1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 2 /* AF_RXRPC internal definitions 3 * 4 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved. 5 * Written by David Howells (dhowells@redhat.com) 6 */ 7 8 #include <linux/atomic.h> 9 #include <linux/seqlock.h> 10 #include <linux/win_minmax.h> 11 #include <net/net_namespace.h> 12 #include <net/netns/generic.h> 13 #include <net/sock.h> 14 #include <net/af_rxrpc.h> 15 #include <keys/rxrpc-type.h> 16 #include "protocol.h" 17 18 #define FCRYPT_BSIZE 8 19 struct rxrpc_crypt { 20 union { 21 u8 x[FCRYPT_BSIZE]; 22 __be32 n[2]; 23 }; 24 } __attribute__((aligned(8))); 25 26 #define rxrpc_queue_work(WS) queue_work(rxrpc_workqueue, (WS)) 27 #define rxrpc_queue_delayed_work(WS,D) \ 28 queue_delayed_work(rxrpc_workqueue, (WS), (D)) 29 30 struct key_preparsed_payload; 31 struct rxrpc_connection; 32 struct rxrpc_txbuf; 33 struct rxrpc_txqueue; 34 35 /* 36 * Mark applied to socket buffers in skb->mark. skb->priority is used 37 * to pass supplementary information. 38 */ 39 enum rxrpc_skb_mark { 40 RXRPC_SKB_MARK_PACKET, /* Received packet */ 41 RXRPC_SKB_MARK_ERROR, /* Error notification */ 42 RXRPC_SKB_MARK_SERVICE_CONN_SECURED, /* Service connection response has been verified */ 43 RXRPC_SKB_MARK_REJECT_BUSY, /* Reject with BUSY */ 44 RXRPC_SKB_MARK_REJECT_ABORT, /* Reject with ABORT (code in skb->priority) */ 45 }; 46 47 /* 48 * sk_state for RxRPC sockets 49 */ 50 enum { 51 RXRPC_UNBOUND = 0, 52 RXRPC_CLIENT_UNBOUND, /* Unbound socket used as client */ 53 RXRPC_CLIENT_BOUND, /* client local address bound */ 54 RXRPC_SERVER_BOUND, /* server local address bound */ 55 RXRPC_SERVER_BOUND2, /* second server local address bound */ 56 RXRPC_SERVER_LISTENING, /* server listening for connections */ 57 RXRPC_SERVER_LISTEN_DISABLED, /* server listening disabled */ 58 RXRPC_CLOSE, /* socket is being closed */ 59 }; 60 61 /* 62 * Per-network namespace data. 63 */ 64 struct rxrpc_net { 65 struct proc_dir_entry *proc_net; /* Subdir in /proc/net */ 66 u32 epoch; /* Local epoch for detecting local-end reset */ 67 struct list_head calls; /* List of calls active in this namespace */ 68 spinlock_t call_lock; /* Lock for ->calls */ 69 atomic_t nr_calls; /* Count of allocated calls */ 70 71 atomic_t nr_conns; 72 struct list_head bundle_proc_list; /* List of bundles for proc */ 73 struct list_head conn_proc_list; /* List of conns in this namespace for proc */ 74 struct list_head service_conns; /* Service conns in this namespace */ 75 rwlock_t conn_lock; /* Lock for ->conn_proc_list, ->service_conns */ 76 struct work_struct service_conn_reaper; 77 struct timer_list service_conn_reap_timer; 78 79 bool live; 80 81 atomic_t nr_client_conns; 82 83 struct hlist_head local_endpoints; 84 struct mutex local_mutex; /* Lock for ->local_endpoints */ 85 86 DECLARE_HASHTABLE (peer_hash, 10); 87 spinlock_t peer_hash_lock; /* Lock for ->peer_hash */ 88 89 #define RXRPC_KEEPALIVE_TIME 20 /* NAT keepalive time in seconds */ 90 u8 peer_keepalive_cursor; 91 time64_t peer_keepalive_base; 92 struct list_head peer_keepalive[32]; 93 struct list_head peer_keepalive_new; 94 struct timer_list peer_keepalive_timer; 95 struct work_struct peer_keepalive_work; 96 97 atomic_t stat_tx_data; 98 atomic_t stat_tx_data_retrans; 99 atomic_t stat_tx_data_send; 100 atomic_t stat_tx_data_send_frag; 101 atomic_t stat_tx_data_send_fail; 102 atomic_t stat_tx_data_send_msgsize; 103 atomic_t stat_tx_data_underflow; 104 atomic_t stat_tx_data_cwnd_reset; 105 atomic_t stat_rx_data; 106 atomic_t stat_rx_data_reqack; 107 atomic_t stat_rx_data_jumbo; 108 109 atomic_t stat_tx_ack_fill; 110 atomic_t stat_tx_ack_send; 111 atomic_t stat_tx_ack_skip; 112 atomic_t stat_tx_acks[256]; 113 atomic_t stat_rx_acks[256]; 114 atomic_t stat_tx_jumbo[10]; 115 atomic_t stat_rx_jumbo[10]; 116 117 atomic_t stat_why_req_ack[8]; 118 119 atomic_t stat_io_loop; 120 }; 121 122 /* 123 * Service backlog preallocation. 124 * 125 * This contains circular buffers of preallocated peers, connections and calls 126 * for incoming service calls and their head and tail pointers. This allows 127 * calls to be set up in the data_ready handler, thereby avoiding the need to 128 * shuffle packets around so much. 129 */ 130 struct rxrpc_backlog { 131 unsigned short peer_backlog_head; 132 unsigned short peer_backlog_tail; 133 unsigned short conn_backlog_head; 134 unsigned short conn_backlog_tail; 135 unsigned short call_backlog_head; 136 unsigned short call_backlog_tail; 137 #define RXRPC_BACKLOG_MAX 32 138 struct rxrpc_peer *peer_backlog[RXRPC_BACKLOG_MAX]; 139 struct rxrpc_connection *conn_backlog[RXRPC_BACKLOG_MAX]; 140 struct rxrpc_call *call_backlog[RXRPC_BACKLOG_MAX]; 141 }; 142 143 /* 144 * RxRPC socket definition 145 */ 146 struct rxrpc_sock { 147 /* WARNING: sk has to be the first member */ 148 struct sock sk; 149 rxrpc_notify_new_call_t notify_new_call; /* Func to notify of new call */ 150 rxrpc_discard_new_call_t discard_new_call; /* Func to discard a new call */ 151 struct rxrpc_local *local; /* local endpoint */ 152 struct rxrpc_backlog *backlog; /* Preallocation for services */ 153 spinlock_t incoming_lock; /* Incoming call vs service shutdown lock */ 154 struct list_head sock_calls; /* List of calls owned by this socket */ 155 struct list_head to_be_accepted; /* calls awaiting acceptance */ 156 struct list_head recvmsg_q; /* Calls awaiting recvmsg's attention */ 157 spinlock_t recvmsg_lock; /* Lock for recvmsg_q */ 158 struct key *key; /* security for this socket */ 159 struct key *securities; /* list of server security descriptors */ 160 struct rb_root calls; /* User ID -> call mapping */ 161 unsigned long flags; 162 #define RXRPC_SOCK_CONNECTED 0 /* connect_srx is set */ 163 rwlock_t call_lock; /* lock for calls */ 164 u32 min_sec_level; /* minimum security level */ 165 #define RXRPC_SECURITY_MAX RXRPC_SECURITY_ENCRYPT 166 bool exclusive; /* Exclusive connection for a client socket */ 167 u16 second_service; /* Additional service bound to the endpoint */ 168 struct { 169 /* Service upgrade information */ 170 u16 from; /* Service ID to upgrade (if not 0) */ 171 u16 to; /* service ID to upgrade to */ 172 } service_upgrade; 173 sa_family_t family; /* Protocol family created with */ 174 struct sockaddr_rxrpc srx; /* Primary Service/local addresses */ 175 struct sockaddr_rxrpc connect_srx; /* Default client address from connect() */ 176 }; 177 178 #define rxrpc_sk(__sk) container_of((__sk), struct rxrpc_sock, sk) 179 180 /* 181 * CPU-byteorder normalised Rx packet header. 182 */ 183 struct rxrpc_host_header { 184 u32 epoch; /* client boot timestamp */ 185 u32 cid; /* connection and channel ID */ 186 u32 callNumber; /* call ID (0 for connection-level packets) */ 187 u32 seq; /* sequence number of pkt in call stream */ 188 u32 serial; /* serial number of pkt sent to network */ 189 u8 type; /* packet type */ 190 u8 flags; /* packet flags */ 191 u8 userStatus; /* app-layer defined status */ 192 u8 securityIndex; /* security protocol ID */ 193 union { 194 u16 _rsvd; /* reserved */ 195 u16 cksum; /* kerberos security checksum */ 196 }; 197 u16 serviceId; /* service ID */ 198 } __packed; 199 200 /* 201 * RxRPC socket buffer private variables 202 * - max 48 bytes (struct sk_buff::cb) 203 */ 204 struct rxrpc_skb_priv { 205 union { 206 struct rxrpc_connection *conn; /* Connection referred to (poke packet) */ 207 struct { 208 u16 offset; /* Offset of data */ 209 u16 len; /* Length of data */ 210 u8 flags; 211 #define RXRPC_RX_VERIFIED 0x01 212 }; 213 struct { 214 rxrpc_seq_t first_ack; /* First packet in acks table */ 215 rxrpc_seq_t prev_ack; /* Highest seq seen */ 216 rxrpc_serial_t acked_serial; /* Packet in response to (or 0) */ 217 u16 nr_acks; /* Number of acks+nacks */ 218 u8 reason; /* Reason for ack */ 219 } ack; 220 }; 221 struct rxrpc_host_header