pm_userspace.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505
  1. // SPDX-License-Identifier: GPL-2.0
  2. /* Multipath TCP
  3. *
  4. * Copyright (c) 2022, Intel Corporation.
  5. */
  6. #include "protocol.h"
  7. #include "mib.h"
  8. void mptcp_free_local_addr_list(struct mptcp_sock *msk)
  9. {
  10. struct mptcp_pm_addr_entry *entry, *tmp;
  11. struct sock *sk = (struct sock *)msk;
  12. LIST_HEAD(free_list);
  13. if (!mptcp_pm_is_userspace(msk))
  14. return;
  15. spin_lock_bh(&msk->pm.lock);
  16. list_splice_init(&msk->pm.userspace_pm_local_addr_list, &free_list);
  17. spin_unlock_bh(&msk->pm.lock);
  18. list_for_each_entry_safe(entry, tmp, &free_list, list) {
  19. sock_kfree_s(sk, entry, sizeof(*entry));
  20. }
  21. }
  22. int mptcp_userspace_pm_append_new_local_addr(struct mptcp_sock *msk,
  23. struct mptcp_pm_addr_entry *entry)
  24. {
  25. DECLARE_BITMAP(id_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
  26. struct mptcp_pm_addr_entry *match = NULL;
  27. struct sock *sk = (struct sock *)msk;
  28. struct mptcp_pm_addr_entry *e;
  29. bool addr_match = false;
  30. bool id_match = false;
  31. int ret = -EINVAL;
  32. bitmap_zero(id_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
  33. spin_lock_bh(&msk->pm.lock);
  34. list_for_each_entry(e, &msk->pm.userspace_pm_local_addr_list, list) {
  35. addr_match = mptcp_addresses_equal(&e->addr, &entry->addr, true);
  36. if (addr_match && entry->addr.id == 0)
  37. entry->addr.id = e->addr.id;
  38. id_match = (e->addr.id == entry->addr.id);
  39. if (addr_match && id_match) {
  40. match = e;
  41. break;
  42. } else if (addr_match || id_match) {
  43. break;
  44. }
  45. __set_bit(e->addr.id, id_bitmap);
  46. }
  47. if (!match && !addr_match && !id_match) {
  48. /* Memory for the entry is allocated from the
  49. * sock option buffer.
  50. */
  51. e = sock_kmalloc(sk, sizeof(*e), GFP_ATOMIC);
  52. if (!e) {
  53. spin_unlock_bh(&msk->pm.lock);
  54. return -ENOMEM;
  55. }
  56. *e = *entry;
  57. if (!e->addr.id)
  58. e->addr.id = find_next_zero_bit(id_bitmap,
  59. MPTCP_PM_MAX_ADDR_ID + 1,
  60. 1);
  61. list_add_tail_rcu(&e->list, &msk->pm.userspace_pm_local_addr_list);
  62. msk->pm.local_addr_used++;
  63. ret = e->addr.id;
  64. } else if (match) {
  65. ret = entry->addr.id;
  66. }
  67. spin_unlock_bh(&msk->pm.lock);
  68. return ret;
  69. }
  70. /* If the subflow is closed from the other peer (not via a
  71. * subflow destroy command then), we want to keep the entry
  72. * not to assign the same ID to another address and to be
  73. * able to send RM_ADDR after the removal of the subflow.
  74. */
  75. static int mptcp_userspace_pm_delete_local_addr(struct mptcp_sock *msk,
  76. struct mptcp_pm_addr_entry *addr)
  77. {
  78. struct mptcp_pm_addr_entry *entry, *tmp;
  79. list_for_each_entry_safe(entry, tmp, &msk->pm.userspace_pm_local_addr_list, list) {
  80. if (mptcp_addresses_equal(&entry->addr, &addr->addr, false)) {
  81. /* TODO: a refcount is needed because the entry can
  82. * be used multiple times (e.g. fullmesh mode).
