xref: /linux/net/rxrpc/ar-internal.h (revision 0d240e7811c4ec1965760ee4643b5bbc9cfacbb3)
1 /* AF_RXRPC internal definitions
2  *
3  * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
4  * Written by David Howells (dhowells@redhat.com)
5  *
6  * This program is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU General Public License
8  * as published by the Free Software Foundation; either version
9  * 2 of the License, or (at your option) any later version.
10  */
11 
12 #include <linux/atomic.h>
13 #include <net/sock.h>
14 #include <net/af_rxrpc.h>
15 #include <rxrpc/packet.h>
16 
17 #if 0
18 #define CHECK_SLAB_OKAY(X)				     \
19 	BUG_ON(atomic_read((X)) >> (sizeof(atomic_t) - 2) == \
20 	       (POISON_FREE << 8 | POISON_FREE))
21 #else
22 #define CHECK_SLAB_OKAY(X) do {} while (0)
23 #endif
24 
25 #define FCRYPT_BSIZE 8
26 struct rxrpc_crypt {
27 	union {
28 		u8	x[FCRYPT_BSIZE];
29 		__be32	n[2];
30 	};
31 } __attribute__((aligned(8)));
32 
33 #define rxrpc_queue_work(WS)	queue_work(rxrpc_workqueue, (WS))
34 #define rxrpc_queue_delayed_work(WS,D)	\
35 	queue_delayed_work(rxrpc_workqueue, (WS), (D))
36 
37 #define rxrpc_queue_call(CALL)	rxrpc_queue_work(&(CALL)->processor)
38 #define rxrpc_queue_conn(CONN)	rxrpc_queue_work(&(CONN)->processor)
39 
40 /*
41  * sk_state for RxRPC sockets
42  */
43 enum {
44 	RXRPC_UNBOUND = 0,
45 	RXRPC_CLIENT_UNBOUND,		/* Unbound socket used as client */
46 	RXRPC_CLIENT_BOUND,		/* client local address bound */
47 	RXRPC_SERVER_BOUND,		/* server local address bound */
48 	RXRPC_SERVER_LISTENING,		/* server listening for connections */
49 	RXRPC_CLOSE,			/* socket is being closed */
50 };
51 
52 /*
53  * RxRPC socket definition
54  */
55 struct rxrpc_sock {
56 	/* WARNING: sk has to be the first member */
57 	struct sock		sk;
58 	rxrpc_interceptor_t	interceptor;	/* kernel service Rx interceptor function */
59 	struct rxrpc_local	*local;		/* local endpoint */
60 	struct rxrpc_connection	*conn;		/* exclusive virtual connection */
61 	struct list_head	listen_link;	/* link in the local endpoint's listen list */
62 	struct list_head	secureq;	/* calls awaiting connection security clearance */
63 	struct list_head	acceptq;	/* calls awaiting acceptance */
64 	struct key		*key;		/* security for this socket */
65 	struct key		*securities;	/* list of server security descriptors */
66 	struct rb_root		calls;		/* outstanding calls on this socket */
67 	unsigned long		flags;
68 #define RXRPC_SOCK_CONNECTED		0	/* connect_srx is set */
69 #define RXRPC_SOCK_EXCLUSIVE_CONN	1	/* exclusive connection for a client socket */
70 	rwlock_t		call_lock;	/* lock for calls */
71 	u32			min_sec_level;	/* minimum security level */
72 #define RXRPC_SECURITY_MAX	RXRPC_SECURITY_ENCRYPT
73 	struct sockaddr_rxrpc	srx;		/* local address */
74 	struct sockaddr_rxrpc	connect_srx;	/* Default client address from connect() */
75 	sa_family_t		proto;		/* protocol created with */
76 };
77 
78 #define rxrpc_sk(__sk) container_of((__sk), struct rxrpc_sock, sk)
79 
80 /*
81  * CPU-byteorder normalised Rx packet header.