hdr; /* RxRPC packet header from this packet */ 222 }; 223 224 #define rxrpc_skb(__skb) ((struct rxrpc_skb_priv *) &(__skb)->cb) 225 226 /* 227 * RxRPC security module interface 228 */ 229 struct rxrpc_security { 230 const char *name; /* name of this service */ 231 u8 security_index; /* security type provided */ 232 u32 no_key_abort; /* Abort code indicating no key */ 233 234 /* Initialise a security service */ 235 int (*init)(void); 236 237 /* Clean up a security service */ 238 void (*exit)(void); 239 240 /* Parse the information from a server key */ 241 int (*preparse_server_key)(struct key_preparsed_payload *); 242 243 /* Clean up the preparse buffer after parsing a server key */ 244 void (*free_preparse_server_key)(struct key_preparsed_payload *); 245 246 /* Destroy the payload of a server key */ 247 void (*destroy_server_key)(struct key *); 248 249 /* Describe a server key */ 250 void (*describe_server_key)(const struct key *, struct seq_file *); 251 252 /* initialise a connection's security */ 253 int (*init_connection_security)(struct rxrpc_connection *, 254 struct rxrpc_key_token *); 255 256 /* Work out how much data we can store in a packet, given an estimate 257 * of the amount of data remaining and allocate a data buffer. 258 */ 259 struct rxrpc_txbuf *(*alloc_txbuf)(struct rxrpc_call *call, size_t remaining, gfp_t gfp); 260 261 /* impose security on a packet */ 262 int (*secure_packet)(struct rxrpc_call *, struct rxrpc_txbuf *); 263 264 /* verify the security on a received packet */ 265 int (*verify_packet)(struct rxrpc_call *, struct sk_buff *); 266 267 /* Free crypto request on a call */ 268 void (*free_call_crypto)(struct rxrpc_call *); 269 270 /* issue a challenge */ 271 int (*issue_challenge)(struct rxrpc_connection *); 272 273 /* respond to a challenge */ 274 int (*respond_to_challenge)(struct rxrpc_connection *, 275 struct sk_buff *); 276 277 /* verify a response */ 278 int (*verify_response)(struct rxrpc_connection *, 279 struct sk_buff *); 280 281 /* clear connection security */ 282 void (*clear)(struct rxrpc_connection *); 283 }; 284 285 /* 286 * RxRPC local transport endpoint description 287 * - owned by a single AF_RXRPC socket 288 * - pointed to by transport socket struct sk_user_data 289 */ 290 struct rxrpc_local { 291 struct rcu_head rcu; 292 atomic_t active_users; /* Number of users of the local endpoint */ 293 refcount_t ref; /* Number of references to the structure */ 294 struct net *net; /* The network namespace */ 295 struct rxrpc_net *rxnet; /* Our bits in the network namespace */ 296 struct hlist_node link; 297 struct socket *socket; /* my UDP socket */ 298 struct task_struct *io_thread; 299 struct completion io_thread_ready; /* Indication that the I/O thread started */ 300 struct page_frag_cache tx_alloc; /* Tx control packet allocation (I/O thread only) */ 301 struct rxrpc_sock *service; /* Service(s) listening on this endpoint */ 302 #ifdef CONFIG_AF_RXRPC_INJECT_RX_DELAY 303 struct sk_buff_head rx_delay_queue; /* Delay injection queue */ 304 #endif 305 struct sk_buff_head rx_queue; /* Received packets */ 306 struct list_head conn_attend_q; /* Conns requiring immediate attention */ 307 struct list_head call_attend_q; /* Calls requiring immediate attention */ 308 309 struct rb_root client_bundles; /* Client connection bundles by socket params */ 310 spinlock_t client_bundles_lock; /* Lock for client_bundles */ 311 bool kill_all_client_conns; 312 struct list_head idle_client_conns; 313 struct timer_list client_conn_reap_timer; 314 unsigned long client_conn_flags; 315 #define RXRPC_CLIENT_CONN_REAP_TIMER 0 /* The client conn reap timer expired */ 316 317 spinlock_t lock; /* access lock */ 318 rwlock_t services_lock; /* lock for services list */ 319 int debug_id; /* debug ID for printks */ 320 bool dead; 321 bool service_closed; /* Service socket closed */ 322 struct idr conn_ids; /* List of connection IDs */ 323 struct list_head new_client_calls; /* Newly created client calls need connection */ 324 spinlock_t client_call_lock; /* Lock for ->new_client_calls */ 325 struct sockaddr_rxrpc srx; /* local address */ 326 /* Provide a kvec table sufficiently large to manage either a DATA 327 * packet with a maximum set of jumbo subpackets or a PING ACK padded 328 * out to 64K with zeropages for PMTUD. 329 */ 330 struct kvec kvec[RXRPC_MAX_NR_JUMBO > 3 + 16 ? 331 RXRPC_MAX_NR_JUMBO : 3 + 16]; 332 }; 333 334 /* 335 * RxRPC remote transport endpoint definition 336 * - matched by local endpoint, remote port, address and protocol type 337 */ 338 struct rxrpc_peer { 339 struct rcu_head rcu; /* This must be first */ 340 refcount_t ref; 341 unsigned long hash_key; 342 struct hlist_node hash_link; 343 struct rxrpc_local *local; 344 struct hlist_head error_targets; /* targets for net error distribution */ 345 struct rb_root service_conns; /* Service connections */ 346 struct list_head keepalive_link; /* Link in net->peer_keepalive[] */ 347 time64_t last_tx_at; /* Last time packet sent here */ 348 seqlock_t service_conn_lock; 349 spinlock_t lock; /* access lock */ 350 int debug_id; /* debug ID for printks */ 351 struct sockaddr_rxrpc srx; /* remote address */ 352 353 /* Path MTU discovery [RFC8899] */ 354 unsigned int pmtud_trial; /* Current MTU probe size */ 355 unsigned int pmtud_good; /* Largest working MTU probe we've tried */ 356 unsigned int pmtud_bad; /* Smallest non-working MTU probe we've tried */ 357 bool pmtud_lost; /* T if MTU probe was lost */ 358 bool pmtud_probing; /* T if we have an active probe outstanding */ 359 bool pmtud_pending; /* T if a call to this peer should send a probe */ 360 u8 pmtud_jumbo; /* Max jumbo packets for the MTU */ 361 bool ackr_adv_pmtud; /* T if the peer advertises path-MTU */ 362 unsigned int ackr_max_data; /* Maximum data advertised by peer */ 363 seqcount_t mtu_lock; /* Lockless MTU access management */ 364 unsigned int if_mtu; /* Local interface MTU (- hdrsize) for this peer */ 365 unsigned int max_data; /* Maximum packet data capacity for this peer */ 366 unsigned short hdrsize; /* header size (IP + UDP + RxRPC) */ 367 unsigned short tx_seg_max; /* Maximum number of transmissable segments */ 368 369 /* Calculated RTT cache */ 370 unsigned int recent_srtt_us; 371 unsigned int recent_rto_us; 372 373 u8 cong_ssthresh; /* Congestion slow-start threshold */ 374 }; 375 376 /* 377 * Keys for matching a connection. 378 */ 379 struct rxrpc_conn_proto { 380 union { 381 struct { 382 u32 epoch; /* epoch of this connection */ 383 u32 cid; /* connection ID */ 384 }; 385 u64 index_key; 386 }; 387 }; 388 389 struct rxrpc_conn_parameters { 390 struct rxrpc_local *local; /* Representation of local endpoint */ 391 struct rxrpc_peer *peer; /* Representation of remote endpoint */ 392 struct key *key; /* Security details */ 393 bool exclusive; /* T if conn is exclusive */ 394 bool upgrade; /* T if service ID can be upgraded */ 395 u16 service_id; /* Service ID for this connection */ 396 u32 security_level; /* Security level selected */ 397 }; 398 399 /* 400 * Call completion condition (state == RXRPC_CALL_COMPLETE). 401 */ 402 enum rxrpc_call_completion { 403 RXRPC_CALL_SUCCEEDED, /* - Normal termination */ 404 RXRPC_CALL_REMOTELY_ABORTED, /* - call aborted by peer */ 405 RXRPC_CALL_LOCALLY_ABORTED, /* - call aborted locally on error or close */ 406 RXRPC_CALL_LOCAL_ERROR, /* - call failed due to local error */ 407 RXRPC_CALL_NETWORK_ERROR, /* - call terminated by network error */ 408 NR__RXRPC_CALL_COMPLETIONS 409 }; 410 411 /* 412 * Bits in the connection flags. 