni list_add_tail(&dfrag->list, &msk->rtx_queue); 6513f8e0aaeSPaolo Abeni sk_wmem_queued_add(sk, frag_truesize); 6523f8e0aaeSPaolo Abeni } else { 6533f8e0aaeSPaolo Abeni sk_wmem_queued_add(sk, ret); 65418b683bfSPaolo Abeni } 65518b683bfSPaolo Abeni 656d027236cSPaolo Abeni /* charge data on mptcp rtx queue to the master socket 657d027236cSPaolo Abeni * Note: we charge such data both to sk and ssk 658d027236cSPaolo Abeni */ 659d027236cSPaolo Abeni sk->sk_forward_alloc -= frag_truesize; 6603f8e0aaeSPaolo Abeni } 661d027236cSPaolo Abeni 66257040755SPaolo Abeni /* if the tail skb extension is still the cached one, collapsing 66357040755SPaolo Abeni * really happened. Note: we can't check for 'same skb' as the sk_buff 66457040755SPaolo Abeni * hdr on tail can be transmitted, freed and re-allocated by the 66557040755SPaolo Abeni * do_tcp_sendpages() call 66657040755SPaolo Abeni */ 66757040755SPaolo Abeni tail = tcp_write_queue_tail(ssk); 66857040755SPaolo Abeni if (mpext && tail && mpext == skb_ext_find(tail, SKB_EXT_MPTCP)) { 66957040755SPaolo Abeni WARN_ON_ONCE(!can_collapse); 67057040755SPaolo Abeni mpext->data_len += ret; 67157040755SPaolo Abeni goto out; 67257040755SPaolo Abeni } 67357040755SPaolo Abeni 6746d0060f6SMat Martineau skb = tcp_write_queue_tail(ssk); 6756d0060f6SMat Martineau mpext = __skb_ext_set(skb, SKB_EXT_MPTCP, msk->cached_ext); 6766d0060f6SMat Martineau msk->cached_ext = NULL; 6776d0060f6SMat Martineau 6786d0060f6SMat Martineau memset(mpext, 0, sizeof(*mpext)); 6793f8e0aaeSPaolo Abeni mpext->data_seq = *write_seq; 6806d0060f6SMat Martineau mpext->subflow_seq = mptcp_subflow_ctx(ssk)->rel_write_seq; 6816d0060f6SMat Martineau mpext->data_len = ret; 6826d0060f6SMat Martineau mpext->use_map = 1; 6836d0060f6SMat Martineau mpext->dsn64 = 1; 6846d0060f6SMat Martineau 6856d0060f6SMat Martineau pr_debug("data_seq=%llu subflow_seq=%u data_len=%u dsn64=%d", 6866d0060f6SMat Martineau mpext->data_seq, mpext->subflow_seq, mpext->data_len, 6876d0060f6SMat Martineau mpext->dsn64); 6886d0060f6SMat Martineau 68957040755SPaolo Abeni out: 6903f8e0aaeSPaolo Abeni if (!retransmission) 69118b683bfSPaolo Abeni pfrag->offset += frag_truesize; 6923f8e0aaeSPaolo Abeni *write_seq += ret; 6936d0060f6SMat Martineau mptcp_subflow_ctx(ssk)->rel_write_seq += ret; 6946d0060f6SMat Martineau 6956d0060f6SMat Martineau return ret; 6966d0060f6SMat Martineau } 6976d0060f6SMat Martineau 698a0e17064SFlorian Westphal static void mptcp_nospace(struct mptcp_sock *msk, struct socket *sock) 699a0e17064SFlorian Westphal { 700a0e17064SFlorian Westphal clear_bit(MPTCP_SEND_SPACE, &msk->flags); 701a0e17064SFlorian Westphal smp_mb__after_atomic(); /* msk->flags is changed by write_space cb */ 702a0e17064SFlorian Westphal 703a0e17064SFlorian Westphal /* enables sk->write_space() callbacks */ 704a0e17064SFlorian Westphal set_bit(SOCK_NOSPACE, &sock->flags); 705a0e17064SFlorian Westphal } 706a0e17064SFlorian Westphal 707f296234cSPeter Krystad static struct sock *mptcp_subflow_get_send(struct mptcp_sock *msk) 708f296234cSPeter Krystad { 709f296234cSPeter Krystad struct mptcp_subflow_context *subflow; 710f296234cSPeter Krystad struct sock *backup = NULL; 711f296234cSPeter Krystad 712f296234cSPeter Krystad sock_owned_by_me((const struct sock *)msk); 713f296234cSPeter Krystad 714149f7c71SFlorian Westphal if (!mptcp_ext_cache_refill(msk)) 715149f7c71SFlorian Westphal return NULL; 716149f7c71SFlorian Westphal 717f296234cSPeter Krystad mptcp_for_each_subflow(msk, subflow) { 718f296234cSPeter Krystad struct sock *ssk = mptcp_subflow_tcp_sock(subflow); 719f296234cSPeter Krystad 720f296234cSPeter Krystad if (!sk_stream_memory_free(ssk)) { 721f296234cSPeter Krystad struct socket *sock = ssk->sk_socket; 722f296234cSPeter Krystad 723a0e17064SFlorian Westphal if (sock) 724a0e17064SFlorian Westphal mptcp_nospace(msk, sock); 725f296234cSPeter Krystad 726f296234cSPeter Krystad return NULL; 727f296234cSPeter Krystad } 728f296234cSPeter Krystad 729f296234cSPeter Krystad if (subflow->backup) { 730f296234cSPeter Krystad if (!backup) 731f296234cSPeter Krystad backup = ssk; 732f296234cSPeter Krystad 733f296234cSPeter Krystad continue; 734f296234cSPeter Krystad } 735f296234cSPeter Krystad 736f296234cSPeter Krystad return ssk; 737f296234cSPeter Krystad } 738f296234cSPeter Krystad 739f296234cSPeter Krystad return backup; 740f296234cSPeter Krystad } 741f296234cSPeter Krystad 7421891c4a0SFlorian Westphal static void ssk_check_wmem(struct mptcp_sock *msk, struct sock *ssk) 7431891c4a0SFlorian Westphal { 7441891c4a0SFlorian Westphal struct socket *sock; 7451891c4a0SFlorian Westphal 7461891c4a0SFlorian Westphal if (likely(sk_stream_is_writeable(ssk))) 7471891c4a0SFlorian Westphal return; 7481891c4a0SFlorian Westphal 7491891c4a0SFlorian Westphal sock = READ_ONCE(ssk->sk_socket); 750a0e17064SFlorian Westphal if (sock) 751a0e17064SFlorian Westphal mptcp_nospace(msk, sock); 7521891c4a0SFlorian Westphal } 7531891c4a0SFlorian Westphal 754f870fa0bSMat Martineau static int mptcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) 755f870fa0bSMat Martineau { 75657040755SPaolo Abeni int mss_now = 0, size_goal = 0, ret = 0; 757f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 75817091708SFlorian Westphal struct page_frag *pfrag; 7596d0060f6SMat Martineau size_t copied = 0; 760cec37a6eSPeter Krystad struct sock *ssk; 76172511aabSFlorian Westphal bool tx_ok; 7626d0060f6SMat Martineau long timeo; 763f870fa0bSMat Martineau 764f870fa0bSMat Martineau if (msg->msg_flags & ~(MSG_MORE | MSG_DONTWAIT | MSG_NOSIGNAL)) 765f870fa0bSMat Martineau return -EOPNOTSUPP; 766f870fa0bSMat Martineau 767cec37a6eSPeter Krystad lock_sock(sk); 7681954b860SMat Martineau 7691954b860SMat Martineau timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT); 7701954b860SMat Martineau 7711954b860SMat Martineau if ((1 << sk->sk_state) & ~(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT)) { 7721954b860SMat Martineau ret = sk_stream_wait_connect(sk, &timeo); 7731954b860SMat Martineau if (ret) 7741954b860SMat Martineau goto out; 7751954b860SMat Martineau } 7761954b860SMat Martineau 77717091708SFlorian Westphal pfrag = sk_page_frag(sk); 77872511aabSFlorian Westphal restart: 77918b683bfSPaolo Abeni mptcp_clean_una(sk); 78018b683bfSPaolo Abeni 781fb529e62SFlorian Westphal wait_for_sndbuf: 782ec3edaa7SPeter Krystad __mptcp_flush_join_list(msk); 783f296234cSPeter Krystad ssk = mptcp_subflow_get_send(msk); 78417091708SFlorian Westphal while (!sk_stream_memory_free(sk) || 78517091708SFlorian Westphal !ssk || 78617091708SFlorian Westphal !mptcp_page_frag_refill(ssk, pfrag)) { 787fb529e62SFlorian Westphal if (ssk) { 788fb529e62SFlorian Westphal /* make sure retransmit timer is 789fb529e62SFlorian Westphal * running before we wait for memory. 790fb529e62SFlorian Westphal * 791fb529e62SFlorian Westphal * The retransmit timer might be needed 792fb529e62SFlorian Westphal * to make the peer send an up-to-date 793fb529e62SFlorian Westphal * MPTCP Ack. 794fb529e62SFlorian Westphal */ 795fb529e62SFlorian Westphal mptcp_set_timeout(sk, ssk); 796fb529e62SFlorian Westphal if (!mptcp_timer_pending(sk)) 797fb529e62SFlorian Westphal mptcp_reset_timer(sk); 798fb529e62SFlorian Westphal } 799fb529e62SFlorian Westphal 800f296234cSPeter Krystad ret = sk_stream_wait_memory(sk, &timeo); 801f296234cSPeter Krystad if (ret) 802f296234cSPeter Krystad goto out; 803f296234cSPeter Krystad 80418b683bfSPaolo Abeni mptcp_clean_una(sk); 80518b683bfSPaolo Abeni 806f296234cSPeter Krystad ssk = mptcp_subflow_get_send(msk); 807f296234cSPeter Krystad if (list_empty(&msk->conn_list)) { 808f296234cSPeter Krystad ret = -ENOTCONN; 809f296234cSPeter Krystad goto out; 810f296234cSPeter Krystad } 811cec37a6eSPeter Krystad } 812cec37a6eSPeter Krystad 8136d0060f6SMat Martineau pr_debug("conn_list->subflow=%p", ssk); 814cec37a6eSPeter Krystad 8156d0060f6SMat Martineau lock_sock(ssk); 81672511aabSFlorian Westphal tx_ok = msg_data_left(msg); 81772511aabSFlorian Westphal while (tx_ok) { 8183f8e0aaeSPaolo Abeni ret = mptcp_sendmsg_frag(sk, ssk, msg, NULL, &timeo, &mss_now, 81957040755SPaolo Abeni &size_goal); 82072511aabSFlorian Westphal if (ret < 0) { 82172511aabSFlorian Westphal if (ret == -EAGAIN && timeo > 0) { 82272511aabSFlorian Westphal mptcp_set_timeout(sk, ssk); 82372511aabSFlorian Westphal release_sock(ssk); 82472511aabSFlorian Westphal goto restart; 82572511aabSFlorian Westphal } 8266d0060f6SMat Martineau break; 82772511aabSFlorian Westphal } 8286d0060f6SMat Martineau 8296d0060f6SMat Martineau copied += ret; 830fb529e62SFlorian Westphal 83172511aabSFlorian Westphal tx_ok = msg_data_left(msg); 83272511aabSFlorian Westphal if (!tx_ok) 83372511aabSFlorian Westphal break; 83472511aabSFlorian Westphal 835149f7c71SFlorian Westphal if (!sk_stream_memory_free(ssk) || 83617091708SFlorian Westphal !mptcp_page_frag_refill(ssk, pfrag) || 837149f7c71SFlorian Westphal !mptcp_ext_cache_refill(msk)) { 83872511aabSFlorian Westphal set_bit(SOCK_NOSPACE, &sk->sk_socket->flags); 83972511aabSFlorian Westphal tcp_push(ssk, msg->msg_flags, mss_now, 84072511aabSFlorian Westphal