]> git.saurik.com Git - apple/xnu.git/blame - bsd/netinet/mptcp_var.h
xnu-6153.81.5.tar.gz
[apple/xnu.git] / bsd / netinet / mptcp_var.h
CommitLineData
39236c6e 1/*
5ba3f43e 2 * Copyright (c) 2012-2017 Apple Inc. All rights reserved.
39236c6e
A
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
29#ifndef _NETINET_MPTCP_VAR_H_
0a7de745 30#define _NETINET_MPTCP_VAR_H_
39236c6e
A
31
32#ifdef PRIVATE
33#include <netinet/in.h>
34#include <netinet/tcp.h>
35#endif
36
37#ifdef BSD_KERNEL_PRIVATE
38#include <sys/queue.h>
39#include <sys/protosw.h>
40#include <kern/locks.h>
41#include <mach/boolean.h>
42#include <netinet/mp_pcb.h>
5ba3f43e 43#include <netinet/tcp_var.h>
a39ff7e2 44#include <os/log.h>
5ba3f43e
A
45
46struct mpt_itf_info {
47 uint32_t ifindex;
48 uint32_t has_v4_conn:1,
0a7de745
A
49 has_v6_conn:1,
50 has_nat64_conn:1,
51 no_mptcp_support:1;
5ba3f43e 52};
39236c6e
A
53
54/*
55 * MPTCP Session
56 *
57 * This is an extension to the multipath PCB specific for MPTCP, protected by
5ba3f43e 58 * the per-PCB mpp_lock (also the socket's lock);
39236c6e
A
59 */
60struct mptses {
0a7de745
A
61 struct mppcb *mpte_mppcb; /* back ptr to multipath PCB */
62 struct mptcb *mpte_mptcb; /* ptr to MPTCP PCB */
63 TAILQ_HEAD(, mptopt) mpte_sopts; /* list of socket options */
64 TAILQ_HEAD(, mptsub) mpte_subflows; /* list of subflows */
65 uint16_t mpte_numflows; /* # of subflows in list */
66 uint16_t mpte_nummpcapflows; /* # of MP_CAP subflows */
67 sae_associd_t mpte_associd; /* MPTCP association ID */
68 sae_connid_t mpte_connid_last; /* last used connection ID */
5ba3f43e 69
cb323159
A
70 uint64_t mpte_time_target;
71 thread_call_t mpte_time_thread;
72
73 uint32_t mpte_last_cellicon_set;
74 uint32_t mpte_cellicon_increments;
75
5ba3f43e
A
76 union {
77 /* Source address of initial subflow */
cb323159
A
78 struct sockaddr _mpte_src;
79 struct sockaddr_in _mpte_src_v4;
80 struct sockaddr_in6 _mpte_src_v6;
81 } mpte_u_src;
82#define mpte_src mpte_u_src._mpte_src
83#define __mpte_src_v4 mpte_u_src._mpte_src_v4
84#define __mpte_src_v6 mpte_u_src._mpte_src_v6
5ba3f43e
A
85 union {
86 /* Destination address of initial subflow */
cb323159
A
87 struct sockaddr _mpte_dst;
88 struct sockaddr_in _mpte_dst_v4;
89 struct sockaddr_in6 _mpte_dst_v6;
90 } mpte_u_dst;
91#define mpte_dst mpte_u_dst._mpte_dst
92#define __mpte_dst_v4 mpte_u_dst._mpte_dst_v4
93#define __mpte_dst_v6 mpte_u_dst._mpte_dst_v6
5ba3f43e 94
a39ff7e2
A
95 struct sockaddr_in mpte_dst_v4_nat64;
96
cb323159
A
97 struct sockaddr_in mpte_dst_unicast_v4;
98 struct sockaddr_in6 mpte_dst_unicast_v6;
99
0a7de745 100 uint16_t mpte_alternate_port; /* Alternate port for subflow establishment (network-byte-order) */
a39ff7e2 101
cb323159
A
102 int mpte_epid;
103 uuid_t mpte_euuid;
104
0a7de745 105 struct mptsub *mpte_active_sub; /* ptr to last active subf */
cb323159 106 uint16_t mpte_flags; /* per mptcp session flags */
0a7de745
A
107#define MPTE_SND_REM_ADDR 0x01 /* Send Remove_addr option */
108#define MPTE_SVCTYPE_CHECKED 0x02 /* Did entitlement-check for service-type */
109#define MPTE_FIRSTPARTY 0x04 /* First-party app used multipath_extended entitlement */
110#define MPTE_ACCESS_GRANTED 0x08 /* Access to cellular has been granted for this connection */
cb323159
A
111#define MPTE_FORCE_ENABLE 0x10 /* For MPTCP regardless of heuristics to detect middleboxes */
112#define MPTE_IN_WORKLOOP 0x20 /* Are we currently inside the workloop ? */
113#define MPTE_WORKLOOP_RELAUNCH 0x40 /* Another event got queued, we should restart the workloop */