413 */ 414 enum rxrpc_conn_flag { 415 RXRPC_CONN_IN_SERVICE_CONNS, /* Conn is in peer->service_conns */ 416 RXRPC_CONN_DONT_REUSE, /* Don't reuse this connection */ 417 RXRPC_CONN_PROBING_FOR_UPGRADE, /* Probing for service upgrade */ 418 RXRPC_CONN_FINAL_ACK_0, /* Need final ACK for channel 0 */ 419 RXRPC_CONN_FINAL_ACK_1, /* Need final ACK for channel 1 */ 420 RXRPC_CONN_FINAL_ACK_2, /* Need final ACK for channel 2 */ 421 RXRPC_CONN_FINAL_ACK_3, /* Need final ACK for channel 3 */ 422 }; 423 424 #define RXRPC_CONN_FINAL_ACK_MASK ((1UL << RXRPC_CONN_FINAL_ACK_0) | \ 425 (1UL << RXRPC_CONN_FINAL_ACK_1) | \ 426 (1UL << RXRPC_CONN_FINAL_ACK_2) | \ 427 (1UL << RXRPC_CONN_FINAL_ACK_3)) 428 429 /* 430 * Events that can be raised upon a connection. 431 */ 432 enum rxrpc_conn_event { 433 RXRPC_CONN_EV_CHALLENGE, /* Send challenge packet */ 434 RXRPC_CONN_EV_ABORT_CALLS, /* Abort attached calls */ 435 }; 436 437 /* 438 * The connection protocol state. 439 */ 440 enum rxrpc_conn_proto_state { 441 RXRPC_CONN_UNUSED, /* Connection not yet attempted */ 442 RXRPC_CONN_CLIENT_UNSECURED, /* Client connection needs security init */ 443 RXRPC_CONN_CLIENT, /* Client connection */ 444 RXRPC_CONN_SERVICE_PREALLOC, /* Service connection preallocation */ 445 RXRPC_CONN_SERVICE_UNSECURED, /* Service unsecured connection */ 446 RXRPC_CONN_SERVICE_CHALLENGING, /* Service challenging for security */ 447 RXRPC_CONN_SERVICE, /* Service secured connection */ 448 RXRPC_CONN_ABORTED, /* Conn aborted */ 449 RXRPC_CONN__NR_STATES 450 }; 451 452 /* 453 * RxRPC client connection bundle. 454 */ 455 struct rxrpc_bundle { 456 struct rxrpc_local *local; /* Representation of local endpoint */ 457 struct rxrpc_peer *peer; /* Remote endpoint */ 458 struct key *key; /* Security details */ 459 struct list_head proc_link; /* Link in net->bundle_proc_list */ 460 const struct rxrpc_security *security; /* applied security module */ 461 refcount_t ref; 462 atomic_t active; /* Number of active users */ 463 unsigned int debug_id; 464 u32 security_level; /* Security level selected */ 465 u16 service_id; /* Service ID for this connection */ 466 bool try_upgrade; /* True if the bundle is attempting upgrade */ 467 bool exclusive; /* T if conn is exclusive */ 468 bool upgrade; /* T if service ID can be upgraded */ 469 unsigned short alloc_error; /* Error from last conn allocation */ 470 struct rb_node local_node; /* Node in local->client_conns */ 471 struct list_head waiting_calls; /* Calls waiting for channels */ 472 unsigned long avail_chans; /* Mask of available channels */ 473 unsigned int conn_ids[4]; /* Connection IDs. */ 474 struct rxrpc_connection *conns[4]; /* The connections in the bundle (max 4) */ 475 }; 476 477 /* 478 * RxRPC connection definition 479 * - matched by { local, peer, epoch, conn_id, direction } 480 * - each connection can only handle four simultaneous calls 481 */ 482 struct rxrpc_connection { 483 struct rxrpc_conn_proto proto; 484 struct rxrpc_local *local; /* Representation of local endpoint */ 485 struct rxrpc_peer *peer; /* Remote endpoint */ 486 struct rxrpc_net *rxnet; /* Network namespace to which call belongs */ 487 struct key *key; /* Security details */ 488 struct list_head attend_link; /* Link in local->conn_attend_q */ 489 490 refcount_t ref; 491 atomic_t active; /* Active count for service conns */ 492 struct rcu_head rcu; 493 struct list_head cache_link; 494 495 unsigned char act_chans; /* Mask of active channels */ 496 struct rxrpc_channel { 497 unsigned long final_ack_at; /* Time at which to issue final ACK */ 498 struct rxrpc_call *call; /* Active call */ 499 unsigned int call_debug_id; /* call->debug_id */ 500 u32 call_id; /* ID of current call */ 501 u32 call_counter; /* Call ID counter */ 502 u32 last_call; /* ID of last call */ 503 u8 last_type; /* Type of last packet */ 504 union { 505 u32 last_seq; 506 u32 last_abort; 507 }; 508 } channels[RXRPC_MAXCALLS]; 509 510 struct timer_list timer; /* Conn event timer */ 511 struct work_struct processor; /* connection event processor */ 512 struct work_struct destructor; /* In-process-context destroyer */ 513 struct rxrpc_bundle *bundle; /* Client connection bundle */ 514 struct rb_node service_node; /* Node in peer->service_conns */ 515 struct list_head proc_link; /* link in procfs list */ 516 struct list_head link; /* link in master connection list */ 517 struct sk_buff_head rx_queue; /* received conn-level packets */ 518 struct page_frag_cache tx_data_alloc; /* Tx DATA packet allocation */ 519 struct mutex tx_data_alloc_lock; 520 521 struct mutex security_lock; /* Lock for security management */ 522 const struct rxrpc_security *security; /* applied security module */ 523 union { 524 struct { 525 struct crypto_sync_skcipher *cipher; /* encryption handle */ 526 struct rxrpc_crypt csum_iv; /* packet checksum base */ 527 u32 nonce; /* response re-use preventer */ 528 } rxkad; 529 }; 530 unsigned long flags; 531 unsigned long events; 532 unsigned long idle_timestamp; /* Time at which last became idle */ 533 spinlock_t state_lock; /* state-change lock */ 534 enum rxrpc_conn_proto_state state; /* current state of connection */ 535 enum rxrpc_call_completion completion; /* Completion condition */ 536 s32 abort_code; /* Abort code of connection abort */ 537 int debug_id; /* debug ID for printks */ 538 rxrpc_serial_t tx_serial; /* Outgoing packet serial number counter */ 539 unsigned int hi_serial; /* highest serial number received */ 540 rxrpc_serial_t pmtud_probe; /* Serial of MTU probe (or 0) */ 541 unsigned int pmtud_call; /* ID of call used for probe */ 542 u32 service_id; /* Service ID, possibly upgraded */ 543 u32 security_level; /* Security level selected */ 544 u8 security_ix; /* security type */ 545 u8 out_clientflag; /* RXRPC_CLIENT_INITIATED if we are client */ 546 u8 bundle_shift; /* Index into bundle->avail_chans */ 547 bool exclusive; /* T if conn is exclusive */ 548 bool upgrade; /* T if service ID can be upgraded */ 549 u16 orig_service_id; /* Originally requested service ID */ 550 short error; /* Local error code */ 551 }; 552 553 static inline bool rxrpc_to_server(const struct rxrpc_skb_priv *sp) 554 { 555 return sp->hdr.flags & RXRPC_CLIENT_INITIATED; 556 } 557 558 static inline bool rxrpc_to_client(const struct rxrpc_skb_priv *sp) 559 { 560 return !rxrpc_to_server(sp); 561 } 562 563 /* 564 * Flags in call->flags. 565 */ 566 enum rxrpc_call_flag { 567 RXRPC_CALL_RELEASED, /* call has been released - no more message to userspace */ 568 RXRPC_CALL_HAS_USERID, /* has a user ID attached */ 569 RXRPC_CALL_IS_SERVICE, /* Call is service call */ 570 RXRPC_CALL_EXPOSED, /* The call was exposed to the world */ 571 RXRPC_CALL_RX_LAST, /* Received the last packet (at rxtx_top) */ 572 RXRPC_CALL_TX_LAST, /* Last packet in Tx buffer (at rxtx_top) */ 573 RXRPC_CALL_TX_ALL_ACKED, /* Last packet has been hard-acked */ 574 RXRPC_CALL_TX_NO_MORE, /* No more data to transmit (MSG_MORE deasserted) */ 575 RXRPC_CALL_SEND_PING, /* A ping will need to be sent */ 576 RXRPC_CALL_RETRANS_TIMEOUT, /* Retransmission due to timeout occurred */ 577 RXRPC_CALL_BEGAN_RX_TIMER, /* We began the expect_rx_by timer */ 578 RXRPC_CALL_RX_HEARD, /* The peer responded at least once to this call */ 579 RXRPC_CALL_DISCONNECTED, /* The call has been disconnected */ 580 RXRPC_CALL_KERNEL, /* The call was made by the kernel */ 581 RXRPC_CALL_UPGRADE, /* Service upgrade was requested for the call */ 582 RXRPC_CALL_EXCLUSIVE, /* The call uses a once-only connection */ 583 RXRPC_CALL_RX_IS_IDLE, /* recvmsg() is idle - send an ACK */ 584 RXRPC_CALL_RECVMSG_READ_ALL, /* recvmsg() read all of the received data */ 585 }; 586 587 /* 588 * Events that can be raised on a call. 589 */ 590 enum rxrpc_call_event { 591 RXRPC_CALL_EV_ACK_LOST, /* ACK may be lost, send ping */ 592 RXRPC_CALL_EV_INITIAL_PING, /* Send initial ping for a new service call */ 593 }; 594 595 /* 596 * The states that a call can be in. 597 */ 598 enum rxrpc_call_state { 599 RXRPC_CALL_UNINITIALISED, 600 RXRPC_CALL_CLIENT_AWAIT_CONN, /* - client waiting for connection to become available */ 601 RXRPC_CALL_CLIENT_SEND_REQUEST, /* - client sending request phase */ 602 RXRPC_CALL_CLIENT_AWAIT_REPLY, /* - client awaiting reply */ 603 RXRPC_CALL_CLIENT_RECV_REPLY, /* - client receiving reply phase */ 604 RXRPC_CALL_SERVER_PREALLOC, /* - service preallocation */ 605 RXRPC_CALL_SERVER_SECURING, /* - server securing request connection */ 606 RXRPC_CALL_SERVER_RECV_REQUEST, /* - server receiving request */ 607 RXRPC_CALL_SERVER_ACK_REQUEST, /* - server pending ACK of request */ 608 RXRPC_CALL_SERVER_SEND_REPLY, /* - server sending reply */ 609 RXRPC_CALL_SERVER_AWAIT_ACK, /* - server awaiting final ACK */ 610 RXRPC_CALL_COMPLETE, /* - call complete */ 611 NR__RXRPC_CALL_STATES 612 }; 613 614 /* 615 * Call Tx congestion management modes. 