82  */
83 struct rxrpc_host_header {
84 	u32		epoch;		/* client boot timestamp */
85 	u32		cid;		/* connection and channel ID */
86 	u32		callNumber;	/* call ID (0 for connection-level packets) */
87 	u32		seq;		/* sequence number of pkt in call stream */
88 	u32		serial;		/* serial number of pkt sent to network */
89 	u8		type;		/* packet type */
90 	u8		flags;		/* packet flags */
91 	u8		userStatus;	/* app-layer defined status */
92 	u8		securityIndex;	/* security protocol ID */
93 	union {
94 		u16	_rsvd;		/* reserved */
95 		u16	cksum;		/* kerberos security checksum */
96 	};
97 	u16		serviceId;	/* service ID */
98 } __packed;
99 
100 /*
101  * RxRPC socket buffer private variables
102  * - max 48 bytes (struct sk_buff::cb)
103  */
104 struct rxrpc_skb_priv {
105 	struct rxrpc_call	*call;		/* call with which associated */
106 	unsigned long		resend_at;	/* time in jiffies at which to resend */
107 	union {
108 		unsigned int	offset;		/* offset into buffer of next read */
109 		int		remain;		/* amount of space remaining for next write */
110 		u32		error;		/* network error code */
111 		bool		need_resend;	/* T if needs resending */
112 	};
113 
114 	struct rxrpc_host_header hdr;		/* RxRPC packet header from this packet */
115 };
116 
117 #define rxrpc_skb(__skb) ((struct rxrpc_skb_priv *) &(__skb)->cb)
118 
119 enum rxrpc_command {
120 	RXRPC_CMD_SEND_DATA,		/* send data message */
121 	RXRPC_CMD_SEND_ABORT,		/* request abort generation */
122 	RXRPC_CMD_ACCEPT,		/* [server] accept incoming call */
123 	RXRPC_CMD_REJECT_BUSY,		/* [server] reject a call as busy */
124 };
125 
126 /*
127  * RxRPC security module interface
128  */
129 struct rxrpc_security {
130 	const char		*name;		/* name of this service */
131 	u8			security_index;	/* security type provided */
132 
133 	/* Initialise a security service */
134 	int (*init)(void);
135 
136 	/* Clean up a security service */
137 	void (*exit)(void);
138 
139 	/* initialise a connection's security */
140 	int (*init_connection_security)(struct rxrpc_connection *);
141 
142 	/* prime a connection's packet security */
143 	void (*prime_packet_security)(struct rxrpc_connection *);
144 
145 	/* impose security on a packet */
146 	int (*secure_packet)(const struct rxrpc_call *,
147 			     struct sk_buff *,
148 			     size_t,
149 			     void *);
150 
151 	/* verify the security on a received packet */
152 	int (*verify_packet)(const struct rxrpc_call *, struct sk_buff *,
153 			     u32 *);
154 
155 	/* issue a challenge */
156 	int (*issue_challenge)(struct rxrpc_connection *);
157 
158 	/* respond to a challenge */
159 	int (*respond_to_challenge)(struct rxrpc_connection *,
160 				    struct sk_buff *,
161 				    u32 *);
162 
163 	/* verify a response */
164 	int (*verify_response)(struct rxrpc_connection *,
165 			       struct sk_buff *,
166 			       u32 *);
167 
168 	/* clear connection security */
169 	void (*clear)(struct rxrpc_connection *);
170 };
171 
172 /*
173  * RxRPC local transport endpoint description
174  * - owned by a single AF_RXRPC socket
175  * - pointed to by transport socket struct sk_user_data
176  */
177 struct rxrpc_local {
178 	struct rcu_head		rcu;
179 	atomic_t		usage;
180 	struct list_head	link;
181 	struct socket		*socket;	/* my UDP socket */
182 	struct work_struct	processor;
183 	struct list_head	services;	/* services listening on this endpoint */
184 	struct rw_semaphore	defrag_sem;	/* control re-enablement of IP DF bit */
185 	struct sk_buff_head	accept_queue;	/* incoming calls awaiting acceptance */
186 	struct sk_buff_head	reject_queue;	/* packets awaiting rejection */
187 	struct sk_buff_head	event_queue;	/* endpoint event packets awaiting processing */
188 	struct mutex		conn_lock;	/* Client connection creation lock */
189 	spinlock_t		lock;		/* access lock */
190 	rwlock_t		services_lock;	/* lock for services list */
191 	int			debug_id;	/* debug ID for printks */
192 	bool			dead;
193 	struct sockaddr_rxrpc	srx;		/* local address */
194 };
195 
196 /*
197  * RxRPC remote transport endpoint definition
198  * - matched by local endpoint, remote port, address and protocol type
199  */
200 struct rxrpc_peer {
201 	struct rcu_head		rcu;		/* This must be first */
202 	atomic_t		usage;
203 	unsigned long		hash_key;
204 	struct hlist_node	hash_link;
205 	struct rxrpc_local	*local;
206 	struct hlist_head	error_targets;	/* targets for net error distribution */
207 	struct work_struct	error_distributor;
208 	spinlock_t		lock;		/* access lock */
209 	unsigned int		if_mtu;		/* interface MTU for this peer */
210 	unsigned int		mtu;		/* network MTU for this peer */
211 	unsigned int		maxdata;	/* data size (MTU - hdrsize) */
212 	unsigned short		hdrsize;	/* header size (IP + UDP + RxRPC) */
213 	int			debug_id;	/* debug ID for printks */
214 	int			error_report;	/* Net (+0) or local (+1000000) to distribute */
215 #define RXRPC_LOCAL_ERROR_OFFSET 1000000
216 	struct sockaddr_rxrpc	srx;		/* remote address */
217 
218 	/* calculated RTT cache */
219 #define RXRPC_RTT_CACHE_SIZE 32
220 	suseconds_t		rtt;		/* current RTT estimate (in uS) */
221 	unsigned int		rtt_point;	/* next entry at which to insert */
222 	unsigned int		rtt_usage;	/* amount of cache actually used */
223 	suseconds_t		rtt_cache[RXRPC_RTT_CACHE_SIZE]; /* calculated RTT cache */
224 };
225 
226 /*
227  * RxRPC point-to-point transport / connection manager definition
228  * - handles a bundle of connections between two endpoints