tcp_sk(ssk)->nonagle, size_goal); 84172511aabSFlorian Westphal mptcp_set_timeout(sk, ssk); 84272511aabSFlorian Westphal release_sock(ssk); 84372511aabSFlorian Westphal goto restart; 84472511aabSFlorian Westphal } 84572511aabSFlorian Westphal 846fb529e62SFlorian Westphal /* memory is charged to mptcp level socket as well, i.e. 847fb529e62SFlorian Westphal * if msg is very large, mptcp socket may run out of buffer 848fb529e62SFlorian Westphal * space. mptcp_clean_una() will release data that has 849fb529e62SFlorian Westphal * been acked at mptcp level in the mean time, so there is 850fb529e62SFlorian Westphal * a good chance we can continue sending data right away. 85172511aabSFlorian Westphal * 85272511aabSFlorian Westphal * Normally, when the tcp subflow can accept more data, then 85372511aabSFlorian Westphal * so can the MPTCP socket. However, we need to cope with 85472511aabSFlorian Westphal * peers that might lag behind in their MPTCP-level 85572511aabSFlorian Westphal * acknowledgements, i.e. data might have been acked at 85672511aabSFlorian Westphal * tcp level only. So, we must also check the MPTCP socket 85772511aabSFlorian Westphal * limits before we send more data. 858fb529e62SFlorian Westphal */ 859fb529e62SFlorian Westphal if (unlikely(!sk_stream_memory_free(sk))) { 860fb529e62SFlorian Westphal tcp_push(ssk, msg->msg_flags, mss_now, 861fb529e62SFlorian Westphal tcp_sk(ssk)->nonagle, size_goal); 862fb529e62SFlorian Westphal mptcp_clean_una(sk); 863fb529e62SFlorian Westphal if (!sk_stream_memory_free(sk)) { 864fb529e62SFlorian Westphal /* can't send more for now, need to wait for 865fb529e62SFlorian Westphal * MPTCP-level ACKs from peer. 866fb529e62SFlorian Westphal * 867fb529e62SFlorian Westphal * Wakeup will happen via mptcp_clean_una(). 868fb529e62SFlorian Westphal */ 869fb529e62SFlorian Westphal mptcp_set_timeout(sk, ssk); 870fb529e62SFlorian Westphal release_sock(ssk); 871fb529e62SFlorian Westphal goto wait_for_sndbuf; 872fb529e62SFlorian Westphal } 873fb529e62SFlorian Westphal } 8746d0060f6SMat Martineau } 8756d0060f6SMat Martineau 876b51f9b80SPaolo Abeni mptcp_set_timeout(sk, ssk); 87757040755SPaolo Abeni if (copied) { 8786d0060f6SMat Martineau ret = copied; 87957040755SPaolo Abeni tcp_push(ssk, msg->msg_flags, mss_now, tcp_sk(ssk)->nonagle, 88057040755SPaolo Abeni size_goal); 881b51f9b80SPaolo Abeni 882b51f9b80SPaolo Abeni /* start the timer, if it's not pending */ 883b51f9b80SPaolo Abeni if (!mptcp_timer_pending(sk)) 884b51f9b80SPaolo Abeni mptcp_reset_timer(sk); 88557040755SPaolo Abeni } 8866d0060f6SMat Martineau 8871891c4a0SFlorian Westphal ssk_check_wmem(msk, ssk); 8886d0060f6SMat Martineau release_sock(ssk); 8891954b860SMat Martineau out: 890cec37a6eSPeter Krystad release_sock(sk); 891cec37a6eSPeter Krystad return ret; 892f870fa0bSMat Martineau } 893f870fa0bSMat Martineau 8947a6a6cbcSPaolo Abeni static void mptcp_wait_data(struct sock *sk, long *timeo) 8957a6a6cbcSPaolo Abeni { 8967a6a6cbcSPaolo Abeni DEFINE_WAIT_FUNC(wait, woken_wake_function); 8977a6a6cbcSPaolo Abeni struct mptcp_sock *msk = mptcp_sk(sk); 8987a6a6cbcSPaolo Abeni 8997a6a6cbcSPaolo Abeni add_wait_queue(sk_sleep(sk), &wait); 9007a6a6cbcSPaolo Abeni sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk); 9017a6a6cbcSPaolo Abeni 9027a6a6cbcSPaolo Abeni sk_wait_event(sk, timeo, 9037a6a6cbcSPaolo Abeni test_and_clear_bit(MPTCP_DATA_READY, &msk->flags), &wait); 9047a6a6cbcSPaolo Abeni 9057a6a6cbcSPaolo Abeni sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk); 9067a6a6cbcSPaolo Abeni remove_wait_queue(sk_sleep(sk), &wait); 9077a6a6cbcSPaolo Abeni } 9087a6a6cbcSPaolo Abeni 9096771bfd9SFlorian Westphal static int __mptcp_recvmsg_mskq(struct mptcp_sock *msk, 9106771bfd9SFlorian Westphal struct msghdr *msg, 9116771bfd9SFlorian Westphal size_t len) 9126771bfd9SFlorian Westphal { 9136771bfd9SFlorian Westphal struct sock *sk = (struct sock *)msk; 9146771bfd9SFlorian Westphal struct sk_buff *skb; 9156771bfd9SFlorian Westphal int copied = 0; 9166771bfd9SFlorian Westphal 9176771bfd9SFlorian Westphal while ((skb = skb_peek(&sk->sk_receive_queue)) != NULL) { 9186771bfd9SFlorian Westphal u32 offset = MPTCP_SKB_CB(skb)->offset; 9196771bfd9SFlorian Westphal u32 data_len = skb->len - offset; 9206771bfd9SFlorian Westphal u32 count = min_t(size_t, len - copied, data_len); 9216771bfd9SFlorian Westphal int err; 9226771bfd9SFlorian Westphal 9236771bfd9SFlorian Westphal err = skb_copy_datagram_msg(skb, offset, msg, count); 9246771bfd9SFlorian Westphal if (unlikely(err < 0)) { 9256771bfd9SFlorian Westphal if (!copied) 9266771bfd9SFlorian Westphal return err; 9276771bfd9SFlorian Westphal break; 9286771bfd9SFlorian Westphal } 9296771bfd9SFlorian Westphal 9306771bfd9SFlorian Westphal copied += count; 9316771bfd9SFlorian Westphal 9326771bfd9SFlorian Westphal if (count < data_len) { 9336771bfd9SFlorian Westphal MPTCP_SKB_CB(skb)->offset += count; 9346771bfd9SFlorian Westphal break; 9356771bfd9SFlorian Westphal } 9366771bfd9SFlorian Westphal 9376771bfd9SFlorian Westphal __skb_unlink(skb, &sk->sk_receive_queue); 9386771bfd9SFlorian Westphal __kfree_skb(skb); 9396771bfd9SFlorian Westphal 9406771bfd9SFlorian Westphal if (copied >= len) 9416771bfd9SFlorian Westphal break; 9426771bfd9SFlorian Westphal } 9436771bfd9SFlorian Westphal 9446771bfd9SFlorian Westphal return copied; 9456771bfd9SFlorian Westphal } 9466771bfd9SFlorian Westphal 9476771bfd9SFlorian Westphal static bool __mptcp_move_skbs(struct mptcp_sock *msk) 9486771bfd9SFlorian Westphal { 9496771bfd9SFlorian Westphal unsigned int moved = 0; 9506771bfd9SFlorian Westphal bool done; 9516771bfd9SFlorian Westphal 9526771bfd9SFlorian Westphal do { 9536771bfd9SFlorian Westphal struct sock *ssk = mptcp_subflow_recv_lookup(msk); 9546771bfd9SFlorian Westphal 9556771bfd9SFlorian Westphal if (!ssk) 9566771bfd9SFlorian Westphal break; 9576771bfd9SFlorian Westphal 9586771bfd9SFlorian Westphal lock_sock(ssk); 9596771bfd9SFlorian Westphal done = __mptcp_move_skbs_from_subflow(msk, ssk, &moved); 9606771bfd9SFlorian Westphal release_sock(ssk); 9616771bfd9SFlorian Westphal } while (!done); 9626771bfd9SFlorian Westphal 9636771bfd9SFlorian Westphal return moved > 0; 9646771bfd9SFlorian Westphal } 9656771bfd9SFlorian Westphal 966f870fa0bSMat Martineau static int mptcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len, 967f870fa0bSMat Martineau int nonblock, int flags, int *addr_len) 968f870fa0bSMat Martineau { 969f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 970cec37a6eSPeter Krystad int copied = 0; 9717a6a6cbcSPaolo Abeni int target; 9727a6a6cbcSPaolo Abeni long timeo; 973f870fa0bSMat Martineau 974f870fa0bSMat Martineau if (msg->msg_flags & ~(MSG_WAITALL | MSG_DONTWAIT)) 975f870fa0bSMat Martineau return -EOPNOTSUPP; 976f870fa0bSMat Martineau 977cec37a6eSPeter Krystad lock_sock(sk); 9787a6a6cbcSPaolo Abeni timeo = sock_rcvtimeo(sk, nonblock); 9797a6a6cbcSPaolo Abeni 9807a6a6cbcSPaolo Abeni len = min_t(size_t, len, INT_MAX); 9817a6a6cbcSPaolo Abeni target = sock_rcvlowat(sk, flags & MSG_WAITALL, len); 982ec3edaa7SPeter Krystad __mptcp_flush_join_list(msk); 9837a6a6cbcSPaolo Abeni 9846771bfd9SFlorian Westphal while (len > (size_t)copied) { 9857a6a6cbcSPaolo Abeni int bytes_read; 9867a6a6cbcSPaolo Abeni 9876771bfd9SFlorian Westphal bytes_read = __mptcp_recvmsg_mskq(msk, msg, len - copied); 9886771bfd9SFlorian Westphal if (unlikely(bytes_read < 0)) { 9897a6a6cbcSPaolo Abeni if (!copied) 9907a6a6cbcSPaolo Abeni copied = bytes_read; 9916771bfd9SFlorian Westphal goto out_err; 992cec37a6eSPeter Krystad } 993cec37a6eSPeter Krystad 9947a6a6cbcSPaolo Abeni copied += bytes_read; 9957a6a6cbcSPaolo Abeni 9966771bfd9SFlorian Westphal if (skb_queue_empty(&sk->sk_receive_queue) && 9976771bfd9SFlorian Westphal __mptcp_move_skbs(msk)) 9986771bfd9SFlorian Westphal continue; 9997a6a6cbcSPaolo Abeni 10007a6a6cbcSPaolo Abeni /* only the master socket status is relevant here. The exit 10017a6a6cbcSPaolo Abeni * conditions mirror closely tcp_recvmsg() 10027a6a6cbcSPaolo Abeni */ 10037a6a6cbcSPaolo Abeni if (copied >= target) 10047a6a6cbcSPaolo Abeni break; 10057a6a6cbcSPaolo Abeni 10067a6a6cbcSPaolo Abeni if (copied) { 10077a6a6cbcSPaolo Abeni if (sk->sk_err || 10087a6a6cbcSPaolo Abeni sk->sk_state == TCP_CLOSE || 10097a6a6cbcSPaolo Abeni (sk->sk_shutdown & RCV_SHUTDOWN) || 10107a6a6cbcSPaolo Abeni !timeo || 10117a6a6cbcSPaolo Abeni signal_pending(current)) 10127a6a6cbcSPaolo Abeni break; 10137a6a6cbcSPaolo Abeni } else { 10147a6a6cbcSPaolo Abeni if (sk->sk_err) { 10157a6a6cbcSPaolo Abeni copied = sock_error(sk); 10167a6a6cbcSPaolo Abeni break; 10177a6a6cbcSPaolo Abeni } 10187a6a6cbcSPaolo Abeni 10195969856aSPaolo Abeni if (test_and_clear_bit(MPTCP_WORK_EOF, &msk->flags)) 10205969856aSPaolo Abeni mptcp_check_for_eof(msk); 10215969856aSPaolo Abeni 10227a6a6cbcSPaolo Abeni if (sk->sk_shutdown & RCV_SHUTDOWN) 10237a6a6cbcSPaolo Abeni break; 10247a6a6cbcSPaolo Abeni 10257a6a6cbcSPaolo Abeni if (sk->sk_state == TCP_CLOSE) { 10267a6a6cbcSPaolo Abeni copied = -ENOTCONN; 10277a6a6cbcSPaolo Abeni break; 10287a6a6cbcSPaolo Abeni } 10297a6a6cbcSPaolo Abeni 10307a6a6cbcSPaolo Abeni if (!timeo) { 10317a6a6cbcSPaolo Abeni copied = -EAGAIN; 10327a6a6cbcSPaolo Abeni break; 10337a6a6cbcSPaolo Abeni } 10347a6a6cbcSPaolo Abeni 10357a6a6cbcSPaolo Abeni if (signal_pending(current)) { 10367a6a6cbcSPaolo Abeni copied = sock_intr_errno(timeo); 10377a6a6cbcSPaolo Abeni break; 10387a6a6cbcSPaolo Abeni } 10397a6a6cbcSPaolo Abeni } 10407a6a6cbcSPaolo Abeni 10417a6a6cbcSPaolo Abeni pr_debug("block timeout %ld", timeo); 10427a6a6cbcSPaolo Abeni mptcp_wait_data(sk, &timeo); 10437a6a6cbcSPaolo Abeni } 10447a6a6cbcSPaolo Abeni 10456771bfd9SFlorian Westphal if (skb_queue_empty(&sk->sk_receive_queue)) { 10466771bfd9SFlorian Westphal /* entire backlog drained, clear DATA_READY. */ 10477a6a6cbcSPaolo Abeni clear_bit(MPTCP_DATA_READY, &msk->flags); 10487a6a6cbcSPaolo Abeni 10496771bfd9SFlorian Westphal /* .. race-breaker: ssk might have gotten new data 10506771bfd9SFlorian Westphal * after last __mptcp_move_skbs() returned false. 