616 */ 617 enum rxrpc_ca_state { 618 RXRPC_CA_SLOW_START, 619 RXRPC_CA_CONGEST_AVOIDANCE, 620 RXRPC_CA_PACKET_LOSS, 621 RXRPC_CA_FAST_RETRANSMIT, 622 NR__RXRPC_CA_STATES 623 } __mode(byte); 624 625 /* 626 * Current purpose of call RACK timer. According to the RACK-TLP protocol 627 * [RFC8985], the transmission timer (call->rack_timo_at) may only be used for 628 * one of these at once. 629 */ 630 enum rxrpc_rack_timer_mode { 631 RXRPC_CALL_RACKTIMER_OFF, /* Timer not running */ 632 RXRPC_CALL_RACKTIMER_RACK_REORDER, /* RACK reordering timer */ 633 RXRPC_CALL_RACKTIMER_TLP_PTO, /* TLP timeout */ 634 RXRPC_CALL_RACKTIMER_RTO, /* Retransmission timeout */ 635 } __mode(byte); 636 637 /* 638 * RxRPC call definition 639 * - matched by { connection, call_id } 640 */ 641 struct rxrpc_call { 642 struct rcu_head rcu; 643 struct rxrpc_connection *conn; /* connection carrying call */ 644 struct rxrpc_bundle *bundle; /* Connection bundle to use */ 645 struct rxrpc_peer *peer; /* Peer record for remote address */ 646 struct rxrpc_local *local; /* Representation of local endpoint */ 647 struct rxrpc_sock __rcu *socket; /* socket responsible */ 648 struct rxrpc_net *rxnet; /* Network namespace to which call belongs */ 649 struct key *key; /* Security details */ 650 const struct rxrpc_security *security; /* applied security module */ 651 struct mutex user_mutex; /* User access mutex */ 652 struct sockaddr_rxrpc dest_srx; /* Destination address */ 653 ktime_t delay_ack_at; /* When DELAY ACK needs to happen */ 654 ktime_t rack_timo_at; /* When ACK is figured as lost */ 655 ktime_t ping_at; /* When next to send a ping */ 656 ktime_t keepalive_at; /* When next to send a keepalive ping */ 657 ktime_t expect_rx_by; /* When we expect to get a packet by */ 658 ktime_t expect_req_by; /* When we expect to get a request DATA packet by */ 659 ktime_t expect_term_by; /* When we expect call termination by */ 660 u32 next_rx_timo; /* Timeout for next Rx packet (ms) */ 661 u32 next_req_timo; /* Timeout for next Rx request packet (ms) */ 662 u32 hard_timo; /* Maximum lifetime or 0 (s) */ 663 struct timer_list timer; /* Combined event timer */ 664 struct work_struct destroyer; /* In-process-context destroyer */ 665 rxrpc_notify_rx_t notify_rx; /* kernel service Rx notification function */ 666 struct list_head link; /* link in master call list */ 667 struct list_head wait_link; /* Link in local->new_client_calls */ 668 struct hlist_node error_link; /* link in error distribution list */ 669 struct list_head accept_link; /* Link in rx->acceptq */ 670 struct list_head recvmsg_link; /* Link in rx->recvmsg_q */ 671 struct list_head sock_link; /* Link in rx->sock_calls */ 672 struct rb_node sock_node; /* Node in rx->calls */ 673 struct list_head attend_link; /* Link in local->call_attend_q */ 674 struct rxrpc_txbuf *tx_pending; /* Tx buffer being filled */ 675 wait_queue_head_t waitq; /* Wait queue for channel or Tx */ 676 s64 tx_total_len; /* Total length left to be transmitted (or -1) */ 677 unsigned long user_call_ID; /* user-defined call ID */ 678 unsigned long flags; 679 unsigned long events; 680 spinlock_t notify_lock; /* Kernel notification lock */ 681 unsigned int send_abort_why; /* Why the abort [enum rxrpc_abort_reason] */ 682 s32 send_abort; /* Abort code to be sent */ 683 short send_abort_err; /* Error to be associated with the abort */ 684 rxrpc_seq_t send_abort_seq; /* DATA packet that incurred the abort (or 0) */ 685 s32 abort_code; /* Local/remote abort code */ 686 int error; /* Local error incurred */ 687 enum rxrpc_call_state _state; /* Current state of call (needs barrier) */ 688 enum rxrpc_call_completion completion; /* Call completion condition */ 689 refcount_t ref; 690 u8 security_ix; /* Security type */ 691 enum rxrpc_interruptibility interruptibility; /* At what point call may be interrupted */ 692 u32 call_id; /* call ID on connection */ 693 u32 cid; /* connection ID plus channel index */ 694 u32 security_level; /* Security level selected */ 695 int debug_id; /* debug ID for printks */ 696 unsigned short rx_pkt_offset; /* Current recvmsg packet offset */ 697 unsigned short rx_pkt_len; /* Current recvmsg packet len */ 698 699 /* Sendmsg data tracking. */ 700 rxrpc_seq_t send_top; /* Highest Tx slot filled by sendmsg. */ 701 struct rxrpc_txqueue *send_queue; /* Queue that sendmsg is writing into */ 702 703 /* Transmitted data tracking. */ 704 struct rxrpc_txqueue *tx_queue; /* Start of transmission buffers */ 705 struct rxrpc_txqueue *tx_qtail; /* End of transmission buffers */ 706 rxrpc_seq_t tx_qbase; /* First slot in tx_queue */ 707 rxrpc_seq_t tx_bottom; /* First packet in buffer */ 708 rxrpc_seq_t tx_transmitted; /* Highest packet transmitted */ 709 rxrpc_seq_t tx_top; /* Highest Tx slot allocated. */ 710 rxrpc_serial_t tx_last_serial; /* Serial of last DATA transmitted */ 711 u16 tx_backoff; /* Delay to insert due to Tx failure (ms) */ 712 u16 tx_nr_sent; /* Number of packets sent, but unacked */ 713 u16 tx_nr_lost; /* Number of packets marked lost */ 714 u16 tx_nr_resent; /* Number of packets resent, but unacked */ 715 u16 tx_winsize; /* Maximum size of Tx window */ 716 #define RXRPC_TX_MAX_WINDOW 128 717 u8 tx_jumbo_max; /* Maximum subpkts peer will accept */ 718 ktime_t tx_last_sent; /* Last time a transmission occurred */ 719 720 /* Received data tracking */ 721 struct sk_buff_head recvmsg_queue; /* Queue of packets ready for recvmsg() */ 722 struct sk_buff_head rx_queue; /* Queue of packets for this call to receive */ 723 struct sk_buff_head rx_oos_queue; /* Queue of out of sequence packets */ 724 725 rxrpc_seq_t rx_highest_seq; /* Higest sequence number received */ 726 rxrpc_seq_t rx_consumed; /* Highest packet consumed */ 727 rxrpc_serial_t rx_serial; /* Highest serial received for this call */ 728 u8 rx_winsize; /* Size of Rx window */ 729 730 /* TCP-style slow-start congestion control [RFC5681]. Since the SMSS 731 * is fixed, we keep these numbers in terms of segments (ie. DATA 732 * packets) rather than bytes. 