229  * - matched by { local, peer }
230  */
231 struct rxrpc_transport {
232 	struct rxrpc_local	*local;		/* local transport endpoint */
233 	struct rxrpc_peer	*peer;		/* remote transport endpoint */
234 	struct rb_root		bundles;	/* client connection bundles on this transport */
235 	struct rb_root		client_conns;	/* client connections on this transport */
236 	struct rb_root		server_conns;	/* server connections on this transport */
237 	struct list_head	link;		/* link in master session list */
238 	unsigned long		put_time;	/* time at which to reap */
239 	spinlock_t		client_lock;	/* client connection allocation lock */
240 	rwlock_t		conn_lock;	/* lock for active/dead connections */
241 	atomic_t		usage;
242 	int			debug_id;	/* debug ID for printks */
243 	unsigned int		conn_idcounter;	/* connection ID counter (client) */
244 };
245 
246 /*
247  * RxRPC client connection bundle
248  * - matched by { transport, service_id, key }
249  */
250 struct rxrpc_conn_bundle {
251 	struct rb_node		node;		/* node in transport's lookup tree */
252 	struct list_head	unused_conns;	/* unused connections in this bundle */
253 	struct list_head	avail_conns;	/* available connections in this bundle */
254 	struct list_head	busy_conns;	/* busy connections in this bundle */
255 	struct key		*key;		/* security for this bundle */
256 	wait_queue_head_t	chanwait;	/* wait for channel to become available */
257 	atomic_t		usage;
258 	int			debug_id;	/* debug ID for printks */
259 	unsigned short		num_conns;	/* number of connections in this bundle */
260 	u16			service_id;	/* Service ID for this bundle */
261 	u8			security_ix;	/* security type */
262 };
263 
264 /*
265  * RxRPC connection definition
266  * - matched by { transport, service_id, conn_id, direction, key }
267  * - each connection can only handle four simultaneous calls
268  */
269 struct rxrpc_connection {
270 	struct rxrpc_transport	*trans;		/* transport session */
271 	struct rxrpc_conn_bundle *bundle;	/* connection bundle (client) */
272 	struct work_struct	processor;	/* connection event processor */
273 	struct rb_node		node;		/* node in transport's lookup tree */
274 	struct list_head	link;		/* link in master connection list */
275 	struct list_head	bundle_link;	/* link in bundle */
276 	struct rb_root		calls;		/* calls on this connection */
277 	struct sk_buff_head	rx_queue;	/* received conn-level packets */
278 	struct rxrpc_call	*channels[RXRPC_MAXCALLS]; /* channels (active calls) */
279 	const struct rxrpc_security *security;	/* applied security module */
280 	struct key		*key;		/* security for this connection (client) */
281 	struct key		*server_key;	/* security for this service */
282 	struct crypto_skcipher	*cipher;	/* encryption handle */
283 	struct rxrpc_crypt	csum_iv;	/* packet checksum base */
284 	unsigned long		events;
285 #define RXRPC_CONN_CHALLENGE	0		/* send challenge packet */
286 	unsigned long		put_time;	/* time at which to reap */
287 	rwlock_t		lock;		/* access lock */
288 	spinlock_t		state_lock;	/* state-change lock */
289 	atomic_t		usage;
290 	enum {					/* current state of connection */
291 		RXRPC_CONN_UNUSED,		/* - connection not yet attempted */
292 		RXRPC_CONN_CLIENT,		/* - client connection */
293 		RXRPC_CONN_SERVER_UNSECURED,	/* - server unsecured connection */
294 		RXRPC_CONN_SERVER_CHALLENGING,	/* - server challenging for security */
295 		RXRPC_CONN_SERVER,		/* - server secured connection */
296 		RXRPC_CONN_REMOTELY_ABORTED,	/* - conn aborted by peer */
297 		RXRPC_CONN_LOCALLY_ABORTED,	/* - conn aborted locally */
298 		RXRPC_CONN_NETWORK_ERROR,	/* - conn terminated by network error */
299 	} state;
300 	u32			local_abort;	/* local abort code */
301 	u32			remote_abort;	/* remote abort code */
302 	int			error;		/* local error incurred */
303 	int			debug_id;	/* debug ID for printks */
304 	unsigned int		call_counter;	/* call ID counter */
305 	atomic_t		serial;		/* packet serial number counter */
306 	atomic_t		hi_serial;	/* highest serial number received */
307 	u8			avail_calls;	/* number of calls available */
308 	u8			size_align;	/* data size alignment (for security) */
309 	u8			header_size;	/* rxrpc + security header size */
310 	u8			security_size;	/* security header size */
311 	u32			security_level;	/* security level negotiated */
312 	u32			security_nonce;	/* response re-use preventer */
313 	u32			epoch;		/* epoch of this connection */
314 	u32			cid;		/* connection ID */
315 	u16			service_id;	/* service ID for this connection */
316 	u8			security_ix;	/* security type */
317 	u8			in_clientflag;	/* RXRPC_CLIENT_INITIATED if we are server */
318 	u8			out_clientflag;	/* RXRPC_CLIENT_INITIATED if we are client */
319 };
320 
321 /*
322  * Flags in call->flags.
323  */
324 enum rxrpc_call_flag {
325 	RXRPC_CALL_RELEASED,		/* call has been released - no more message to userspace */
326 	RXRPC_CALL_TERMINAL_MSG,	/* call has given the socket its final message */
327 	RXRPC_CALL_RCVD_LAST,		/* all packets received */
328 	RXRPC_CALL_RUN_RTIMER,		/* Tx resend timer started */
329 	RXRPC_CALL_TX_SOFT_ACK,		/* sent some soft ACKs */
330 	RXRPC_CALL_PROC_BUSY,		/* the processor is busy */
331 	RXRPC_CALL_INIT_ACCEPT,		/* acceptance was initiated */
332 	RXRPC_CALL_HAS_USERID,		/* has a user ID attached */
333 	RXRPC_CALL_EXPECT_OOS,		/* expect out of sequence packets */
334 };
335 
336 /*
337  * Events that can be raised on a call.