10517a6a6cbcSPaolo Abeni */ 10526771bfd9SFlorian Westphal if (unlikely(__mptcp_move_skbs(msk))) 10536771bfd9SFlorian Westphal set_bit(MPTCP_DATA_READY, &msk->flags); 10546771bfd9SFlorian Westphal } else if (unlikely(!test_bit(MPTCP_DATA_READY, &msk->flags))) { 10556771bfd9SFlorian Westphal /* data to read but mptcp_wait_data() cleared DATA_READY */ 10567a6a6cbcSPaolo Abeni set_bit(MPTCP_DATA_READY, &msk->flags); 10577a6a6cbcSPaolo Abeni } 10586771bfd9SFlorian Westphal out_err: 1059cec37a6eSPeter Krystad release_sock(sk); 1060cec37a6eSPeter Krystad return copied; 1061cec37a6eSPeter Krystad } 1062cec37a6eSPeter Krystad 1063b51f9b80SPaolo Abeni static void mptcp_retransmit_handler(struct sock *sk) 1064b51f9b80SPaolo Abeni { 1065b51f9b80SPaolo Abeni struct mptcp_sock *msk = mptcp_sk(sk); 1066b51f9b80SPaolo Abeni 10673b1d6210SPaolo Abeni if (atomic64_read(&msk->snd_una) == msk->write_seq) { 1068b51f9b80SPaolo Abeni mptcp_stop_timer(sk); 10693b1d6210SPaolo Abeni } else { 10703b1d6210SPaolo Abeni set_bit(MPTCP_WORK_RTX, &msk->flags); 10713b1d6210SPaolo Abeni if (schedule_work(&msk->work)) 10723b1d6210SPaolo Abeni sock_hold(sk); 10733b1d6210SPaolo Abeni } 1074b51f9b80SPaolo Abeni } 1075b51f9b80SPaolo Abeni 1076b51f9b80SPaolo Abeni static void mptcp_retransmit_timer(struct timer_list *t) 1077b51f9b80SPaolo Abeni { 1078b51f9b80SPaolo Abeni struct inet_connection_sock *icsk = from_timer(icsk, t, 1079b51f9b80SPaolo Abeni icsk_retransmit_timer); 1080b51f9b80SPaolo Abeni struct sock *sk = &icsk->icsk_inet.sk; 1081b51f9b80SPaolo Abeni 1082b51f9b80SPaolo Abeni bh_lock_sock(sk); 1083b51f9b80SPaolo Abeni if (!sock_owned_by_user(sk)) { 1084b51f9b80SPaolo Abeni mptcp_retransmit_handler(sk); 1085b51f9b80SPaolo Abeni } else { 1086b51f9b80SPaolo Abeni /* delegate our work to tcp_release_cb() */ 1087b51f9b80SPaolo Abeni if (!test_and_set_bit(TCP_WRITE_TIMER_DEFERRED, 1088b51f9b80SPaolo Abeni &sk->sk_tsq_flags)) 1089b51f9b80SPaolo Abeni sock_hold(sk); 1090b51f9b80SPaolo Abeni } 1091b51f9b80SPaolo Abeni bh_unlock_sock(sk); 1092b51f9b80SPaolo Abeni sock_put(sk); 1093b51f9b80SPaolo Abeni } 1094b51f9b80SPaolo Abeni 10953b1d6210SPaolo Abeni /* Find an idle subflow. Return NULL if there is unacked data at tcp 10963b1d6210SPaolo Abeni * level. 10973b1d6210SPaolo Abeni * 10983b1d6210SPaolo Abeni * A backup subflow is returned only if that is the only kind available. 10993b1d6210SPaolo Abeni */ 11003b1d6210SPaolo Abeni static struct sock *mptcp_subflow_get_retrans(const struct mptcp_sock *msk) 11013b1d6210SPaolo Abeni { 11023b1d6210SPaolo Abeni struct mptcp_subflow_context *subflow; 11033b1d6210SPaolo Abeni struct sock *backup = NULL; 11043b1d6210SPaolo Abeni 11053b1d6210SPaolo Abeni sock_owned_by_me((const struct sock *)msk); 11063b1d6210SPaolo Abeni 11073b1d6210SPaolo Abeni mptcp_for_each_subflow(msk, subflow) { 11083b1d6210SPaolo Abeni struct sock *ssk = mptcp_subflow_tcp_sock(subflow); 11093b1d6210SPaolo Abeni 11103b1d6210SPaolo Abeni /* still data outstanding at TCP level? Don't retransmit. */ 11113b1d6210SPaolo Abeni if (!tcp_write_queue_empty(ssk)) 11123b1d6210SPaolo Abeni return NULL; 11133b1d6210SPaolo Abeni 11143b1d6210SPaolo Abeni if (subflow->backup) { 11153b1d6210SPaolo Abeni if (!backup) 11163b1d6210SPaolo Abeni backup = ssk; 11173b1d6210SPaolo Abeni continue; 11183b1d6210SPaolo Abeni } 11193b1d6210SPaolo Abeni 11203b1d6210SPaolo Abeni return ssk; 11213b1d6210SPaolo Abeni } 11223b1d6210SPaolo Abeni 11233b1d6210SPaolo Abeni return backup; 11243b1d6210SPaolo Abeni } 11253b1d6210SPaolo Abeni 1126cec37a6eSPeter Krystad /* subflow sockets can be either outgoing (connect) or incoming 1127cec37a6eSPeter Krystad * (accept). 1128cec37a6eSPeter Krystad * 1129cec37a6eSPeter Krystad * Outgoing subflows use in-kernel sockets. 1130cec37a6eSPeter Krystad * Incoming subflows do not have their own 'struct socket' allocated, 1131cec37a6eSPeter Krystad * so we need to use tcp_close() after detaching them from the mptcp 1132cec37a6eSPeter Krystad * parent socket. 1133cec37a6eSPeter Krystad */ 1134cec37a6eSPeter Krystad static void __mptcp_close_ssk(struct sock *sk, struct sock *ssk, 1135cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow, 1136cec37a6eSPeter Krystad long timeout) 1137cec37a6eSPeter Krystad { 1138cec37a6eSPeter Krystad struct socket *sock = READ_ONCE(ssk->sk_socket); 1139cec37a6eSPeter Krystad 1140cec37a6eSPeter Krystad list_del(&subflow->node); 1141cec37a6eSPeter Krystad 1142cec37a6eSPeter Krystad if (sock && sock != sk->sk_socket) { 1143cec37a6eSPeter Krystad /* outgoing subflow */ 1144cec37a6eSPeter Krystad sock_release(sock); 1145cec37a6eSPeter Krystad } else { 1146cec37a6eSPeter Krystad /* incoming subflow */ 1147cec37a6eSPeter Krystad tcp_close(ssk, timeout); 1148cec37a6eSPeter Krystad } 1149f870fa0bSMat Martineau } 1150f870fa0bSMat Martineau 1151dc24f8b4SPaolo Abeni static unsigned int mptcp_sync_mss(struct sock *sk, u32 pmtu) 1152dc24f8b4SPaolo Abeni { 1153dc24f8b4SPaolo Abeni return 0; 1154dc24f8b4SPaolo Abeni } 1155dc24f8b4SPaolo Abeni 115680992017SPaolo Abeni static void mptcp_worker(struct work_struct *work) 115780992017SPaolo Abeni { 115880992017SPaolo Abeni struct mptcp_sock *msk = container_of(work, struct mptcp_sock, work); 11593b1d6210SPaolo Abeni struct sock *ssk, *sk = &msk->sk.icsk_inet.sk; 1160149f7c71SFlorian Westphal int orig_len, orig_offset, mss_now = 0, size_goal = 0; 11613b1d6210SPaolo Abeni struct mptcp_data_frag *dfrag; 11623b1d6210SPaolo Abeni u64 orig_write_seq; 11633b1d6210SPaolo Abeni size_t copied = 0; 11643b1d6210SPaolo Abeni struct msghdr msg; 11653b1d6210SPaolo Abeni long timeo = 0; 116680992017SPaolo Abeni 116780992017SPaolo Abeni lock_sock(sk); 11683b1d6210SPaolo Abeni mptcp_clean_una(sk); 1169ec3edaa7SPeter Krystad __mptcp_flush_join_list(msk); 11706771bfd9SFlorian Westphal __mptcp_move_skbs(msk); 11713b1d6210SPaolo Abeni 117259832e24SFlorian Westphal if (test_and_clear_bit(MPTCP_WORK_EOF, &msk->flags)) 117359832e24SFlorian Westphal mptcp_check_for_eof(msk); 117459832e24SFlorian Westphal 11753b1d6210SPaolo Abeni if (!test_and_clear_bit(MPTCP_WORK_RTX, &msk->flags)) 11763b1d6210SPaolo Abeni goto unlock; 11773b1d6210SPaolo Abeni 11783b1d6210SPaolo Abeni dfrag = mptcp_rtx_head(sk); 11793b1d6210SPaolo Abeni if (!dfrag) 11803b1d6210SPaolo Abeni goto unlock; 11813b1d6210SPaolo Abeni 1182149f7c71SFlorian Westphal if (!mptcp_ext_cache_refill(msk)) 1183149f7c71SFlorian Westphal goto reset_unlock; 1184149f7c71SFlorian Westphal 11853b1d6210SPaolo Abeni ssk = mptcp_subflow_get_retrans(msk); 11863b1d6210SPaolo Abeni if (!ssk) 11873b1d6210SPaolo Abeni goto reset_unlock; 11883b1d6210SPaolo Abeni 11893b1d6210SPaolo Abeni lock_sock(ssk); 11903b1d6210SPaolo Abeni 11913b1d6210SPaolo Abeni msg.msg_flags = MSG_DONTWAIT; 11923b1d6210SPaolo Abeni orig_len = dfrag->data_len; 11933b1d6210SPaolo Abeni orig_offset = dfrag->offset; 11943b1d6210SPaolo Abeni orig_write_seq = dfrag->data_seq; 11953b1d6210SPaolo Abeni while (dfrag->data_len > 0) { 1196149f7c71SFlorian Westphal int ret = mptcp_sendmsg_frag(sk, ssk, &msg, dfrag, &timeo, 1197149f7c71SFlorian Westphal &mss_now, &size_goal); 11983b1d6210SPaolo Abeni if (ret < 0) 11993b1d6210SPaolo Abeni break; 12003b1d6210SPaolo Abeni 1201fc518953SFlorian Westphal MPTCP_INC_STATS(sock_net(sk), MPTCP_MIB_RETRANSSEGS); 12023b1d6210SPaolo Abeni copied += ret; 12033b1d6210SPaolo Abeni dfrag->data_len -= ret; 12043b1d6210SPaolo Abeni dfrag->offset += ret; 1205149f7c71SFlorian Westphal 1206149f7c71SFlorian Westphal if (!mptcp_ext_cache_refill(msk)) 1207149f7c71SFlorian Westphal break; 12083b1d6210SPaolo Abeni } 12093b1d6210SPaolo Abeni if (copied) 12103b1d6210SPaolo Abeni tcp_push(ssk, msg.msg_flags, mss_now, tcp_sk(ssk)->nonagle, 12113b1d6210SPaolo Abeni size_goal); 12123b1d6210SPaolo Abeni 12133b1d6210SPaolo Abeni dfrag->data_seq = orig_write_seq; 12143b1d6210SPaolo Abeni dfrag->offset = orig_offset; 12153b1d6210SPaolo Abeni dfrag->data_len = orig_len; 12163b1d6210SPaolo Abeni 12173b1d6210SPaolo Abeni mptcp_set_timeout(sk, ssk); 12183b1d6210SPaolo Abeni release_sock(ssk); 12193b1d6210SPaolo Abeni 