114#define MPTE_UNICAST_IP 0x80 /* New subflows are only being established towards the unicast IP in the ADD_ADDR */
115#define MPTE_CELL_PROHIBITED 0x100 /* Cell access has been prohibited based on signal quality */
0a7de745
A
116 uint8_t mpte_svctype; /* MPTCP Service type */
117 uint8_t mpte_lost_aid; /* storing lost address id */
118 uint8_t mpte_addrid_last; /* storing address id parm */
5ba3f43e 119
0a7de745
A
120#define MPTE_ITFINFO_SIZE 4
121 uint32_t mpte_itfinfo_size;
122 struct mpt_itf_info _mpte_itfinfo[MPTE_ITFINFO_SIZE];
123 struct mpt_itf_info *mpte_itfinfo;
5ba3f43e 124
0a7de745 125 struct mbuf *mpte_reinjectq;
5ba3f43e
A
126
127 /* The below is used for stats */
0a7de745
A
128 uint32_t mpte_subflow_switches; /* Number of subflow-switches in sending */
129 uint32_t mpte_used_cell:1,
130 mpte_used_wifi:1,
131 mpte_initial_cell:1,
132 mpte_triggered_cell,
133 mpte_handshake_success:1;
134
135 struct mptcp_itf_stats mpte_itfstats[MPTCP_ITFSTATS_SIZE];
136 uint64_t mpte_init_txbytes __attribute__((aligned(8)));
137 uint64_t mpte_init_rxbytes __attribute__((aligned(8)));
39236c6e
A
138};
139
5ba3f43e
A
140static inline struct socket *
141mptetoso(struct mptses *mpte)
142{
0a7de745 143 return mpte->mpte_mppcb->mpp_socket;
5ba3f43e
A
144}
145
146static inline struct mptses *
147mptompte(struct mppcb *mp)
148{
0a7de745 149 return (struct mptses *)mp->mpp_pcbe;
5ba3f43e 150}
39236c6e 151
5ba3f43e
A
152static inline struct mptses *
153mpsotompte(struct socket *so)
154{
0a7de745 155 return mptompte(mpsotomppcb(so));
5ba3f43e 156}
39236c6e 157
5ba3f43e
A
158static inline boolean_t
159mpp_try_lock(struct mppcb *mp)
160{
0a7de745 161 if (!lck_mtx_try_lock(&mp->mpp_lock)) {
5ba3f43e 162 return false;
0a7de745 163 }
39236c6e 164
5ba3f43e
A
165 VERIFY(!(mp->mpp_flags & MPP_INSIDE_OUTPUT));
166 VERIFY(!(mp->mpp_flags & MPP_INSIDE_INPUT));
39236c6e 167
5ba3f43e
A
168 return true;
169}
170
171static inline void
172mpp_lock(struct mppcb *mp)
173{
174 lck_mtx_lock(&mp->mpp_lock);
175 VERIFY(!(mp->mpp_flags & MPP_INSIDE_OUTPUT));
176 VERIFY(!(mp->mpp_flags & MPP_INSIDE_INPUT));
177}
178
179static inline void
180mpp_unlock(struct mppcb *mp)
181{
182 VERIFY(!(mp->mpp_flags & MPP_INSIDE_OUTPUT));
183 VERIFY(!(mp->mpp_flags & MPP_INSIDE_INPUT));
184 lck_mtx_unlock(&mp->mpp_lock);
185}
186
187static inline lck_mtx_t *
188mpp_getlock(struct mppcb *mp, int flags)
189{
190 if (flags & PR_F_WILLUNLOCK) {
191 VERIFY(!(mp->mpp_flags & MPP_INSIDE_OUTPUT));
192 VERIFY(!(mp->mpp_flags & MPP_INSIDE_INPUT));
193 }
194
0a7de745 195 return &mp->mpp_lock;
5ba3f43e
A
196}
197
5ba3f43e
A
198static inline int
199mptcp_subflow_cwnd_space(struct socket *so)
200{
201 struct tcpcb *tp = sototcpcb(so);
5c9f4661 202 int cwnd = min(tp->snd_wnd, tp->snd_cwnd) - (so->so_snd.sb_cc);
5ba3f43e 203
0a7de745 204 return min(cwnd, sbspace(&so->so_snd));
5ba3f43e 205}
39236c6e 206
39236c6e
A
207
208/*
209 * MPTCP socket options
210 */
211struct mptopt {
0a7de745
A
212 TAILQ_ENTRY(mptopt) mpo_entry; /* glue to other options */
213 uint32_t mpo_flags; /* see flags below */
214 int mpo_level; /* sopt_level */
215 int mpo_name; /* sopt_name */
216 int mpo_intval; /* sopt_val */
39236c6e
A
217};
218
0a7de745
A
219#define MPOF_ATTACHED 0x1 /* attached to MP socket */
220#define MPOF_SUBFLOW_OK 0x2 /* can be issued on subflow socket */
221#define MPOF_INTERIM 0x4 /* has not been issued on any subflow */
39236c6e 222
39236c6e
A
223/*
224 * MPTCP subflow
225 *
5ba3f43e 226 * Note that mpts_flags and mpts_evctl are modified via atomic operations.