338  */
339 enum rxrpc_call_event {
340 	RXRPC_CALL_EV_RCVD_ACKALL,	/* ACKALL or reply received */
341 	RXRPC_CALL_EV_RCVD_BUSY,	/* busy packet received */
342 	RXRPC_CALL_EV_RCVD_ABORT,	/* abort packet received */
343 	RXRPC_CALL_EV_RCVD_ERROR,	/* network error received */
344 	RXRPC_CALL_EV_ACK_FINAL,	/* need to generate final ACK (and release call) */
345 	RXRPC_CALL_EV_ACK,		/* need to generate ACK */
346 	RXRPC_CALL_EV_REJECT_BUSY,	/* need to generate busy message */
347 	RXRPC_CALL_EV_ABORT,		/* need to generate abort */
348 	RXRPC_CALL_EV_CONN_ABORT,	/* local connection abort generated */
349 	RXRPC_CALL_EV_RESEND_TIMER,	/* Tx resend timer expired */
350 	RXRPC_CALL_EV_RESEND,		/* Tx resend required */
351 	RXRPC_CALL_EV_DRAIN_RX_OOS,	/* drain the Rx out of sequence queue */
352 	RXRPC_CALL_EV_LIFE_TIMER,	/* call's lifetimer ran out */
353 	RXRPC_CALL_EV_ACCEPTED,		/* incoming call accepted by userspace app */
354 	RXRPC_CALL_EV_SECURED,		/* incoming call's connection is now secure */
355 	RXRPC_CALL_EV_POST_ACCEPT,	/* need to post an "accept?" message to the app */
356 	RXRPC_CALL_EV_RELEASE,		/* need to release the call's resources */
357 };
358 
359 /*
360  * The states that a call can be in.
361  */
362 enum rxrpc_call_state {
363 	RXRPC_CALL_CLIENT_SEND_REQUEST,	/* - client sending request phase */
364 	RXRPC_CALL_CLIENT_AWAIT_REPLY,	/* - client awaiting reply */
365 	RXRPC_CALL_CLIENT_RECV_REPLY,	/* - client receiving reply phase */
366 	RXRPC_CALL_CLIENT_FINAL_ACK,	/* - client sending final ACK phase */
367 	RXRPC_CALL_SERVER_SECURING,	/* - server securing request connection */
368 	RXRPC_CALL_SERVER_ACCEPTING,	/* - server accepting request */
369 	RXRPC_CALL_SERVER_RECV_REQUEST,	/* - server receiving request */
370 	RXRPC_CALL_SERVER_ACK_REQUEST,	/* - server pending ACK of request */
371 	RXRPC_CALL_SERVER_SEND_REPLY,	/* - server sending reply */
372 	RXRPC_CALL_SERVER_AWAIT_ACK,	/* - server awaiting final ACK */
373 	RXRPC_CALL_COMPLETE,		/* - call completed */
374 	RXRPC_CALL_SERVER_BUSY,		/* - call rejected by busy server */
375 	RXRPC_CALL_REMOTELY_ABORTED,	/* - call aborted by peer */
376 	RXRPC_CALL_LOCALLY_ABORTED,	/* - call aborted locally on error or close */
377 	RXRPC_CALL_NETWORK_ERROR,	/* - call terminated by network error */
378 	RXRPC_CALL_DEAD,		/* - call is dead */
379 	NR__RXRPC_CALL_STATES
380 };
381 
382 /*
383  * RxRPC call definition
384  * - matched by { connection, call_id }
385  */
386 struct rxrpc_call {
387 	struct rxrpc_connection	*conn;		/* connection carrying call */
388 	struct rxrpc_sock	*socket;	/* socket responsible */
389 	struct timer_list	lifetimer;	/* lifetime remaining on call */
390 	struct timer_list	deadspan;	/* reap timer for re-ACK'ing, etc  */
391 	struct timer_list	ack_timer;	/* ACK generation timer */
392 	struct timer_list	resend_timer;	/* Tx resend timer */
393 	struct work_struct	destroyer;	/* call destroyer */
394 	struct work_struct	processor;	/* packet processor and ACK generator */
395 	struct list_head	link;		/* link in master call list */
396 	struct hlist_node	error_link;	/* link in error distribution list */
397 	struct list_head	accept_link;	/* calls awaiting acceptance */
398 	struct rb_node		sock_node;	/* node in socket call tree */
399 	struct rb_node		conn_node;	/* node in connection call tree */
400 	struct sk_buff_head	rx_queue;	/* received packets */
401 	struct sk_buff_head	rx_oos_queue;	/* packets received out of sequence */
402 	struct sk_buff		*tx_pending;	/* Tx socket buffer being filled */
403 	wait_queue_head_t	tx_waitq;	/* wait for Tx window space to become available */
404 	unsigned long		user_call_ID;	/* user-defined call ID */
405 	unsigned long		creation_jif;	/* time of call creation */
406 	unsigned long		flags;
407 	unsigned long		events;
408 	spinlock_t		lock;
409 	rwlock_t		state_lock;	/* lock for state transition */
410 	atomic_t		usage;
411 	atomic_t		sequence;	/* Tx data packet sequence counter */
