blob: cb21fccf2089b1cddf72a637402fe8bad1963473 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * TCP over IPv6
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09003 * Linux INET6 implementation
Linus Torvalds1da177e2005-04-16 15:20:36 -07004 *
5 * Authors:
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09006 * Pedro Roque <roque@di.fc.ul.pt>
Linus Torvalds1da177e2005-04-16 15:20:36 -07007 *
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09008 * Based on:
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 * linux/net/ipv4/tcp.c
10 * linux/net/ipv4/tcp_input.c
11 * linux/net/ipv4/tcp_output.c
12 *
13 * Fixes:
14 * Hideaki YOSHIFUJI : sin6_scope_id support
15 * YOSHIFUJI Hideaki @USAGI and: Support IPV6_V6ONLY socket option, which
16 * Alexey Kuznetsov allow both IPv4 and IPv6 sockets to bind
17 * a single port at the same time.
18 * YOSHIFUJI Hideaki @USAGI: convert /proc/net/tcp6 to seq_file.
19 *
20 * This program is free software; you can redistribute it and/or
21 * modify it under the terms of the GNU General Public License
22 * as published by the Free Software Foundation; either version
23 * 2 of the License, or (at your option) any later version.
24 */
25
Herbert Xueb4dea52008-12-29 23:04:08 -080026#include <linux/bottom_half.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028#include <linux/errno.h>
29#include <linux/types.h>
30#include <linux/socket.h>
31#include <linux/sockios.h>
32#include <linux/net.h>
33#include <linux/jiffies.h>
34#include <linux/in.h>
35#include <linux/in6.h>
36#include <linux/netdevice.h>
37#include <linux/init.h>
38#include <linux/jhash.h>
39#include <linux/ipsec.h>
40#include <linux/times.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090041#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
43#include <linux/ipv6.h>
44#include <linux/icmpv6.h>
45#include <linux/random.h>
46
47#include <net/tcp.h>
48#include <net/ndisc.h>
Arnaldo Carvalho de Melo5324a042005-08-12 09:26:18 -030049#include <net/inet6_hashtables.h>
Arnaldo Carvalho de Melo81297652005-12-13 23:15:24 -080050#include <net/inet6_connection_sock.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070051#include <net/ipv6.h>
52#include <net/transp_v6.h>
53#include <net/addrconf.h>
54#include <net/ip6_route.h>
55#include <net/ip6_checksum.h>
56#include <net/inet_ecn.h>
57#include <net/protocol.h>
58#include <net/xfrm.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070059#include <net/snmp.h>
60#include <net/dsfield.h>
Arnaldo Carvalho de Melo6d6ee432005-12-13 23:25:19 -080061#include <net/timewait_sock.h>
Denis V. Lunev3d58b5f2008-04-03 14:22:32 -070062#include <net/inet_common.h>
David S. Miller6e5714e2011-08-03 20:50:44 -070063#include <net/secure_seq.h>
Glauber Costad1a4c0b2011-12-11 21:47:04 +000064#include <net/tcp_memcontrol.h>
Eliezer Tamir076bb0c2013-07-10 17:13:17 +030065#include <net/busy_poll.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070066
67#include <asm/uaccess.h>
68
69#include <linux/proc_fs.h>
70#include <linux/seq_file.h>
71
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -080072#include <linux/crypto.h>
73#include <linux/scatterlist.h>
74
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -080075static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb);
Gui Jianfeng6edafaa2008-08-06 23:50:04 -070076static void tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb,
77 struct request_sock *req);
Linus Torvalds1da177e2005-04-16 15:20:36 -070078
79static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -070080
Stephen Hemminger3b401a82009-09-01 19:25:04 +000081static const struct inet_connection_sock_af_ops ipv6_mapped;
82static const struct inet_connection_sock_af_ops ipv6_specific;
David S. Millera9286302006-11-14 19:53:22 -080083#ifdef CONFIG_TCP_MD5SIG
Stephen Hemmingerb2e4b3d2009-09-01 19:25:03 +000084static const struct tcp_sock_af_ops tcp_sock_ipv6_specific;
85static const struct tcp_sock_af_ops tcp_sock_ipv6_mapped_specific;
YOSHIFUJI Hideaki9501f972008-04-18 12:45:16 +090086#else
87static struct tcp_md5sig_key *tcp_v6_md5_do_lookup(struct sock *sk,
Eric Dumazetb71d1d42011-04-22 04:53:02 +000088 const struct in6_addr *addr)
YOSHIFUJI Hideaki9501f972008-04-18 12:45:16 +090089{
90 return NULL;
91}
David S. Millera9286302006-11-14 19:53:22 -080092#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070093
Neal Cardwellfae6ef82012-08-19 03:30:38 +000094static void inet6_sk_rx_dst_set(struct sock *sk, const struct sk_buff *skb)
95{
96 struct dst_entry *dst = skb_dst(skb);
97 const struct rt6_info *rt = (const struct rt6_info *)dst;
98
99 dst_hold(dst);
100 sk->sk_rx_dst = dst;
101 inet_sk(sk)->rx_dst_ifindex = skb->skb_iif;
102 if (rt->rt6i_node)
103 inet6_sk(sk)->rx_dst_cookie = rt->rt6i_node->fn_sernum;
104}
105
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106static void tcp_v6_hash(struct sock *sk)
107{
108 if (sk->sk_state != TCP_CLOSE) {
Arnaldo Carvalho de Melo8292a172005-12-13 23:15:52 -0800109 if (inet_csk(sk)->icsk_af_ops == &ipv6_mapped) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110 tcp_prot.hash(sk);
111 return;
112 }
113 local_bh_disable();
Eric Dumazet9327f702009-12-04 03:46:54 +0000114 __inet6_hash(sk, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115 local_bh_enable();
116 }
117}
118
Eric Dumazetcf533ea2011-10-21 05:22:42 -0400119static __u32 tcp_v6_init_sequence(const struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700120{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700121 return secure_tcpv6_sequence_number(ipv6_hdr(skb)->daddr.s6_addr32,
122 ipv6_hdr(skb)->saddr.s6_addr32,
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -0700123 tcp_hdr(skb)->dest,
124 tcp_hdr(skb)->source);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125}
126
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900127static int tcp_v6_connect(struct sock *sk, struct sockaddr *uaddr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128 int addr_len)
129{
130 struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900131 struct inet_sock *inet = inet_sk(sk);
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800132 struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 struct ipv6_pinfo *np = inet6_sk(sk);
134 struct tcp_sock *tp = tcp_sk(sk);
Arnaud Ebalard20c59de2010-06-01 21:35:01 +0000135 struct in6_addr *saddr = NULL, *final_p, final;
David S. Miller493f3772010-12-02 12:14:29 -0800136 struct rt6_info *rt;
David S. Miller4c9483b2011-03-12 16:22:43 -0500137 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700138 struct dst_entry *dst;
139 int addr_type;
140 int err;
141
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900142 if (addr_len < SIN6_LEN_RFC2133)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143 return -EINVAL;
144
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900145 if (usin->sin6_family != AF_INET6)
Eric Dumazeta02cec22010-09-22 20:43:57 +0000146 return -EAFNOSUPPORT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700147
David S. Miller4c9483b2011-03-12 16:22:43 -0500148 memset(&fl6, 0, sizeof(fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149
150 if (np->sndflow) {
David S. Miller4c9483b2011-03-12 16:22:43 -0500151 fl6.flowlabel = usin->sin6_flowinfo&IPV6_FLOWINFO_MASK;
152 IP6_ECN_flow_init(fl6.flowlabel);
153 if (fl6.flowlabel&IPV6_FLOWLABEL_MASK) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154 struct ip6_flowlabel *flowlabel;
David S. Miller4c9483b2011-03-12 16:22:43 -0500155 flowlabel = fl6_sock_lookup(sk, fl6.flowlabel);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156 if (flowlabel == NULL)
157 return -EINVAL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700158 fl6_sock_release(flowlabel);
159 }
160 }
161
162 /*
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900163 * connect() to INADDR_ANY means loopback (BSD'ism).
164 */
165
Weilong Chen4c99aa42013-12-19 18:44:34 +0800166 if (ipv6_addr_any(&usin->sin6_addr))
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900167 usin->sin6_addr.s6_addr[15] = 0x1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700168
169 addr_type = ipv6_addr_type(&usin->sin6_addr);
170
Weilong Chen4c99aa42013-12-19 18:44:34 +0800171 if (addr_type & IPV6_ADDR_MULTICAST)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700172 return -ENETUNREACH;
173
174 if (addr_type&IPV6_ADDR_LINKLOCAL) {
175 if (addr_len >= sizeof(struct sockaddr_in6) &&
176 usin->sin6_scope_id) {
177 /* If interface is set while binding, indices
178 * must coincide.