39236c6e
A
227 */
228struct mptsub {
0a7de745
A
229 TAILQ_ENTRY(mptsub) mpts_entry; /* glue to peer subflows */
230 uint32_t mpts_refcnt; /* reference count */
231 uint32_t mpts_flags; /* see flags below */
232 uint32_t mpts_evctl; /* subflow control events */
233 sae_connid_t mpts_connid; /* subflow connection ID */
234 int mpts_oldintval; /* sopt_val before sosetopt */
235 struct mptses *mpts_mpte; /* back ptr to MPTCP session */
236 struct socket *mpts_socket; /* subflow socket */
237 struct sockaddr *mpts_src; /* source address */
5ba3f43e
A
238
239 union {
240 /* destination address */
cb323159
A
241 struct sockaddr _mpts_dst;
242 struct sockaddr_in _mpts_dst_v4;
243 struct sockaddr_in6 _mpts_dst_v6;
244 } mpts_u_dst;
245#define mpts_dst mpts_u_dst._mpts_dst
246#define __mpts_dst_v4 mpts_u_dst._mpts_dst_v4
247#define __mpts_dst_v6 mpts_u_dst._mpts_dst_v6
0a7de745
A
248 u_int32_t mpts_rel_seq; /* running count of subflow # */
249 u_int32_t mpts_iss; /* Initial sequence number, taking TFO into account */
250 u_int32_t mpts_ifscope; /* scoped to the interface */
251 uint32_t mpts_probesoon; /* send probe after probeto */
252 uint32_t mpts_probecnt; /* number of probes sent */
253 uint32_t mpts_maxseg; /* cached value of t_maxseg */
39236c6e
A
254};
255
256/*
257 * Valid values for mpts_flags. In particular:
258 *
259 * - MP_CAPABLE means that the connection is successfully established as
260 * MPTCP and data transfer may occur, but is not yet ready for multipath-
261 * related semantics until MP_READY. I.e. if this is on the first subflow,
262 * it causes the MPTCP socket to transition to a connected state, except
263 * that additional subflows will not be established; they will be marked
264 * with PENDING and will be processed when the first subflow is marked
265 * with MP_READY.
266 *
267 * - MP_READY implies that an MP_CAPABLE connection has been confirmed as
268 * an MPTCP connection. See notes above.
269 *
270 * - MP_DEGRADED implies that the connection has lost its MPTCP capabilities
271 * but data transfer on the MPTCP socket is unaffected. Any existing
272 * PENDING subflows will be disconnected, and further attempts to connect
273 * additional subflows will be rejected.
274 *
275 * Note that these are per-subflow flags. The setting and clearing of MP_READY
276 * reflects the state of the MPTCP connection with regards to its multipath
277 * semantics, via the MPTCPF_JOIN_READY flag. Until that flag is set (meaning
278 * until at least a subflow is marked with MP_READY), further connectx(2)
279 * attempts to join will be queued. When the flag is cleared (after it has
280 * been set), further connectx(2) will fail (and existing queued ones will be
281 * aborted) and the MPTCP connection loses all of its multipath semantics.
282 *
283 * Keep in sync with bsd/dev/dtrace/scripts/mptcp.d.
284 */
0a7de745
A
285#define MPTSF_ATTACHED 0x00000001 /* attached to MPTCP PCB */
286#define MPTSF_CONNECTING 0x00000002 /* connection was attempted */
287#define MPTSF_CONNECT_PENDING 0x00000004 /* will connect when MPTCP is ready */
288#define MPTSF_CONNECTED 0x00000008 /* connection is established */
289#define MPTSF_DISCONNECTING 0x00000010 /* disconnection was attempted */
290#define MPTSF_DISCONNECTED 0x00000020 /* has been disconnected */
291#define MPTSF_MP_CAPABLE 0x00000040 /* connected as a MPTCP subflow */
292#define MPTSF_MP_READY 0x00000080 /* MPTCP has been confirmed */
293#define MPTSF_MP_DEGRADED 0x00000100 /* has lost its MPTCP capabilities */
294#define MPTSF_PREFERRED 0x00000200 /* primary/preferred subflow */
295#define MPTSF_SOPT_OLDVAL 0x00000400 /* old option value is valid */
296#define MPTSF_SOPT_INPROG 0x00000800 /* sosetopt in progress */
297#define MPTSF_FAILINGOVER 0x00001000 /* subflow not used for output */
298#define MPTSF_ACTIVE 0x00002000 /* subflow currently in use */
299#define MPTSF_MPCAP_CTRSET 0x00004000 /* mpcap counter */
300#define MPTSF_CLOSED 0x00008000 /* soclose_locked has been called on this subflow */
301#define MPTSF_TFO_REQD 0x00010000 /* TFO requested */
302#define MPTSF_CLOSE_REQD 0x00020000 /* A close has been requested from NECP */
303#define MPTSF_INITIAL_SUB 0x00040000 /* This is the initial subflow */
304#define MPTSF_READ_STALL 0x00080000 /* A read-stall has been detected */
305#define MPTSF_WRITE_STALL 0x00100000 /* A write-stall has been detected */
cb323159
A
306#define MPTSF_FULLY_ESTABLISHED 0x00200000 /* Subflow is fully established and it has been confirmed
307 * whether or not it supports MPTCP.
308 * No need for further middlebox-detection.