  83. */
  84. list_del_rcu(&entry->list);
  85. kfree(entry);
  86. msk->pm.local_addr_used--;
  87. return 0;
  88. }
  89. }
  90. return -EINVAL;
  91. }
  92. int mptcp_userspace_pm_get_flags_and_ifindex_by_id(struct mptcp_sock *msk,
  93. unsigned int id,
  94. u8 *flags, int *ifindex)
  95. {
  96. struct mptcp_pm_addr_entry *entry, *match = NULL;
  97. *flags = 0;
  98. *ifindex = 0;
  99. spin_lock_bh(&msk->pm.lock);
  100. list_for_each_entry(entry, &msk->pm.userspace_pm_local_addr_list, list) {
  101. if (id == entry->addr.id) {
  102. match = entry;
  103. break;
  104. }
  105. }
  106. spin_unlock_bh(&msk->pm.lock);
  107. if (match) {
  108. *flags = match->flags;
  109. *ifindex = match->ifindex;
  110. }
  111. return 0;
  112. }
  113. int mptcp_userspace_pm_get_local_id(struct mptcp_sock *msk,
  114. struct mptcp_addr_info *skc)
  115. {
  116. struct mptcp_pm_addr_entry new_entry;
  117. __be16 msk_sport = ((struct inet_sock *)
  118. inet_sk((struct sock *)msk))->inet_sport;
  119. memset(&new_entry, 0, sizeof(struct mptcp_pm_addr_entry));
  120. new_entry.addr = *skc;
  121. new_entry.addr.id = 0;
  122. new_entry.flags = MPTCP_PM_ADDR_FLAG_IMPLICIT;
  123. if (new_entry.addr.port == msk_sport)
  124. new_entry.addr.port = 0;
  125. return mptcp_userspace_pm_append_new_local_addr(msk, &new_entry);
  126. }
  127. int mptcp_nl_cmd_announce(struct sk_buff *skb, struct genl_info *info)
  128. {
  129. struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN];
  130. struct nlattr *addr = info->attrs[MPTCP_PM_ATTR_ADDR];
  131. struct mptcp_pm_addr_entry addr_val;
  132. struct mptcp_sock *msk;
  133. int err = -EINVAL;
  134. u32 token_val;
  135. if (!addr || !token) {
  136. GENL_SET_ERR_MSG(info, "missing required inputs");
  137. return err;
  138. }
  139. token_val = nla_get_u32(token);
  140. msk = mptcp_token_get_sock(sock_net(skb->sk), token_val);
  141. if (!msk) {
  142. NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token");
  143. return err;
  144. }
  145. if (!mptcp_pm_is_userspace(msk)) {
  146. GENL_SET_ERR_MSG(info, "invalid request; userspace PM not selected");
  147. goto announce_err;
  148. }
  149. err = mptcp_pm_parse_entry(addr, info, true, &addr_val);
  150. if (err < 0) {
  151. GENL_SET_ERR_MSG(info, "error parsing local address");
  152. goto announce_err;
  153. }
  154. if (addr_val.addr.id == 0 || !(addr_val.flags & MPTCP_PM_ADDR_FLAG_SIGNAL)) {
  155. GENL_SET_ERR_MSG(info, "invalid addr id or flags");
  156. err = -EINVAL;
  157. goto announce_err;
  158. }
  159. err = mptcp_userspace_pm_append_new_local_addr(msk, &addr_val);
  160. if (err < 0) {
  161. GENL_SET_ERR_MSG(info, "did not match address and id");
  162. goto announce_err;
  163. }
  164. lock_sock((struct sock *)msk);
  165. spin_lock_bh(&msk->pm.lock);
  166. if (mptcp_pm_alloc_anno_list(msk, &addr_val)) {
  167. msk->pm.add_addr_signaled++;
  168. mptcp_pm_announce_addr(msk, &addr_val.addr, false);
  169. mptcp_pm_nl_addr_send_ack(msk);
  170. }
  171. spin_unlock_bh(&msk->pm.lock);
  172. release_sock((struct sock *)msk);
  173. err = 0;
  174. announce_err:
  175. sock_put((struct sock *)msk);
  176. return err;
  177. }
  178. int mptcp_nl_cmd_remove(struct sk_buff *skb, struct genl_info *info)
  179. {
  180. struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN];
  181. struct nlattr *id = info->attrs[MPTCP_PM_ATTR_LOC_ID];
  182. struct mptcp_pm_addr_entry *match = NULL;
  183. struct mptcp_pm_addr_entry *entry;
  184. struct mptcp_sock *msk;
  185. LIST_HEAD(free_list);
  186. int err = -EINVAL;
  187. u32 token_val;
  188. u8 id_val;
  189. if (!id || !token) {
  190. GENL_SET_ERR_MSG(info, "missing required inputs");
  191. return err;
  192. }
  193. id_val = nla_get_u8(id);
  194. token_val = nla_get_u32(token);