179 */
180 if (sk->sk_bound_dev_if &&
181 sk->sk_bound_dev_if != usin->sin6_scope_id)
182 return -EINVAL;
183
184 sk->sk_bound_dev_if = usin->sin6_scope_id;
185 }
186
187 /* Connect to link-local address requires an interface */
188 if (!sk->sk_bound_dev_if)
189 return -EINVAL;
190 }
191
192 if (tp->rx_opt.ts_recent_stamp &&
Eric Dumazetefe42082013-10-03 15:42:29 -0700193 !ipv6_addr_equal(&sk->sk_v6_daddr, &usin->sin6_addr)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194 tp->rx_opt.ts_recent = 0;
195 tp->rx_opt.ts_recent_stamp = 0;
196 tp->write_seq = 0;
197 }
198
Eric Dumazetefe42082013-10-03 15:42:29 -0700199 sk->sk_v6_daddr = usin->sin6_addr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500200 np->flow_label = fl6.flowlabel;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700201
202 /*
203 * TCP over IPv4
204 */
205
206 if (addr_type == IPV6_ADDR_MAPPED) {
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800207 u32 exthdrlen = icsk->icsk_ext_hdr_len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700208 struct sockaddr_in sin;
209
210 SOCK_DEBUG(sk, "connect: ipv4 mapped\n");
211
212 if (__ipv6_only_sock(sk))
213 return -ENETUNREACH;
214
215 sin.sin_family = AF_INET;
216 sin.sin_port = usin->sin6_port;
217 sin.sin_addr.s_addr = usin->sin6_addr.s6_addr32[3];
218
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800219 icsk->icsk_af_ops = &ipv6_mapped;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220 sk->sk_backlog_rcv = tcp_v4_do_rcv;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800221#ifdef CONFIG_TCP_MD5SIG
222 tp->af_specific = &tcp_sock_ipv6_mapped_specific;
223#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700224
225 err = tcp_v4_connect(sk, (struct sockaddr *)&sin, sizeof(sin));
226
227 if (err) {
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800228 icsk->icsk_ext_hdr_len = exthdrlen;
229 icsk->icsk_af_ops = &ipv6_specific;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700230 sk->sk_backlog_rcv = tcp_v6_do_rcv;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800231#ifdef CONFIG_TCP_MD5SIG
232 tp->af_specific = &tcp_sock_ipv6_specific;
233#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700234 goto failure;
235 } else {
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000236 ipv6_addr_set_v4mapped(inet->inet_saddr, &np->saddr);
237 ipv6_addr_set_v4mapped(inet->inet_rcv_saddr,
Eric Dumazetefe42082013-10-03 15:42:29 -0700238 &sk->sk_v6_rcv_saddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700239 }
240
241 return err;
242 }
243
Eric Dumazetefe42082013-10-03 15:42:29 -0700244 if (!ipv6_addr_any(&sk->sk_v6_rcv_saddr))
245 saddr = &sk->sk_v6_rcv_saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700246
David S. Miller4c9483b2011-03-12 16:22:43 -0500247 fl6.flowi6_proto = IPPROTO_TCP;
Eric Dumazetefe42082013-10-03 15:42:29 -0700248 fl6.daddr = sk->sk_v6_daddr;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000249 fl6.saddr = saddr ? *saddr : np->saddr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500250 fl6.flowi6_oif = sk->sk_bound_dev_if;
251 fl6.flowi6_mark = sk->sk_mark;
David S. Miller1958b852011-03-12 16:36:19 -0500252 fl6.fl6_dport = usin->sin6_port;
253 fl6.fl6_sport = inet->inet_sport;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700254
David S. Miller4c9483b2011-03-12 16:22:43 -0500255 final_p = fl6_update_dst(&fl6, np->opt, &final);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700256
David S. Miller4c9483b2011-03-12 16:22:43 -0500257 security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
Venkat Yekkiralabeb8d132006-08-04 23:12:42 -0700258
Steffen Klassert0e0d44a2013-08-28 08:04:14 +0200259 dst = ip6_dst_lookup_flow(sk, &fl6, final_p);
David S. Miller68d0c6d2011-03-01 13:19:07 -0800260 if (IS_ERR(dst)) {
261 err = PTR_ERR(dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700262 goto failure;
David S. Miller14e50e52007-05-24 18:17:54 -0700263 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700264
265 if (saddr == NULL) {
David S. Miller4c9483b2011-03-12 16:22:43 -0500266 saddr = &fl6.saddr;
Eric Dumazetefe42082013-10-03 15:42:29 -0700267 sk->sk_v6_rcv_saddr = *saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700268 }
269
270 /* set the source address */
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000271 np->saddr = *saddr;
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000272 inet->inet_rcv_saddr = LOOPBACK4_IPV6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273
Herbert Xuf83ef8c2006-06-30 13:37:03 -0700274 sk->sk_gso_type = SKB_GSO_TCPV6;
YOSHIFUJI Hideaki8e1ef0a2006-08-29 17:15:09 -0700275 __ip6_dst_store(sk, dst, NULL, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700276
David S. Miller493f3772010-12-02 12:14:29 -0800277 rt = (struct rt6_info *) dst;
278 if (tcp_death_row.sysctl_tw_recycle &&
279 !tp->rx_opt.ts_recent_stamp &&
Eric Dumazetefe42082013-10-03 15:42:29 -0700280 ipv6_addr_equal(&rt->rt6i_dst.addr, &sk->sk_v6_daddr))
David S. Miller81166dd2012-07-10 03:14:24 -0700281 tcp_fetch_timewait_stamp(sk, dst);
David S. Miller493f3772010-12-02 12:14:29 -0800282
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800283 icsk->icsk_ext_hdr_len = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 if (np->opt)
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800285 icsk->icsk_ext_hdr_len = (np->opt->opt_flen +
286 np->opt->opt_nflen);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700287
288 tp->rx_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - sizeof(struct ipv6hdr);
289
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000290 inet->inet_dport = usin->sin6_port;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700291
292 tcp_set_state(sk, TCP_SYN_SENT);
Arnaldo Carvalho de Melod8313f52005-12-13 23:25:44 -0800293 err = inet6_hash_connect(&tcp_death_row, sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700294 if (err)
295 goto late_failure;
296
Andrey Vagin2b916472012-11-22 01:13:58 +0000297 if (!tp->write_seq && likely(!tp->repair))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700298 tp->write_seq = secure_tcpv6_sequence_number(np->saddr.s6_addr32,
Eric Dumazetefe42082013-10-03 15:42:29 -0700299 sk->sk_v6_daddr.s6_addr32,
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000300 inet->inet_sport,
301 inet->inet_dport);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700302
303 err = tcp_connect(sk);
304 if (err)
305 goto late_failure;
306
307 return 0;
308
309late_failure:
310 tcp_set_state(sk, TCP_CLOSE);
311 __sk_dst_reset(sk);
312failure:
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000313 inet->inet_dport = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700314 sk->sk_route_caps = 0;
315 return err;
316}
317
Eric Dumazet563d34d2012-07-23 09:48:52 +0200318static void tcp_v6_mtu_reduced(struct sock *sk)
319{
320 struct dst_entry *dst;
321
322 if ((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE))
323 return;
324
325 dst = inet6_csk_update_pmtu(sk, tcp_sk(sk)->mtu_info);
326 if (!dst)
327 return;
328
329 if (inet_csk(sk)->icsk_pmtu_cookie > dst_mtu(dst)) {
330 tcp_sync_mss(sk, dst_mtu(dst));
331 tcp_simple_retransmit(sk);
332 }
333}
334
Linus Torvalds1da177e2005-04-16 15:20:36 -0700335static void tcp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700336 u8 type, u8 code, int offset, __be32 info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700337{
Weilong Chen4c99aa42013-12-19 18:44:34 +0800338 const struct ipv6hdr *hdr = (const struct ipv6hdr *)skb->data;
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -0300339 const struct tcphdr *th = (struct tcphdr *)(skb->data+offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700340 struct ipv6_pinfo *np;
341 struct sock *sk;
342 int err;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900343 struct tcp_sock *tp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700344 __u32 seq;
Pavel Emelyanovca12a1a2008-07-16 20:28:42 -0700345 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346
Pavel Emelyanovca12a1a2008-07-16 20:28:42 -0700347 sk = inet6_lookup(net, &tcp_hashinfo, &hdr->daddr,
Pavel Emelyanovd86e0da2008-01-31 05:07:21 -0800348 th->dest, &hdr->saddr, th->source, skb->dev->ifindex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700349
350 if (sk == NULL) {
Denis V. Luneve41b5362008-10-08 10:33:26 -0700351 ICMP6_INC_STATS_BH(net, __in6_dev_get(skb->dev),
352 ICMP6_MIB_INERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700353 return;
354 }
355
356 if (sk->sk_state == TCP_TIME_WAIT) {
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -0700357 inet_twsk_put(inet_twsk(sk));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700358 return;
359 }
360
361 bh_lock_sock(sk);
Eric Dumazet563d34d2012-07-23 09:48:52 +0200362 if (sock_owned_by_user(sk) && type != ICMPV6_PKT_TOOBIG)
Pavel Emelyanovde0744a2008-07-16 20:31:16 -0700363 NET_INC_STATS_BH(net, LINUX_MIB_LOCKDROPPEDICMPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700364
365 if (sk->sk_state == TCP_CLOSE)
366 goto out;
367
Stephen Hemmingere802af92010-04-22 15:24:53 -0700368 if (ipv6_hdr(skb)->hop_limit < inet6_sk(sk)->min_hopcount) {
369 NET_INC_STATS_BH(net, LINUX_MIB_TCPMINTTLDROP);
370 goto out;
371 }
372
Linus Torvalds1da177e2005-04-16 15:20:36 -0700373 tp = tcp_sk(sk);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900374 seq = ntohl(th->seq);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700375 if (sk->sk_state != TCP_LISTEN &&
376 !between(seq, tp->snd_una, tp->snd_nxt)) {
Pavel Emelyanovde0744a2008-07-16 20:31:16 -0700377 NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700378 goto out;
379 }
380
381 np = inet6_sk(sk);
382
David S. Millerec18d9a2012-07-12 00:25:15 -0700383 if (type == NDISC_REDIRECT) {
384 struct dst_entry *dst = __sk_dst_check(sk, np->dst_cookie);
385
David S. Miller1ed5c482012-07-12 00:41:25 -0700386 if (dst)
David S. Miller6700c272012-07-17 03:29:28 -0700387 dst->ops->redirect(dst, sk, skb);
Christoph Paasch50a75a82013-04-07 04:53:15 +0000388 goto out;
David S. Millerec18d9a2012-07-12 00:25:15 -0700389 }
390
Linus Torvalds1da177e2005-04-16 15:20:36 -0700391 if (type == ICMPV6_PKT_TOOBIG) {
Eric Dumazet0d4f0602013-03-18 07:01:28 +0000392 /* We are not interested in TCP_LISTEN and open_requests
393 * (SYN-ACKs send out by Linux are always <576bytes so
394 * they should go through unfragmented).
395 */
396 if (sk->sk_state == TCP_LISTEN)
397 goto out;
398
Hannes Frederic Sowa93b36cf2013-12-15 03:41:14 +0100399 if (!ip6_sk_accept_pmtu(sk))
400 goto out;
401
Eric Dumazet563d34d2012-07-23 09:48:52 +0200402 tp->mtu_info = ntohl(info);
403 if (!sock_owned_by_user(sk))
404 tcp_v6_mtu_reduced(sk);
Julian Anastasovd013ef2a2012-09-05 10:53:18 +0000405 else if (!test_and_set_bit(TCP_MTU_REDUCED_DEFERRED,
406 &tp->tsq_flags))
407 sock_hold(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700408 goto out;
409 }
410
411 icmpv6_err_convert(type, code, &err);
412
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700413 /* Might be for an request_sock */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700414 switch (sk->sk_state) {
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700415 struct request_sock *req, **prev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700416 case TCP_LISTEN:
417 if (sock_owned_by_user(sk))
418 goto out;
419
Arnaldo Carvalho de Melo81297652005-12-13 23:15:24 -0800420 req = inet6_csk_search_req(sk, &prev, th->dest, &hdr->daddr,
421 &hdr->saddr, inet6_iif(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700422 if (!req)
423 goto out;
424
425 /* ICMPs are not backlogged, hence we cannot get
426 * an established socket here.
427 */
Ilpo Järvinen547b7922008-07-25 21:43:18 -0700428 WARN_ON(req->sk != NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700429
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -0700430 if (seq != tcp_rsk(req)->snt_isn) {
Pavel Emelyanovde0744a2008-07-16 20:31:16 -0700431 NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700432 goto out;
433 }
434
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -0700435 inet_csk_reqsk_queue_drop(sk, req, prev);
Vijay Subramanian5f1e9422013-01-31 08:24:19 +0000436 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENDROPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 goto out;
438
439 case TCP_SYN_SENT:
440 case TCP_SYN_RECV: /* Cannot happen.