309 */
310#define MPTSF_CELLICON_SET 0x00400000 /* This subflow set the cellicon */
0a7de745
A
311
312#define MPTSF_BITS \
39236c6e 313 "\020\1ATTACHED\2CONNECTING\3PENDING\4CONNECTED\5DISCONNECTING" \
5ba3f43e
A
314 "\6DISCONNECTED\7MP_CAPABLE\10MP_READY\11MP_DEGRADED" \
315 "\12PREFERRED\13SOPT_OLDVAL" \
316 "\14SOPT_INPROG\15FAILINGOVER\16ACTIVE\17MPCAP_CTRSET" \
317 "\20CLOSED\21TFO_REQD\22CLOSEREQD\23INITIALSUB\24READ_STALL" \
318 "\25WRITE_STALL\26CONFIRMED"
39236c6e
A
319
320/*
321 * MPTCP states
322 * Keep in sync with bsd/dev/dtrace/mptcp.d
323 */
324typedef enum mptcp_state {
0a7de745
A
325 MPTCPS_CLOSED = 0, /* closed */
326 MPTCPS_LISTEN = 1, /* not yet implemented */
327 MPTCPS_ESTABLISHED = 2, /* MPTCP connection established */
328 MPTCPS_CLOSE_WAIT = 3, /* rcvd DFIN, waiting for close */
329 MPTCPS_FIN_WAIT_1 = 4, /* have closed, sent DFIN */
330 MPTCPS_CLOSING = 5, /* closed xchd DFIN, waiting DFIN ACK */
331 MPTCPS_LAST_ACK = 6, /* had DFIN and close; await DFIN ACK */
332 MPTCPS_FIN_WAIT_2 = 7, /* have closed, DFIN is acked */
333 MPTCPS_TIME_WAIT = 8, /* in 2*MSL quiet wait after close */
334 MPTCPS_TERMINATE = 9, /* terminal state */
39236c6e
A
335} mptcp_state_t;
336
0a7de745
A
337typedef u_int64_t mptcp_key_t;
338typedef u_int32_t mptcp_token_t;
339typedef u_int8_t mptcp_addr_id;
39236c6e
A
340
341
342/* Address ID list */
343struct mptcp_subf_auth_entry {
344 LIST_ENTRY(mptcp_subf_auth_entry) msae_next;
0a7de745
A
345 u_int32_t msae_laddr_rand; /* Local nonce */
346 u_int32_t msae_raddr_rand; /* Remote nonce */
347 mptcp_addr_id msae_laddr_id; /* Local addr ID */
348 mptcp_addr_id msae_raddr_id; /* Remote addr ID */
39236c6e
A
349};
350
351/*
352 * MPTCP Protocol Control Block
353 *
354 * Protected by per-MPTCP mpt_lock.
355 * Keep in sync with bsd/dev/dtrace/scripts/mptcp.d.
356 */
357struct mptcb {
0a7de745
A
358 struct mptses *mpt_mpte; /* back ptr to MPTCP session */
359 mptcp_state_t mpt_state; /* MPTCP state */
cb323159
A
360 uint32_t mpt_flags; /* see flags below */
361 uint32_t mpt_version; /* MPTCP proto version */
0a7de745 362 int mpt_softerror; /* error not yet reported */
39236c6e
A
363 /*
364 * Authentication and metadata invariants
365 */
0a7de745
A
366 mptcp_key_t mpt_localkey; /* in network byte order */
367 mptcp_key_t mpt_remotekey; /* in network byte order */
368 mptcp_token_t mpt_localtoken; /* HMAC SHA1 of local key */
369 mptcp_token_t mpt_remotetoken; /* HMAC SHA1 of remote key */
39236c6e
A
370
371 /*
372 * Timer vars for scenarios where subflow level acks arrive, but
373 * Data ACKs do not.
374 */
0a7de745 375 int mpt_rxtshift; /* num of consecutive retrans */
cb323159
A
376 uint32_t mpt_rxtstart; /* time at which rxt started */
377 uint64_t mpt_rtseq; /* seq # being tracked */
378 uint32_t mpt_timer_vals; /* timer related values */
379 uint32_t mpt_timewait; /* timewait */
39236c6e
A
380 /*
381 * Sending side
382 */
cb323159
A
383 uint64_t mpt_snduna; /* DSN of last unacked byte */
384 uint64_t mpt_sndnxt; /* DSN of next byte to send */
385 uint64_t mpt_sndmax; /* DSN of max byte sent */
386 uint64_t mpt_local_idsn; /* First byte's DSN */
387 uint32_t mpt_sndwnd;
388 uint64_t mpt_sndwl1;
389 uint64_t mpt_sndwl2;
39236c6e
A
390 /*
391 * Receiving side
392 */
cb323159
A
393 uint64_t mpt_rcvnxt; /* Next expected DSN */
394 uint64_t mpt_remote_idsn; /* Peer's IDSN */
395 uint32_t mpt_rcvwnd;
396 uint32_t mpt_rcvadv;
39236c6e
A
397 LIST_HEAD(, mptcp_subf_auth_entry) mpt_subauth_list; /* address IDs */
398 /*
399 * Fastclose
400 */
cb323159
A
401 uint64_t mpt_dsn_at_csum_fail; /* MPFail Opt DSN */
402 uint32_t mpt_ssn_at_csum_fail; /* MPFail Subflow Seq */
39236c6e
A
403 /*
404 * Zombie handling
405 */
0a7de745
A
406#define MPT_GC_TICKS (30)
407#define MPT_GC_TICKS_FAST (10)
408 int32_t mpt_gc_ticks; /* Used for zombie deletion */
fe8ab488 409
cb323159
A
410 uint32_t mpt_notsent_lowat; /* TCP_NOTSENT_LOWAT support */
411 uint32_t mpt_peer_version; /* Version from peer */
5ba3f43e 412
0a7de745 413 struct tsegqe_head mpt_segq;
cb323159 414 uint16_t mpt_reassqlen; /* length of reassembly queue */
39236c6e
A
415};
416