12203b1d6210SPaolo Abeni reset_unlock: 12213b1d6210SPaolo Abeni if (!mptcp_timer_pending(sk)) 12223b1d6210SPaolo Abeni mptcp_reset_timer(sk); 12233b1d6210SPaolo Abeni 12243b1d6210SPaolo Abeni unlock: 122580992017SPaolo Abeni release_sock(sk); 122680992017SPaolo Abeni sock_put(sk); 122780992017SPaolo Abeni } 122880992017SPaolo Abeni 1229784325e9SMatthieu Baerts static int __mptcp_init_sock(struct sock *sk) 1230f870fa0bSMat Martineau { 1231cec37a6eSPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 1232cec37a6eSPeter Krystad 1233ec3edaa7SPeter Krystad spin_lock_init(&msk->join_list_lock); 1234ec3edaa7SPeter Krystad 1235cec37a6eSPeter Krystad INIT_LIST_HEAD(&msk->conn_list); 1236ec3edaa7SPeter Krystad INIT_LIST_HEAD(&msk->join_list); 123718b683bfSPaolo Abeni INIT_LIST_HEAD(&msk->rtx_queue); 12381891c4a0SFlorian Westphal __set_bit(MPTCP_SEND_SPACE, &msk->flags); 123980992017SPaolo Abeni INIT_WORK(&msk->work, mptcp_worker); 1240cec37a6eSPeter Krystad 12418ab183deSPaolo Abeni msk->first = NULL; 1242dc24f8b4SPaolo Abeni inet_csk(sk)->icsk_sync_mss = mptcp_sync_mss; 12438ab183deSPaolo Abeni 12441b1c7a0eSPeter Krystad mptcp_pm_data_init(msk); 12451b1c7a0eSPeter Krystad 1246b51f9b80SPaolo Abeni /* re-use the csk retrans timer for MPTCP-level retrans */ 1247b51f9b80SPaolo Abeni timer_setup(&msk->sk.icsk_retransmit_timer, mptcp_retransmit_timer, 0); 1248b51f9b80SPaolo Abeni 1249f870fa0bSMat Martineau return 0; 1250f870fa0bSMat Martineau } 1251f870fa0bSMat Martineau 1252784325e9SMatthieu Baerts static int mptcp_init_sock(struct sock *sk) 1253784325e9SMatthieu Baerts { 1254fc518953SFlorian Westphal struct net *net = sock_net(sk); 1255fc518953SFlorian Westphal int ret; 125618b683bfSPaolo Abeni 1257fc518953SFlorian Westphal if (!mptcp_is_enabled(net)) 1258fc518953SFlorian Westphal return -ENOPROTOOPT; 1259fc518953SFlorian Westphal 1260fc518953SFlorian Westphal if (unlikely(!net->mib.mptcp_statistics) && !mptcp_mib_alloc(net)) 1261fc518953SFlorian Westphal return -ENOMEM; 1262fc518953SFlorian Westphal 1263fc518953SFlorian Westphal ret = __mptcp_init_sock(sk); 126418b683bfSPaolo Abeni if (ret) 126518b683bfSPaolo Abeni return ret; 126618b683bfSPaolo Abeni 1267d027236cSPaolo Abeni sk_sockets_allocated_inc(sk); 12683f8e0aaeSPaolo Abeni sk->sk_sndbuf = sock_net(sk)->ipv4.sysctl_tcp_wmem[2]; 1269d027236cSPaolo Abeni 127018b683bfSPaolo Abeni return 0; 127118b683bfSPaolo Abeni } 127218b683bfSPaolo Abeni 127318b683bfSPaolo Abeni static void __mptcp_clear_xmit(struct sock *sk) 127418b683bfSPaolo Abeni { 127518b683bfSPaolo Abeni struct mptcp_sock *msk = mptcp_sk(sk); 127618b683bfSPaolo Abeni struct mptcp_data_frag *dtmp, *dfrag; 127718b683bfSPaolo Abeni 1278b51f9b80SPaolo Abeni sk_stop_timer(sk, &msk->sk.icsk_retransmit_timer); 1279b51f9b80SPaolo Abeni 128018b683bfSPaolo Abeni list_for_each_entry_safe(dfrag, dtmp, &msk->rtx_queue, list) 1281d027236cSPaolo Abeni dfrag_clear(sk, dfrag); 1282784325e9SMatthieu Baerts } 1283784325e9SMatthieu Baerts 128480992017SPaolo Abeni static void mptcp_cancel_work(struct sock *sk) 128580992017SPaolo Abeni { 128680992017SPaolo Abeni struct mptcp_sock *msk = mptcp_sk(sk); 128780992017SPaolo Abeni 128880992017SPaolo Abeni if (cancel_work_sync(&msk->work)) 128980992017SPaolo Abeni sock_put(sk); 129080992017SPaolo Abeni } 129180992017SPaolo Abeni 129276c42a29SMat Martineau static void mptcp_subflow_shutdown(struct sock *ssk, int how, 129376c42a29SMat Martineau bool data_fin_tx_enable, u64 data_fin_tx_seq) 129421498490SPeter Krystad { 129521498490SPeter Krystad lock_sock(ssk); 129621498490SPeter Krystad 129721498490SPeter Krystad switch (ssk->sk_state) { 129821498490SPeter Krystad case TCP_LISTEN: 129921498490SPeter Krystad if (!(how & RCV_SHUTDOWN)) 130021498490SPeter Krystad break; 130121498490SPeter Krystad /* fall through */ 130221498490SPeter Krystad case TCP_SYN_SENT: 130321498490SPeter Krystad tcp_disconnect(ssk, O_NONBLOCK); 130421498490SPeter Krystad break; 130521498490SPeter Krystad default: 130676c42a29SMat Martineau if (data_fin_tx_enable) { 130776c42a29SMat Martineau struct mptcp_subflow_context *subflow; 130876c42a29SMat Martineau 130976c42a29SMat Martineau subflow = mptcp_subflow_ctx(ssk); 131076c42a29SMat Martineau subflow->data_fin_tx_seq = data_fin_tx_seq; 131176c42a29SMat Martineau subflow->data_fin_tx_enable = 1; 131276c42a29SMat Martineau } 131376c42a29SMat Martineau 131421498490SPeter Krystad ssk->sk_shutdown |= how; 131521498490SPeter Krystad tcp_shutdown(ssk, how); 131621498490SPeter Krystad break; 131721498490SPeter Krystad } 131821498490SPeter Krystad 131921498490SPeter Krystad release_sock(ssk); 132021498490SPeter Krystad } 132121498490SPeter Krystad 13228ab183deSPaolo Abeni /* Called with msk lock held, releases such lock before returning */ 13232c22c06cSFlorian Westphal static void mptcp_close(struct sock *sk, long timeout) 1324f870fa0bSMat Martineau { 1325cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow, *tmp; 1326f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 1327b2c5b614SFlorian Westphal LIST_HEAD(conn_list); 132876c42a29SMat Martineau u64 data_fin_tx_seq; 1329f870fa0bSMat Martineau 13302c22c06cSFlorian Westphal lock_sock(sk); 13312c22c06cSFlorian Westphal 1332f870fa0bSMat Martineau inet_sk_state_store(sk, TCP_CLOSE); 1333f870fa0bSMat Martineau 133410f6d46cSPaolo Abeni /* be sure to always acquire the join list lock, to sync vs 133510f6d46cSPaolo Abeni * mptcp_finish_join(). 133610f6d46cSPaolo Abeni */ 133710f6d46cSPaolo Abeni spin_lock_bh(&msk->join_list_lock); 133810f6d46cSPaolo Abeni list_splice_tail_init(&msk->join_list, &msk->conn_list); 133910f6d46cSPaolo Abeni spin_unlock_bh(&msk->join_list_lock); 1340b2c5b614SFlorian Westphal list_splice_init(&msk->conn_list, &conn_list); 1341b2c5b614SFlorian Westphal 134276c42a29SMat Martineau data_fin_tx_seq = msk->write_seq; 134376c42a29SMat Martineau 134418b683bfSPaolo Abeni __mptcp_clear_xmit(sk); 134518b683bfSPaolo Abeni 1346b2c5b614SFlorian Westphal release_sock(sk); 1347b2c5b614SFlorian Westphal 1348b2c5b614SFlorian Westphal list_for_each_entry_safe(subflow, tmp, &conn_list, node) { 1349cec37a6eSPeter Krystad struct sock *ssk = mptcp_subflow_tcp_sock(subflow); 1350cec37a6eSPeter Krystad 135176c42a29SMat Martineau subflow->data_fin_tx_seq = data_fin_tx_seq; 135276c42a29SMat Martineau subflow->data_fin_tx_enable = 1; 1353cec37a6eSPeter Krystad __mptcp_close_ssk(sk, ssk, subflow, timeout); 1354f870fa0bSMat Martineau } 1355f870fa0bSMat Martineau 135680992017SPaolo Abeni mptcp_cancel_work(sk); 1357926bdeabSPeter Krystad mptcp_pm_close(msk); 135880992017SPaolo Abeni 13596771bfd9SFlorian Westphal __skb_queue_purge(&sk->sk_receive_queue); 13606771bfd9SFlorian Westphal 1361cec37a6eSPeter Krystad sk_common_release(sk); 1362f870fa0bSMat Martineau } 1363f870fa0bSMat Martineau 1364cf7da0d6SPeter Krystad static void mptcp_copy_inaddrs(struct sock *msk, const struct sock *ssk) 1365cf7da0d6SPeter Krystad { 1366cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 1367cf7da0d6SPeter Krystad const struct ipv6_pinfo *ssk6 = inet6_sk(ssk); 1368cf7da0d6SPeter Krystad struct ipv6_pinfo *msk6 = inet6_sk(msk); 1369cf7da0d6SPeter Krystad 1370cf7da0d6SPeter Krystad msk->sk_v6_daddr = ssk->sk_v6_daddr; 1371cf7da0d6SPeter Krystad msk->sk_v6_rcv_saddr = ssk->sk_v6_rcv_saddr; 1372cf7da0d6SPeter Krystad 1373cf7da0d6SPeter Krystad if (msk6 && ssk6) { 1374cf7da0d6SPeter Krystad msk6->saddr = ssk6->saddr; 1375cf7da0d6SPeter Krystad msk6->flow_label = ssk6->flow_label; 1376cf7da0d6SPeter Krystad } 1377cf7da0d6SPeter Krystad #endif 1378cf7da0d6SPeter Krystad 1379cf7da0d6SPeter Krystad inet_sk(msk)->inet_num = inet_sk(ssk)->inet_num; 1380cf7da0d6SPeter Krystad inet_sk(msk)->inet_dport = inet_sk(ssk)->inet_dport; 1381cf7da0d6SPeter Krystad inet_sk(msk)->inet_sport = inet_sk(ssk)->inet_sport; 1382cf7da0d6SPeter Krystad inet_sk(msk)->inet_daddr = inet_sk(ssk)->inet_daddr; 1383cf7da0d6SPeter Krystad inet_sk(msk)->inet_saddr = inet_sk(ssk)->inet_saddr; 1384cf7da0d6SPeter Krystad inet_sk(msk)->inet_rcv_saddr = inet_sk(ssk)->inet_rcv_saddr; 1385cf7da0d6SPeter Krystad } 1386cf7da0d6SPeter Krystad 138718b683bfSPaolo Abeni static int mptcp_disconnect(struct sock *sk, int flags) 138818b683bfSPaolo Abeni { 138942c556feSFlorian Westphal /* Should never be called. 