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900441 It can, it SYNs are crossed. --ANK */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700442 if (!sock_owned_by_user(sk)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700443 sk->sk_err = err;
444 sk->sk_error_report(sk); /* Wake people up to see the error (see connect in sock.c) */
445
446 tcp_done(sk);
447 } else
448 sk->sk_err_soft = err;
449 goto out;
450 }
451
452 if (!sock_owned_by_user(sk) && np->recverr) {
453 sk->sk_err = err;
454 sk->sk_error_report(sk);
455 } else
456 sk->sk_err_soft = err;
457
458out:
459 bh_unlock_sock(sk);
460 sock_put(sk);
461}
462
463
Neal Cardwell9f10d3f2012-06-28 12:34:21 +0000464static int tcp_v6_send_synack(struct sock *sk, struct dst_entry *dst,
465 struct flowi6 *fl6,
Neal Cardwell3840a062012-06-28 12:34:19 +0000466 struct request_sock *req,
Eric Dumazetfff32692012-06-01 01:47:50 +0000467 u16 queue_mapping)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700468{
Eric Dumazet634fb9792013-10-09 15:21:29 -0700469 struct inet_request_sock *ireq = inet_rsk(req);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700470 struct ipv6_pinfo *np = inet6_sk(sk);
Weilong Chen4c99aa42013-12-19 18:44:34 +0800471 struct sk_buff *skb;
Neal Cardwell94942182012-06-28 12:34:20 +0000472 int err = -ENOMEM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700473
Neal Cardwell9f10d3f2012-06-28 12:34:21 +0000474 /* First, grab a route. */
475 if (!dst && (dst = inet6_csk_route_req(sk, fl6, req)) == NULL)
Denis V. Lunevfd80eb92008-02-29 11:43:03 -0800476 goto done;
Neal Cardwell94942182012-06-28 12:34:20 +0000477
Christoph Paasch1a2c6182013-03-17 08:23:34 +0000478 skb = tcp_make_synack(sk, dst, req, NULL);
Neal Cardwell94942182012-06-28 12:34:20 +0000479
Linus Torvalds1da177e2005-04-16 15:20:36 -0700480 if (skb) {
Eric Dumazet634fb9792013-10-09 15:21:29 -0700481 __tcp_v6_send_check(skb, &ireq->ir_v6_loc_addr,
482 &ireq->ir_v6_rmt_addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700483
Eric Dumazet634fb9792013-10-09 15:21:29 -0700484 fl6->daddr = ireq->ir_v6_rmt_addr;
Florent Fourcotdf3687f2014-01-17 17:15:03 +0100485 if (np->repflow && (ireq->pktopts != NULL))
486 fl6->flowlabel = ip6_flowlabel(ipv6_hdr(ireq->pktopts));
487
Eric Dumazetfff32692012-06-01 01:47:50 +0000488 skb_set_queue_mapping(skb, queue_mapping);
RongQing.Li43264e02012-07-01 17:18:59 +0000489 err = ip6_xmit(sk, skb, fl6, np->opt, np->tclass);
Gerrit Renkerb9df3cb2006-11-14 11:21:36 -0200490 err = net_xmit_eval(err);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491 }
492
493done:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700494 return err;
495}
496
Christoph Paasch1a2c6182013-03-17 08:23:34 +0000497static int tcp_v6_rtx_synack(struct sock *sk, struct request_sock *req)
Octavian Purdila72659ec2010-01-17 19:09:39 -0800498{
Neal Cardwell9f10d3f2012-06-28 12:34:21 +0000499 struct flowi6 fl6;
Eric Dumazete6c022a2012-10-27 23:16:46 +0000500 int res;
Neal Cardwell9f10d3f2012-06-28 12:34:21 +0000501
Christoph Paasch1a2c6182013-03-17 08:23:34 +0000502 res = tcp_v6_send_synack(sk, NULL, &fl6, req, 0);
Eric Dumazete6c022a2012-10-27 23:16:46 +0000503 if (!res)
504 TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_RETRANSSEGS);
505 return res;
Octavian Purdila72659ec2010-01-17 19:09:39 -0800506}
507
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700508static void tcp_v6_reqsk_destructor(struct request_sock *req)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700509{
Eric Dumazet634fb9792013-10-09 15:21:29 -0700510 kfree_skb(inet_rsk(req)->pktopts);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700511}
512
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800513#ifdef CONFIG_TCP_MD5SIG
514static struct tcp_md5sig_key *tcp_v6_md5_do_lookup(struct sock *sk,
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000515 const struct in6_addr *addr)
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800516{
Eric Dumazeta915da9b2012-01-31 05:18:33 +0000517 return tcp_md5_do_lookup(sk, (union tcp_md5_addr *)addr, AF_INET6);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800518}
519
520static struct tcp_md5sig_key *tcp_v6_md5_lookup(struct sock *sk,
521 struct sock *addr_sk)
522{
Eric Dumazetefe42082013-10-03 15:42:29 -0700523 return tcp_v6_md5_do_lookup(sk, &addr_sk->sk_v6_daddr);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800524}
525
526static struct tcp_md5sig_key *tcp_v6_reqsk_md5_lookup(struct sock *sk,
527 struct request_sock *req)
528{
Eric Dumazet634fb9792013-10-09 15:21:29 -0700529 return tcp_v6_md5_do_lookup(sk, &inet_rsk(req)->ir_v6_rmt_addr);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800530}
531
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800532static int tcp_v6_parse_md5_keys (struct sock *sk, char __user *optval,
533 int optlen)
534{
535 struct tcp_md5sig cmd;
536 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)&cmd.tcpm_addr;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800537
538 if (optlen < sizeof(cmd))
539 return -EINVAL;
540
541 if (copy_from_user(&cmd, optval, sizeof(cmd)))
542 return -EFAULT;
543
544 if (sin6->sin6_family != AF_INET6)
545 return -EINVAL;
546
547 if (!cmd.tcpm_keylen) {
Brian Haleye773e4f2007-08-24 23:16:08 -0700548 if (ipv6_addr_v4mapped(&sin6->sin6_addr))
Eric Dumazeta915da9b2012-01-31 05:18:33 +0000549 return tcp_md5_do_del(sk, (union tcp_md5_addr *)&sin6->sin6_addr.s6_addr32[3],
550 AF_INET);
551 return tcp_md5_do_del(sk, (union tcp_md5_addr *)&sin6->sin6_addr,
552 AF_INET6);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800553 }
554
555 if (cmd.tcpm_keylen > TCP_MD5SIG_MAXKEYLEN)
556 return -EINVAL;
557
Eric Dumazeta915da9b2012-01-31 05:18:33 +0000558 if (ipv6_addr_v4mapped(&sin6->sin6_addr))
559 return tcp_md5_do_add(sk, (union tcp_md5_addr *)&sin6->sin6_addr.s6_addr32[3],
560 AF_INET, cmd.tcpm_key, cmd.tcpm_keylen, GFP_KERNEL);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800561
Eric Dumazeta915da9b2012-01-31 05:18:33 +0000562 return tcp_md5_do_add(sk, (union tcp_md5_addr *)&sin6->sin6_addr,
563 AF_INET6, cmd.tcpm_key, cmd.tcpm_keylen, GFP_KERNEL);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800564}
565
Adam Langley49a72df2008-07-19 00:01:42 -0700566static int tcp_v6_md5_hash_pseudoheader(struct tcp_md5sig_pool *hp,
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000567 const struct in6_addr *daddr,
568 const struct in6_addr *saddr, int nbytes)
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800569{
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800570 struct tcp6_pseudohdr *bp;
Adam Langley49a72df2008-07-19 00:01:42 -0700571 struct scatterlist sg;
YOSHIFUJI Hideaki8d26d762008-04-17 13:19:16 +0900572
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800573 bp = &hp->md5_blk.ip6;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800574 /* 1. TCP pseudo-header (RFC2460) */
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000575 bp->saddr = *saddr;
576 bp->daddr = *daddr;
Adam Langley49a72df2008-07-19 00:01:42 -0700577 bp->protocol = cpu_to_be32(IPPROTO_TCP);
Adam Langley00b13042008-07-31 21:36:07 -0700578 bp->len = cpu_to_be32(nbytes);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800579
Adam Langley49a72df2008-07-19 00:01:42 -0700580 sg_init_one(&sg, bp, sizeof(*bp));
581 return crypto_hash_update(&hp->md5_desc, &sg, sizeof(*bp));
582}
David S. Millerc7da57a2007-10-26 00:41:21 -0700583
Adam Langley49a72df2008-07-19 00:01:42 -0700584static int tcp_v6_md5_hash_hdr(char *md5_hash, struct tcp_md5sig_key *key,
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000585 const struct in6_addr *daddr, struct in6_addr *saddr,
Eric Dumazet318cf7a2011-10-24 02:46:04 -0400586 const struct tcphdr *th)
Adam Langley49a72df2008-07-19 00:01:42 -0700587{
588 struct tcp_md5sig_pool *hp;
589 struct hash_desc *desc;
590
591 hp = tcp_get_md5sig_pool();
592 if (!hp)
593 goto clear_hash_noput;
594 desc = &hp->md5_desc;
595
596 if (crypto_hash_init(desc))
597 goto clear_hash;
598 if (tcp_v6_md5_hash_pseudoheader(hp, daddr, saddr, th->doff << 2))
599 goto clear_hash;
600 if (tcp_md5_hash_header(hp, th))
601 goto clear_hash;
602 if (tcp_md5_hash_key(hp, key))
603 goto clear_hash;
604 if (crypto_hash_final(desc, md5_hash))
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800605 goto clear_hash;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800606
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800607 tcp_put_md5sig_pool();
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800608 return 0;
Adam Langley49a72df2008-07-19 00:01:42 -0700609
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800610clear_hash:
611 tcp_put_md5sig_pool();
612clear_hash_noput:
613 memset(md5_hash, 0, 16);
Adam Langley49a72df2008-07-19 00:01:42 -0700614 return 1;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800615}
616
Adam Langley49a72df2008-07-19 00:01:42 -0700617static int tcp_v6_md5_hash_skb(char *md5_hash, struct tcp_md5sig_key *key,
Eric Dumazet318cf7a2011-10-24 02:46:04 -0400618 const struct sock *sk,
619 const struct request_sock *req,
620 const struct sk_buff *skb)
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800621{
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000622 const struct in6_addr *saddr, *daddr;
Adam Langley49a72df2008-07-19 00:01:42 -0700623 struct tcp_md5sig_pool *hp;
624 struct hash_desc *desc;
Eric Dumazet318cf7a2011-10-24 02:46:04 -0400625 const struct tcphdr *th = tcp_hdr(skb);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800626
627 if (sk) {
628 saddr = &inet6_sk(sk)->saddr;
Eric Dumazetefe42082013-10-03 15:42:29 -0700629 daddr = &sk->sk_v6_daddr;
Adam Langley49a72df2008-07-19 00:01:42 -0700630 } else if (req) {
Eric Dumazet634fb9792013-10-09 15:21:29 -0700631 saddr = &inet_rsk(req)->ir_v6_loc_addr;
632 daddr = &inet_rsk(req)->ir_v6_rmt_addr;
Adam Langley49a72df2008-07-19 00:01:42 -0700633 } else {
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000634 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
Adam Langley49a72df2008-07-19 00:01:42 -0700635 saddr = &ip6h->saddr;
636 daddr = &ip6h->daddr;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800637 }
Adam Langley49a72df2008-07-19 00:01:42 -0700638
639 hp = tcp_get_md5sig_pool();
640 if (!hp)
641 goto clear_hash_noput;
642 desc = &hp->md5_desc;
643
644 if (crypto_hash_init(desc))
645 goto clear_hash;
646
647 if (tcp_v6_md5_hash_pseudoheader(hp, daddr, saddr, skb->len))
648 goto clear_hash;
649 if (tcp_md5_hash_header(hp, th))
650 goto clear_hash;
651 if (tcp_md5_hash_skb_data(hp, skb, th->doff << 2))
652 goto clear_hash;
653 if (tcp_md5_hash_key(hp, key))
654 goto clear_hash;
655 if (crypto_hash_final(desc, md5_hash))
656 goto clear_hash;
657
658 tcp_put_md5sig_pool();
659 return 0;
660
661clear_hash:
662 tcp_put_md5sig_pool();
663clear_hash_noput:
664 memset(md5_hash, 0, 16);
665 return 1;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800666}
667
Eric Dumazet318cf7a2011-10-24 02:46:04 -0400668static int tcp_v6_inbound_md5_hash(struct sock *sk, const struct sk_buff *skb)
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800669{
Eric Dumazetcf533ea2011-10-21 05:22:42 -0400670 const __u8 *hash_location = NULL;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800671 struct tcp_md5sig_key *hash_expected;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000672 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
Eric Dumazet318cf7a2011-10-24 02:46:04 -0400673 const struct tcphdr *th = tcp_hdr(skb);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800674 int genhash;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800675 u8 newhash[16];
676
677 hash_expected = tcp_v6_md5_do_lookup(sk, &ip6h->saddr);
YOSHIFUJI Hideaki7d5d5522008-04-17 12:29:53 +0900678 hash_location = tcp_parse_md5sig_option(th);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800679
David S. Miller785957d2008-07-30 03:03:15 -0700680 /* We've parsed the options - do we have a hash? */
681 if (!hash_expected && !hash_location)
682 return 0;
683
684 if (hash_expected && !hash_location) {
685 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPMD5NOTFOUND);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800686 return 1;
687 }
688
David S. Miller785957d2008-07-30 03:03:15 -0700689 if (!hash_expected && hash_location) {
690 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPMD5UNEXPECTED);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800691 return 1;
692 }
693
694 /* check the signature */
Adam Langley49a72df2008-07-19 00:01:42 -0700695 genhash = tcp_v6_md5_hash_skb(newhash,
696 hash_expected,
697 NULL, NULL, skb);
698
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800699 if (genhash || memcmp(hash_location, newhash, 16) != 0) {
Joe Perchese87cc472012-05-13 21:56:26 +0000700 net_info_ratelimited("MD5 Hash %s for [%pI6c]:%u->[%pI6c]:%u\n",
701 genhash ? "failed" : "mismatch",
702 &ip6h->saddr, ntohs(th->source),
703 &ip6h->daddr, ntohs(th->dest));
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800704 return 1;