412 	u32			local_abort;	/* local abort code */
413 	u32			remote_abort;	/* remote abort code */
414 	int			error_report;	/* Network error (ICMP/local transport) */
415 	int			error;		/* Local error incurred */
416 	enum rxrpc_call_state	state : 8;	/* current state of call */
417 	int			debug_id;	/* debug ID for printks */
418 	u8			channel;	/* connection channel occupied by this call */
419 
420 	/* transmission-phase ACK management */
421 	u8			acks_head;	/* offset into window of first entry */
422 	u8			acks_tail;	/* offset into window of last entry */
423 	u8			acks_winsz;	/* size of un-ACK'd window */
424 	u8			acks_unacked;	/* lowest unacked packet in last ACK received */
425 	int			acks_latest;	/* serial number of latest ACK received */
426 	rxrpc_seq_t		acks_hard;	/* highest definitively ACK'd msg seq */
427 	unsigned long		*acks_window;	/* sent packet window
428 						 * - elements are pointers with LSB set if ACK'd
429 						 */
430 
431 	/* receive-phase ACK management */
432 	rxrpc_seq_t		rx_data_expect;	/* next data seq ID expected to be received */
433 	rxrpc_seq_t		rx_data_post;	/* next data seq ID expected to be posted */
434 	rxrpc_seq_t		rx_data_recv;	/* last data seq ID encountered by recvmsg */
435 	rxrpc_seq_t		rx_data_eaten;	/* last data seq ID consumed by recvmsg */
436 	rxrpc_seq_t		rx_first_oos;	/* first packet in rx_oos_queue (or 0) */
437 	rxrpc_seq_t		ackr_win_top;	/* top of ACK window (rx_data_eaten is bottom) */
438 	rxrpc_seq_t		ackr_prev_seq;	/* previous sequence number received */
439 	u8			ackr_reason;	/* reason to ACK */
440 	rxrpc_serial_t		ackr_serial;	/* serial of packet being ACK'd */
441 	atomic_t		ackr_not_idle;	/* number of packets in Rx queue */
442 
443 	/* received packet records, 1 bit per record */
444 #define RXRPC_ACKR_WINDOW_ASZ DIV_ROUND_UP(RXRPC_MAXACKS, BITS_PER_LONG)
445 	unsigned long		ackr_window[RXRPC_ACKR_WINDOW_ASZ + 1];
446 
447 	struct hlist_node	hash_node;
448 	unsigned long		hash_key;	/* Full hash key */
449 	u8			in_clientflag;	/* Copy of conn->in_clientflag for hashing */
450 	struct rxrpc_local	*local;		/* Local endpoint. Used for hashing. */
451 	sa_family_t		proto;		/* Frame protocol */
452 	u32			call_id;	/* call ID on connection  */
453 	u32			cid;		/* connection ID plus channel index */
454 	u32			epoch;		/* epoch of this connection */
455 	u16			service_id;	/* service ID */
456 	union {					/* Peer IP address for hashing */
457 		__be32	ipv4_addr;
458 		__u8	ipv6_addr[16];		/* Anticipates eventual IPv6 support */
459 	} peer_ip;
460 };
461 
462 /*
463  * locally abort an RxRPC call
464  */
465 static inline void rxrpc_abort_call(struct rxrpc_call *call, u32 abort_code)
466 {
467 	write_lock_bh(&call->state_lock);
468 	if (call->state < RXRPC_CALL_COMPLETE) {
469 		call->local_abort = abort_code;
470 		call->state = RXRPC_CALL_LOCALLY_ABORTED;
471 		set_bit(RXRPC_CALL_EV_ABORT, &call->events);
472 	}
473 	write_unlock_bh(&call->state_lock);
474 }
475 
476 /*
477  * af_rxrpc.c
478  */
479 extern atomic_t rxrpc_n_skbs;
480 extern u32 rxrpc_epoch;
481 extern atomic_t rxrpc_debug_id;
482 extern struct workqueue_struct *rxrpc_workqueue;
483 
484 extern struct rxrpc_transport *rxrpc_name_to_transport(struct rxrpc_sock *,
485 						       struct sockaddr *,
486 						       int, int, gfp_t);
487 
488 /*
489  * call_accept.c
490  */
491 void rxrpc_accept_incoming_calls(struct rxrpc_local *);
492 struct rxrpc_call *rxrpc_accept_call(struct rxrpc_sock *, unsigned long);
493 int rxrpc_reject_call(struct rxrpc_sock *);
494 
495 /*
496  * call_event.c
497  */
498 void __rxrpc_propose_ACK(struct rxrpc_call *, u8, u32, bool);
499 void rxrpc_propose_ACK(struct rxrpc_call *, u8, u32, bool);
500 void rxrpc_process_call(struct work_struct *);
501 
502 /*
503  * call_object.c
504  */
505 extern unsigned int rxrpc_max_call_lifetime;
506 extern unsigned int rxrpc_dead_call_expiry;
507 extern struct kmem_cache *rxrpc_call_jar;
508 extern struct list_head rxrpc_calls;
509 extern rwlock_t rxrpc_call_lock;