417/* valid values for mpt_flags (see also notes on mpts_flags above) */
0a7de745
A
418#define MPTCPF_CHECKSUM 0x001 /* checksum DSS option */
419#define MPTCPF_FALLBACK_TO_TCP 0x002 /* Fallback to TCP */
420#define MPTCPF_JOIN_READY 0x004 /* Ready to start 2 or more subflows */
421#define MPTCPF_RECVD_MPFAIL 0x008 /* Received MP_FAIL option */
422#define MPTCPF_SND_64BITDSN 0x010 /* Send full 64-bit DSN */
423#define MPTCPF_SND_64BITACK 0x020 /* Send 64-bit ACK response */
424#define MPTCPF_RCVD_64BITACK 0x040 /* Received 64-bit Data ACK */
425#define MPTCPF_POST_FALLBACK_SYNC 0x080 /* Post fallback resend data */
426#define MPTCPF_FALLBACK_HEURISTIC 0x100 /* Send SYN without MP_CAPABLE due to heuristic */
427#define MPTCPF_HEURISTIC_TRAC 0x200 /* Tracked this connection in the heuristics as a failure */
428#define MPTCPF_REASS_INPROG 0x400 /* Reassembly is in progress */
cb323159 429#define MPTCPF_UNICAST_IP 0x800
0a7de745
A
430
431#define MPTCPF_BITS \
5ba3f43e
A
432 "\020\1CHECKSUM\2FALLBACK_TO_TCP\3JOIN_READY\4RECVD_MPFAIL" \
433 "\5SND_64BITDSN\6SND_64BITACK\7RCVD_64BITACK\10POST_FALLBACK_SYNC" \
434 "\11FALLBACK_HEURISTIC\12HEURISTIC_TRAC\13REASS_INPROG"
39236c6e
A
435
436/* valid values for mpt_timer_vals */
0a7de745
A
437#define MPTT_REXMT 0x01 /* Starting Retransmit Timer */
438#define MPTT_TW 0x02 /* Starting Timewait Timer */
439#define MPTT_FASTCLOSE 0x04 /* Starting Fastclose wait timer */
39236c6e
A
440
441/* events for close FSM */
0a7de745
A
442#define MPCE_CLOSE 0x1
443#define MPCE_RECV_DATA_ACK 0x2
444#define MPCE_RECV_DATA_FIN 0x4
39236c6e
A
445
446/* mptcb manipulation */
0a7de745
A
447static inline struct mptcb *
448tptomptp(struct tcpcb *tp)
5ba3f43e 449{
0a7de745 450 return tp->t_mptcb;
5ba3f43e 451}
39236c6e
A
452
453/*
454 * MPTCP control block and state structures are allocated along with
455 * the MP protocol control block; the folllowing represents the layout.
456 */
457struct mpp_mtp {
0a7de745
A
458 struct mppcb mpp; /* Multipath PCB */
459 struct mptses mpp_ses; /* MPTCP session */
460 struct mptcb mtcb; /* MPTCP PCB */
39236c6e
A
461};
462
463#ifdef SYSCTL_DECL
464SYSCTL_DECL(_net_inet_mptcp);
465#endif /* SYSCTL_DECL */
466
467extern struct mppcbinfo mtcbinfo;
468extern struct pr_usrreqs mptcp_usrreqs;
a39ff7e2 469extern os_log_t mptcp_log_handle;
39236c6e
A
470
471/* Encryption algorithm related definitions */
0a7de745 472#define SHA1_TRUNCATED 8
39236c6e 473
39236c6e 474/* MPTCP Debugging Levels */
0a7de745
A
475#define MPTCP_LOGLVL_NONE 0x0 /* No debug logging */
476#define MPTCP_LOGLVL_ERR 0x1 /* Errors in execution are logged */
477#define MPTCP_LOGLVL_LOG 0x2 /* Important logs */
478#define MPTCP_LOGLVL_VERBOSE 0x4 /* Verbose logs */
3e170ce0
A
479
480/* MPTCP sub-components for debug logging */
0a7de745
A
481#define MPTCP_NO_DBG 0x00 /* No areas are logged */
482#define MPTCP_STATE_DBG 0x01 /* State machine logging */
483#define MPTCP_SOCKET_DBG 0x02 /* Socket call logging */
484#define MPTCP_SENDER_DBG 0x04 /* Sender side logging */
485#define MPTCP_RECEIVER_DBG 0x08 /* Receiver logging */
486#define MPTCP_EVENTS_DBG 0x10 /* Subflow events logging */
39236c6e
A
487
488/* Mask to obtain 32-bit portion of data sequence number */
0a7de745
A
489#define MPTCP_DATASEQ_LOW32_MASK (0xffffffff)
490#define MPTCP_DATASEQ_LOW32(seq) (seq & MPTCP_DATASEQ_LOW32_MASK)
39236c6e
A
491
492/* Mask to obtain upper 32-bit portion of data sequence number */
0a7de745
A
493#define MPTCP_DATASEQ_HIGH32_MASK (0xffffffff00000000)
494#define MPTCP_DATASEQ_HIGH32(seq) (seq & MPTCP_DATASEQ_HIGH32_MASK)
39236c6e
A
495
496/* Mask to obtain 32-bit portion of data ack */
0a7de745
A
497#define MPTCP_DATAACK_LOW32_MASK (0xffffffff)
498#define MPTCP_DATAACK_LOW32(ack) (ack & MPTCP_DATAACK_LOW32_MASK)
39236c6e
A
499
500/* Mask to obtain upper 32-bit portion of data ack */
0a7de745
A
501#define MPTCP_DATAACK_HIGH32_MASK (0xffffffff00000000)
502#define MPTCP_DATAACK_HIGH32(ack) (ack & MPTCP_DATAACK_HIGH32_MASK)
39236c6e
A
503
504/*
505 * x is the 64-bit data sequence number, y the 32-bit data seq number to be
506 * extended. z is y extended to the appropriate 64-bit value.