705 }
706 return 0;
707}
708#endif
709
Glenn Griffinc6aefaf2008-02-07 21:49:26 -0800710struct request_sock_ops tcp6_request_sock_ops __read_mostly = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700711 .family = AF_INET6,
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -0700712 .obj_size = sizeof(struct tcp6_request_sock),
Octavian Purdila72659ec2010-01-17 19:09:39 -0800713 .rtx_syn_ack = tcp_v6_rtx_synack,
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700714 .send_ack = tcp_v6_reqsk_send_ack,
715 .destructor = tcp_v6_reqsk_destructor,
Octavian Purdila72659ec2010-01-17 19:09:39 -0800716 .send_reset = tcp_v6_send_reset,
717 .syn_ack_timeout = tcp_syn_ack_timeout,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700718};
719
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800720#ifdef CONFIG_TCP_MD5SIG
Stephen Hemmingerb2e4b3d2009-09-01 19:25:03 +0000721static const struct tcp_request_sock_ops tcp_request_sock_ipv6_ops = {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800722 .md5_lookup = tcp_v6_reqsk_md5_lookup,
John Dykstrae3afe7b2009-07-16 05:04:51 +0000723 .calc_md5_hash = tcp_v6_md5_hash_skb,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800724};
Andrew Mortonb6332e62006-11-30 19:16:28 -0800725#endif
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800726
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700727static void tcp_v6_send_response(struct sk_buff *skb, u32 seq, u32 ack, u32 win,
Andrey Vaginee684b62013-02-11 05:50:19 +0000728 u32 tsval, u32 tsecr,
Florent Fourcot1d13a962014-01-16 17:21:22 +0100729 struct tcp_md5sig_key *key, int rst, u8 tclass,
730 u32 label)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700731{
Eric Dumazetcf533ea2011-10-21 05:22:42 -0400732 const struct tcphdr *th = tcp_hdr(skb);
733 struct tcphdr *t1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700734 struct sk_buff *buff;
David S. Miller4c9483b2011-03-12 16:22:43 -0500735 struct flowi6 fl6;
Eric Dumazetadf30902009-06-02 05:19:30 +0000736 struct net *net = dev_net(skb_dst(skb)->dev);
Daniel Lezcanoe5047992008-03-07 11:16:26 -0800737 struct sock *ctl_sk = net->ipv6.tcp_sk;
YOSHIFUJI Hideaki9cb57342008-01-12 02:16:03 -0800738 unsigned int tot_len = sizeof(struct tcphdr);
Eric Dumazetadf30902009-06-02 05:19:30 +0000739 struct dst_entry *dst;
Al Viroe69a4ad2006-11-14 20:56:00 -0800740 __be32 *topt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700741
Andrey Vaginee684b62013-02-11 05:50:19 +0000742 if (tsecr)
YOSHIFUJI Hideaki4244f8a2006-10-10 19:40:50 -0700743 tot_len += TCPOLEN_TSTAMP_ALIGNED;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800744#ifdef CONFIG_TCP_MD5SIG
745 if (key)
746 tot_len += TCPOLEN_MD5SIG_ALIGNED;
747#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700748
749 buff = alloc_skb(MAX_HEADER + sizeof(struct ipv6hdr) + tot_len,
750 GFP_ATOMIC);
751 if (buff == NULL)
752 return;
753
754 skb_reserve(buff, MAX_HEADER + sizeof(struct ipv6hdr) + tot_len);
755
Ilpo Järvinen77c676d2008-10-09 14:41:38 -0700756 t1 = (struct tcphdr *) skb_push(buff, tot_len);
Herbert Xu6651ffc2010-04-21 00:47:15 -0700757 skb_reset_transport_header(buff);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700758
759 /* Swap the send and the receive. */
760 memset(t1, 0, sizeof(*t1));
761 t1->dest = th->source;
762 t1->source = th->dest;
Ilpo Järvinen77c676d2008-10-09 14:41:38 -0700763 t1->doff = tot_len / 4;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700764 t1->seq = htonl(seq);
765 t1->ack_seq = htonl(ack);
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700766 t1->ack = !rst || !th->ack;
767 t1->rst = rst;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700768 t1->window = htons(win);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800769
Al Viroe69a4ad2006-11-14 20:56:00 -0800770 topt = (__be32 *)(t1 + 1);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900771
Andrey Vaginee684b62013-02-11 05:50:19 +0000772 if (tsecr) {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800773 *topt++ = htonl((TCPOPT_NOP << 24) | (TCPOPT_NOP << 16) |
774 (TCPOPT_TIMESTAMP << 8) | TCPOLEN_TIMESTAMP);
Andrey Vaginee684b62013-02-11 05:50:19 +0000775 *topt++ = htonl(tsval);
776 *topt++ = htonl(tsecr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700777 }
778
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800779#ifdef CONFIG_TCP_MD5SIG
780 if (key) {
781 *topt++ = htonl((TCPOPT_NOP << 24) | (TCPOPT_NOP << 16) |
782 (TCPOPT_MD5SIG << 8) | TCPOLEN_MD5SIG);
Adam Langley49a72df2008-07-19 00:01:42 -0700783 tcp_v6_md5_hash_hdr((__u8 *)topt, key,
Adam Langley90b7e112008-07-31 20:49:48 -0700784 &ipv6_hdr(skb)->saddr,
785 &ipv6_hdr(skb)->daddr, t1);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800786 }
787#endif
788
David S. Miller4c9483b2011-03-12 16:22:43 -0500789 memset(&fl6, 0, sizeof(fl6));
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000790 fl6.daddr = ipv6_hdr(skb)->saddr;
791 fl6.saddr = ipv6_hdr(skb)->daddr;
Florent Fourcot1d13a962014-01-16 17:21:22 +0100792 fl6.flowlabel = label;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700793
David S. Millere5700af2010-04-21 14:59:20 -0700794 buff->ip_summed = CHECKSUM_PARTIAL;
795 buff->csum = 0;
796
David S. Miller4c9483b2011-03-12 16:22:43 -0500797 __tcp_v6_send_check(buff, &fl6.saddr, &fl6.daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700798
David S. Miller4c9483b2011-03-12 16:22:43 -0500799 fl6.flowi6_proto = IPPROTO_TCP;
Alexey Kuznetsov4c675252012-10-12 04:34:17 +0000800 if (ipv6_addr_type(&fl6.daddr) & IPV6_ADDR_LINKLOCAL)
801 fl6.flowi6_oif = inet6_iif(skb);
David S. Miller1958b852011-03-12 16:36:19 -0500802 fl6.fl6_dport = t1->dest;
803 fl6.fl6_sport = t1->source;
David S. Miller4c9483b2011-03-12 16:22:43 -0500804 security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700805
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700806 /* Pass a socket to ip6_dst_lookup either it is for RST
807 * Underlying function will use this to retrieve the network
808 * namespace
809 */
Steffen Klassert0e0d44a2013-08-28 08:04:14 +0200810 dst = ip6_dst_lookup_flow(ctl_sk, &fl6, NULL);
David S. Miller68d0c6d2011-03-01 13:19:07 -0800811 if (!IS_ERR(dst)) {
812 skb_dst_set(buff, dst);
Eric Dumazetb903d322011-10-27 00:44:35 -0400813 ip6_xmit(ctl_sk, buff, &fl6, NULL, tclass);
David S. Miller68d0c6d2011-03-01 13:19:07 -0800814 TCP_INC_STATS_BH(net, TCP_MIB_OUTSEGS);
815 if (rst)
816 TCP_INC_STATS_BH(net, TCP_MIB_OUTRSTS);
817 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700818 }
819
820 kfree_skb(buff);
821}
822
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700823static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb)
824{
Eric Dumazetcf533ea2011-10-21 05:22:42 -0400825 const struct tcphdr *th = tcp_hdr(skb);
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700826 u32 seq = 0, ack_seq = 0;
Guo-Fu Tsengfa3e5b42008-10-09 21:11:56 -0700827 struct tcp_md5sig_key *key = NULL;
Shawn Lu658ddaa2012-01-31 22:35:48 +0000828#ifdef CONFIG_TCP_MD5SIG
829 const __u8 *hash_location = NULL;
830 struct ipv6hdr *ipv6h = ipv6_hdr(skb);
831 unsigned char newhash[16];
832 int genhash;
833 struct sock *sk1 = NULL;
834#endif
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700835
836 if (th->rst)
837 return;
838
839 if (!ipv6_unicast_destination(skb))
840 return;
841
842#ifdef CONFIG_TCP_MD5SIG
Shawn Lu658ddaa2012-01-31 22:35:48 +0000843 hash_location = tcp_parse_md5sig_option(th);
844 if (!sk && hash_location) {
845 /*
846 * active side is lost. Try to find listening socket through
847 * source port, and then find md5 key through listening socket.
848 * we are not loose security here:
849 * Incoming packet is checked with md5 hash with finding key,
850 * no RST generated if md5 hash doesn't match.
851 */
852 sk1 = inet6_lookup_listener(dev_net(skb_dst(skb)->dev),
Tom Herbert5ba24952013-01-22 09:50:39 +0000853 &tcp_hashinfo, &ipv6h->saddr,
854 th->source, &ipv6h->daddr,
Shawn Lu658ddaa2012-01-31 22:35:48 +0000855 ntohs(th->source), inet6_iif(skb));
856 if (!sk1)
857 return;
858
859 rcu_read_lock();
860 key = tcp_v6_md5_do_lookup(sk1, &ipv6h->saddr);
861 if (!key)
862 goto release_sk1;
863
864 genhash = tcp_v6_md5_hash_skb(newhash, key, NULL, NULL, skb);
865 if (genhash || memcmp(hash_location, newhash, 16) != 0)
866 goto release_sk1;
867 } else {
868 key = sk ? tcp_v6_md5_do_lookup(sk, &ipv6h->saddr) : NULL;
869 }
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700870#endif
871
872 if (th->ack)
873 seq = ntohl(th->ack_seq);
874 else
875 ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len -
876 (th->doff << 2);
877
Florent Fourcot1d13a962014-01-16 17:21:22 +0100878 tcp_v6_send_response(skb, seq, ack_seq, 0, 0, 0, key, 1, 0, 0);
Shawn Lu658ddaa2012-01-31 22:35:48 +0000879
880#ifdef CONFIG_TCP_MD5SIG
881release_sk1:
882 if (sk1) {
883 rcu_read_unlock();
884 sock_put(sk1);
885 }
886#endif
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700887}
888
Andrey Vaginee684b62013-02-11 05:50:19 +0000889static void tcp_v6_send_ack(struct sk_buff *skb, u32 seq, u32 ack,
890 u32 win, u32 tsval, u32 tsecr,
Florent Fourcot1d13a962014-01-16 17:21:22 +0100891 struct tcp_md5sig_key *key, u8 tclass,
892 u32 label)
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700893{
Florent Fourcot1d13a962014-01-16 17:21:22 +0100894 tcp_v6_send_response(skb, seq, ack, win, tsval, tsecr, key, 0, tclass,
895 label);
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700896}
897
Linus Torvalds1da177e2005-04-16 15:20:36 -0700898static void tcp_v6_timewait_ack(struct sock *sk, struct sk_buff *skb)
899{
Arnaldo Carvalho de Melo8feaf0c02005-08-09 20:09:30 -0700900 struct inet_timewait_sock *tw = inet_twsk(sk);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800901 struct tcp_timewait_sock *tcptw = tcp_twsk(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700902
YOSHIFUJI Hideaki9501f972008-04-18 12:45:16 +0900903 tcp_v6_send_ack(skb, tcptw->tw_snd_nxt, tcptw->tw_rcv_nxt,
Arnaldo Carvalho de Melo8feaf0c02005-08-09 20:09:30 -0700904 tcptw->tw_rcv_wnd >> tw->tw_rcv_wscale,
Andrey Vaginee684b62013-02-11 05:50:19 +0000905 tcp_time_stamp + tcptw->tw_ts_offset,
Eric Dumazetb903d322011-10-27 00:44:35 -0400906 tcptw->tw_ts_recent, tcp_twsk_md5_key(tcptw),
Florent Fourcot1d13a962014-01-16 17:21:22 +0100907 tw->tw_tclass, (tw->tw_flowlabel << 12));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700908
Arnaldo Carvalho de Melo8feaf0c02005-08-09 20:09:30 -0700909 inet_twsk_put(tw);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700910}
911
Gui Jianfeng6edafaa2008-08-06 23:50:04 -0700912static void tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb,
913 struct request_sock *req)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700914{
Andrey Vaginee684b62013-02-11 05:50:19 +0000915 tcp_v6_send_ack(skb, tcp_rsk(req)->snt_isn + 1, tcp_rsk(req)->rcv_isn + 1,
916 req->rcv_wnd, tcp_time_stamp, req->ts_recent,
Florent Fourcot1d13a962014-01-16 17:21:22 +0100917 tcp_v6_md5_do_lookup(sk, &ipv6_hdr(skb)->daddr),
918 0, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700919}
920
921
Weilong Chen4c99aa42013-12-19 18:44:34 +0800922static struct sock *tcp_v6_hnd_req(struct sock *sk, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700923{
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700924 struct request_sock *req, **prev;
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -0700925 const struct tcphdr *th = tcp_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700926 struct sock *nsk;
927
928 /* Find possible connection requests. */
Arnaldo Carvalho de Melo81297652005-12-13 23:15:24 -0800929 req = inet6_csk_search_req(sk, &prev, th->source,
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700930 &ipv6_hdr(skb)->saddr,
931 &ipv6_hdr(skb)->daddr, inet6_iif(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700932 if (req)
Jerry Chu83368862012-08-31 12:29:12 +0000933 return tcp_check_req(sk, skb, req, prev, false);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700934
YOSHIFUJI Hideaki3b1e0a62008-03-26 02:26:21 +0900935 nsk = __inet6_lookup_established(sock_net(sk), &tcp_hashinfo,
Pavel Emelyanovd86e0da2008-01-31 05:07:21 -0800936 &ipv6_hdr(skb)->saddr, th->source,
937 &ipv6_hdr(skb)->daddr, ntohs(th->dest), inet6_iif(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700938
939 if (nsk) {
940 if (nsk->sk_state != TCP_TIME_WAIT) {
941 bh_lock_sock(nsk);
942 return nsk;
943 }
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -0700944 inet_twsk_put(inet_twsk(nsk));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700945 return NULL;
946 }
947
Glenn Griffinc6aefaf2008-02-07 21:49:26 -0800948#ifdef CONFIG_SYN_COOKIES
Florian Westphalaf9b4732010-06-03 00:43:44 +0000949 if (!th->syn)
Glenn Griffinc6aefaf2008-02-07 21:49:26 -0800950 sk = cookie_v6_check(sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700951#endif
952 return sk;
953}
954
Linus Torvalds1da177e2005-04-16 15:20:36 -0700955/* FIXME: this is substantially similar to the ipv4 code.