510 
511 struct rxrpc_call *rxrpc_find_call_hash(struct rxrpc_host_header *,
512 					void *, sa_family_t, const void *);
513 struct rxrpc_call *rxrpc_find_call_by_user_ID(struct rxrpc_sock *, unsigned long);
514 struct rxrpc_call *rxrpc_new_client_call(struct rxrpc_sock *,
515 					 struct rxrpc_transport *,
516 					 struct rxrpc_conn_bundle *,
517 					 unsigned long, gfp_t);
518 struct rxrpc_call *rxrpc_incoming_call(struct rxrpc_sock *,
519 				       struct rxrpc_connection *,
520 				       struct rxrpc_host_header *);
521 void rxrpc_release_call(struct rxrpc_call *);
522 void rxrpc_release_calls_on_socket(struct rxrpc_sock *);
523 void __rxrpc_put_call(struct rxrpc_call *);
524 void __exit rxrpc_destroy_all_calls(void);
525 
526 /*
527  * conn_event.c
528  */
529 void rxrpc_process_connection(struct work_struct *);
530 void rxrpc_reject_packet(struct rxrpc_local *, struct sk_buff *);
531 void rxrpc_reject_packets(struct rxrpc_local *);
532 
533 /*
534  * conn_object.c
535  */
536 extern unsigned int rxrpc_connection_expiry;
537 extern struct list_head rxrpc_connections;
538 extern rwlock_t rxrpc_connection_lock;
539 
540 struct rxrpc_conn_bundle *rxrpc_get_bundle(struct rxrpc_sock *,
541 					   struct rxrpc_transport *,
542 					   struct key *, u16, gfp_t);
543 void rxrpc_put_bundle(struct rxrpc_transport *, struct rxrpc_conn_bundle *);
544 int rxrpc_connect_call(struct rxrpc_sock *, struct rxrpc_transport *,
545 		       struct rxrpc_conn_bundle *, struct rxrpc_call *, gfp_t);
546 void rxrpc_put_connection(struct rxrpc_connection *);
547 void __exit rxrpc_destroy_all_connections(void);
548 struct rxrpc_connection *rxrpc_find_connection(struct rxrpc_transport *,
549 					       struct rxrpc_host_header *);
550 extern struct rxrpc_connection *
551 rxrpc_incoming_connection(struct rxrpc_transport *, struct rxrpc_host_header *);
552 
553 /*
554  * input.c
555  */
556 void rxrpc_data_ready(struct sock *);
557 int rxrpc_queue_rcv_skb(struct rxrpc_call *, struct sk_buff *, bool, bool);
558 void rxrpc_fast_process_packet(struct rxrpc_call *, struct sk_buff *);
559 
560 /*
561  * insecure.c
562  */
563 extern const struct rxrpc_security rxrpc_no_security;
564 
565 /*
566  * key.c
567  */
568 extern struct key_type key_type_rxrpc;
569 extern struct key_type key_type_rxrpc_s;
570 
571 int rxrpc_request_key(struct rxrpc_sock *, char __user *, int);
572 int rxrpc_server_keyring(struct rxrpc_sock *, char __user *, int);
573 int rxrpc_get_server_data_key(struct rxrpc_connection *, const void *, time_t,
574 			      u32);
575 
576 /*
577  * local_event.c
578  */
579 extern void rxrpc_process_local_events(struct rxrpc_local *);
580 
581 /*
582  * local_object.c
583  */
584 struct rxrpc_local *rxrpc_lookup_local(const struct sockaddr_rxrpc *);
585 void __rxrpc_put_local(struct rxrpc_local *);
586 void __exit rxrpc_destroy_all_locals(void);
587 
588 static inline void rxrpc_get_local(struct rxrpc_local *local)
589 {
590 	atomic_inc(&local->usage);
591 }
592 
593 static inline
594 struct rxrpc_local *rxrpc_get_local_maybe(struct rxrpc_local *local)
595 {
596 	return atomic_inc_not_zero(&local->usage) ? local : NULL;
597 }
598 
599 static inline void rxrpc_put_local(struct rxrpc_local *local)
600 {
601 	if (atomic_dec_and_test(&local->usage))
602 		__rxrpc_put_local(local);
603 }
604 
605 /*
606  * misc.c
607  */
608 extern unsigned int rxrpc_max_backlog __read_mostly;
609 extern unsigned int rxrpc_requested_ack_delay;
610 extern unsigned int rxrpc_soft_ack_delay;
611 extern unsigned int rxrpc_idle_ack_delay;
612 extern unsigned int rxrpc_rx_window_size;
613 extern unsigned int rxrpc_rx_mtu;
614 extern unsigned int rxrpc_rx_jumbo_max;
615 
616 extern const char *const rxrpc_pkts[];
617 extern const s8 rxrpc_ack_priority[];
618 
619 extern const char *rxrpc_acks(u8 reason);
620 
621 /*
622  * output.c
623  */
624 extern unsigned int rxrpc_resend_timeout;
625 
626 int rxrpc_send_packet(struct rxrpc_transport *, struct sk_buff *);