507 * This algorithm is based on the fact that subflow level window sizes are
508 * at the maximum 2**30 (in reality, they are a lot lesser). A high throughput
509 * application sending on a large number of subflows can in theory have very
510 * large MPTCP level send and receive windows. In which case, 64 bit DSNs
511 * must be sent in place of 32 bit DSNs on wire. For us, with 2 subflows at
512 * 512K each, sequence wraparound detection can be done by checking whether
513 * the 32-bit value obtained on wire is 2**31 bytes apart from the stored
514 * lower 32-bits of the Data Sequence Number. Bogus DSNs are dropped by
515 * comparing against rwnd. Bogus DSNs within rwnd cannot be protected against
516 * and are as weak as bogus TCP sequence numbers.
517 */
0a7de745
A
518#define MPTCP_EXTEND_DSN(x, y, z) { \
519 if ((MPTCP_DATASEQ_LOW32(x) > y) && \
520 ((((u_int32_t)MPTCP_DATASEQ_LOW32(x)) - (u_int32_t)y) >= \
cb323159 521 (u_int32_t)(1U << 31))) { \
0a7de745
A
522 /* \
523 * y wrapped around and x and y are 2**31 bytes apart \
524 */ \
525 z = MPTCP_DATASEQ_HIGH32(x) + 0x100000000; \
526 z |= y; \
527 } else if ((MPTCP_DATASEQ_LOW32(x) < y) && \
528 (((u_int32_t)y - \
529 ((u_int32_t)MPTCP_DATASEQ_LOW32(x))) >= \
cb323159 530 (u_int32_t)(1U << 31))) { \
0a7de745
A
531 /* \
532 * x wrapped around and x and y are 2**31 apart \
533 */ \
534 z = MPTCP_DATASEQ_HIGH32(x) - 0x100000000; \
535 z |= y; \
536 } else { \
537 z = MPTCP_DATASEQ_HIGH32(x) | y; \
538 } \
39236c6e
A
539}
540
0a7de745
A
541#define mptcplog(x, y, z) do { \
542 if ((mptcp_dbg_area & y) && (mptcp_dbg_level & z)) \
543 log x; \
3e170ce0 544} while (0)
39236c6e 545
0a7de745
A
546extern int mptcp_enable; /* Multipath TCP */
547extern int mptcp_mpcap_retries; /* Multipath TCP retries */
548extern int mptcp_join_retries; /* Multipath TCP Join retries */
549extern int mptcp_dss_csum; /* Multipath DSS Option checksum */
550extern int mptcp_fail_thresh; /* Multipath failover thresh of retransmits */
39236c6e 551extern int mptcp_subflow_keeptime; /* Multipath subflow TCP_KEEPALIVE opt */
0a7de745
A
552extern uint32_t mptcp_dbg_level; /* Multipath TCP debugging level */
553extern uint32_t mptcp_dbg_area; /* Multipath TCP debugging area */
554extern int mptcp_developer_mode; /* Allow aggregation mode */
cb323159 555extern uint32_t mptcp_cellicon_refcount;
3e170ce0 556
94ff46dc
A
557#define MPTCP_CELLICON_TOGGLE_RATE (5 * TCP_RETRANSHZ) /* Only toggle every 5 seconds */
558
0a7de745 559extern int tcp_jack_rxmt; /* Join ACK retransmission value in msecs */
39236c6e
A
560
561__BEGIN_DECLS
562extern void mptcp_init(struct protosw *, struct domain *);
563extern int mptcp_ctloutput(struct socket *, struct sockopt *);
cb323159
A
564extern int mptcp_session_create(struct mppcb *);
565extern boolean_t mptcp_ok_to_create_subflows(struct mptcb *mp_tp);
566extern void mptcp_check_subflows_and_add(struct mptses *mpte);
567extern void mptcp_check_subflows_and_remove(struct mptses *mpte);
568extern void mptcpstats_inc_switch(struct mptses *mpte, const struct mptsub *mpts);
569extern void mptcpstats_update(struct mptcp_itf_stats *stats, const struct mptsub *mpts);
570extern int mptcpstats_get_index_by_ifindex(struct mptcp_itf_stats *stats, int ifindex, boolean_t create);
39236c6e
A
571extern struct mptses *mptcp_drop(struct mptses *, struct mptcb *, int);
572extern struct mptses *mptcp_close(struct mptses *, struct mptcb *);
573extern int mptcp_lock(struct socket *, int, void *);
574extern int mptcp_unlock(struct socket *, int, void *);
575extern lck_mtx_t *mptcp_getlock(struct socket *, int);
5ba3f43e
A
576extern void mptcp_subflow_workloop(struct mptses *);
577
578extern void mptcp_sched_create_subflows(struct mptses *);
39236c6e 579
a39ff7e2 580extern void mptcp_finish_usrclosed(struct mptses *mpte);