733 */ 734 #define RXRPC_TX_SMSS RXRPC_JUMBO_DATALEN 735 #define RXRPC_MIN_CWND 4 736 enum rxrpc_ca_state cong_ca_state; /* Congestion control state */ 737 u8 cong_extra; /* Extra to send for congestion management */ 738 u16 cong_cwnd; /* Congestion window size */ 739 u16 cong_ssthresh; /* Slow-start threshold */ 740 u16 cong_dup_acks; /* Count of ACKs showing missing packets */ 741 u16 cong_cumul_acks; /* Cumulative ACK count */ 742 ktime_t cong_tstamp; /* Last time cwnd was changed */ 743 744 /* RACK-TLP [RFC8985] state. */ 745 ktime_t rack_xmit_ts; /* Latest transmission timestamp */ 746 ktime_t rack_rtt; /* RTT of most recently ACK'd segment */ 747 ktime_t rack_rtt_ts; /* Timestamp of rack_rtt */ 748 ktime_t rack_reo_wnd; /* Reordering window */ 749 unsigned int rack_reo_wnd_mult; /* Multiplier applied to rack_reo_wnd */ 750 int rack_reo_wnd_persist; /* Num loss recoveries before reset reo_wnd */ 751 rxrpc_seq_t rack_fack; /* Highest sequence so far ACK'd */ 752 rxrpc_seq_t rack_end_seq; /* Highest sequence seen */ 753 rxrpc_seq_t rack_dsack_round; /* DSACK opt recv'd in latest roundtrip */ 754 bool rack_dsack_round_none; /* T if dsack_round is "None" */ 755 bool rack_reordering_seen; /* T if detected reordering event */ 756 enum rxrpc_rack_timer_mode rack_timer_mode; /* Current mode of RACK timer */ 757 bool tlp_is_retrans; /* T if unacked TLP retransmission */ 758 rxrpc_serial_t tlp_serial; /* Serial of TLP probe (or 0 if none in progress) */ 759 rxrpc_seq_t tlp_seq; /* Sequence of TLP probe */ 760 unsigned int tlp_rtt_taken; /* Last time RTT taken */ 761 ktime_t tlp_max_ack_delay; /* Sender budget for max delayed ACK interval */ 762 763 /* Receive-phase ACK management (ACKs we send). */ 764 u8 ackr_reason; /* reason to ACK */ 765 u16 ackr_sack_base; /* Starting slot in SACK table ring */ 766 rxrpc_seq_t ackr_window; /* Base of SACK window */ 767 rxrpc_seq_t ackr_wtop; /* Base of SACK window */ 768 unsigned int ackr_nr_unacked; /* Number of unacked packets */ 769 atomic_t ackr_nr_consumed; /* Number of packets needing hard ACK */ 770 struct { 771 #define RXRPC_SACK_SIZE 256 772 /* SACK table for soft-acked packets */ 773 u8 ackr_sack_table[RXRPC_SACK_SIZE]; 774 } __aligned(8); 775 776 /* RTT management */ 777 rxrpc_serial_t rtt_serial[4]; /* Serial number of DATA or PING sent */ 778 ktime_t rtt_sent_at[4]; /* Time packet sent */ 779 unsigned long rtt_avail; /* Mask of available slots in bits 0-3, 780 * Mask of pending samples in 8-11 */ 781 #define RXRPC_CALL_RTT_AVAIL_MASK 0xf 782 #define RXRPC_CALL_RTT_PEND_SHIFT 8 783 784 /* Transmission-phase ACK management (ACKs we've received). */ 785 ktime_t acks_latest_ts; /* Timestamp of latest ACK received */ 786 rxrpc_seq_t acks_hard_ack; /* Highest sequence hard acked */ 787 rxrpc_seq_t acks_prev_seq; /* Highest previousPacket received */ 788 rxrpc_seq_t acks_lowest_nak; /* Lowest NACK in the buffer (or ==tx_hard_ack) */ 789 rxrpc_serial_t acks_highest_serial; /* Highest serial number ACK'd */ 790 unsigned short acks_nr_sacks; /* Number of soft acks recorded */ 791 unsigned short acks_nr_snacks; /* Number of soft nacks recorded */ 792 793 /* Calculated RTT cache */ 794 ktime_t rtt_last_req; /* Time of last RTT request */ 795 unsigned int rtt_count; /* Number of samples we've got */ 796 unsigned int rtt_taken; /* Number of samples taken (wrapping) */ 797 struct minmax min_rtt; /* Estimated minimum RTT */ 798 u32 srtt_us; /* smoothed round trip time << 3 in usecs */ 799 u32 mdev_us; /* medium deviation */ 800 u32 mdev_max_us; /* maximal mdev for the last rtt period */ 801 u32 rttvar_us; /* smoothed mdev_max */ 802 u32 rto_us; /* Retransmission timeout in usec */ 803 u8 backoff; /* Backoff timeout (as shift) */ 804 }; 805 806 /* 807 * Summary of a new ACK and the changes it made to the Tx buffer packet states. 808 */ 809 struct rxrpc_ack_summary { 810 rxrpc_serial_t ack_serial; /* Serial number of ACK */ 811 rxrpc_serial_t acked_serial; /* Serial number ACK'd */ 812 u16 in_flight; /* Number of unreceived transmissions */ 813 u16 nr_new_hacks; /* Number of rotated new ACKs */ 814 u16 nr_new_sacks; /* Number of new soft ACKs in packet */ 815 u16 nr_new_snacks; /* Number of new soft nacks in packet */ 816 u8 ack_reason; 817 bool new_low_snack:1; /* T if new low soft NACK found */ 818 bool retrans_timeo:1; /* T if reTx due to timeout happened */ 819 bool need_retransmit:1; /* T if we need transmission */ 820 bool rtt_sample_avail:1; /* T if RTT sample available */ 821 bool in_fast_or_rto_recovery:1; 822 bool exiting_fast_or_rto_recovery:1; 823 bool tlp_probe_acked:1; /* T if the TLP probe seq was acked */ 824 u8 /*enum rxrpc_congest_change*/ change; 825 }; 826 827 /* 828 * sendmsg() cmsg-specified parameters. 829 */ 830 enum rxrpc_command { 831 RXRPC_CMD_SEND_DATA, /* send data message */ 832 RXRPC_CMD_SEND_ABORT, /* request abort generation */ 833 RXRPC_CMD_REJECT_BUSY, /* [server] reject a call as busy */ 834 RXRPC_CMD_CHARGE_ACCEPT, /* [server] charge accept preallocation */ 835 }; 836 837 struct rxrpc_call_params { 838 s64 tx_total_len; /* Total Tx data length (if send data) */ 839 unsigned long user_call_ID; /* User's call ID */ 840 struct { 841 u32 hard; /* Maximum lifetime (sec) */ 842 u32 idle; /* Max time since last data packet (msec) */ 843 u32 normal; /* Max time since last call packet (msec) */ 844 } timeouts; 845 u8 nr_timeouts; /* Number of timeouts specified */ 846 bool kernel; /* T if kernel is making the call */ 847 enum rxrpc_interruptibility interruptibility; /* How is interruptible is the call? */ 848 }; 849 850 struct rxrpc_send_params { 851 struct rxrpc_call_params call; 852 u32 abort_code; /* Abort code to Tx (if abort) */ 853 enum rxrpc_command command : 8; /* The command to implement */ 854 bool exclusive; /* Shared or exclusive call */ 855 bool upgrade; /* If the connection is upgradeable */ 856 }; 857 858 /* 859 * Buffer of data to be output as a packet. 860 */ 861 struct rxrpc_txbuf { 862 refcount_t ref; 863 rxrpc_seq_t seq; /* Sequence number of this packet */ 864 rxrpc_serial_t serial; /* Last serial number transmitted with */ 865 unsigned int call_debug_id; 866 unsigned int debug_id; 867 unsigned short len; /* Amount of data in buffer */ 868 unsigned short space; /* Remaining data space */ 869 unsigned short offset; /* Offset of fill point */ 870 unsigned short pkt_len; /* Size of packet content */ 871 unsigned short alloc_size; /* Amount of bufferage allocated */ 872 unsigned int flags; 873 #define RXRPC_TXBUF_WIRE_FLAGS 0xff /* The wire protocol flags */ 874 #define RXRPC_TXBUF_RESENT 0x100 /* Set if has been resent */ 875 __be16 cksum; /* Checksum to go in header */ 876 bool jumboable; /* Can be non-terminal jumbo subpacket */ 877 u8 nr_kvec; /* Amount of kvec[] used */ 878 struct kvec kvec[1]; 879 }; 880 881 static inline bool rxrpc_sending_to_server(const struct rxrpc_txbuf *txb) 882 { 883 return txb->flags & RXRPC_CLIENT_INITIATED; 884 } 885 886 static inline bool rxrpc_sending_to_client(const struct rxrpc_txbuf *txb) 887 { 888 return !rxrpc_sending_to_server(txb); 889 } 890 891 /* 892 * Transmit queue element, including RACK [RFC8985] per-segment metadata. The 893 * transmission timestamp is in usec from the base. 894 */ 895 struct rxrpc_txqueue { 896 /* Start with the members we want to prefetch. */ 897 struct rxrpc_txqueue *next; 898 ktime_t xmit_ts_base; 899 rxrpc_seq_t qbase; 900 u8 nr_reported_acks; /* Number of segments explicitly acked/nacked */ 901 unsigned long segment_acked; /* Bit-per-buf: Set if ACK'd */ 902 unsigned long segment_lost; /* Bit-per-buf: Set if declared lost */ 903 unsigned long segment_retransmitted; /* Bit-per-buf: Set if retransmitted */ 904 unsigned long rtt_samples; /* Bit-per-buf: Set if available for RTT */ 905 unsigned long ever_retransmitted; /* Bit-per-buf: Set if ever retransmitted */ 906 907 /* The arrays we want to pack into as few cache lines as possible. */ 908 struct { 909 #define RXRPC_NR_TXQUEUE BITS_PER_LONG 910 #define RXRPC_TXQ_MASK (RXRPC_NR_TXQUEUE - 1) 911 struct rxrpc_txbuf *bufs[RXRPC_NR_TXQUEUE]; 912 unsigned int segment_serial[RXRPC_NR_TXQUEUE]; 913 unsigned int segment_xmit_ts[RXRPC_NR_TXQUEUE]; 914 } ____cacheline_aligned; 915 }; 916 917 /* 918 * Data transmission request. 919 */ 920 struct rxrpc_send_data_req { 921 ktime_t now; /* Current time */ 922 struct rxrpc_txqueue *tq; /* Tx queue segment holding first DATA */ 923 rxrpc_seq_t seq; /* Sequence of first data */ 924 int n; /* Number of DATA packets to glue into jumbo */ 925 bool retrans; /* T if this is a retransmission */ 926 bool did_send; /* T if did actually send */ 927 bool tlp_probe; /* T if this is a TLP probe */ 928 int /* enum rxrpc_txdata_trace */ trace; 929 }; 930 931 #include <trace/events/rxrpc.h> 932 933 /* 934 * Allocate the next serial number on a connection. 0 must be skipped. 