956 * Can some kind of merge be done? -- erics
957 */
958static int tcp_v6_conn_request(struct sock *sk, struct sk_buff *skb)
959{
William Allen Simpsone6b4d112009-12-02 18:07:39 +0000960 struct tcp_options_received tmp_opt;
961 struct request_sock *req;
Eric Dumazet634fb9792013-10-09 15:21:29 -0700962 struct inet_request_sock *ireq;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700963 struct ipv6_pinfo *np = inet6_sk(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700964 struct tcp_sock *tp = tcp_sk(sk);
William Allen Simpsone6b4d112009-12-02 18:07:39 +0000965 __u32 isn = TCP_SKB_CB(skb)->when;
David S. Miller493f3772010-12-02 12:14:29 -0800966 struct dst_entry *dst = NULL;
Neal Cardwell3840a062012-06-28 12:34:19 +0000967 struct flowi6 fl6;
Eric Dumazeta2a385d2012-05-16 23:15:34 +0000968 bool want_cookie = false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700969
970 if (skb->protocol == htons(ETH_P_IP))
971 return tcp_v4_conn_request(sk, skb);
972
973 if (!ipv6_unicast_destination(skb))
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900974 goto drop;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700975
Hannes Frederic Sowa5ad37d52013-07-26 17:43:23 +0200976 if ((sysctl_tcp_syncookies == 2 ||
977 inet_csk_reqsk_queue_is_full(sk)) && !isn) {
Eric Dumazet946cedc2011-08-30 03:21:44 +0000978 want_cookie = tcp_syn_flood_action(sk, skb, "TCPv6");
979 if (!want_cookie)
980 goto drop;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700981 }
982
Vijay Subramanian5f1e9422013-01-31 08:24:19 +0000983 if (sk_acceptq_is_full(sk) && inet_csk_reqsk_queue_young(sk) > 1) {
984 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700985 goto drop;
Vijay Subramanian5f1e9422013-01-31 08:24:19 +0000986 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700987
Arnaldo Carvalho de Meloca304b62005-12-13 23:15:40 -0800988 req = inet6_reqsk_alloc(&tcp6_request_sock_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700989 if (req == NULL)
990 goto drop;
991
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800992#ifdef CONFIG_TCP_MD5SIG
993 tcp_rsk(req)->af_specific = &tcp_request_sock_ipv6_ops;
994#endif
995
Linus Torvalds1da177e2005-04-16 15:20:36 -0700996 tcp_clear_options(&tmp_opt);
997 tmp_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - sizeof(struct ipv6hdr);
998 tmp_opt.user_mss = tp->rx_opt.user_mss;
Christoph Paasch1a2c6182013-03-17 08:23:34 +0000999 tcp_parse_options(skb, &tmp_opt, 0, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001000
Florian Westphal4dfc2812008-04-10 03:12:40 -07001001 if (want_cookie && !tmp_opt.saw_tstamp)
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001002 tcp_clear_options(&tmp_opt);
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001003
Linus Torvalds1da177e2005-04-16 15:20:36 -07001004 tmp_opt.tstamp_ok = tmp_opt.saw_tstamp;
1005 tcp_openreq_init(req, &tmp_opt, skb);
1006
Eric Dumazet634fb9792013-10-09 15:21:29 -07001007 ireq = inet_rsk(req);
1008 ireq->ir_v6_rmt_addr = ipv6_hdr(skb)->saddr;
1009 ireq->ir_v6_loc_addr = ipv6_hdr(skb)->daddr;
Florian Westphal172d69e2010-06-21 11:48:45 +00001010 if (!want_cookie || tmp_opt.tstamp_ok)
Hannes Frederic Sowa5d134f12013-01-05 16:10:48 +00001011 TCP_ECN_create_request(req, skb, sock_net(sk));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001012
Eric Dumazet634fb9792013-10-09 15:21:29 -07001013 ireq->ir_iif = sk->sk_bound_dev_if;
Eric Dumazet4d0fe502011-11-23 17:29:23 -05001014
1015 /* So that link locals have meaning */
1016 if (!sk->sk_bound_dev_if &&
Eric Dumazet634fb9792013-10-09 15:21:29 -07001017 ipv6_addr_type(&ireq->ir_v6_rmt_addr) & IPV6_ADDR_LINKLOCAL)
1018 ireq->ir_iif = inet6_iif(skb);
Eric Dumazet4d0fe502011-11-23 17:29:23 -05001019
Florian Westphal2bbdf382010-06-13 11:29:39 +00001020 if (!isn) {
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001021 if (ipv6_opt_accepted(sk, skb) ||
1022 np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo ||
Florent Fourcotdf3687f2014-01-17 17:15:03 +01001023 np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim ||
1024 np->repflow) {
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001025 atomic_inc(&skb->users);
Eric Dumazet634fb9792013-10-09 15:21:29 -07001026 ireq->pktopts = skb;
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001027 }
David S. Miller493f3772010-12-02 12:14:29 -08001028
1029 if (want_cookie) {
Florian Westphal2bbdf382010-06-13 11:29:39 +00001030 isn = cookie_v6_init_sequence(sk, skb, &req->mss);
1031 req->cookie_ts = tmp_opt.tstamp_ok;
David S. Miller493f3772010-12-02 12:14:29 -08001032 goto have_isn;
Florian Westphal2bbdf382010-06-13 11:29:39 +00001033 }
David S. Miller493f3772010-12-02 12:14:29 -08001034
1035 /* VJ's idea. We save last timestamp seen
1036 * from the destination in peer table, when entering
1037 * state TIME-WAIT, and check against it before
1038 * accepting new connection request.
1039 *
1040 * If "isn" is not zero, this request hit alive
1041 * timewait bucket, so that all the necessary checks
1042 * are made in the function processing timewait state.
1043 */
1044 if (tmp_opt.saw_tstamp &&
1045 tcp_death_row.sysctl_tw_recycle &&
David S. Miller81166dd2012-07-10 03:14:24 -07001046 (dst = inet6_csk_route_req(sk, &fl6, req)) != NULL) {
1047 if (!tcp_peer_is_proven(req, dst, true)) {
David S. Miller493f3772010-12-02 12:14:29 -08001048 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_PAWSPASSIVEREJECTED);
1049 goto drop_and_release;
1050 }
1051 }
1052 /* Kill the following clause, if you dislike this way. */
1053 else if (!sysctl_tcp_syncookies &&
1054 (sysctl_max_syn_backlog - inet_csk_reqsk_queue_len(sk) <
1055 (sysctl_max_syn_backlog >> 2)) &&
David S. Miller81166dd2012-07-10 03:14:24 -07001056 !tcp_peer_is_proven(req, dst, false)) {
David S. Miller493f3772010-12-02 12:14:29 -08001057 /* Without syncookies last quarter of
1058 * backlog is filled with destinations,
1059 * proven to be alive.
1060 * It means that we continue to communicate
1061 * to destinations, already remembered
1062 * to the moment of synflood.
1063 */
1064 LIMIT_NETDEBUG(KERN_DEBUG "TCP: drop open request from %pI6/%u\n",
Eric Dumazet634fb9792013-10-09 15:21:29 -07001065 &ireq->ir_v6_rmt_addr, ntohs(tcp_hdr(skb)->source));
David S. Miller493f3772010-12-02 12:14:29 -08001066 goto drop_and_release;
1067 }
1068
1069 isn = tcp_v6_init_sequence(skb);
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001070 }
David S. Miller493f3772010-12-02 12:14:29 -08001071have_isn:
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -07001072 tcp_rsk(req)->snt_isn = isn;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001073
Neal Cardwell437c5b52012-06-23 19:22:00 +00001074 if (security_inet_conn_request(sk, skb, req))
1075 goto drop_and_release;
Venkat Yekkirala4237c752006-07-24 23:32:50 -07001076
Neal Cardwell9f10d3f2012-06-28 12:34:21 +00001077 if (tcp_v6_send_synack(sk, dst, &fl6, req,
Eric Dumazetfff32692012-06-01 01:47:50 +00001078 skb_get_queue_mapping(skb)) ||
William Allen Simpson4957faade2009-12-02 18:25:27 +00001079 want_cookie)
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001080 goto drop_and_free;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001081
Neal Cardwell016818d2012-09-22 04:18:55 +00001082 tcp_rsk(req)->snt_synack = tcp_time_stamp;
Jerry Chu83368862012-08-31 12:29:12 +00001083 tcp_rsk(req)->listener = NULL;
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001084 inet6_csk_reqsk_queue_hash_add(sk, req, TCP_TIMEOUT_INIT);
1085 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001086
David S. Miller493f3772010-12-02 12:14:29 -08001087drop_and_release:
1088 dst_release(dst);
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001089drop_and_free:
1090 reqsk_free(req);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001091drop:
Vijay Subramanian5f1e9422013-01-31 08:24:19 +00001092 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENDROPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001093 return 0; /* don't send reset */
1094}
1095
Weilong Chen4c99aa42013-12-19 18:44:34 +08001096static struct sock *tcp_v6_syn_recv_sock(struct sock *sk, struct sk_buff *skb,
1097 struct request_sock *req,
1098 struct dst_entry *dst)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001099{
Eric Dumazet634fb9792013-10-09 15:21:29 -07001100 struct inet_request_sock *ireq;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001101 struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
1102 struct tcp6_sock *newtcp6sk;
1103 struct inet_sock *newinet;
1104 struct tcp_sock *newtp;
1105 struct sock *newsk;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001106#ifdef CONFIG_TCP_MD5SIG
1107 struct tcp_md5sig_key *key;
1108#endif
Neal Cardwell3840a062012-06-28 12:34:19 +00001109 struct flowi6 fl6;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001110
1111 if (skb->protocol == htons(ETH_P_IP)) {
1112 /*
1113 * v6 mapped
1114 */
1115
1116 newsk = tcp_v4_syn_recv_sock(sk, skb, req, dst);
1117
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001118 if (newsk == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001119 return NULL;
1120
1121 newtcp6sk = (struct tcp6_sock *)newsk;
1122 inet_sk(newsk)->pinet6 = &newtcp6sk->inet6;
1123
1124 newinet = inet_sk(newsk);
1125 newnp = inet6_sk(newsk);
1126 newtp = tcp_sk(newsk);
1127
1128 memcpy(newnp, np, sizeof(struct ipv6_pinfo));
1129
Eric Dumazetefe42082013-10-03 15:42:29 -07001130 ipv6_addr_set_v4mapped(newinet->inet_daddr, &newsk->sk_v6_daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001131
Eric Dumazetc720c7e2009-10-15 06:30:45 +00001132 ipv6_addr_set_v4mapped(newinet->inet_saddr, &newnp->saddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001133
Eric Dumazetefe42082013-10-03 15:42:29 -07001134 newsk->sk_v6_rcv_saddr = newnp->saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001135
Arnaldo Carvalho de Melo8292a172005-12-13 23:15:52 -08001136 inet_csk(newsk)->icsk_af_ops = &ipv6_mapped;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001137 newsk->sk_backlog_rcv = tcp_v4_do_rcv;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001138#ifdef CONFIG_TCP_MD5SIG
1139 newtp->af_specific = &tcp_sock_ipv6_mapped_specific;
1140#endif
1141
Yan, Zheng676a1182011-09-25 02:21:30 +00001142 newnp->ipv6_ac_list = NULL;
1143 newnp->ipv6_fl_list = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001144 newnp->pktoptions = NULL;
1145 newnp->opt = NULL;
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001146 newnp->mcast_oif = inet6_iif(skb);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001147 newnp->mcast_hops = ipv6_hdr(skb)->hop_limit;
Florent Fourcot1397ed32013-12-08 15:46:57 +01001148 newnp->rcv_flowinfo = ip6_flowinfo(ipv6_hdr(skb));
Florent Fourcotdf3687f2014-01-17 17:15:03 +01001149 if (np->repflow)
1150 newnp->flow_label = ip6_flowlabel(ipv6_hdr(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001151
Arnaldo Carvalho de Meloe6848972005-08-09 19:45:38 -07001152 /*
1153 * No need to charge this sock to the relevant IPv6 refcnt debug socks count
1154 * here, tcp_create_openreq_child now does this for us, see the comment in
1155 * that function for the gory details. -acme
Linus Torvalds1da177e2005-04-16 15:20:36 -07001156 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001157
1158 /* It is tricky place. Until this moment IPv4 tcp
Arnaldo Carvalho de Melo8292a172005-12-13 23:15:52 -08001159 worked with IPv6 icsk.icsk_af_ops.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001160 Sync it now.