139042c556feSFlorian Westphal * inet_stream_connect() calls ->disconnect, but that 139142c556feSFlorian Westphal * refers to the subflow socket, not the mptcp one. 139242c556feSFlorian Westphal */ 139342c556feSFlorian Westphal WARN_ON_ONCE(1); 139442c556feSFlorian Westphal return 0; 139518b683bfSPaolo Abeni } 139618b683bfSPaolo Abeni 1397b0519de8SFlorian Westphal #if IS_ENABLED(CONFIG_MPTCP_IPV6) 1398b0519de8SFlorian Westphal static struct ipv6_pinfo *mptcp_inet6_sk(const struct sock *sk) 1399b0519de8SFlorian Westphal { 1400b0519de8SFlorian Westphal unsigned int offset = sizeof(struct mptcp6_sock) - sizeof(struct ipv6_pinfo); 1401b0519de8SFlorian Westphal 1402b0519de8SFlorian Westphal return (struct ipv6_pinfo *)(((u8 *)sk) + offset); 1403b0519de8SFlorian Westphal } 1404b0519de8SFlorian Westphal #endif 1405b0519de8SFlorian Westphal 1406fca5c82cSPaolo Abeni struct sock *mptcp_sk_clone(const struct sock *sk, 1407cfde141eSPaolo Abeni const struct mptcp_options_received *mp_opt, 1408fca5c82cSPaolo Abeni struct request_sock *req) 1409b0519de8SFlorian Westphal { 141058b09919SPaolo Abeni struct mptcp_subflow_request_sock *subflow_req = mptcp_subflow_rsk(req); 1411b0519de8SFlorian Westphal struct sock *nsk = sk_clone_lock(sk, GFP_ATOMIC); 141258b09919SPaolo Abeni struct mptcp_sock *msk; 141358b09919SPaolo Abeni u64 ack_seq; 1414b0519de8SFlorian Westphal 1415b0519de8SFlorian Westphal if (!nsk) 1416b0519de8SFlorian Westphal return NULL; 1417b0519de8SFlorian Westphal 1418b0519de8SFlorian Westphal #if IS_ENABLED(CONFIG_MPTCP_IPV6) 1419b0519de8SFlorian Westphal if (nsk->sk_family == AF_INET6) 1420b0519de8SFlorian Westphal inet_sk(nsk)->pinet6 = mptcp_inet6_sk(nsk); 1421b0519de8SFlorian Westphal #endif 1422b0519de8SFlorian Westphal 142358b09919SPaolo Abeni __mptcp_init_sock(nsk); 142458b09919SPaolo Abeni 142558b09919SPaolo Abeni msk = mptcp_sk(nsk); 142658b09919SPaolo Abeni msk->local_key = subflow_req->local_key; 142758b09919SPaolo Abeni msk->token = subflow_req->token; 142858b09919SPaolo Abeni msk->subflow = NULL; 142958b09919SPaolo Abeni 143058b09919SPaolo Abeni msk->write_seq = subflow_req->idsn + 1; 1431cc9d2566SPaolo Abeni atomic64_set(&msk->snd_una, msk->write_seq); 1432cfde141eSPaolo Abeni if (mp_opt->mp_capable) { 143358b09919SPaolo Abeni msk->can_ack = true; 1434cfde141eSPaolo Abeni msk->remote_key = mp_opt->sndr_key; 143558b09919SPaolo Abeni mptcp_crypto_key_sha(msk->remote_key, NULL, &ack_seq); 143658b09919SPaolo Abeni ack_seq++; 143758b09919SPaolo Abeni msk->ack_seq = ack_seq; 143858b09919SPaolo Abeni } 14397f20d5fcSPaolo Abeni 14405e20087dSFlorian Westphal sock_reset_flag(nsk, SOCK_RCU_FREE); 14417f20d5fcSPaolo Abeni /* will be fully established after successful MPC subflow creation */ 14427f20d5fcSPaolo Abeni inet_sk_state_store(nsk, TCP_SYN_RECV); 144358b09919SPaolo Abeni bh_unlock_sock(nsk); 144458b09919SPaolo Abeni 144558b09919SPaolo Abeni /* keep a single reference */ 144658b09919SPaolo Abeni __sock_put(nsk); 1447b0519de8SFlorian Westphal return nsk; 1448b0519de8SFlorian Westphal } 1449b0519de8SFlorian Westphal 1450cf7da0d6SPeter Krystad static struct sock *mptcp_accept(struct sock *sk, int flags, int *err, 1451cf7da0d6SPeter Krystad bool kern) 1452cf7da0d6SPeter Krystad { 1453cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 1454cf7da0d6SPeter Krystad struct socket *listener; 1455cf7da0d6SPeter Krystad struct sock *newsk; 1456cf7da0d6SPeter Krystad 1457cf7da0d6SPeter Krystad listener = __mptcp_nmpc_socket(msk); 1458cf7da0d6SPeter Krystad if (WARN_ON_ONCE(!listener)) { 1459cf7da0d6SPeter Krystad *err = -EINVAL; 1460cf7da0d6SPeter Krystad return NULL; 1461cf7da0d6SPeter Krystad } 1462cf7da0d6SPeter Krystad 1463cf7da0d6SPeter Krystad pr_debug("msk=%p, listener=%p", msk, mptcp_subflow_ctx(listener->sk)); 1464cf7da0d6SPeter Krystad newsk = inet_csk_accept(listener->sk, flags, err, kern); 1465cf7da0d6SPeter Krystad if (!newsk) 1466cf7da0d6SPeter Krystad return NULL; 1467cf7da0d6SPeter Krystad 1468cf7da0d6SPeter Krystad pr_debug("msk=%p, subflow is mptcp=%d", msk, sk_is_mptcp(newsk)); 1469cf7da0d6SPeter Krystad 1470cf7da0d6SPeter Krystad if (sk_is_mptcp(newsk)) { 1471cf7da0d6SPeter Krystad struct mptcp_subflow_context *subflow; 1472cf7da0d6SPeter Krystad struct sock *new_mptcp_sock; 1473cf7da0d6SPeter Krystad struct sock *ssk = newsk; 1474cf7da0d6SPeter Krystad 1475cf7da0d6SPeter Krystad subflow = mptcp_subflow_ctx(newsk); 147658b09919SPaolo Abeni new_mptcp_sock = subflow->conn; 147758b09919SPaolo Abeni 147858b09919SPaolo Abeni /* is_mptcp should be false if subflow->conn is missing, see 147958b09919SPaolo Abeni * subflow_syn_recv_sock() 148058b09919SPaolo Abeni */ 148158b09919SPaolo Abeni if (WARN_ON_ONCE(!new_mptcp_sock)) { 148258b09919SPaolo Abeni tcp_sk(newsk)->is_mptcp = 0; 148358b09919SPaolo Abeni return newsk; 148458b09919SPaolo Abeni } 148558b09919SPaolo Abeni 148658b09919SPaolo Abeni /* acquire the 2nd reference for the owning socket */ 148758b09919SPaolo Abeni sock_hold(new_mptcp_sock); 1488cf7da0d6SPeter Krystad 1489cf7da0d6SPeter Krystad local_bh_disable(); 149058b09919SPaolo Abeni bh_lock_sock(new_mptcp_sock); 1491cf7da0d6SPeter Krystad msk = mptcp_sk(new_mptcp_sock); 14928ab183deSPaolo Abeni msk->first = newsk; 1493cf7da0d6SPeter Krystad 1494cf7da0d6SPeter Krystad newsk = new_mptcp_sock; 1495cf7da0d6SPeter Krystad mptcp_copy_inaddrs(newsk, ssk); 1496cf7da0d6SPeter Krystad list_add(&subflow->node, &msk->conn_list); 1497df1036daSFlorian Westphal inet_sk_state_store(newsk, TCP_ESTABLISHED); 1498cf7da0d6SPeter Krystad 1499cf7da0d6SPeter Krystad bh_unlock_sock(new_mptcp_sock); 1500fc518953SFlorian Westphal 1501fc518953SFlorian Westphal __MPTCP_INC_STATS(sock_net(sk), MPTCP_MIB_MPCAPABLEPASSIVEACK); 1502cf7da0d6SPeter Krystad local_bh_enable(); 1503fc518953SFlorian Westphal } else { 1504fc518953SFlorian Westphal MPTCP_INC_STATS(sock_net(sk), 1505fc518953SFlorian Westphal MPTCP_MIB_MPCAPABLEPASSIVEFALLBACK); 1506cf7da0d6SPeter Krystad } 1507cf7da0d6SPeter Krystad 1508cf7da0d6SPeter Krystad return newsk; 1509cf7da0d6SPeter Krystad } 1510cf7da0d6SPeter Krystad 151179c0949eSPeter Krystad static void mptcp_destroy(struct sock *sk) 151279c0949eSPeter Krystad { 1513c9fd9c5fSFlorian Westphal struct mptcp_sock *msk = mptcp_sk(sk); 1514c9fd9c5fSFlorian Westphal 15152c5ebd00SPaolo Abeni mptcp_token_destroy(msk); 1516c9fd9c5fSFlorian Westphal if (msk->cached_ext) 1517c9fd9c5fSFlorian Westphal __skb_ext_put(msk->cached_ext); 1518d027236cSPaolo Abeni 1519d027236cSPaolo Abeni sk_sockets_allocated_dec(sk); 152079c0949eSPeter Krystad } 152179c0949eSPeter Krystad 1522717e79c8SPeter Krystad static int mptcp_setsockopt(struct sock *sk, int level, int optname, 152350e741bbSFlorian Westphal char __user *optval, unsigned int optlen) 1524717e79c8SPeter Krystad { 1525717e79c8SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 1526717e79c8SPeter Krystad struct socket *ssock; 1527717e79c8SPeter Krystad 1528717e79c8SPeter Krystad pr_debug("msk=%p", msk); 1529717e79c8SPeter Krystad 1530717e79c8SPeter Krystad /* @@ the meaning of setsockopt() when the socket is connected and 1531b6e4a1aeSMat Martineau * there are multiple subflows is not yet defined. It is up to the 1532b6e4a1aeSMat Martineau * MPTCP-level socket to configure the subflows until the subflow 1533b6e4a1aeSMat Martineau * is in TCP fallback, when TCP socket options are passed through 1534b6e4a1aeSMat Martineau * to the one remaining subflow. 1535717e79c8SPeter Krystad */ 1536717e79c8SPeter Krystad lock_sock(sk); 1537b6e4a1aeSMat Martineau ssock = __mptcp_tcp_fallback(msk); 1538e154659bSFlorian Westphal release_sock(sk); 1539b6e4a1aeSMat Martineau if (ssock) 1540b6e4a1aeSMat Martineau return tcp_setsockopt(ssock->sk, level, optname, optval, 1541b6e4a1aeSMat Martineau optlen); 154250e741bbSFlorian Westphal 1543b6e4a1aeSMat Martineau return -EOPNOTSUPP; 1544717e79c8SPeter Krystad } 1545717e79c8SPeter Krystad 1546717e79c8SPeter Krystad static int mptcp_getsockopt(struct sock *sk, int level, int optname, 154750e741bbSFlorian Westphal char __user *optval, int __user *option) 1548717e79c8SPeter Krystad { 1549717e79c8SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 1550717e79c8SPeter Krystad struct socket *ssock; 1551717e79c8SPeter Krystad 1552717e79c8SPeter Krystad pr_debug("msk=%p", msk); 1553717e79c8SPeter Krystad 1554b6e4a1aeSMat Martineau /* @@ the meaning of setsockopt() when the socket is connected and 1555b6e4a1aeSMat Martineau * there are multiple subflows is not yet defined. It is up to the 1556b6e4a1aeSMat Martineau * MPTCP-level socket to configure the subflows until the subflow 1557b6e4a1aeSMat Martineau * is in TCP fallback, when socket options are passed through 1558b6e4a1aeSMat Martineau * to the one remaining subflow. 1559717e79c8SPeter Krystad */ 1560717e79c8SPeter Krystad lock_sock(sk); 1561b6e4a1aeSMat Martineau ssock = __mptcp_tcp_fallback(msk); 1562e154659bSFlorian Westphal release_sock(sk); 1563b6e4a1aeSMat Martineau if (ssock) 1564b6e4a1aeSMat Martineau return tcp_getsockopt(ssock->sk, level, optname, optval, 1565b6e4a1aeSMat Martineau option); 156650e741bbSFlorian Westphal 1567b6e4a1aeSMat Martineau return -EOPNOTSUPP; 1568717e79c8SPeter Krystad } 1569717e79c8SPeter Krystad 1570b51f9b80SPaolo Abeni #define MPTCP_DEFERRED_ALL (TCPF_DELACK_TIMER_DEFERRED | \ 1571b51f9b80SPaolo Abeni TCPF_WRITE_TIMER_DEFERRED) 157214c441b5SPaolo Abeni 157314c441b5SPaolo Abeni /* this is very alike tcp_release_cb() but we must handle differently a 157414c441b5SPaolo Abeni * different set of events 157514c441b5SPaolo Abeni */ 157614c441b5SPaolo Abeni static void mptcp_release_cb(struct sock *sk) 157714c441b5SPaolo Abeni { 157814c441b5SPaolo Abeni unsigned long flags, nflags; 157914c441b5SPaolo Abeni 158014c441b5SPaolo Abeni do { 158114c441b5SPaolo Abeni flags = sk->sk_tsq_flags; 158214c441b5SPaolo Abeni if (!