935 */ 936 static inline rxrpc_serial_t rxrpc_get_next_serial(struct rxrpc_connection *conn) 937 { 938 rxrpc_serial_t serial; 939 940 serial = conn->tx_serial; 941 if (serial == 0) 942 serial = 1; 943 conn->tx_serial = serial + 1; 944 return serial; 945 } 946 947 /* 948 * Allocate the next serial n numbers on a connection. 0 must be skipped. 949 */ 950 static inline rxrpc_serial_t rxrpc_get_next_serials(struct rxrpc_connection *conn, 951 unsigned int n) 952 { 953 rxrpc_serial_t serial; 954 955 serial = conn->tx_serial; 956 if (serial + n <= n) 957 serial = 1; 958 conn->tx_serial = serial + n; 959 return serial; 960 } 961 962 /* 963 * af_rxrpc.c 964 */ 965 extern atomic_t rxrpc_n_rx_skbs; 966 extern struct workqueue_struct *rxrpc_workqueue; 967 968 /* 969 * call_accept.c 970 */ 971 int rxrpc_service_prealloc(struct rxrpc_sock *, gfp_t); 972 void rxrpc_discard_prealloc(struct rxrpc_sock *); 973 bool rxrpc_new_incoming_call(struct rxrpc_local *local, 974 struct rxrpc_peer *peer, 975 struct rxrpc_connection *conn, 976 struct sockaddr_rxrpc *peer_srx, 977 struct sk_buff *skb); 978 int rxrpc_user_charge_accept(struct rxrpc_sock *, unsigned long); 979 980 /* 981 * call_event.c 982 */ 983 void rxrpc_propose_ping(struct rxrpc_call *call, u32 serial, 984 enum rxrpc_propose_ack_trace why); 985 void rxrpc_propose_delay_ACK(struct rxrpc_call *, rxrpc_serial_t, 986 enum rxrpc_propose_ack_trace); 987 void rxrpc_resend_tlp(struct rxrpc_call *call); 988 void rxrpc_transmit_some_data(struct rxrpc_call *call, unsigned int limit, 989 enum rxrpc_txdata_trace trace); 990 bool rxrpc_input_call_event(struct rxrpc_call *call); 991 992 /* 993 * call_object.c 994 */ 995 extern const char *const rxrpc_call_states[]; 996 extern const char *const rxrpc_call_completions[]; 997 extern struct kmem_cache *rxrpc_call_jar; 998 999 void rxrpc_poke_call(struct rxrpc_call *call, enum rxrpc_call_poke_trace what); 1000 struct rxrpc_call *rxrpc_find_call_by_user_ID(struct rxrpc_sock *, unsigned long); 1001 struct rxrpc_call *rxrpc_alloc_call(struct rxrpc_sock *, gfp_t, unsigned int); 1002 struct rxrpc_call *rxrpc_new_client_call(struct rxrpc_sock *, 1003 struct rxrpc_conn_parameters *, 1004 struct rxrpc_call_params *, gfp_t, 1005 unsigned int); 1006 void rxrpc_start_call_timer(struct rxrpc_call *call); 1007 void rxrpc_incoming_call(struct rxrpc_sock *, struct rxrpc_call *, 1008 struct sk_buff *); 1009 void rxrpc_release_call(struct rxrpc_sock *, struct rxrpc_call *); 1010 void rxrpc_release_calls_on_socket(struct rxrpc_sock *); 1011 void rxrpc_see_call(struct rxrpc_call *, enum rxrpc_call_trace); 1012 struct rxrpc_call *rxrpc_try_get_call(struct rxrpc_call *, enum rxrpc_call_trace); 1013 void rxrpc_get_call(struct rxrpc_call *, enum rxrpc_call_trace); 1014 void rxrpc_put_call(struct rxrpc_call *, enum rxrpc_call_trace); 1015 void rxrpc_cleanup_call(struct rxrpc_call *); 1016 void rxrpc_destroy_all_calls(struct rxrpc_net *); 1017 1018 static inline bool rxrpc_is_service_call(const struct rxrpc_call *call) 1019 { 1020 return test_bit(RXRPC_CALL_IS_SERVICE, &call->flags); 1021 } 1022 1023 static inline bool rxrpc_is_client_call(const struct rxrpc_call *call) 1024 { 1025 return !rxrpc_is_service_call(call); 1026 } 1027 1028 /* 1029 * call_state.c 1030 */ 1031 bool rxrpc_set_call_completion(struct rxrpc_call *call, 1032 enum rxrpc_call_completion compl, 1033 u32 abort_code, 1034 int error); 1035 bool rxrpc_call_completed(struct rxrpc_call *call); 1036 bool rxrpc_abort_call(struct rxrpc_call *call, rxrpc_seq_t seq, 1037 u32 abort_code, int error, enum rxrpc_abort_reason why); 1038 void rxrpc_prefail_call(struct rxrpc_call *call, enum rxrpc_call_completion compl, 1039 int error); 1040 1041 static inline void rxrpc_set_call_state(struct rxrpc_call *call, 1042 enum rxrpc_call_state state) 1043 { 1044 /* Order write of completion info before write of ->state. */ 1045 smp_store_release(&call->_state, state); 1046 wake_up(&call->waitq); 1047 } 1048 1049 static inline enum rxrpc_call_state __rxrpc_call_state(const struct rxrpc_call *call) 1050 { 1051 return call->_state; /* Only inside I/O thread */ 1052 } 1053 1054 static inline bool __rxrpc_call_is_complete(const struct rxrpc_call *call) 1055 { 1056 return __rxrpc_call_state(call) == RXRPC_CALL_COMPLETE; 1057 } 1058 1059 static inline enum rxrpc_call_state rxrpc_call_state(const struct rxrpc_call *call) 1060 { 1061 /* Order read ->state before read of completion info. */ 1062 return smp_load_acquire(&call->_state); 1063 } 1064 1065 static inline bool rxrpc_call_is_complete(const struct rxrpc_call *call) 1066 { 1067 return rxrpc_call_state(call) == RXRPC_CALL_COMPLETE; 1068 } 1069 1070 static inline bool rxrpc_call_has_failed(const struct rxrpc_call *call) 1071 { 1072 return rxrpc_call_is_complete(call) && call->completion != RXRPC_CALL_SUCCEEDED; 1073 } 1074 1075 /* 1076 * conn_client.c 1077 */ 1078 extern unsigned int rxrpc_reap_client_connections; 1079 extern unsigned long rxrpc_conn_idle_client_expiry; 1080 extern unsigned long rxrpc_conn_idle_client_fast_expiry; 1081 1082 void rxrpc_purge_client_connections(struct rxrpc_local *local); 1083 struct rxrpc_bundle *rxrpc_get_bundle(struct rxrpc_bundle *, enum rxrpc_bundle_trace); 1084 void rxrpc_put_bundle(struct rxrpc_bundle *, enum rxrpc_bundle_trace); 1085 int rxrpc_look_up_bundle(struct rxrpc_call *call, gfp_t gfp); 1086 void rxrpc_connect_client_calls(struct rxrpc_local *local); 1087 void rxrpc_expose_client_call(struct rxrpc_call *); 1088 void rxrpc_disconnect_client_call(struct rxrpc_bundle *, struct rxrpc_call *); 1089 void rxrpc_deactivate_bundle(struct rxrpc_bundle *bundle); 1090 void rxrpc_discard_expired_client_conns(struct rxrpc_local *local); 1091 void rxrpc_clean_up_local_conns(struct rxrpc_local *); 1092 1093 /* 1094 * conn_event.c 1095 */ 1096 void rxrpc_conn_retransmit_call(struct rxrpc_connection *conn, struct sk_buff *skb, 1097 unsigned int channel); 1098 int rxrpc_abort_conn(struct rxrpc_connection *conn, struct sk_buff *skb, 1099 s32 abort_code, int err, enum rxrpc_abort_reason why); 1100 void rxrpc_process_connection(struct work_struct *); 1101 void rxrpc_process_delayed_final_acks(struct rxrpc_connection *, bool); 1102 bool rxrpc_input_conn_packet(struct rxrpc_connection *conn, struct sk_buff *skb); 1103 void rxrpc_input_conn_event(struct rxrpc_connection *conn, struct sk_buff *skb); 1104 1105 static inline bool rxrpc_is_conn_aborted(const struct rxrpc_connection *conn) 1106 { 1107 /* Order reading the abort info after the state check. */ 1108 return smp_load_acquire(&conn->state) == RXRPC_CONN_ABORTED; 1109 } 1110 1111 /* 1112 * conn_object.c 1113 */ 1114 extern unsigned int rxrpc_connection_expiry; 1115 extern unsigned int rxrpc_closed_conn_expiry; 1116 1117 void rxrpc_poke_conn(struct rxrpc_connection *conn, enum rxrpc_conn_trace why); 1118 struct rxrpc_connection *rxrpc_alloc_connection(struct rxrpc_net *, gfp_t); 1119 struct rxrpc_connection *rxrpc_find_client_connection_rcu(struct rxrpc_local *, 1120 struct sockaddr_rxrpc *, 1121 struct sk_buff *); 1122 void __rxrpc_disconnect_call(struct rxrpc_connection *, struct rxrpc_call *); 1123 void rxrpc_disconnect_call(struct rxrpc_call *); 1124 void rxrpc_kill_client_conn(struct rxrpc_connection *); 1125 void rxrpc_queue_conn(struct rxrpc_connection *, enum rxrpc_conn_trace); 1126 void rxrpc_see_connection(struct rxrpc_connection *, enum rxrpc_conn_trace); 1127 struct rxrpc_connection *rxrpc_get_connection(struct rxrpc_connection *, 1128 enum rxrpc_conn_trace); 1129 struct rxrpc_connection *rxrpc_get_connection_maybe(struct rxrpc_connection *, 1130 enum rxrpc_conn_trace); 1131 void rxrpc_put_connection(struct rxrpc_connection *, enum rxrpc_conn_trace); 1132 void rxrpc_service_connection_reaper(struct work_struct *); 1133 void rxrpc_destroy_all_connections(struct rxrpc_net *); 1134 1135 static inline bool