1161 */
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08001162 tcp_sync_mss(newsk, inet_csk(newsk)->icsk_pmtu_cookie);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001163
1164 return newsk;
1165 }
1166
Eric Dumazet634fb9792013-10-09 15:21:29 -07001167 ireq = inet_rsk(req);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001168
1169 if (sk_acceptq_is_full(sk))
1170 goto out_overflow;
1171
David S. Miller493f3772010-12-02 12:14:29 -08001172 if (!dst) {
Neal Cardwell3840a062012-06-28 12:34:19 +00001173 dst = inet6_csk_route_req(sk, &fl6, req);
David S. Miller493f3772010-12-02 12:14:29 -08001174 if (!dst)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001175 goto out;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001176 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001177
1178 newsk = tcp_create_openreq_child(sk, req, skb);
1179 if (newsk == NULL)
Balazs Scheidler093d2822010-10-21 13:06:43 +02001180 goto out_nonewsk;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001181
Arnaldo Carvalho de Meloe6848972005-08-09 19:45:38 -07001182 /*
1183 * No need to charge this sock to the relevant IPv6 refcnt debug socks
1184 * count here, tcp_create_openreq_child now does this for us, see the
1185 * comment in that function for the gory details. -acme
1186 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001187
Stephen Hemminger59eed272006-08-25 15:55:43 -07001188 newsk->sk_gso_type = SKB_GSO_TCPV6;
YOSHIFUJI Hideaki8e1ef0a2006-08-29 17:15:09 -07001189 __ip6_dst_store(newsk, dst, NULL, NULL);
Neal Cardwellfae6ef82012-08-19 03:30:38 +00001190 inet6_sk_rx_dst_set(newsk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001191
1192 newtcp6sk = (struct tcp6_sock *)newsk;
1193 inet_sk(newsk)->pinet6 = &newtcp6sk->inet6;
1194
1195 newtp = tcp_sk(newsk);
1196 newinet = inet_sk(newsk);
1197 newnp = inet6_sk(newsk);
1198
1199 memcpy(newnp, np, sizeof(struct ipv6_pinfo));
1200
Eric Dumazet634fb9792013-10-09 15:21:29 -07001201 newsk->sk_v6_daddr = ireq->ir_v6_rmt_addr;
1202 newnp->saddr = ireq->ir_v6_loc_addr;
1203 newsk->sk_v6_rcv_saddr = ireq->ir_v6_loc_addr;
1204 newsk->sk_bound_dev_if = ireq->ir_iif;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001205
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001206 /* Now IPv6 options...
Linus Torvalds1da177e2005-04-16 15:20:36 -07001207
1208 First: no IPv4 options.
1209 */
Eric Dumazetf6d8bd02011-04-21 09:45:37 +00001210 newinet->inet_opt = NULL;
Yan, Zheng676a1182011-09-25 02:21:30 +00001211 newnp->ipv6_ac_list = NULL;
Masayuki Nakagawad35690b2007-03-16 16:14:03 -07001212 newnp->ipv6_fl_list = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001213
1214 /* Clone RX bits */
1215 newnp->rxopt.all = np->rxopt.all;
1216
1217 /* Clone pktoptions received with SYN */
1218 newnp->pktoptions = NULL;
Eric Dumazet634fb9792013-10-09 15:21:29 -07001219 if (ireq->pktopts != NULL) {
1220 newnp->pktoptions = skb_clone(ireq->pktopts,
Mel Gorman99a1dec2012-07-31 16:44:14 -07001221 sk_gfp_atomic(sk, GFP_ATOMIC));
Eric Dumazet634fb9792013-10-09 15:21:29 -07001222 consume_skb(ireq->pktopts);
1223 ireq->pktopts = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001224 if (newnp->pktoptions)
1225 skb_set_owner_r(newnp->pktoptions, newsk);
1226 }
1227 newnp->opt = NULL;
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001228 newnp->mcast_oif = inet6_iif(skb);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001229 newnp->mcast_hops = ipv6_hdr(skb)->hop_limit;
Florent Fourcot1397ed32013-12-08 15:46:57 +01001230 newnp->rcv_flowinfo = ip6_flowinfo(ipv6_hdr(skb));
Florent Fourcotdf3687f2014-01-17 17:15:03 +01001231 if (np->repflow)
1232 newnp->flow_label = ip6_flowlabel(ipv6_hdr(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001233
1234 /* Clone native IPv6 options from listening socket (if any)
1235
1236 Yes, keeping reference count would be much more clever,
1237 but we make one more one thing there: reattach optmem
1238 to newsk.
1239 */
RongQing.Li43264e02012-07-01 17:18:59 +00001240 if (np->opt)
1241 newnp->opt = ipv6_dup_options(newsk, np->opt);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001242
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08001243 inet_csk(newsk)->icsk_ext_hdr_len = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001244 if (newnp->opt)
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08001245 inet_csk(newsk)->icsk_ext_hdr_len = (newnp->opt->opt_nflen +
1246 newnp->opt->opt_flen);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001247
1248 tcp_sync_mss(newsk, dst_mtu(dst));
David S. Miller0dbaee32010-12-13 12:52:14 -08001249 newtp->advmss = dst_metric_advmss(dst);
Neal Cardwelld135c522012-04-22 09:45:47 +00001250 if (tcp_sk(sk)->rx_opt.user_mss &&
1251 tcp_sk(sk)->rx_opt.user_mss < newtp->advmss)
1252 newtp->advmss = tcp_sk(sk)->rx_opt.user_mss;
1253
Linus Torvalds1da177e2005-04-16 15:20:36 -07001254 tcp_initialize_rcv_mss(newsk);
1255
Eric Dumazetc720c7e2009-10-15 06:30:45 +00001256 newinet->inet_daddr = newinet->inet_saddr = LOOPBACK4_IPV6;
1257 newinet->inet_rcv_saddr = LOOPBACK4_IPV6;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001258
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001259#ifdef CONFIG_TCP_MD5SIG
1260 /* Copy over the MD5 key from the original socket */
Eric Dumazetefe42082013-10-03 15:42:29 -07001261 if ((key = tcp_v6_md5_do_lookup(sk, &newsk->sk_v6_daddr)) != NULL) {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001262 /* We're using one, so create a matching key
1263 * on the newsk structure. If we fail to get
1264 * memory, then we end up not copying the key
1265 * across. Shucks.
1266 */
Eric Dumazetefe42082013-10-03 15:42:29 -07001267 tcp_md5_do_add(newsk, (union tcp_md5_addr *)&newsk->sk_v6_daddr,
Mel Gorman99a1dec2012-07-31 16:44:14 -07001268 AF_INET6, key->key, key->keylen,
1269 sk_gfp_atomic(sk, GFP_ATOMIC));
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001270 }
1271#endif
1272
Balazs Scheidler093d2822010-10-21 13:06:43 +02001273 if (__inet_inherit_port(sk, newsk) < 0) {
Christoph Paasche337e242012-12-14 04:07:58 +00001274 inet_csk_prepare_forced_close(newsk);
1275 tcp_done(newsk);
Balazs Scheidler093d2822010-10-21 13:06:43 +02001276 goto out;
1277 }
Eric Dumazet9327f702009-12-04 03:46:54 +00001278 __inet6_hash(newsk, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001279
1280 return newsk;
1281
1282out_overflow:
Pavel Emelyanovde0744a2008-07-16 20:31:16 -07001283 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS);
Balazs Scheidler093d2822010-10-21 13:06:43 +02001284out_nonewsk:
Linus Torvalds1da177e2005-04-16 15:20:36 -07001285 dst_release(dst);
Balazs Scheidler093d2822010-10-21 13:06:43 +02001286out:
1287 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENDROPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001288 return NULL;
1289}
1290
Al Virob51655b2006-11-14 21:40:42 -08001291static __sum16 tcp_v6_checksum_init(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001292{
Patrick McHardy84fa7932006-08-29 16:44:56 -07001293 if (skb->ip_summed == CHECKSUM_COMPLETE) {
Herbert Xu684f2172009-01-08 10:41:23 -08001294 if (!tcp_v6_check(skb->len, &ipv6_hdr(skb)->saddr,
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001295 &ipv6_hdr(skb)->daddr, skb->csum)) {
Herbert Xufb286bb2005-11-10 13:01:24 -08001296 skb->ip_summed = CHECKSUM_UNNECESSARY;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001297 return 0;
Herbert Xufb286bb2005-11-10 13:01:24 -08001298 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001299 }
Herbert Xufb286bb2005-11-10 13:01:24 -08001300
Herbert Xu684f2172009-01-08 10:41:23 -08001301 skb->csum = ~csum_unfold(tcp_v6_check(skb->len,
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001302 &ipv6_hdr(skb)->saddr,
1303 &ipv6_hdr(skb)->daddr, 0));
Herbert Xufb286bb2005-11-10 13:01:24 -08001304
Linus Torvalds1da177e2005-04-16 15:20:36 -07001305 if (skb->len <= 76) {
Herbert Xufb286bb2005-11-10 13:01:24 -08001306 return __skb_checksum_complete(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001307 }
1308 return 0;
1309}
1310
1311/* The socket must have it's spinlock held when we get
1312 * here.
1313 *
1314 * We have a potential double-lock case here, so even when
1315 * doing backlog processing we use the BH locking scheme.
1316 * This is because we cannot sleep with the original spinlock
1317 * held.
1318 */
1319static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb)
1320{
1321 struct ipv6_pinfo *np = inet6_sk(sk);
1322 struct tcp_sock *tp;
1323 struct sk_buff *opt_skb = NULL;
1324
1325 /* Imagine: socket is IPv6. IPv4 packet arrives,
1326 goes to IPv4 receive handler and backlogged.
1327 From backlog it always goes here. Kerboom...
1328 Fortunately, tcp_rcv_established and rcv_established
1329 handle them correctly, but it is not case with
1330 tcp_v6_hnd_req and tcp_v6_send_reset(). --ANK
1331 */
1332
1333 if (skb->protocol == htons(ETH_P_IP))
1334 return tcp_v4_do_rcv(sk, skb);
1335
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001336#ifdef CONFIG_TCP_MD5SIG
1337 if (tcp_v6_inbound_md5_hash (sk, skb))
1338 goto discard;
1339#endif
1340
Dmitry Mishinfda9ef52006-08-31 15:28:39 -07001341 if (sk_filter(sk, skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001342 goto discard;
1343
1344 /*
1345 * socket locking is here for SMP purposes as backlog rcv
1346 * is currently called with bh processing disabled.