627 int rxrpc_do_sendmsg(struct rxrpc_sock *, struct msghdr *, size_t);
628 
629 /*
630  * peer_event.c
631  */
632 void rxrpc_error_report(struct sock *);
633 void rxrpc_peer_error_distributor(struct work_struct *);
634 
635 /*
636  * peer_object.c
637  */
638 struct rxrpc_peer *rxrpc_lookup_peer_rcu(struct rxrpc_local *,
639 					 const struct sockaddr_rxrpc *);
640 struct rxrpc_peer *rxrpc_lookup_peer(struct rxrpc_local *,
641 				     struct sockaddr_rxrpc *, gfp_t);
642 struct rxrpc_peer *rxrpc_alloc_peer(struct rxrpc_local *, gfp_t);
643 
644 static inline void rxrpc_get_peer(struct rxrpc_peer *peer)
645 {
646 	atomic_inc(&peer->usage);
647 }
648 
649 static inline
650 struct rxrpc_peer *rxrpc_get_peer_maybe(struct rxrpc_peer *peer)
651 {
652 	return atomic_inc_not_zero(&peer->usage) ? peer : NULL;
653 }
654 
655 extern void __rxrpc_put_peer(struct rxrpc_peer *peer);
656 static inline void rxrpc_put_peer(struct rxrpc_peer *peer)
657 {
658 	if (atomic_dec_and_test(&peer->usage))
659 		__rxrpc_put_peer(peer);
660 }
661 
662 /*
663  * proc.c
664  */
665 extern const char *const rxrpc_call_states[];
666 extern const struct file_operations rxrpc_call_seq_fops;
667 extern const struct file_operations rxrpc_connection_seq_fops;
668 
669 /*
670  * recvmsg.c
671  */
672 void rxrpc_remove_user_ID(struct rxrpc_sock *, struct rxrpc_call *);
673 int rxrpc_recvmsg(struct socket *, struct msghdr *, size_t, int);
674 
675 /*
676  * rxkad.c
677  */
678 #ifdef CONFIG_RXKAD
679 extern const struct rxrpc_security rxkad;
680 #endif
681 
682 /*
683  * security.c
684  */
685 int __init rxrpc_init_security(void);
686 void rxrpc_exit_security(void);
687 int rxrpc_init_client_conn_security(struct rxrpc_connection *);
688 int rxrpc_init_server_conn_security(struct rxrpc_connection *);
689 
690 /*
691  * skbuff.c
692  */
693 void rxrpc_packet_destructor(struct sk_buff *);
694 
695 /*
696  * sysctl.c
697  */
698 #ifdef CONFIG_SYSCTL
699 extern int __init rxrpc_sysctl_init(void);
700 extern void rxrpc_sysctl_exit(void);
701 #else
702 static inline int __init rxrpc_sysctl_init(void) { return 0; }
703 static inline void rxrpc_sysctl_exit(void) {}
704 #endif
705 
706 /*
707  * transport.c
708  */
709 extern unsigned int rxrpc_transport_expiry;
710 
711 struct rxrpc_transport *rxrpc_get_transport(struct rxrpc_local *,
712 					    struct rxrpc_peer *, gfp_t);
713 void rxrpc_put_transport(struct rxrpc_transport *);
714 void __exit rxrpc_destroy_all_transports(void);
715 struct rxrpc_transport *rxrpc_find_transport(struct rxrpc_local *,
716 					     struct rxrpc_peer *);
717 
718 /*
719  * utils.c
720  */
721 void rxrpc_get_addr_from_skb(struct rxrpc_local *, const struct sk_buff *,
722 			     struct sockaddr_rxrpc *);
723 
724 /*
725  * debug tracing
726  */
727 extern unsigned int rxrpc_debug;
728 
729 #define dbgprintk(FMT,...) \
730 	printk("[%-6.6s] "FMT"\n", current->comm ,##__VA_ARGS__)
731 
732 #define kenter(FMT,...)	dbgprintk("==> %s("FMT")",__func__ ,##__VA_ARGS__)
733 #define kleave(FMT,...)	dbgprintk("<== %s()"FMT"",__func__ ,##__VA_ARGS__)
734 #define kdebug(FMT,...)	dbgprintk("    "FMT ,##__VA_ARGS__)
735 #define kproto(FMT,...)	dbgprintk("### "FMT ,##__VA_ARGS__)
736 #define knet(FMT,...)	dbgprintk("@@@ "FMT ,##__VA_ARGS__)
737 
738 
739 #if defined(__KDEBUG)
740 #define _enter(FMT,...)	kenter(FMT,##__VA_ARGS__)
741 #define _leave(FMT,...)	kleave(FMT,##__VA_ARGS__)
742 #define _debug(FMT,...)	kdebug(FMT,##__VA_ARGS__)
743 #define _proto(FMT,...)	kproto(FMT,##__VA_ARGS__)
744 #define _net(FMT,...)	knet(FMT,##__VA_ARGS__)
745 
746 #elif defined(CONFIG_AF_RXRPC_DEBUG)
747 #define RXRPC_DEBUG_KENTER	0x01
748 #define RXRPC_DEBUG_KLEAVE	0x02
749 #define RXRPC_DEBUG_KDEBUG	0x04
750 #define RXRPC_DEBUG_KPROTO	0x08
751 #define RXRPC_DEBUG_KNET	0x10
752 
753 #define _enter(FMT,...)					\
754 do {							\
755 	if (unlikely(rxrpc_debug & RXRPC_DEBUG_KENTER))	\
756 		kenter(FMT,##__VA_ARGS__);		\
757 } while (0)
758 