  195. msk = mptcp_token_get_sock(sock_net(skb->sk), token_val);
  196. if (!msk) {
  197. NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token");
  198. return err;
  199. }
  200. if (!mptcp_pm_is_userspace(msk)) {
  201. GENL_SET_ERR_MSG(info, "invalid request; userspace PM not selected");
  202. goto remove_err;
  203. }
  204. lock_sock((struct sock *)msk);
  205. list_for_each_entry(entry, &msk->pm.userspace_pm_local_addr_list, list) {
  206. if (entry->addr.id == id_val) {
  207. match = entry;
  208. break;
  209. }
  210. }
  211. if (!match) {
  212. GENL_SET_ERR_MSG(info, "address with specified id not found");
  213. release_sock((struct sock *)msk);
  214. goto remove_err;
  215. }
  216. list_move(&match->list, &free_list);
  217. mptcp_pm_remove_addrs(msk, &free_list);
  218. release_sock((struct sock *)msk);
  219. list_for_each_entry_safe(match, entry, &free_list, list) {
  220. sock_kfree_s((struct sock *)msk, match, sizeof(*match));
  221. }
  222. err = 0;
  223. remove_err:
  224. sock_put((struct sock *)msk);
  225. return err;
  226. }
  227. int mptcp_nl_cmd_sf_create(struct sk_buff *skb, struct genl_info *info)
  228. {
  229. struct nlattr *raddr = info->attrs[MPTCP_PM_ATTR_ADDR_REMOTE];
  230. struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN];
  231. struct nlattr *laddr = info->attrs[MPTCP_PM_ATTR_ADDR];
  232. struct mptcp_pm_addr_entry local = { 0 };
  233. struct mptcp_addr_info addr_r;
  234. struct mptcp_addr_info addr_l;
  235. struct mptcp_sock *msk;
  236. int err = -EINVAL;
  237. struct sock *sk;
  238. u32 token_val;
  239. if (!laddr || !raddr || !token) {
  240. GENL_SET_ERR_MSG(info, "missing required inputs");
  241. return err;
  242. }
  243. token_val = nla_get_u32(token);
  244. msk = mptcp_token_get_sock(genl_info_net(info), token_val);
  245. if (!msk) {
  246. NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token");
  247. return err;
  248. }
  249. if (!mptcp_pm_is_userspace(msk)) {
  250. GENL_SET_ERR_MSG(info, "invalid request; userspace PM not selected");
  251. goto create_err;
  252. }
  253. err = mptcp_pm_parse_addr(laddr, info, &addr_l);
  254. if (err < 0) {
  255. NL_SET_ERR_MSG_ATTR(info->extack, laddr, "error parsing local addr");
  256. goto create_err;
  257. }
  258. err = mptcp_pm_parse_addr(raddr, info, &addr_r);
  259. if (err < 0) {
  260. NL_SET_ERR_MSG_ATTR(info->extack, raddr, "error parsing remote addr");
  261. goto create_err;
  262. }
  263. sk = &msk->sk.icsk_inet.sk;
  264. if (!mptcp_pm_addr_families_match(sk, &addr_l, &addr_r)) {
  265. GENL_SET_ERR_MSG(info, "families mismatch");
  266. err = -EINVAL;
  267. goto create_err;
  268. }
  269. local.addr = addr_l;
  270. err = mptcp_userspace_pm_append_new_local_addr(msk, &local);
  271. if (err < 0) {
  272. GENL_SET_ERR_MSG(info, "did not match address and id");
  273. goto create_err;
  274. }
  275. lock_sock(sk);
  276. err = __mptcp_subflow_connect(sk, &addr_l, &addr_r);
  277. release_sock(sk);
  278. spin_lock_bh(&msk->pm.lock);
  279. if (err)
  280. mptcp_userspace_pm_delete_local_addr(msk, &local);
  281. else
  282. msk->pm.subflows++;
  283. spin_unlock_bh(&msk->pm.lock);
  284. create_err:
  285. sock_put((struct sock *)msk);
  286. return err;
  287. }
  288. static struct sock *mptcp_nl_find_ssk(struct mptcp_sock *msk,
  289. const struct mptcp_addr_info *local,
  290. const struct mptcp_addr_info *remote)
  291. {
  292. struct mptcp_subflow_context *subflow;
  293. if (local->family != remote->family)
  294. return NULL;
  295. mptcp_for_each_subflow(msk, subflow) {
  296. const struct inet_sock *issk;
  297. struct sock *ssk;
  298. ssk = mptcp_subflow_tcp_sock(subflow);
  299. if (local->family != ssk->sk_family)
  300. continue;
  301. issk = inet_sk(ssk);
  302. switch (ssk->sk_family) {