rxrpc_conn_is_client(const struct rxrpc_connection *conn) 1136 { 1137 return conn->out_clientflag; 1138 } 1139 1140 static inline bool rxrpc_conn_is_service(const struct rxrpc_connection *conn) 1141 { 1142 return !rxrpc_conn_is_client(conn); 1143 } 1144 1145 static inline void rxrpc_reduce_conn_timer(struct rxrpc_connection *conn, 1146 unsigned long expire_at) 1147 { 1148 timer_reduce(&conn->timer, expire_at); 1149 } 1150 1151 /* 1152 * conn_service.c 1153 */ 1154 struct rxrpc_connection *rxrpc_find_service_conn_rcu(struct rxrpc_peer *, 1155 struct sk_buff *); 1156 struct rxrpc_connection *rxrpc_prealloc_service_connection(struct rxrpc_net *, gfp_t); 1157 void rxrpc_new_incoming_connection(struct rxrpc_sock *, struct rxrpc_connection *, 1158 const struct rxrpc_security *, struct sk_buff *); 1159 void rxrpc_unpublish_service_conn(struct rxrpc_connection *); 1160 1161 /* 1162 * input.c 1163 */ 1164 void rxrpc_congestion_degrade(struct rxrpc_call *); 1165 void rxrpc_input_call_packet(struct rxrpc_call *, struct sk_buff *); 1166 void rxrpc_implicit_end_call(struct rxrpc_call *, struct sk_buff *); 1167 1168 /* 1169 * input_rack.c 1170 */ 1171 void rxrpc_input_rack_one(struct rxrpc_call *call, 1172 struct rxrpc_ack_summary *summary, 1173 struct rxrpc_txqueue *tq, 1174 unsigned int ix); 1175 void rxrpc_input_rack(struct rxrpc_call *call, 1176 struct rxrpc_ack_summary *summary, 1177 struct rxrpc_txqueue *tq, 1178 unsigned long new_acks); 1179 void rxrpc_rack_detect_loss_and_arm_timer(struct rxrpc_call *call, 1180 struct rxrpc_ack_summary *summary); 1181 ktime_t rxrpc_tlp_calc_pto(struct rxrpc_call *call, ktime_t now); 1182 void rxrpc_tlp_send_probe(struct rxrpc_call *call); 1183 void rxrpc_tlp_process_ack(struct rxrpc_call *call, struct rxrpc_ack_summary *summary); 1184 void rxrpc_rack_timer_expired(struct rxrpc_call *call, ktime_t overran_by); 1185 1186 /* Initialise TLP state [RFC8958 7.1]. */ 1187 static inline void rxrpc_tlp_init(struct rxrpc_call *call) 1188 { 1189 call->tlp_serial = 0; 1190 call->tlp_seq = call->acks_hard_ack; 1191 call->tlp_is_retrans = false; 1192 } 1193 1194 /* 1195 * io_thread.c 1196 */ 1197 int rxrpc_encap_rcv(struct sock *, struct sk_buff *); 1198 void rxrpc_error_report(struct sock *); 1199 bool rxrpc_direct_abort(struct sk_buff *skb, enum rxrpc_abort_reason why, 1200 s32 abort_code, int err); 1201 int rxrpc_io_thread(void *data); 1202 static inline void rxrpc_wake_up_io_thread(struct rxrpc_local *local) 1203 { 1204 wake_up_process(READ_ONCE(local->io_thread)); 1205 } 1206 1207 static inline bool rxrpc_protocol_error(struct sk_buff *skb, enum rxrpc_abort_reason why) 1208 { 1209 return rxrpc_direct_abort(skb, why, RX_PROTOCOL_ERROR, -EPROTO); 1210 } 1211 1212 /* 1213 * insecure.c 1214 */ 1215 extern const struct rxrpc_security rxrpc_no_security; 1216 1217 /* 1218 * key.c 1219 */ 1220 extern struct key_type key_type_rxrpc; 1221 1222 int rxrpc_request_key(struct rxrpc_sock *, sockptr_t , int); 1223 int rxrpc_get_server_data_key(struct rxrpc_connection *, const void *, time64_t, 1224 u32); 1225 1226 /* 1227 * local_event.c 1228 */ 1229 void rxrpc_gen_version_string(void); 1230 void rxrpc_send_version_request(struct rxrpc_local *local, 1231 struct rxrpc_host_header *hdr, 1232 struct sk_buff *skb); 1233 1234 /* 1235 * local_object.c 1236 */ 1237 void rxrpc_local_dont_fragment(const struct rxrpc_local *local, bool set); 1238 struct rxrpc_local *rxrpc_lookup_local(struct net *, const struct sockaddr_rxrpc *); 1239 struct rxrpc_local *rxrpc_get_local(struct rxrpc_local *, enum rxrpc_local_trace); 1240 struct rxrpc_local *rxrpc_get_local_maybe(struct rxrpc_local *, enum rxrpc_local_trace); 1241 void rxrpc_put_local(struct rxrpc_local *, enum rxrpc_local_trace); 1242 struct rxrpc_local *rxrpc_use_local(struct rxrpc_local *, enum rxrpc_local_trace); 1243 void rxrpc_unuse_local(struct rxrpc_local *, enum rxrpc_local_trace); 1244 void rxrpc_destroy_local(struct rxrpc_local *local); 1245 void rxrpc_destroy_all_locals(struct rxrpc_net *); 1246 1247 static inline bool __rxrpc_use_local(struct rxrpc_local *local, 1248 enum rxrpc_local_trace why) 1249 { 1250 int r, u; 1251 1252 r = refcount_read(&local->ref); 1253 u = atomic_fetch_add_unless(&local->active_users, 1, 0); 1254 trace_rxrpc_local(local->debug_id, why, r, u); 1255 return u != 0; 1256 } 1257 1258 static inline void rxrpc_see_local(struct rxrpc_local *local, 1259 enum rxrpc_local_trace why) 1260 { 1261 int r, u; 1262 1263 r = refcount_read(&local->ref); 1264 u = atomic_read(&local->active_users); 1265 trace_rxrpc_local(local->debug_id, why, r, u); 1266 } 1267 1268 /* 1269 * misc.c 1270 */ 1271 extern unsigned int rxrpc_max_backlog __read_mostly; 1272 extern unsigned long rxrpc_soft_ack_delay; 1273 extern unsigned long rxrpc_idle_ack_delay; 1274 extern unsigned int rxrpc_rx_window_size; 1275 extern unsigned int rxrpc_rx_mtu; 1276 extern unsigned int rxrpc_rx_jumbo_max; 1277 #ifdef CONFIG_AF_RXRPC_INJECT_RX_DELAY 1278 extern unsigned long rxrpc_inject_rx_delay; 1279 #endif 1280 1281 /* 1282 * net_ns.c 1283 */ 1284 extern unsigned int rxrpc_net_id; 1285 extern struct pernet_operations rxrpc_net_ops; 1286 1287 static inline struct rxrpc_net *rxrpc_net(struct net *net) 1288 { 1289 return net_generic(net, rxrpc_net_id); 1290 } 1291 1292 /* 1293 * output.c 1294 */ 1295 void rxrpc_send_ACK(struct rxrpc_call *call, u8 ack_reason, 1296 rxrpc_serial_t serial, enum rxrpc_propose_ack_trace why); 1297 void rxrpc_send_probe_for_pmtud(struct rxrpc_call *call); 1298 int rxrpc_send_abort_packet(struct rxrpc_call *); 1299 void rxrpc_send_data_packet(struct rxrpc_call *call, struct rxrpc_send_data_req *req); 1300 void rxrpc_send_conn_abort(struct rxrpc_connection *conn); 1301 void rxrpc_reject_packet(struct rxrpc_local *local, struct sk_buff *skb); 1302 void rxrpc_send_keepalive(struct rxrpc_peer *); 1303 1304 /* 1305 * peer_event.c 1306 */ 1307 void rxrpc_input_error(struct rxrpc_local *, struct sk_buff *); 1308 void rxrpc_peer_keepalive_worker(struct work_struct *); 1309 void rxrpc_input_probe_for_pmtud(struct rxrpc_connection *conn, rxrpc_serial_t acked_serial, 1310 bool sendmsg_fail); 1311 1312 /* 1313 * peer_object.c 1314 */ 1315 struct rxrpc_peer *rxrpc_lookup_peer_rcu(struct rxrpc_local *, 1316 const struct sockaddr_rxrpc *); 1317 struct rxrpc_peer *rxrpc_lookup_peer(struct rxrpc_local *local, 1318 struct sockaddr_rxrpc *srx, gfp_t gfp); 1319 struct rxrpc_peer *rxrpc_alloc_peer(struct rxrpc_local *, gfp_t, 1320 enum rxrpc_peer_trace); 1321 void rxrpc_new_incoming_peer(struct rxrpc_local *local, struct rxrpc_peer *peer); 1322 void rxrpc_destroy_all_peers(struct rxrpc_net *); 1323 struct rxrpc_peer *rxrpc_get_peer(struct rxrpc_peer *, enum rxrpc_peer_trace); 1324 struct rxrpc_peer *rxrpc_get_peer_maybe(struct rxrpc_peer *, enum rxrpc_peer_trace); 1325 void rxrpc_put_peer(struct rxrpc_peer *, enum rxrpc_peer_trace); 1326 1327 /* 1328 * proc.c 1329 */ 1330 extern const struct seq_operations rxrpc_call_seq_ops; 1331 extern const struct seq_operations rxrpc_connection_seq_ops; 1332 extern const struct seq_operations rxrpc_bundle_seq_ops; 1333 extern const struct seq_operations rxrpc_peer_seq_ops; 1334 extern const struct seq_operations rxrpc_local_seq_ops; 1335 1336 /* 1337 * recvmsg.c 1338 */ 1339 void rxrpc_notify_socket(struct rxrpc_call *); 1340 int rxrpc_recvmsg(struct socket *, struct msghdr *, size_t, int); 1341 1342 /* 1343 * Abort a call due to a protocol error. 