(flags & MPTCP_DEFERRED_ALL)) 158314c441b5SPaolo Abeni return; 158414c441b5SPaolo Abeni nflags = flags & ~MPTCP_DEFERRED_ALL; 158514c441b5SPaolo Abeni } while (cmpxchg(&sk->sk_tsq_flags, flags, nflags) != flags); 158614c441b5SPaolo Abeni 1587b51f9b80SPaolo Abeni sock_release_ownership(sk); 1588b51f9b80SPaolo Abeni 158914c441b5SPaolo Abeni if (flags & TCPF_DELACK_TIMER_DEFERRED) { 159014c441b5SPaolo Abeni struct mptcp_sock *msk = mptcp_sk(sk); 159114c441b5SPaolo Abeni struct sock *ssk; 159214c441b5SPaolo Abeni 159314c441b5SPaolo Abeni ssk = mptcp_subflow_recv_lookup(msk); 159414c441b5SPaolo Abeni if (!ssk || !schedule_work(&msk->work)) 159514c441b5SPaolo Abeni __sock_put(sk); 159614c441b5SPaolo Abeni } 1597b51f9b80SPaolo Abeni 1598b51f9b80SPaolo Abeni if (flags & TCPF_WRITE_TIMER_DEFERRED) { 1599b51f9b80SPaolo Abeni mptcp_retransmit_handler(sk); 1600b51f9b80SPaolo Abeni __sock_put(sk); 1601b51f9b80SPaolo Abeni } 160214c441b5SPaolo Abeni } 160314c441b5SPaolo Abeni 16042c5ebd00SPaolo Abeni static int mptcp_hash(struct sock *sk) 16052c5ebd00SPaolo Abeni { 16062c5ebd00SPaolo Abeni /* should never be called, 16072c5ebd00SPaolo Abeni * we hash the TCP subflows not the master socket 16082c5ebd00SPaolo Abeni */ 16092c5ebd00SPaolo Abeni WARN_ON_ONCE(1); 16102c5ebd00SPaolo Abeni return 0; 16112c5ebd00SPaolo Abeni } 16122c5ebd00SPaolo Abeni 16132c5ebd00SPaolo Abeni static void mptcp_unhash(struct sock *sk) 16142c5ebd00SPaolo Abeni { 16152c5ebd00SPaolo Abeni /* called from sk_common_release(), but nothing to do here */ 16162c5ebd00SPaolo Abeni } 16172c5ebd00SPaolo Abeni 1618cec37a6eSPeter Krystad static int mptcp_get_port(struct sock *sk, unsigned short snum) 1619f870fa0bSMat Martineau { 1620f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 1621cec37a6eSPeter Krystad struct socket *ssock; 1622f870fa0bSMat Martineau 1623cec37a6eSPeter Krystad ssock = __mptcp_nmpc_socket(msk); 1624cec37a6eSPeter Krystad pr_debug("msk=%p, subflow=%p", msk, ssock); 1625cec37a6eSPeter Krystad if (WARN_ON_ONCE(!ssock)) 1626cec37a6eSPeter Krystad return -EINVAL; 1627f870fa0bSMat Martineau 1628cec37a6eSPeter Krystad return inet_csk_get_port(ssock->sk, snum); 1629cec37a6eSPeter Krystad } 1630f870fa0bSMat Martineau 1631cec37a6eSPeter Krystad void mptcp_finish_connect(struct sock *ssk) 1632cec37a6eSPeter Krystad { 1633cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow; 1634cec37a6eSPeter Krystad struct mptcp_sock *msk; 1635cec37a6eSPeter Krystad struct sock *sk; 16366d0060f6SMat Martineau u64 ack_seq; 1637f870fa0bSMat Martineau 1638cec37a6eSPeter Krystad subflow = mptcp_subflow_ctx(ssk); 1639cec37a6eSPeter Krystad sk = subflow->conn; 1640cec37a6eSPeter Krystad msk = mptcp_sk(sk); 1641cec37a6eSPeter Krystad 1642648ef4b8SMat Martineau pr_debug("msk=%p, token=%u", sk, subflow->token); 1643648ef4b8SMat Martineau 16446d0060f6SMat Martineau mptcp_crypto_key_sha(subflow->remote_key, NULL, &ack_seq); 16456d0060f6SMat Martineau ack_seq++; 1646648ef4b8SMat Martineau subflow->map_seq = ack_seq; 1647648ef4b8SMat Martineau subflow->map_subflow_seq = 1; 16486d0060f6SMat Martineau subflow->rel_write_seq = 1; 16496d0060f6SMat Martineau 1650cec37a6eSPeter Krystad /* the socket is not connected yet, no msk/subflow ops can access/race 1651cec37a6eSPeter Krystad * accessing the field below 1652cec37a6eSPeter Krystad */ 1653cec37a6eSPeter Krystad WRITE_ONCE(msk->remote_key, subflow->remote_key); 1654cec37a6eSPeter Krystad WRITE_ONCE(msk->local_key, subflow->local_key); 16556d0060f6SMat Martineau WRITE_ONCE(msk->write_seq, subflow->idsn + 1); 16566d0060f6SMat Martineau WRITE_ONCE(msk->ack_seq, ack_seq); 1657d22f4988SChristoph Paasch WRITE_ONCE(msk->can_ack, 1); 1658cc9d2566SPaolo Abeni atomic64_set(&msk->snd_una, msk->write_seq); 16591b1c7a0eSPeter Krystad 16601b1c7a0eSPeter Krystad mptcp_pm_new_connection(msk, 0); 1661f870fa0bSMat Martineau } 1662f870fa0bSMat Martineau 1663cf7da0d6SPeter Krystad static void mptcp_sock_graft(struct sock *sk, struct socket *parent) 1664cf7da0d6SPeter Krystad { 1665cf7da0d6SPeter Krystad write_lock_bh(&sk->sk_callback_lock); 1666cf7da0d6SPeter Krystad rcu_assign_pointer(sk->sk_wq, &parent->wq); 1667cf7da0d6SPeter Krystad sk_set_socket(sk, parent); 1668cf7da0d6SPeter Krystad sk->sk_uid = SOCK_INODE(parent)->i_uid; 1669cf7da0d6SPeter Krystad write_unlock_bh(&sk->sk_callback_lock); 1670cf7da0d6SPeter Krystad } 1671cf7da0d6SPeter Krystad 1672f296234cSPeter Krystad bool mptcp_finish_join(struct sock *sk) 1673f296234cSPeter Krystad { 1674f296234cSPeter Krystad struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk); 1675f296234cSPeter Krystad struct mptcp_sock *msk = mptcp_sk(subflow->conn); 1676f296234cSPeter Krystad struct sock *parent = (void *)msk; 1677f296234cSPeter Krystad struct socket *parent_sock; 1678ec3edaa7SPeter Krystad bool ret; 1679f296234cSPeter Krystad 1680f296234cSPeter Krystad pr_debug("msk=%p, subflow=%p", msk, subflow); 1681f296234cSPeter Krystad 1682f296234cSPeter Krystad /* mptcp socket already closing? */ 1683f296234cSPeter Krystad if (inet_sk_state_load(parent) != TCP_ESTABLISHED) 1684f296234cSPeter Krystad return false; 1685f296234cSPeter Krystad 1686f296234cSPeter Krystad if (!msk->pm.server_side) 1687f296234cSPeter Krystad return true; 1688f296234cSPeter Krystad 168910f6d46cSPaolo Abeni if (!mptcp_pm_allow_new_subflow(msk)) 169010f6d46cSPaolo Abeni return false; 169110f6d46cSPaolo Abeni 169210f6d46cSPaolo Abeni /* active connections are already on conn_list, and we can't acquire 169310f6d46cSPaolo Abeni * msk lock here. 169410f6d46cSPaolo Abeni * use the join list lock as synchronization point and double-check 169510f6d46cSPaolo Abeni * msk status to avoid racing with mptcp_close() 169610f6d46cSPaolo Abeni */ 169710f6d46cSPaolo Abeni spin_lock_bh(&msk->join_list_lock); 169810f6d46cSPaolo Abeni ret = inet_sk_state_load(parent) == TCP_ESTABLISHED; 169910f6d46cSPaolo Abeni if (ret && !WARN_ON_ONCE(!list_empty(&subflow->node))) 170010f6d46cSPaolo Abeni list_add_tail(&subflow->node, &msk->join_list); 170110f6d46cSPaolo Abeni spin_unlock_bh(&msk->join_list_lock); 170210f6d46cSPaolo Abeni if (!ret) 170310f6d46cSPaolo Abeni return false; 170410f6d46cSPaolo Abeni 170510f6d46cSPaolo Abeni /* attach to msk socket only after we are sure he will deal with us 170610f6d46cSPaolo Abeni * at close time 170710f6d46cSPaolo Abeni */ 1708f296234cSPeter Krystad parent_sock = READ_ONCE(parent->sk_socket); 1709f296234cSPeter Krystad if (parent_sock && !sk->sk_socket) 1710f296234cSPeter Krystad mptcp_sock_graft(sk, parent_sock); 171164d950aeSChristoph Paasch subflow->map_seq = msk->ack_seq; 171210f6d46cSPaolo Abeni return true; 1713f296234cSPeter Krystad } 1714f296234cSPeter Krystad 17151891c4a0SFlorian Westphal static bool mptcp_memory_free(const struct sock *sk, int wake) 17161891c4a0SFlorian Westphal { 17171891c4a0SFlorian Westphal struct mptcp_sock *msk = mptcp_sk(sk); 17181891c4a0SFlorian Westphal 17191891c4a0SFlorian Westphal return wake ? test_bit(MPTCP_SEND_SPACE, &msk->flags) : true; 17201891c4a0SFlorian Westphal } 17211891c4a0SFlorian Westphal 1722f870fa0bSMat Martineau static struct proto mptcp_prot = { 1723f870fa0bSMat Martineau .name = "MPTCP", 1724f870fa0bSMat Martineau .owner = THIS_MODULE, 1725f870fa0bSMat Martineau .init = mptcp_init_sock, 172618b683bfSPaolo Abeni .disconnect = mptcp_disconnect, 1727f870fa0bSMat Martineau .close = mptcp_close, 1728cf7da0d6SPeter Krystad .accept = mptcp_accept, 1729717e79c8SPeter Krystad .setsockopt = mptcp_setsockopt, 1730717e79c8SPeter Krystad .getsockopt = mptcp_getsockopt, 1731f870fa0bSMat Martineau .shutdown = tcp_shutdown, 173279c0949eSPeter Krystad .destroy = mptcp_destroy, 1733f870fa0bSMat Martineau .sendmsg = mptcp_sendmsg, 1734f870fa0bSMat Martineau .recvmsg = mptcp_recvmsg, 173514c441b5SPaolo Abeni .release_cb = mptcp_release_cb, 17362c5ebd00SPaolo Abeni .hash = mptcp_hash, 17372c5ebd00SPaolo Abeni .unhash = mptcp_unhash, 1738cec37a6eSPeter Krystad .get_port = mptcp_get_port, 1739d027236cSPaolo Abeni .sockets_allocated = &mptcp_sockets_allocated, 1740d027236cSPaolo Abeni .memory_allocated = &tcp_memory_allocated, 1741d027236cSPaolo Abeni .memory_pressure = &tcp_memory_pressure, 17421891c4a0SFlorian Westphal .stream_memory_free = mptcp_memory_free, 1743d027236cSPaolo Abeni .sysctl_wmem_offset = offsetof(struct net, ipv4.sysctl_tcp_wmem), 1744d027236cSPaolo Abeni .sysctl_mem = sysctl_tcp_mem, 1745f870fa0bSMat Martineau .obj_size = sizeof(struct mptcp_sock), 17462c5ebd00SPaolo Abeni .slab_flags = SLAB_TYPESAFE_BY_RCU, 1747f870fa0bSMat Martineau .no_autobind = true, 1748f870fa0bSMat Martineau }; 1749f870fa0bSMat Martineau 17502303f994SPeter Krystad static int mptcp_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) 17512303f994SPeter Krystad { 17522303f994SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 17532303f994SPeter Krystad struct socket *ssock; 1754cf7da0d6SPeter Krystad int err; 17552303f994SPeter Krystad 17562303f994SPeter Krystad lock_sock(sock->sk); 17572303f994SPeter Krystad ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE); 17582303f994SPeter Krystad if (IS_ERR(ssock)) { 17592303f994SPeter