  303. case AF_INET:
  304. if (issk->inet_saddr != local->addr.s_addr ||
  305. issk->inet_daddr != remote->addr.s_addr)
  306. continue;
  307. break;
  308. #if IS_ENABLED(CONFIG_MPTCP_IPV6)
  309. case AF_INET6: {
  310. const struct ipv6_pinfo *pinfo = inet6_sk(ssk);
  311. if (!ipv6_addr_equal(&local->addr6, &pinfo->saddr) ||
  312. !ipv6_addr_equal(&remote->addr6, &ssk->sk_v6_daddr))
  313. continue;
  314. break;
  315. }
  316. #endif
  317. default:
  318. continue;
  319. }
  320. if (issk->inet_sport == local->port &&
  321. issk->inet_dport == remote->port)
  322. return ssk;
  323. }
  324. return NULL;
  325. }
  326. int mptcp_nl_cmd_sf_destroy(struct sk_buff *skb, struct genl_info *info)
  327. {
  328. struct nlattr *raddr = info->attrs[MPTCP_PM_ATTR_ADDR_REMOTE];
  329. struct nlattr *token = info->attrs[MPTCP_PM_ATTR_TOKEN];
  330. struct nlattr *laddr = info->attrs[MPTCP_PM_ATTR_ADDR];
  331. struct mptcp_addr_info addr_l;
  332. struct mptcp_addr_info addr_r;
  333. struct mptcp_sock *msk;
  334. struct sock *sk, *ssk;
  335. int err = -EINVAL;
  336. u32 token_val;
  337. if (!laddr || !raddr || !token) {
  338. GENL_SET_ERR_MSG(info, "missing required inputs");
  339. return err;
  340. }
  341. token_val = nla_get_u32(token);
  342. msk = mptcp_token_get_sock(genl_info_net(info), token_val);
  343. if (!msk) {
  344. NL_SET_ERR_MSG_ATTR(info->extack, token, "invalid token");
  345. return err;
  346. }
  347. if (!mptcp_pm_is_userspace(msk)) {
  348. GENL_SET_ERR_MSG(info, "invalid request; userspace PM not selected");
  349. goto destroy_err;
  350. }
  351. err = mptcp_pm_parse_addr(laddr, info, &addr_l);
  352. if (err < 0) {
  353. NL_SET_ERR_MSG_ATTR(info->extack, laddr, "error parsing local addr");
  354. goto destroy_err;
  355. }
  356. err = mptcp_pm_parse_addr(raddr, info, &addr_r);
  357. if (err < 0) {
  358. NL_SET_ERR_MSG_ATTR(info->extack, raddr, "error parsing remote addr");
  359. goto destroy_err;
  360. }
  361. if (addr_l.family != addr_r.family) {
  362. GENL_SET_ERR_MSG(info, "address families do not match");
  363. err = -EINVAL;
  364. goto destroy_err;
  365. }
  366. if (!addr_l.port || !addr_r.port) {
  367. GENL_SET_ERR_MSG(info, "missing local or remote port");
  368. err = -EINVAL;
  369. goto destroy_err;
  370. }
  371. sk = &msk->sk.icsk_inet.sk;
  372. lock_sock(sk);
  373. ssk = mptcp_nl_find_ssk(msk, &addr_l, &addr_r);
  374. if (ssk) {
  375. struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
  376. struct mptcp_pm_addr_entry entry = { .addr = addr_l };
  377. spin_lock_bh(&msk->pm.lock);
  378. mptcp_userspace_pm_delete_local_addr(msk, &entry);
  379. spin_unlock_bh(&msk->pm.lock);
  380. mptcp_subflow_shutdown(sk, ssk, RCV_SHUTDOWN | SEND_SHUTDOWN);
  381. mptcp_close_ssk(sk, ssk, subflow);
  382. MPTCP_INC_STATS(sock_net(sk), MPTCP_MIB_RMSUBFLOW);
  383. err = 0;
  384. } else {
  385. err = -ESRCH;
  386. }
  387. release_sock(sk);
  388. destroy_err:
  389. sock_put((struct sock *)msk);
  390. return err;
  391. }
  392. int mptcp_userspace_pm_set_flags(struct net *net, struct nlattr *token,
  393. struct mptcp_pm_addr_entry *loc,
  394. struct mptcp_pm_addr_entry *rem, u8 bkup)
  395. {
  396. struct mptcp_sock *msk;
  397. int ret = -EINVAL;
  398. u32 token_val;
  399. token_val = nla_get_u32(token);
  400. msk = mptcp_token_get_sock(net, token_val);
  401. if (!msk)
  402. return ret;
  403. if (!mptcp_pm_is_userspace(msk))
  404. goto set_flags_err;
  405. if (loc->addr.family == AF_UNSPEC ||
  406. rem->addr.family == AF_UNSPEC)
  407. goto set_flags_err;
  408. lock_sock((struct sock *)msk);
  409. ret = mptcp_pm_nl_mp_prio_send_ack(msk, &loc->addr, &rem->addr, bkup);
  410. release_sock((struct sock *)msk);
  411. set_flags_err:
  412. sock_put((struct sock *)msk);
  413. return ret;
  414. }