39236c6e 581extern struct mptopt *mptcp_sopt_alloc(int);
5ba3f43e 582extern const char *mptcp_sopt2str(int, int);
39236c6e
A
583extern void mptcp_sopt_free(struct mptopt *);
584extern void mptcp_sopt_insert(struct mptses *, struct mptopt *);
585extern void mptcp_sopt_remove(struct mptses *, struct mptopt *);
586extern struct mptopt *mptcp_sopt_find(struct mptses *, struct sockopt *);
587
5ba3f43e
A
588extern int mptcp_subflow_add(struct mptses *, struct sockaddr *,
589 struct sockaddr *, uint32_t, sae_connid_t *);
5ba3f43e
A
590extern void mptcp_subflow_del(struct mptses *, struct mptsub *);
591
cb323159 592extern void mptcp_handle_input(struct socket *so);
0a7de745 593#define MPTCP_SUBOUT_PROBING 0x01
5ba3f43e
A
594extern int mptcp_subflow_output(struct mptses *mpte, struct mptsub *mpts, int flags);
595extern void mptcp_clean_reinjectq(struct mptses *mpte);
596extern void mptcp_subflow_shutdown(struct mptses *, struct mptsub *);
597extern void mptcp_subflow_disconnect(struct mptses *, struct mptsub *);
598extern int mptcp_subflow_sosetopt(struct mptses *, struct mptsub *,
39236c6e
A
599 struct mptopt *);
600extern int mptcp_subflow_sogetopt(struct mptses *, struct socket *,
601 struct mptopt *);
602
603extern void mptcp_input(struct mptses *, struct mbuf *);
a39ff7e2 604extern boolean_t mptcp_can_send_more(struct mptcb *mp_tp, boolean_t ignore_reinject);
39236c6e
A
605extern int mptcp_output(struct mptses *);
606extern void mptcp_close_fsm(struct mptcb *, uint32_t);
607
39236c6e 608extern void mptcp_hmac_sha1(mptcp_key_t, mptcp_key_t, u_int32_t, u_int32_t,
5ba3f43e
A
609 u_char*);
610extern void mptcp_get_hmac(mptcp_addr_id, struct mptcb *, u_char *);
39236c6e
A
611extern void mptcp_get_rands(mptcp_addr_id, struct mptcb *, u_int32_t *,
612 u_int32_t *);
613extern void mptcp_set_raddr_rand(mptcp_addr_id, struct mptcb *, mptcp_addr_id,
614 u_int32_t);
490019cf 615extern int mptcp_init_remote_parms(struct mptcb *);
39236c6e
A
616extern boolean_t mptcp_ok_to_keepalive(struct mptcb *);
617extern void mptcp_insert_dsn(struct mppcb *, struct mbuf *);
5ba3f43e 618extern void mptcp_output_getm_dsnmap32(struct socket *so, int off,
0a7de745
A
619 uint32_t *dsn, uint32_t *relseq,
620 uint16_t *data_len, uint16_t *dss_csum);
5ba3f43e 621extern void mptcp_output_getm_dsnmap64(struct socket *so, int off,
0a7de745
A
622 uint64_t *dsn, uint32_t *relseq,
623 uint16_t *data_len, uint16_t *dss_csum);
39236c6e 624extern void mptcp_act_on_txfail(struct socket *);
cb323159 625extern struct mptsub *mptcp_get_subflow(struct mptses *mpte, struct mptsub **preferred);
39236c6e 626extern int mptcp_get_map_for_dsn(struct socket *, u_int64_t, u_int32_t *);
5ba3f43e
A
627extern int32_t mptcp_adj_sendlen(struct socket *so, int32_t off);
628extern void mptcp_sbrcv_grow(struct mptcb *mp_tp);
39236c6e
A
629extern int32_t mptcp_sbspace(struct mptcb *);
630extern void mptcp_notify_mpready(struct socket *);
631extern void mptcp_notify_mpfail(struct socket *);
632extern void mptcp_notify_close(struct socket *);
fe8ab488
A
633extern boolean_t mptcp_no_rto_spike(struct socket*);
634extern int mptcp_set_notsent_lowat(struct mptses *mpte, int optval);
635extern u_int32_t mptcp_get_notsent_lowat(struct mptses *mpte);
636extern int mptcp_notsent_lowat_check(struct socket *so);
5ba3f43e 637extern void mptcp_ask_symptoms(struct mptses *mpte);
3e170ce0 638extern void mptcp_control_register(void);
cb323159
A
639extern int mptcp_is_wifi_unusable_for_session(struct mptses *mpte);
640extern boolean_t symptoms_is_wifi_lossy(void);
a39ff7e2 641extern void mptcp_ask_for_nat64(struct ifnet *ifp);
d9a64523 642extern void mptcp_session_necp_cb(void *, int, uint32_t, uint32_t, bool *);
cb323159
A
643extern struct sockaddr *mptcp_get_session_dst(struct mptses *mpte,
644 boolean_t has_v6, boolean_t has_v4);