Krystad err = PTR_ERR(ssock); 17602303f994SPeter Krystad goto unlock; 17612303f994SPeter Krystad } 17622303f994SPeter Krystad 17632303f994SPeter Krystad err = ssock->ops->bind(ssock, uaddr, addr_len); 1764cf7da0d6SPeter Krystad if (!err) 1765cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 17662303f994SPeter Krystad 17672303f994SPeter Krystad unlock: 17682303f994SPeter Krystad release_sock(sock->sk); 17692303f994SPeter Krystad return err; 17702303f994SPeter Krystad } 17712303f994SPeter Krystad 17722303f994SPeter Krystad static int mptcp_stream_connect(struct socket *sock, struct sockaddr *uaddr, 17732303f994SPeter Krystad int addr_len, int flags) 17742303f994SPeter Krystad { 17752303f994SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 17762c5ebd00SPaolo Abeni struct mptcp_subflow_context *subflow; 17772303f994SPeter Krystad struct socket *ssock; 17782303f994SPeter Krystad int err; 17792303f994SPeter Krystad 17802303f994SPeter Krystad lock_sock(sock->sk); 178141be81a8SPaolo Abeni if (sock->state != SS_UNCONNECTED && msk->subflow) { 178241be81a8SPaolo Abeni /* pending connection or invalid state, let existing subflow 178341be81a8SPaolo Abeni * cope with that 178441be81a8SPaolo Abeni */ 178541be81a8SPaolo Abeni ssock = msk->subflow; 178641be81a8SPaolo Abeni goto do_connect; 178741be81a8SPaolo Abeni } 178841be81a8SPaolo Abeni 17892c5ebd00SPaolo Abeni mptcp_token_destroy(msk); 17902303f994SPeter Krystad ssock = __mptcp_socket_create(msk, TCP_SYN_SENT); 17912303f994SPeter Krystad if (IS_ERR(ssock)) { 17922303f994SPeter Krystad err = PTR_ERR(ssock); 17932303f994SPeter Krystad goto unlock; 17942303f994SPeter Krystad } 17952303f994SPeter Krystad 17962c5ebd00SPaolo Abeni subflow = mptcp_subflow_ctx(ssock->sk); 1797cf7da0d6SPeter Krystad #ifdef CONFIG_TCP_MD5SIG 1798cf7da0d6SPeter Krystad /* no MPTCP if MD5SIG is enabled on this socket or we may run out of 1799cf7da0d6SPeter Krystad * TCP option space. 1800cf7da0d6SPeter Krystad */ 1801cf7da0d6SPeter Krystad if (rcu_access_pointer(tcp_sk(ssock->sk)->md5sig_info)) 18022c5ebd00SPaolo Abeni subflow->request_mptcp = 0; 1803cf7da0d6SPeter Krystad #endif 18042c5ebd00SPaolo Abeni if (subflow->request_mptcp && mptcp_token_new_connect(ssock->sk)) 18052c5ebd00SPaolo Abeni subflow->request_mptcp = 0; 1806cf7da0d6SPeter Krystad 180741be81a8SPaolo Abeni do_connect: 18082303f994SPeter Krystad err = ssock->ops->connect(ssock, uaddr, addr_len, flags); 180941be81a8SPaolo Abeni sock->state = ssock->state; 181041be81a8SPaolo Abeni 181141be81a8SPaolo Abeni /* on successful connect, the msk state will be moved to established by 181241be81a8SPaolo Abeni * subflow_finish_connect() 181341be81a8SPaolo Abeni */ 181441be81a8SPaolo Abeni if (!err || err == EINPROGRESS) 1815cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 181641be81a8SPaolo Abeni else 181741be81a8SPaolo Abeni inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk)); 18182303f994SPeter Krystad 18192303f994SPeter Krystad unlock: 18202303f994SPeter Krystad release_sock(sock->sk); 18212303f994SPeter Krystad return err; 18222303f994SPeter Krystad } 18232303f994SPeter Krystad 1824cf7da0d6SPeter Krystad static int mptcp_v4_getname(struct socket *sock, struct sockaddr *uaddr, 1825cf7da0d6SPeter Krystad int peer) 1826cf7da0d6SPeter Krystad { 1827cf7da0d6SPeter Krystad if (sock->sk->sk_prot == &tcp_prot) { 1828cf7da0d6SPeter Krystad /* we are being invoked from __sys_accept4, after 1829cf7da0d6SPeter Krystad * mptcp_accept() has just accepted a non-mp-capable 1830cf7da0d6SPeter Krystad * flow: sk is a tcp_sk, not an mptcp one. 1831cf7da0d6SPeter Krystad * 1832cf7da0d6SPeter Krystad * Hand the socket over to tcp so all further socket ops 1833cf7da0d6SPeter Krystad * bypass mptcp. 1834cf7da0d6SPeter Krystad */ 1835cf7da0d6SPeter Krystad sock->ops = &inet_stream_ops; 1836cf7da0d6SPeter Krystad } 1837cf7da0d6SPeter Krystad 1838cf7da0d6SPeter Krystad return inet_getname(sock, uaddr, peer); 1839cf7da0d6SPeter Krystad } 1840cf7da0d6SPeter Krystad 1841cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 1842cf7da0d6SPeter Krystad static int mptcp_v6_getname(struct socket *sock, struct sockaddr *uaddr, 1843cf7da0d6SPeter Krystad int peer) 1844cf7da0d6SPeter Krystad { 1845cf7da0d6SPeter Krystad if (sock->sk->sk_prot == &tcpv6_prot) { 1846cf7da0d6SPeter Krystad /* we are being invoked from __sys_accept4 after 1847cf7da0d6SPeter Krystad * mptcp_accept() has accepted a non-mp-capable 1848cf7da0d6SPeter Krystad * subflow: sk is a tcp_sk, not mptcp. 1849cf7da0d6SPeter Krystad * 1850cf7da0d6SPeter Krystad * Hand the socket over to tcp so all further 1851cf7da0d6SPeter Krystad * socket ops bypass mptcp. 1852cf7da0d6SPeter Krystad */ 1853cf7da0d6SPeter Krystad sock->ops = &inet6_stream_ops; 1854cf7da0d6SPeter Krystad } 1855cf7da0d6SPeter Krystad 1856cf7da0d6SPeter Krystad return inet6_getname(sock, uaddr, peer); 1857cf7da0d6SPeter Krystad } 1858cf7da0d6SPeter Krystad #endif 1859cf7da0d6SPeter Krystad 1860cf7da0d6SPeter Krystad static int mptcp_listen(struct socket *sock, int backlog) 1861cf7da0d6SPeter Krystad { 1862cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 1863cf7da0d6SPeter Krystad struct socket *ssock; 1864cf7da0d6SPeter Krystad int err; 1865cf7da0d6SPeter Krystad 1866cf7da0d6SPeter Krystad pr_debug("msk=%p", msk); 1867cf7da0d6SPeter Krystad 1868cf7da0d6SPeter Krystad lock_sock(sock->sk); 18692c5ebd00SPaolo Abeni mptcp_token_destroy(msk); 1870cf7da0d6SPeter Krystad ssock = __mptcp_socket_create(msk, TCP_LISTEN); 1871cf7da0d6SPeter Krystad if (IS_ERR(ssock)) { 1872cf7da0d6SPeter Krystad err = PTR_ERR(ssock); 1873cf7da0d6SPeter Krystad goto unlock; 1874cf7da0d6SPeter Krystad } 1875cf7da0d6SPeter Krystad 18765e20087dSFlorian Westphal sock_set_flag(sock->sk, SOCK_RCU_FREE); 18775e20087dSFlorian Westphal 1878cf7da0d6SPeter Krystad err = ssock->ops->listen(ssock, backlog); 1879cf7da0d6SPeter Krystad inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk)); 1880cf7da0d6SPeter Krystad if (!err) 1881cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 1882cf7da0d6SPeter Krystad 1883cf7da0d6SPeter Krystad unlock: 1884cf7da0d6SPeter Krystad release_sock(sock->sk); 1885cf7da0d6SPeter Krystad return err; 1886cf7da0d6SPeter Krystad } 1887cf7da0d6SPeter Krystad 1888cf7da0d6SPeter Krystad static bool is_tcp_proto(const struct proto *p) 1889cf7da0d6SPeter Krystad { 1890cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 1891cf7da0d6SPeter Krystad return p == &tcp_prot || p == &tcpv6_prot; 1892cf7da0d6SPeter Krystad #else 1893cf7da0d6SPeter Krystad return p == &tcp_prot; 1894cf7da0d6SPeter Krystad #endif 1895cf7da0d6SPeter Krystad } 1896cf7da0d6SPeter Krystad 1897cf7da0d6SPeter Krystad static int mptcp_stream_accept(struct socket *sock, struct socket *newsock, 1898cf7da0d6SPeter Krystad int flags, bool kern) 1899cf7da0d6SPeter Krystad { 1900cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 1901cf7da0d6SPeter Krystad struct socket *ssock; 1902cf7da0d6SPeter Krystad int err; 1903cf7da0d6SPeter Krystad 1904cf7da0d6SPeter Krystad pr_debug("msk=%p", msk); 1905cf7da0d6SPeter Krystad 1906cf7da0d6SPeter Krystad lock_sock(sock->sk); 1907cf7da0d6SPeter Krystad if (sock->sk->sk_state != TCP_LISTEN) 1908cf7da0d6SPeter Krystad goto unlock_fail; 1909cf7da0d6SPeter Krystad 1910cf7da0d6SPeter Krystad ssock = __mptcp_nmpc_socket(msk); 1911cf7da0d6SPeter Krystad if (!ssock) 1912cf7da0d6SPeter Krystad goto unlock_fail; 1913cf7da0d6SPeter Krystad 1914cf7da0d6SPeter Krystad sock_hold(ssock->sk); 1915cf7da0d6SPeter Krystad release_sock(sock->sk); 1916cf7da0d6SPeter Krystad 1917cf7da0d6SPeter Krystad err = ssock->ops->accept(sock, newsock, flags, kern); 1918cf7da0d6SPeter Krystad if (err == 0 && !is_tcp_proto(newsock->sk->sk_prot)) { 1919cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(newsock->sk); 1920cf7da0d6SPeter Krystad struct mptcp_subflow_context *subflow; 1921cf7da0d6SPeter Krystad 1922cf7da0d6SPeter Krystad /* set ssk->sk_socket of accept()ed flows to mptcp socket. 1923cf7da0d6SPeter Krystad * This is needed so NOSPACE flag can be set from tcp stack. 