759 #define _leave(FMT,...)					\
760 do {							\
761 	if (unlikely(rxrpc_debug & RXRPC_DEBUG_KLEAVE))	\
762 		kleave(FMT,##__VA_ARGS__);		\
763 } while (0)
764 
765 #define _debug(FMT,...)					\
766 do {							\
767 	if (unlikely(rxrpc_debug & RXRPC_DEBUG_KDEBUG))	\
768 		kdebug(FMT,##__VA_ARGS__);		\
769 } while (0)
770 
771 #define _proto(FMT,...)					\
772 do {							\
773 	if (unlikely(rxrpc_debug & RXRPC_DEBUG_KPROTO))	\
774 		kproto(FMT,##__VA_ARGS__);		\
775 } while (0)
776 
777 #define _net(FMT,...)					\
778 do {							\
779 	if (unlikely(rxrpc_debug & RXRPC_DEBUG_KNET))	\
780 		knet(FMT,##__VA_ARGS__);		\
781 } while (0)
782 
783 #else
784 #define _enter(FMT,...)	no_printk("==> %s("FMT")",__func__ ,##__VA_ARGS__)
785 #define _leave(FMT,...)	no_printk("<== %s()"FMT"",__func__ ,##__VA_ARGS__)
786 #define _debug(FMT,...)	no_printk("    "FMT ,##__VA_ARGS__)
787 #define _proto(FMT,...)	no_printk("### "FMT ,##__VA_ARGS__)
788 #define _net(FMT,...)	no_printk("@@@ "FMT ,##__VA_ARGS__)
789 #endif
790 
791 /*
792  * debug assertion checking
793  */
794 #if 1 // defined(__KDEBUGALL)
795 
796 #define ASSERT(X)						\
797 do {								\
798 	if (unlikely(!(X))) {					\
799 		pr_err("Assertion failed\n");			\
800 		BUG();						\
801 	}							\
802 } while (0)
803 
804 #define ASSERTCMP(X, OP, Y)						\
805 do {									\
806 	unsigned long _x = (unsigned long)(X);				\
807 	unsigned long _y = (unsigned long)(Y);				\
808 	if (unlikely(!(_x OP _y))) {					\
809 		pr_err("Assertion failed - %lu(0x%lx) %s %lu(0x%lx) is false\n",			\
810 		       _x, _x, #OP, _y, _y);				\
811 		BUG();							\
812 	}								\
813 } while (0)
814 
815 #define ASSERTIF(C, X)						\
816 do {								\
817 	if (unlikely((C) && !(X))) {				\
818 		pr_err("Assertion failed\n");			\
819 		BUG();						\
820 	}							\
821 } while (0)
822 
823 #define ASSERTIFCMP(C, X, OP, Y)					\
824 do {									\
825 	unsigned long _x = (unsigned long)(X);				\
826 	unsigned long _y = (unsigned long)(Y);				\
827 	if (unlikely((C) && !(_x OP _y))) {				\
828 		pr_err("Assertion failed - %lu(0x%lx) %s %lu(0x%lx) is false\n", \
829 		       _x, _x, #OP, _y, _y);				\
830 		BUG();							\
831 	}								\
832 } while (0)
833 
834 #else
835 
836 #define ASSERT(X)				\
837 do {						\
838 } while (0)
839 
840 #define ASSERTCMP(X, OP, Y)			\
841 do {						\
842 } while (0)
843 
844 #define ASSERTIF(C, X)				\
845 do {						\
846 } while (0)
847 
848 #define ASSERTIFCMP(C, X, OP, Y)		\
849 do {						\
850 } while (0)
851 
852 #endif /* __KDEBUGALL */
853 
854 /*
855  * socket buffer accounting / leak finding
856  */
857 static inline void __rxrpc_new_skb(struct sk_buff *skb, const char *fn)
858 {
859 	//_net("new skb %p %s [%d]", skb, fn, atomic_read(&rxrpc_n_skbs));
860 	//atomic_inc(&rxrpc_n_skbs);
861 }
862 
863 #define rxrpc_new_skb(skb) __rxrpc_new_skb((skb), __func__)
864 
865 static inline void __rxrpc_kill_skb(struct sk_buff *skb, const char *fn)
866 {
867 	//_net("kill skb %p %s [%d]", skb, fn, atomic_read(&rxrpc_n_skbs));
868 	//atomic_dec(&rxrpc_n_skbs);
869 }
870 
871 #define rxrpc_kill_skb(skb) __rxrpc_kill_skb((skb), __func__)
872 
873 static inline void __rxrpc_free_skb(struct sk_buff *skb, const char *fn)
874 {
875 	if (skb) {
876 		CHECK_SLAB_OKAY(&skb->users);
877 		//_net("free skb %p %s [%d]",
878 		//     skb, fn, atomic_read(&rxrpc_n_skbs));
879 		//atomic_dec(&rxrpc_n_skbs);
880 		kfree_skb(skb);
881 	}
882 }
883 
884 #define rxrpc_free_skb(skb) __rxrpc_free_skb((skb), __func__)
885 
886 static inline void rxrpc_purge_queue(struct sk_buff_head *list)
887 {
888 	struct sk_buff *skb;
889 	while ((skb = skb_dequeue((list))) != NULL)
890 		rxrpc_free_skb(skb);
891 }
892 
893 #define rxrpc_get_call(CALL)				\
894 do {							\
895 	CHECK_SLAB_OKAY(&(CALL)->usage);		\
896 	if (atomic_inc_return(&(CALL)->usage) == 1)	\
897 		BUG();					\
898 } while (0)
899 
900 #define rxrpc_put_call(CALL)				\
901 do {							\
902 	__rxrpc_put_call(CALL);				\
903 } while (0)
904