5ba3f43e 645extern void mptcp_set_restrictions(struct socket *mp_so);
cb323159 646extern void mptcp_clear_cellicon(void);
94ff46dc 647extern void mptcp_unset_cellicon(struct mptses *mpte, struct mptsub *mpts, uint32_t val);
5ba3f43e
A
648extern void mptcp_reset_rexmit_state(struct tcpcb *tp);
649extern void mptcp_reset_keepalive(struct tcpcb *tp);
650extern int mptcp_validate_csum(struct tcpcb *tp, struct mbuf *m, uint64_t dsn,
0a7de745
A
651 uint32_t sseq, uint16_t dlen, uint16_t csum,
652 uint16_t dfin);
39236c6e
A
653__END_DECLS
654
655#endif /* BSD_KERNEL_PRIVATE */
656#ifdef PRIVATE
3e170ce0 657
39236c6e 658typedef struct mptcp_flow {
0a7de745
A
659 size_t flow_len;
660 size_t flow_tcpci_offset;
661 uint32_t flow_flags;
662 sae_connid_t flow_cid;
39236c6e
A
663 struct sockaddr_storage flow_src;
664 struct sockaddr_storage flow_dst;
0a7de745
A
665 uint32_t flow_relseq; /* last subflow rel seq# */
666 int32_t flow_soerror; /* subflow level error */
667 uint32_t flow_probecnt; /* number of probes sent */
668 conninfo_tcp_t flow_ci; /* must be the last field */
39236c6e
A
669} mptcp_flow_t;
670
671typedef struct conninfo_mptcp {
0a7de745
A
672 size_t mptcpci_len;
673 size_t mptcpci_flow_offset; /* offsetof first flow */
674 size_t mptcpci_nflows; /* number of subflows */
675 uint32_t mptcpci_state; /* MPTCP level state */
676 uint32_t mptcpci_mpte_flags; /* Session flags */
677 uint32_t mptcpci_flags; /* MPTCB flags */
678 uint32_t mptcpci_ltoken; /* local token */
679 uint32_t mptcpci_rtoken; /* remote token */
680 uint32_t mptcpci_notsent_lowat; /* NOTSENT_LOWAT */
3e170ce0
A
681
682 /* Send side */
0a7de745
A
683 uint64_t mptcpci_snduna; /* DSN of last unacked byte */
684 uint64_t mptcpci_sndnxt; /* DSN of next byte to send */
685 uint64_t mptcpci_sndmax; /* DSN of max byte sent */
686 uint64_t mptcpci_lidsn; /* Local IDSN */
687 uint32_t mptcpci_sndwnd; /* Send window snapshot */
3e170ce0
A
688
689 /* Receive side */
0a7de745
A
690 uint64_t mptcpci_rcvnxt; /* Next expected DSN */
691 uint64_t mptcpci_rcvatmark; /* Session level rcvnxt */
692 uint64_t mptcpci_ridsn; /* Peer's IDSN */
693 uint32_t mptcpci_rcvwnd; /* Receive window */
3e170ce0 694
0a7de745 695 uint8_t mptcpci_mpte_addrid; /* last addr id */
3e170ce0 696
0a7de745 697 mptcp_flow_t mptcpci_flows[1];
39236c6e
A
698} conninfo_mptcp_t;
699
3e170ce0
A
700/* Use SymptomsD notifications of wifi and cell status in subflow selection */
701#define MPTCP_KERN_CTL_NAME "com.apple.network.advisory"
702typedef struct symptoms_advisory {
703 union {
0a7de745 704 uint32_t sa_nwk_status_int;
3e170ce0
A
705 struct {
706 union {
0a7de745
A
707#define SYMPTOMS_ADVISORY_NOCOMMENT 0x0000
708#define SYMPTOMS_ADVISORY_USEAPP 0xFFFF /* Very ugly workaround to avoid breaking backwards compatibility - ToDo: Fix it in +1 */
709 uint16_t sa_nwk_status;
3e170ce0
A
710 struct {
711#define SYMPTOMS_ADVISORY_WIFI_BAD 0x01
712#define SYMPTOMS_ADVISORY_WIFI_OK 0x02
0a7de745 713 uint8_t sa_wifi_status;
3e170ce0
A
714#define SYMPTOMS_ADVISORY_CELL_BAD 0x01
715#define SYMPTOMS_ADVISORY_CELL_OK 0x02
0a7de745 716 uint8_t sa_cell_status;
3e170ce0
A
717 };
718 };
0a7de745 719 uint16_t sa_unused;
3e170ce0
A
720 };
721 };
722} symptoms_advisory_t;
723
cb323159
A
724#define MPTCP_TARGET_BASED_RSSI_THRESHOLD -75
725struct mptcp_symptoms_answer {
726 struct symptoms_advisory advisory;
727 uuid_t uuid;
728 int32_t rssi;
729};
730
5ba3f43e 731struct mptcp_symptoms_ask_uuid {
0a7de745
A
732 uint32_t cmd;
733#define MPTCP_SYMPTOMS_ASK_UUID 1
734 uuid_t uuid;
735 uint32_t priority;
736#define MPTCP_SYMPTOMS_UNKNOWN 0
737#define MPTCP_SYMPTOMS_BACKGROUND 1
738#define MPTCP_SYMPTOMS_FOREGROUND 2
5ba3f43e
A
739};
740
741struct kev_mptcp_data {
742 int value;
743};
3e170ce0 744
39236c6e
A
745#endif /* PRIVATE */
746#endif /* _NETINET_MPTCP_VAR_H_ */