1924cf7da0d6SPeter Krystad */ 1925ec3edaa7SPeter Krystad __mptcp_flush_join_list(msk); 1926cf7da0d6SPeter Krystad list_for_each_entry(subflow, &msk->conn_list, node) { 1927cf7da0d6SPeter Krystad struct sock *ssk = mptcp_subflow_tcp_sock(subflow); 1928cf7da0d6SPeter Krystad 1929cf7da0d6SPeter Krystad if (!ssk->sk_socket) 1930cf7da0d6SPeter Krystad mptcp_sock_graft(ssk, newsock); 1931cf7da0d6SPeter Krystad } 1932cf7da0d6SPeter Krystad } 1933cf7da0d6SPeter Krystad 1934cf7da0d6SPeter Krystad sock_put(ssock->sk); 1935cf7da0d6SPeter Krystad return err; 1936cf7da0d6SPeter Krystad 1937cf7da0d6SPeter Krystad unlock_fail: 1938cf7da0d6SPeter Krystad release_sock(sock->sk); 1939cf7da0d6SPeter Krystad return -EINVAL; 1940cf7da0d6SPeter Krystad } 1941cf7da0d6SPeter Krystad 19422303f994SPeter Krystad static __poll_t mptcp_poll(struct file *file, struct socket *sock, 19432303f994SPeter Krystad struct poll_table_struct *wait) 19442303f994SPeter Krystad { 19451891c4a0SFlorian Westphal struct sock *sk = sock->sk; 19468ab183deSPaolo Abeni struct mptcp_sock *msk; 19472303f994SPeter Krystad __poll_t mask = 0; 19482303f994SPeter Krystad 19491891c4a0SFlorian Westphal msk = mptcp_sk(sk); 19501891c4a0SFlorian Westphal sock_poll_wait(file, sock, wait); 19511891c4a0SFlorian Westphal 19521891c4a0SFlorian Westphal if (test_bit(MPTCP_DATA_READY, &msk->flags)) 19531891c4a0SFlorian Westphal mask = EPOLLIN | EPOLLRDNORM; 19541891c4a0SFlorian Westphal if (sk_stream_is_writeable(sk) && 19551891c4a0SFlorian Westphal test_bit(MPTCP_SEND_SPACE, &msk->flags)) 19561891c4a0SFlorian Westphal mask |= EPOLLOUT | EPOLLWRNORM; 19571891c4a0SFlorian Westphal if (sk->sk_shutdown & RCV_SHUTDOWN) 19581891c4a0SFlorian Westphal mask |= EPOLLIN | EPOLLRDNORM | EPOLLRDHUP; 19591891c4a0SFlorian Westphal 19602303f994SPeter Krystad return mask; 19612303f994SPeter Krystad } 19622303f994SPeter Krystad 196321498490SPeter Krystad static int mptcp_shutdown(struct socket *sock, int how) 196421498490SPeter Krystad { 196521498490SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 196621498490SPeter Krystad struct mptcp_subflow_context *subflow; 196721498490SPeter Krystad int ret = 0; 196821498490SPeter Krystad 196921498490SPeter Krystad pr_debug("sk=%p, how=%d", msk, how); 197021498490SPeter Krystad 197121498490SPeter Krystad lock_sock(sock->sk); 197221498490SPeter Krystad if (how == SHUT_WR || how == SHUT_RDWR) 197321498490SPeter Krystad inet_sk_state_store(sock->sk, TCP_FIN_WAIT1); 197421498490SPeter Krystad 197521498490SPeter Krystad how++; 197621498490SPeter Krystad 197721498490SPeter Krystad if ((how & ~SHUTDOWN_MASK) || !how) { 197821498490SPeter Krystad ret = -EINVAL; 197921498490SPeter Krystad goto out_unlock; 198021498490SPeter Krystad } 198121498490SPeter Krystad 198221498490SPeter Krystad if (sock->state == SS_CONNECTING) { 198321498490SPeter Krystad if ((1 << sock->sk->sk_state) & 198421498490SPeter Krystad (TCPF_SYN_SENT | TCPF_SYN_RECV | TCPF_CLOSE)) 198521498490SPeter Krystad sock->state = SS_DISCONNECTING; 198621498490SPeter Krystad else 198721498490SPeter Krystad sock->state = SS_CONNECTED; 198821498490SPeter Krystad } 198921498490SPeter Krystad 1990ec3edaa7SPeter Krystad __mptcp_flush_join_list(msk); 199121498490SPeter Krystad mptcp_for_each_subflow(msk, subflow) { 199221498490SPeter Krystad struct sock *tcp_sk = mptcp_subflow_tcp_sock(subflow); 199321498490SPeter Krystad 199476c42a29SMat Martineau mptcp_subflow_shutdown(tcp_sk, how, 1, msk->write_seq); 199521498490SPeter Krystad } 199621498490SPeter Krystad 1997*e1ff9e82SDavide Caratti /* Wake up anyone sleeping in poll. */ 1998*e1ff9e82SDavide Caratti sock->sk->sk_state_change(sock->sk); 1999*e1ff9e82SDavide Caratti 200021498490SPeter Krystad out_unlock: 200121498490SPeter Krystad release_sock(sock->sk); 200221498490SPeter Krystad 200321498490SPeter Krystad return ret; 200421498490SPeter Krystad } 200521498490SPeter Krystad 2006e42f1ac6SFlorian Westphal static const struct proto_ops mptcp_stream_ops = { 2007e42f1ac6SFlorian Westphal .family = PF_INET, 2008e42f1ac6SFlorian Westphal .owner = THIS_MODULE, 2009e42f1ac6SFlorian Westphal .release = inet_release, 2010e42f1ac6SFlorian Westphal .bind = mptcp_bind, 2011e42f1ac6SFlorian Westphal .connect = mptcp_stream_connect, 2012e42f1ac6SFlorian Westphal .socketpair = sock_no_socketpair, 2013e42f1ac6SFlorian Westphal .accept = mptcp_stream_accept, 2014e42f1ac6SFlorian Westphal .getname = mptcp_v4_getname, 2015e42f1ac6SFlorian Westphal .poll = mptcp_poll, 2016e42f1ac6SFlorian Westphal .ioctl = inet_ioctl, 2017e42f1ac6SFlorian Westphal .gettstamp = sock_gettstamp, 2018e42f1ac6SFlorian Westphal .listen = mptcp_listen, 2019e42f1ac6SFlorian Westphal .shutdown = mptcp_shutdown, 2020e42f1ac6SFlorian Westphal .setsockopt = sock_common_setsockopt, 2021e42f1ac6SFlorian Westphal .getsockopt = sock_common_getsockopt, 2022e42f1ac6SFlorian Westphal .sendmsg = inet_sendmsg, 2023e42f1ac6SFlorian Westphal .recvmsg = inet_recvmsg, 2024e42f1ac6SFlorian Westphal .mmap = sock_no_mmap, 2025e42f1ac6SFlorian Westphal .sendpage = inet_sendpage, 2026e42f1ac6SFlorian Westphal #ifdef CONFIG_COMPAT 2027e42f1ac6SFlorian Westphal .compat_setsockopt = compat_sock_common_setsockopt, 2028e42f1ac6SFlorian Westphal .compat_getsockopt = compat_sock_common_getsockopt, 2029e42f1ac6SFlorian Westphal #endif 2030e42f1ac6SFlorian Westphal }; 20312303f994SPeter Krystad 2032f870fa0bSMat Martineau static struct inet_protosw mptcp_protosw = { 2033f870fa0bSMat Martineau .type = SOCK_STREAM, 2034f870fa0bSMat Martineau .protocol = IPPROTO_MPTCP, 2035f870fa0bSMat Martineau .prot = &mptcp_prot, 20362303f994SPeter Krystad .ops = &mptcp_stream_ops, 20372303f994SPeter Krystad .flags = INET_PROTOSW_ICSK, 2038f870fa0bSMat Martineau }; 2039f870fa0bSMat Martineau 2040d39dcecaSPaolo Abeni void __init mptcp_proto_init(void) 2041f870fa0bSMat Martineau { 20422303f994SPeter Krystad mptcp_prot.h.hashinfo = tcp_prot.h.hashinfo; 20432303f994SPeter Krystad 2044d027236cSPaolo Abeni if (percpu_counter_init(&mptcp_sockets_allocated, 0, GFP_KERNEL)) 2045d027236cSPaolo Abeni panic("Failed to allocate MPTCP pcpu counter\n"); 2046d027236cSPaolo Abeni 20472303f994SPeter Krystad mptcp_subflow_init(); 20481b1c7a0eSPeter Krystad mptcp_pm_init(); 20492c5ebd00SPaolo Abeni mptcp_token_init(); 20502303f994SPeter Krystad 2051f870fa0bSMat Martineau if (proto_register(&mptcp_prot, 1) != 0) 2052f870fa0bSMat Martineau panic("Failed to register MPTCP proto.\n"); 2053f870fa0bSMat Martineau 2054f870fa0bSMat Martineau inet_register_protosw(&mptcp_protosw); 20556771bfd9SFlorian Westphal 20566771bfd9SFlorian Westphal BUILD_BUG_ON(sizeof(struct mptcp_skb_cb) > sizeof_field(struct sk_buff, cb)); 2057f870fa0bSMat Martineau } 2058f870fa0bSMat Martineau 2059f870fa0bSMat Martineau #if IS_ENABLED(CONFIG_MPTCP_IPV6) 2060e42f1ac6SFlorian Westphal static const struct proto_ops mptcp_v6_stream_ops = { 2061e42f1ac6SFlorian Westphal .family = PF_INET6, 2062e42f1ac6SFlorian Westphal .owner = THIS_MODULE, 2063e42f1ac6SFlorian Westphal .release = inet6_release, 2064e42f1ac6SFlorian Westphal .bind = mptcp_bind, 2065e42f1ac6SFlorian Westphal .connect = mptcp_stream_connect, 2066e42f1ac6SFlorian Westphal .socketpair = sock_no_socketpair, 2067e42f1ac6SFlorian Westphal .accept = mptcp_stream_accept, 2068e42f1ac6SFlorian Westphal .getname = mptcp_v6_getname, 2069e42f1ac6SFlorian Westphal .poll = mptcp_poll, 2070e42f1ac6SFlorian Westphal .ioctl = inet6_ioctl, 2071e42f1ac6SFlorian Westphal .gettstamp = sock_gettstamp, 2072e42f1ac6SFlorian Westphal .listen = mptcp_listen, 2073e42f1ac6SFlorian Westphal .shutdown = mptcp_shutdown, 2074e42f1ac6SFlorian Westphal .setsockopt = sock_common_setsockopt, 2075e42f1ac6SFlorian Westphal .getsockopt = sock_common_getsockopt, 2076e42f1ac6SFlorian Westphal .sendmsg = inet6_sendmsg, 2077e42f1ac6SFlorian Westphal .recvmsg = inet6_recvmsg, 2078e42f1ac6SFlorian Westphal .mmap = sock_no_mmap, 2079e42f1ac6SFlorian Westphal .sendpage = inet_sendpage, 2080e42f1ac6SFlorian Westphal #ifdef CONFIG_COMPAT 20813986912fSChristoph Hellwig .compat_ioctl = inet6_compat_ioctl, 2082e42f1ac6SFlorian Westphal .compat_setsockopt = compat_sock_common_setsockopt, 2083e42f1ac6SFlorian Westphal .compat_getsockopt = compat_sock_common_getsockopt, 2084e42f1ac6SFlorian Westphal #endif 2085e42f1ac6SFlorian Westphal }; 2086e42f1ac6SFlorian Westphal 2087f870fa0bSMat Martineau static struct proto mptcp_v6_prot; 2088f870fa0bSMat Martineau 208979c0949eSPeter Krystad static void mptcp_v6_destroy(struct sock *sk) 209079c0949eSPeter Krystad { 209179c0949eSPeter Krystad mptcp_destroy(sk); 209279c0949eSPeter Krystad inet6_destroy_sock(sk); 209379c0949eSPeter Krystad } 209479c0949eSPeter Krystad 2095f870fa0bSMat Martineau static struct inet_protosw mptcp_v6_protosw = { 2096f870fa0bSMat Martineau .type = SOCK_STREAM, 2097f870fa0bSMat Martineau .protocol = IPPROTO_MPTCP, 2098f870fa0bSMat Martineau .prot = &mptcp_v6_prot, 20992303f994SPeter Krystad .ops = &mptcp_v6_stream_ops, 2100f870fa0bSMat Martineau .flags = INET_PROTOSW_ICSK, 2101f870fa0bSMat Martineau }; 2102f870fa0bSMat Martineau 2103d39dcecaSPaolo Abeni int __init mptcp_proto_v6_init(void) 2104f870fa0bSMat Martineau { 2105f870fa0bSMat Martineau int err; 2106f870fa0bSMat Martineau 2107f870fa0bSMat Martineau mptcp_v6_prot = mptcp_prot; 2108f870fa0bSMat Martineau strcpy(mptcp_v6_prot.name, "MPTCPv6"); 2109f870fa0bSMat Martineau mptcp_v6_prot.slab = NULL; 211079c0949eSPeter Krystad mptcp_v6_prot.destroy = mptcp_v6_destroy; 2111b0519de8SFlorian Westphal mptcp_v6_prot.obj_size = sizeof(struct mptcp6_sock); 2112f870fa0bSMat Martineau 2113f870fa0bSMat Martineau err = proto_register(&mptcp_v6_prot, 1); 2114f870fa0bSMat Martineau if (err) 2115f870fa0bSMat Martineau return err; 2116f870fa0bSMat Martineau 2117f870fa0bSMat Martineau err = inet6_register_protosw(&mptcp_v6_protosw); 2118f870fa0bSMat Martineau if (err) 2119f870fa0bSMat Martineau proto_unregister(&mptcp_v6_prot); 2120f870fa0bSMat Martineau 2121f870fa0bSMat Martineau return err; 2122f870fa0bSMat Martineau } 2123f870fa0bSMat Martineau #endif 2124