1344 */ 1345 static inline int rxrpc_abort_eproto(struct rxrpc_call *call, 1346 struct sk_buff *skb, 1347 s32 abort_code, 1348 enum rxrpc_abort_reason why) 1349 { 1350 struct rxrpc_skb_priv *sp = rxrpc_skb(skb); 1351 1352 rxrpc_abort_call(call, sp->hdr.seq, abort_code, -EPROTO, why); 1353 return -EPROTO; 1354 } 1355 1356 /* 1357 * rtt.c 1358 */ 1359 void rxrpc_call_add_rtt(struct rxrpc_call *call, enum rxrpc_rtt_rx_trace why, 1360 int rtt_slot, 1361 rxrpc_serial_t send_serial, rxrpc_serial_t resp_serial, 1362 ktime_t send_time, ktime_t resp_time); 1363 ktime_t rxrpc_get_rto_backoff(struct rxrpc_call *call, bool retrans); 1364 void rxrpc_call_init_rtt(struct rxrpc_call *call); 1365 1366 /* 1367 * rxkad.c 1368 */ 1369 #ifdef CONFIG_RXKAD 1370 extern const struct rxrpc_security rxkad; 1371 #endif 1372 1373 /* 1374 * security.c 1375 */ 1376 int __init rxrpc_init_security(void); 1377 const struct rxrpc_security *rxrpc_security_lookup(u8); 1378 void rxrpc_exit_security(void); 1379 int rxrpc_init_client_call_security(struct rxrpc_call *); 1380 int rxrpc_init_client_conn_security(struct rxrpc_connection *); 1381 const struct rxrpc_security *rxrpc_get_incoming_security(struct rxrpc_sock *, 1382 struct sk_buff *); 1383 struct key *rxrpc_look_up_server_security(struct rxrpc_connection *, 1384 struct sk_buff *, u32, u32); 1385 1386 /* 1387 * sendmsg.c 1388 */ 1389 bool rxrpc_propose_abort(struct rxrpc_call *call, s32 abort_code, int error, 1390 enum rxrpc_abort_reason why); 1391 int rxrpc_do_sendmsg(struct rxrpc_sock *, struct msghdr *, size_t); 1392 1393 /* 1394 * server_key.c 1395 */ 1396 extern struct key_type key_type_rxrpc_s; 1397 1398 int rxrpc_server_keyring(struct rxrpc_sock *, sockptr_t, int); 1399 1400 /* 1401 * skbuff.c 1402 */ 1403 void rxrpc_kernel_data_consumed(struct rxrpc_call *, struct sk_buff *); 1404 void rxrpc_new_skb(struct sk_buff *, enum rxrpc_skb_trace); 1405 void rxrpc_see_skb(struct sk_buff *, enum rxrpc_skb_trace); 1406 void rxrpc_eaten_skb(struct sk_buff *, enum rxrpc_skb_trace); 1407 void rxrpc_get_skb(struct sk_buff *, enum rxrpc_skb_trace); 1408 void rxrpc_free_skb(struct sk_buff *, enum rxrpc_skb_trace); 1409 void rxrpc_purge_queue(struct sk_buff_head *); 1410 1411 /* 1412 * stats.c 1413 */ 1414 int rxrpc_stats_show(struct seq_file *seq, void *v); 1415 int rxrpc_stats_clear(struct file *file, char *buf, size_t size); 1416 1417 #define rxrpc_inc_stat(rxnet, s) atomic_inc(&(rxnet)->s) 1418 #define rxrpc_dec_stat(rxnet, s) atomic_dec(&(rxnet)->s) 1419 1420 /* 1421 * sysctl.c 1422 */ 1423 #ifdef CONFIG_SYSCTL 1424 extern int __init rxrpc_sysctl_init(void); 1425 extern void rxrpc_sysctl_exit(void); 1426 #else 1427 static inline int __init rxrpc_sysctl_init(void) { return 0; } 1428 static inline void rxrpc_sysctl_exit(void) {} 1429 #endif 1430 1431 /* 1432 * txbuf.c 1433 */ 1434 extern atomic_t rxrpc_nr_txbuf; 1435 struct rxrpc_txbuf *rxrpc_alloc_data_txbuf(struct rxrpc_call *call, size_t data_size, 1436 size_t data_align, gfp_t gfp); 1437 void rxrpc_get_txbuf(struct rxrpc_txbuf *txb, enum rxrpc_txbuf_trace what); 1438 void rxrpc_see_txbuf(struct rxrpc_txbuf *txb, enum rxrpc_txbuf_trace what); 1439 void rxrpc_put_txbuf(struct rxrpc_txbuf *txb, enum rxrpc_txbuf_trace what); 1440 1441 /* 1442 * utils.c 1443 */ 1444 int rxrpc_extract_addr_from_skb(struct sockaddr_rxrpc *, struct sk_buff *); 1445 1446 static inline bool before(u32 seq1, u32 seq2) 1447 { 1448 return (s32)(seq1 - seq2) < 0; 1449 } 1450 static inline bool before_eq(u32 seq1, u32 seq2) 1451 { 1452 return (s32)(seq1 - seq2) <= 0; 1453 } 1454 static inline bool after(u32 seq1, u32 seq2) 1455 { 1456 return (s32)(seq1 - seq2) > 0; 1457 } 1458 static inline bool after_eq(u32 seq1, u32 seq2) 1459 { 1460 return (s32)(seq1 - seq2) >= 0; 1461 } 1462 1463 static inline u32 earliest(u32 seq1, u32 seq2) 1464 { 1465 return before(seq1, seq2) ? seq1 : seq2; 1466 } 1467 1468 static inline u32 latest(u32 seq1, u32 seq2) 1469 { 1470 return after(seq1, seq2) ? seq1 : seq2; 1471 } 1472 1473 static inline bool rxrpc_seq_in_txq(const struct rxrpc_txqueue *tq, rxrpc_seq_t seq) 1474 { 1475 return (seq & (RXRPC_NR_TXQUEUE - 1)) == tq->qbase; 1476 } 1477 1478 static inline void rxrpc_queue_rx_call_packet(struct rxrpc_call *call, struct sk_buff *skb) 1479 { 1480 rxrpc_get_skb(skb, rxrpc_skb_get_call_rx); 1481 __skb_queue_tail(&call->rx_queue, skb); 1482 rxrpc_poke_call(call, rxrpc_call_poke_rx_packet); 1483 } 1484 1485 /* 1486 * Calculate how much space there is for transmitting more DATA packets. 1487 */ 1488 static inline unsigned int rxrpc_tx_window_space(const struct rxrpc_call *call) 1489 { 1490 int winsize = umin(call->tx_winsize, call->cong_cwnd + call->cong_extra); 1491 int transmitted = call->tx_top - call->tx_bottom; 1492 1493 return max(winsize - transmitted, 0); 1494 } 1495 1496 static inline unsigned int rxrpc_left_out(const struct rxrpc_call *call) 1497 { 1498 return call->acks_nr_sacks + call->tx_nr_lost; 1499 } 1500 1501 /* 1502 * Calculate the number of transmitted DATA packets assumed to be in flight 1503 * [approx RFC6675]. 1504 */ 1505 static inline unsigned int rxrpc_tx_in_flight(const struct rxrpc_call *call) 1506 { 1507 return call->tx_nr_sent - rxrpc_left_out(call) + call->tx_nr_resent; 1508 } 1509 1510 /* 1511 * debug tracing 1512 */ 1513 extern unsigned int rxrpc_debug; 1514 1515 #define dbgprintk(FMT,...) \ 1516 printk("[%-6.6s] "FMT"\n", current->comm ,##__VA_ARGS__) 1517 1518 #define kenter(FMT,...) dbgprintk("==> %s("FMT")",__func__ ,##__VA_ARGS__) 1519 #define kleave(FMT,...) dbgprintk("<== %s()"FMT"",__func__ ,##__VA_ARGS__) 1520 #define kdebug(FMT,...) dbgprintk(" "FMT ,##__VA_ARGS__) 1521 1522 1523 #if defined(__KDEBUG) 1524 #define _enter(FMT,...) kenter(FMT,##__VA_ARGS__) 1525 #define _leave(FMT,...) kleave(FMT,##__VA_ARGS__) 1526 #define _debug(FMT,...) kdebug(FMT,##__VA_ARGS__) 1527 1528 #elif defined(CONFIG_AF_RXRPC_DEBUG) 1529 #define RXRPC_DEBUG_KENTER 0x01 1530 #define RXRPC_DEBUG_KLEAVE 0x02 1531 #define RXRPC_DEBUG_KDEBUG 0x04 1532 1533 #define _enter(FMT,...) \ 1534 do { \ 1535 if (unlikely(rxrpc_debug & RXRPC_DEBUG_KENTER)) \ 1536 kenter(FMT,##__VA_ARGS__); \ 1537 } while (0) 1538 1539 #define _leave(FMT,...) \ 1540 do { \ 1541 if (unlikely(rxrpc_debug & RXRPC_DEBUG_KLEAVE)) \ 1542 kleave(FMT,##__VA_ARGS__); \ 1543 } while (0) 1544 1545 #define _debug(FMT,...) \ 1546 do { \ 1547 if (unlikely(rxrpc_debug & RXRPC_DEBUG_KDEBUG)) \ 1548 kdebug(FMT,##__VA_ARGS__); \ 1549 } while (0) 1550 1551 #else 1552 #define _enter(FMT,...) no_printk("==> %s("FMT")",__func__ ,##__VA_ARGS__) 1553 #define _leave(FMT,...) no_printk("<== %s()"FMT"",__func__ ,##__VA_ARGS__) 1554 #define _debug(FMT,...) no_printk(" "FMT ,##__VA_ARGS__) 1555 #endif 1556 1557 /* 1558 * debug assertion checking 1559 */ 1560 #if 1 // defined(__KDEBUGALL) 1561 1562 #define ASSERT(X) \ 1563 do { \ 1564 if (unlikely(!(X))) { \ 1565 pr_err("Assertion failed\n"); \ 1566 BUG(); \ 1567 } \ 1568 } while (0) 1569 1570 #define ASSERTCMP(X, OP, Y) \ 1571 do { \ 1572 __typeof__(X) _x = (X); \ 1573 __typeof__(Y) _y = (__typeof__(X))(Y); \ 1574 if (unlikely(!(_x OP _y))) { \ 1575 pr_err("Assertion failed - %lu(0x%lx) %s %lu(0x%lx) is false\n", \ 1576 (unsigned long)_x, (unsigned long)_x, #OP, \ 1577 (unsigned long)_y, (unsigned long)_y); \ 1578 BUG(); \ 1579 } \ 1580 } while (0) 1581 1582 #define ASSERTIF(C, X) \ 1583 do { \ 1584 if (unlikely((C) && !(X))) { \ 1585 pr_err("Assertion failed\n"); \ 1586 BUG(); \ 1587 } \ 1588 } while (0) 1589 1590 #define ASSERTIFCMP(C, X, OP, Y) \ 1591 do { \ 1592 __typeof__(X) _x = (X); \ 1593 __typeof__(Y) _y = (__typeof__(X))(Y); \ 1594 if (unlikely((C) && !(_x OP _y))) { \ 1595 pr_err("Assertion failed - %lu(0x%lx) %s %lu(0x%lx) is false\n", \ 1596 (unsigned long)_x, (unsigned long)_x, #OP, \ 1597 (unsigned long)_y, (unsigned long)_y); \ 1598 BUG(); \ 1599 } \ 1600 } while (0) 1601 1602 #else 1603 1604 #define ASSERT(X) \ 1605 do { \ 1606 } while (0) 1607 1608 #define ASSERTCMP(X, OP, Y) \ 1609 do { \ 1610 } while (0) 1611 1612 #define ASSERTIF(C, X) \ 1613 do { \ 1614 } while (0) 1615 1616 #define ASSERTIFCMP(C, X, OP, Y) \ 1617 do { \ 1618 } while (0) 1619 1620 #endif /* __KDEBUGALL */ 1621