1347 */
1348
1349 /* Do Stevens' IPV6_PKTOPTIONS.
1350
1351 Yes, guys, it is the only place in our code, where we
1352 may make it not affecting IPv4.
1353 The rest of code is protocol independent,
1354 and I do not like idea to uglify IPv4.
1355
1356 Actually, all the idea behind IPV6_PKTOPTIONS
1357 looks not very well thought. For now we latch
1358 options, received in the last packet, enqueued
1359 by tcp. Feel free to propose better solution.
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001360 --ANK (980728)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001361 */
1362 if (np->rxopt.all)
Mel Gorman99a1dec2012-07-31 16:44:14 -07001363 opt_skb = skb_clone(skb, sk_gfp_atomic(sk, GFP_ATOMIC));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001364
1365 if (sk->sk_state == TCP_ESTABLISHED) { /* Fast path */
Eric Dumazet5d299f32012-08-06 05:09:33 +00001366 struct dst_entry *dst = sk->sk_rx_dst;
1367
Tom Herbertbdeab992011-08-14 19:45:55 +00001368 sock_rps_save_rxhash(sk, skb);
Eric Dumazet5d299f32012-08-06 05:09:33 +00001369 if (dst) {
1370 if (inet_sk(sk)->rx_dst_ifindex != skb->skb_iif ||
1371 dst->ops->check(dst, np->rx_dst_cookie) == NULL) {
1372 dst_release(dst);
1373 sk->sk_rx_dst = NULL;
1374 }
1375 }
1376
Vijay Subramanianc995ae22013-09-03 12:23:22 -07001377 tcp_rcv_established(sk, skb, tcp_hdr(skb), skb->len);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001378 if (opt_skb)
1379 goto ipv6_pktoptions;
1380 return 0;
1381 }
1382
Arnaldo Carvalho de Meloab6a5bb2007-03-18 17:43:48 -07001383 if (skb->len < tcp_hdrlen(skb) || tcp_checksum_complete(skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001384 goto csum_err;
1385
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001386 if (sk->sk_state == TCP_LISTEN) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001387 struct sock *nsk = tcp_v6_hnd_req(sk, skb);
1388 if (!nsk)
1389 goto discard;
1390
1391 /*
1392 * Queue it on the new socket if the new socket is active,
1393 * otherwise we just shortcircuit this and continue with
1394 * the new socket..
1395 */
Weilong Chen4c99aa42013-12-19 18:44:34 +08001396 if (nsk != sk) {
Tom Herbertbdeab992011-08-14 19:45:55 +00001397 sock_rps_save_rxhash(nsk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001398 if (tcp_child_process(sk, nsk, skb))
1399 goto reset;
1400 if (opt_skb)
1401 __kfree_skb(opt_skb);
1402 return 0;
1403 }
Neil Horman47482f12011-04-06 13:07:09 -07001404 } else
Tom Herbertbdeab992011-08-14 19:45:55 +00001405 sock_rps_save_rxhash(sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001406
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -07001407 if (tcp_rcv_state_process(sk, skb, tcp_hdr(skb), skb->len))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001408 goto reset;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001409 if (opt_skb)
1410 goto ipv6_pktoptions;
1411 return 0;
1412
1413reset:
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001414 tcp_v6_send_reset(sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001415discard:
1416 if (opt_skb)
1417 __kfree_skb(opt_skb);
1418 kfree_skb(skb);
1419 return 0;
1420csum_err:
Eric Dumazet6a5dc9e2013-04-29 08:39:56 +00001421 TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_CSUMERRORS);
Pavel Emelyanov63231bd2008-07-16 20:22:25 -07001422 TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_INERRS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001423 goto discard;
1424
1425
1426ipv6_pktoptions:
1427 /* Do you ask, what is it?
1428
1429 1. skb was enqueued by tcp.
1430 2. skb is added to tail of read queue, rather than out of order.
1431 3. socket is not in passive state.
1432 4. Finally, it really contains options, which user wants to receive.
1433 */
1434 tp = tcp_sk(sk);
1435 if (TCP_SKB_CB(opt_skb)->end_seq == tp->rcv_nxt &&
1436 !((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_LISTEN))) {
YOSHIFUJI Hideaki333fad52005-09-08 09:59:17 +09001437 if (np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo)
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001438 np->mcast_oif = inet6_iif(opt_skb);
YOSHIFUJI Hideaki333fad52005-09-08 09:59:17 +09001439 if (np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim)
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001440 np->mcast_hops = ipv6_hdr(opt_skb)->hop_limit;
Florent Fourcot82e9f102013-12-08 15:46:59 +01001441 if (np->rxopt.bits.rxflow || np->rxopt.bits.rxtclass)
Florent Fourcot1397ed32013-12-08 15:46:57 +01001442 np->rcv_flowinfo = ip6_flowinfo(ipv6_hdr(opt_skb));
Florent Fourcotdf3687f2014-01-17 17:15:03 +01001443 if (np->repflow)
1444 np->flow_label = ip6_flowlabel(ipv6_hdr(opt_skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001445 if (ipv6_opt_accepted(sk, opt_skb)) {
1446 skb_set_owner_r(opt_skb, sk);
1447 opt_skb = xchg(&np->pktoptions, opt_skb);
1448 } else {
1449 __kfree_skb(opt_skb);
1450 opt_skb = xchg(&np->pktoptions, NULL);
1451 }
1452 }
1453
Wei Yongjun800d55f2009-02-23 21:45:33 +00001454 kfree_skb(opt_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001455 return 0;
1456}
1457
Herbert Xue5bbef22007-10-15 12:50:28 -07001458static int tcp_v6_rcv(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001459{
Eric Dumazetcf533ea2011-10-21 05:22:42 -04001460 const struct tcphdr *th;
Eric Dumazetb71d1d42011-04-22 04:53:02 +00001461 const struct ipv6hdr *hdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001462 struct sock *sk;
1463 int ret;
Pavel Emelyanova86b1e32008-07-16 20:20:58 -07001464 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001465
1466 if (skb->pkt_type != PACKET_HOST)
1467 goto discard_it;
1468
1469 /*
1470 * Count it even if it's bad.
1471 */
Pavel Emelyanov63231bd2008-07-16 20:22:25 -07001472 TCP_INC_STATS_BH(net, TCP_MIB_INSEGS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001473
1474 if (!pskb_may_pull(skb, sizeof(struct tcphdr)))
1475 goto discard_it;
1476
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -07001477 th = tcp_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001478
1479 if (th->doff < sizeof(struct tcphdr)/4)
1480 goto bad_packet;
1481 if (!pskb_may_pull(skb, th->doff*4))
1482 goto discard_it;
1483
Herbert Xu60476372007-04-09 11:59:39 -07001484 if (!skb_csum_unnecessary(skb) && tcp_v6_checksum_init(skb))
Eric Dumazet6a5dc9e2013-04-29 08:39:56 +00001485 goto csum_error;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001486
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -07001487 th = tcp_hdr(skb);
Stephen Hemmingere802af92010-04-22 15:24:53 -07001488 hdr = ipv6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001489 TCP_SKB_CB(skb)->seq = ntohl(th->seq);
1490 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin +
1491 skb->len - th->doff*4);
1492 TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq);
1493 TCP_SKB_CB(skb)->when = 0;
Eric Dumazetb82d1bb2011-09-27 02:20:08 -04001494 TCP_SKB_CB(skb)->ip_dsfield = ipv6_get_dsfield(hdr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001495 TCP_SKB_CB(skb)->sacked = 0;
1496
Arnaldo Carvalho de Melo9a1f27c2008-10-07 11:41:57 -07001497 sk = __inet6_lookup_skb(&tcp_hashinfo, skb, th->source, th->dest);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001498 if (!sk)
1499 goto no_tcp_socket;
1500
1501process:
1502 if (sk->sk_state == TCP_TIME_WAIT)
1503 goto do_time_wait;
1504
Stephen Hemmingere802af92010-04-22 15:24:53 -07001505 if (hdr->hop_limit < inet6_sk(sk)->min_hopcount) {
1506 NET_INC_STATS_BH(net, LINUX_MIB_TCPMINTTLDROP);
1507 goto discard_and_relse;
1508 }
1509
Linus Torvalds1da177e2005-04-16 15:20:36 -07001510 if (!xfrm6_policy_check(sk, XFRM_POLICY_IN, skb))
1511 goto discard_and_relse;
1512
Dmitry Mishinfda9ef52006-08-31 15:28:39 -07001513 if (sk_filter(sk, skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001514 goto discard_and_relse;
1515
Eliezer Tamir8b80cda2013-07-10 17:13:26 +03001516 sk_mark_napi_id(sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001517 skb->dev = NULL;
1518
Fabio Olive Leite293b9c42006-09-25 22:28:47 -07001519 bh_lock_sock_nested(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001520 ret = 0;
1521 if (!sock_owned_by_user(sk)) {
Dan Williams7bced392013-12-30 12:37:29 -08001522 if (!tcp_prequeue(sk, skb))
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001523 ret = tcp_v6_do_rcv(sk, skb);
Eric Dumazetda882c12012-04-22 23:38:54 +00001524 } else if (unlikely(sk_add_backlog(sk, skb,
1525 sk->sk_rcvbuf + sk->sk_sndbuf))) {
Zhu Yi6b03a532010-03-04 18:01:41 +00001526 bh_unlock_sock(sk);
Eric Dumazet6cce09f2010-03-07 23:21:57 +00001527 NET_INC_STATS_BH(net, LINUX_MIB_TCPBACKLOGDROP);
Zhu Yi6b03a532010-03-04 18:01:41 +00001528 goto discard_and_relse;
1529 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001530 bh_unlock_sock(sk);
1531
1532 sock_put(sk);
1533 return ret ? -1 : 0;
1534
1535no_tcp_socket:
1536 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb))
1537 goto discard_it;
1538
1539 if (skb->len < (th->doff<<2) || tcp_checksum_complete(skb)) {
Eric Dumazet6a5dc9e2013-04-29 08:39:56 +00001540csum_error:
1541 TCP_INC_STATS_BH(net, TCP_MIB_CSUMERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001542bad_packet:
Pavel Emelyanov63231bd2008-07-16 20:22:25 -07001543 TCP_INC_STATS_BH(net, TCP_MIB_INERRS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001544 } else {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001545 tcp_v6_send_reset(NULL, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001546 }
1547
1548discard_it:
Linus Torvalds1da177e2005-04-16 15:20:36 -07001549 kfree_skb(skb);
1550 return 0;
1551
1552discard_and_relse:
1553 sock_put(sk);
1554 goto discard_it;
1555
1556do_time_wait:
1557 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -07001558 inet_twsk_put(inet_twsk(sk));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001559 goto discard_it;
1560 }
1561
Eric Dumazet6a5dc9e2013-04-29 08:39:56 +00001562 if (skb->len < (th->doff<<2)) {
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -07001563 inet_twsk_put(inet_twsk(sk));
Eric Dumazet6a5dc9e2013-04-29 08:39:56 +00001564 goto bad_packet;
1565 }
1566 if (tcp_checksum_complete(skb)) {
1567 inet_twsk_put(inet_twsk(sk));
1568 goto csum_error;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001569 }
1570
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -07001571 switch (tcp_timewait_state_process(inet_twsk(sk), skb, th)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001572 case TCP_TW_SYN:
1573 {
1574 struct sock *sk2;
1575
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +09001576 sk2 = inet6_lookup_listener(dev_net(skb->dev), &tcp_hashinfo,
Tom Herbert5ba24952013-01-22 09:50:39 +00001577 &ipv6_hdr(skb)->saddr, th->source,
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001578 &ipv6_hdr(skb)->daddr,
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001579 ntohs(th->dest), inet6_iif(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001580 if (sk2 != NULL) {
Arnaldo Carvalho de Melo295ff7e2005-08-09 20:44:40 -07001581 struct inet_timewait_sock *tw = inet_twsk(sk);
1582 inet_twsk_deschedule(tw, &tcp_death_row);
1583 inet_twsk_put(tw);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001584 sk = sk2;
1585 goto process;
1586 }
1587 /* Fall through to ACK */
1588 }
1589 case TCP_TW_ACK:
1590 tcp_v6_timewait_ack(sk, skb);
1591 break;
1592 case TCP_TW_RST:
1593 goto no_tcp_socket;
1594 case TCP_TW_SUCCESS:;
1595 }
1596 goto discard_it;
1597}
1598
Eric Dumazetc7109982012-07-26 12:18:11 +00001599static void tcp_v6_early_demux(struct sk_buff *skb)
1600{
1601 const struct ipv6hdr *hdr;
1602 const struct tcphdr *th;
1603 struct sock *sk;
1604
1605 if (skb->pkt_type != PACKET_HOST)
1606 return;
1607
1608 if (!pskb_may_pull(skb, skb_transport_offset(skb) + sizeof(struct tcphdr)))
1609 return;
1610
1611 hdr = ipv6_hdr(skb);
1612 th = tcp_hdr(skb);
1613
1614 if (th->doff < sizeof(struct tcphdr) / 4)
1615 return;
1616
1617 sk = __inet6_lookup_established(dev_net(skb->dev), &tcp_hashinfo,
1618 &hdr->saddr, th->source,
1619 &hdr->daddr, ntohs(th->dest),
1620 inet6_iif(skb));
1621 if (sk) {
1622 skb->sk = sk;
1623 skb->destructor = sock_edemux;
1624 if (sk->sk_state != TCP_TIME_WAIT) {
1625 struct dst_entry *dst = sk->sk_rx_dst;
Neal Cardwellf3f12132012-10-22 21:41:48 +00001626
Eric Dumazetc7109982012-07-26 12:18:11 +00001627 if (dst)
Eric Dumazet5d299f32012-08-06 05:09:33 +00001628 dst = dst_check(dst, inet6_sk(sk)->rx_dst_cookie);
Eric Dumazetc7109982012-07-26 12:18:11 +00001629 if (dst &&
Neal Cardwellf3f12132012-10-22 21:41:48 +00001630 inet_sk(sk)->rx_dst_ifindex == skb->skb_iif)
Eric Dumazetc7109982012-07-26 12:18:11 +00001631 skb_dst_set_noref(skb, dst);
1632 }
1633 }
1634}
1635
David S. Millerccb7c412010-12-01 18:09:13 -08001636static struct timewait_sock_ops tcp6_timewait_sock_ops = {
1637 .twsk_obj_size = sizeof(struct tcp6_timewait_sock),
1638 .twsk_unique = tcp_twsk_unique,
1639 .twsk_destructor= tcp_twsk_destructor,
David S. Millerccb7c412010-12-01 18:09:13 -08001640};
1641
Stephen Hemminger3b401a82009-09-01 19:25:04 +00001642static const struct inet_connection_sock_af_ops ipv6_specific = {
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001643 .queue_xmit = inet6_csk_xmit,
1644 .send_check = tcp_v6_send_check,
1645 .rebuild_header = inet6_sk_rebuild_header,
Eric Dumazet5d299f32012-08-06 05:09:33 +00001646 .sk_rx_dst_set = inet6_sk_rx_dst_set,
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001647 .conn_request = tcp_v6_conn_request,
1648 .syn_recv_sock = tcp_v6_syn_recv_sock,
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001649 .net_header_len = sizeof(struct ipv6hdr),
Eric Dumazet67469602012-04-24 07:37:38 +00001650 .net_frag_header_len = sizeof(struct frag_hdr),
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001651 .setsockopt = ipv6_setsockopt,
1652 .getsockopt = ipv6_getsockopt,
1653 .addr2sockaddr = inet6_csk_addr2sockaddr,
1654 .sockaddr_len = sizeof(struct sockaddr_in6),
Arnaldo Carvalho de Meloab1e0a12008-02-03 04:06:04 -08001655 .bind_conflict = inet6_csk_bind_conflict,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -08001656#ifdef CONFIG_COMPAT
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001657 .compat_setsockopt = compat_ipv6_setsockopt,
1658 .compat_getsockopt = compat_ipv6_getsockopt,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -08001659#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07001660};
1661
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001662#ifdef CONFIG_TCP_MD5SIG
Stephen Hemmingerb2e4b3d2009-09-01 19:25:03 +00001663static const struct tcp_sock_af_ops tcp_sock_ipv6_specific = {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001664 .md5_lookup = tcp_v6_md5_lookup,
Adam Langley49a72df2008-07-19 00:01:42 -07001665 .calc_md5_hash = tcp_v6_md5_hash_skb,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001666 .md5_parse = tcp_v6_parse_md5_keys,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001667};
David S. Millera9286302006-11-14 19:53:22 -08001668#endif
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001669
Linus Torvalds1da177e2005-04-16 15:20:36 -07001670/*
1671 * TCP over IPv4 via INET6 API
1672 */
1673
Stephen Hemminger3b401a82009-09-01 19:25:04 +00001674static const struct inet_connection_sock_af_ops ipv6_mapped = {
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001675 .queue_xmit = ip_queue_xmit,
1676 .send_check = tcp_v4_send_check,
1677 .rebuild_header = inet_sk_rebuild_header,
Eric Dumazet63d02d12012-08-09 14:11:00 +00001678 .sk_rx_dst_set = inet_sk_rx_dst_set,
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001679 .conn_request = tcp_v6_conn_request,
1680 .syn_recv_sock = tcp_v6_syn_recv_sock,
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001681 .net_header_len = sizeof(struct iphdr),
1682 .setsockopt = ipv6_setsockopt,
1683 .getsockopt = ipv6_getsockopt,
1684 .addr2sockaddr = inet6_csk_addr2sockaddr,
1685 .sockaddr_len = sizeof(struct sockaddr_in6),
Arnaldo Carvalho de Meloab1e0a12008-02-03 04:06:04 -08001686 .bind_conflict = inet6_csk_bind_conflict,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -08001687#ifdef CONFIG_COMPAT
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001688 .compat_setsockopt = compat_ipv6_setsockopt,
1689 .compat_getsockopt = compat_ipv6_getsockopt,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -08001690#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07001691};
1692
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001693#ifdef CONFIG_TCP_MD5SIG
Stephen Hemmingerb2e4b3d2009-09-01 19:25:03 +00001694static const struct tcp_sock_af_ops tcp_sock_ipv6_mapped_specific = {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001695 .md5_lookup = tcp_v4_md5_lookup,
Adam Langley49a72df2008-07-19 00:01:42 -07001696 .calc_md5_hash = tcp_v4_md5_hash_skb,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001697 .md5_parse = tcp_v6_parse_md5_keys,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001698};
David S. Millera9286302006-11-14 19:53:22 -08001699#endif
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001700
Linus Torvalds1da177e2005-04-16 15:20:36 -07001701/* NOTE: A lot of things set to zero explicitly by call to
1702 * sk_alloc() so need not be done here.
1703 */
1704static int tcp_v6_init_sock(struct sock *sk)
1705{
Arnaldo Carvalho de Melo6687e982005-08-10 04:03:31 -03001706 struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001707
Neal Cardwell900f65d2012-04-19 09:55:21 +00001708 tcp_init_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001709
Arnaldo Carvalho de Melo8292a172005-12-13 23:15:52 -08001710 icsk->icsk_af_ops = &ipv6_specific;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001711
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001712#ifdef CONFIG_TCP_MD5SIG
David S. Millerac807fa2012-04-23 03:21:58 -04001713 tcp_sk(sk)->af_specific = &tcp_sock_ipv6_specific;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001714#endif
1715
Linus Torvalds1da177e2005-04-16 15:20:36 -07001716 return 0;
1717}
1718
Brian Haley7d06b2e2008-06-14 17:04:49 -07001719static void tcp_v6_destroy_sock(struct sock *sk)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001720{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001721 tcp_v4_destroy_sock(sk);
Brian Haley7d06b2e2008-06-14 17:04:49 -07001722 inet6_destroy_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001723}
1724
YOSHIFUJI Hideaki952a10b2007-04-21 20:13:44 +09001725#ifdef CONFIG_PROC_FS
Linus Torvalds1da177e2005-04-16 15:20:36 -07001726/* Proc filesystem TCPv6 sock list dumping. */
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001727static void get_openreq6(struct seq_file *seq,
Eric W. Biedermana7cb5a42012-05-24 01:10:10 -06001728 const struct sock *sk, struct request_sock *req, int i, kuid_t uid)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001729{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001730 int ttd = req->expires - jiffies;
Eric Dumazet634fb9792013-10-09 15:21:29 -07001731 const struct in6_addr *src = &inet_rsk(req)->ir_v6_loc_addr;
1732 const struct in6_addr *dest = &inet_rsk(req)->ir_v6_rmt_addr;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001733
1734 if (ttd < 0)
1735 ttd = 0;
1736
Linus Torvalds1da177e2005-04-16 15:20:36 -07001737 seq_printf(seq,
1738 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
Francesco Fuscod14c5ab2013-08-15 13:42:14 +02001739 "%02X %08X:%08X %02X:%08lX %08X %5u %8d %d %d %pK\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -07001740 i,
1741 src->s6_addr32[0], src->s6_addr32[1],
1742 src->s6_addr32[2], src->s6_addr32[3],
Eric Dumazetb44084c2013-10-10 00:04:37 -07001743 inet_rsk(req)->ir_num,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001744 dest->s6_addr32[0], dest->s6_addr32[1],
1745 dest->s6_addr32[2], dest->s6_addr32[3],
Eric Dumazet634fb9792013-10-09 15:21:29 -07001746 ntohs(inet_rsk(req)->ir_rmt_port),
Linus Torvalds1da177e2005-04-16 15:20:36 -07001747 TCP_SYN_RECV,
Weilong Chen4c99aa42013-12-19 18:44:34 +08001748 0, 0, /* could print option size, but that is af dependent. */
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001749 1, /* timers active (only the expire timer) */
1750 jiffies_to_clock_t(ttd),
Eric Dumazete6c022a2012-10-27 23:16:46 +00001751 req->num_timeout,
Eric W. Biedermana7cb5a42012-05-24 01:10:10 -06001752 from_kuid_munged(seq_user_ns(seq), uid),
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001753 0, /* non standard timer */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001754 0, /* open_requests have no inode */
1755 0, req);
1756}
1757
1758static void get_tcp6_sock(struct seq_file *seq, struct sock *sp, int i)
1759{
Eric Dumazetb71d1d42011-04-22 04:53:02 +00001760 const struct in6_addr *dest, *src;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001761 __u16 destp, srcp;
1762 int timer_active;
1763 unsigned long timer_expires;
Eric Dumazetcf533ea2011-10-21 05:22:42 -04001764 const struct inet_sock *inet = inet_sk(sp);
1765 const struct tcp_sock *tp = tcp_sk(sp);
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07001766 const struct inet_connection_sock *icsk = inet_csk(sp);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001767
Eric Dumazetefe42082013-10-03 15:42:29 -07001768 dest = &sp->sk_v6_daddr;
1769 src = &sp->sk_v6_rcv_saddr;
Eric Dumazetc720c7e2009-10-15 06:30:45 +00001770 destp = ntohs(inet->inet_dport);
1771 srcp = ntohs(inet->inet_sport);
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07001772
1773 if (icsk->icsk_pending == ICSK_TIME_RETRANS) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001774 timer_active = 1;
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07001775 timer_expires = icsk->icsk_timeout;
1776 } else if (icsk->icsk_pending == ICSK_TIME_PROBE0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001777 timer_active = 4;
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07001778 timer_expires = icsk->icsk_timeout;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001779 } else if (timer_pending(&sp->sk_timer)) {
1780 timer_active = 2;
1781 timer_expires = sp->sk_timer.expires;
1782 } else {
1783 timer_active = 0;
1784 timer_expires = jiffies;
1785 }
1786
1787 seq_printf(seq,
1788 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
Francesco Fuscod14c5ab2013-08-15 13:42:14 +02001789 "%02X %08X:%08X %02X:%08lX %08X %5u %8d %lu %d %pK %lu %lu %u %u %d\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -07001790 i,
1791 src->s6_addr32[0], src->s6_addr32[1],
1792 src->s6_addr32[2], src->s6_addr32[3], srcp,
1793 dest->s6_addr32[0], dest->s6_addr32[1],
1794 dest->s6_addr32[2], dest->s6_addr32[3], destp,
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001795 sp->sk_state,
Sridhar Samudrala47da8ee2006-06-27 13:29:00 -07001796 tp->write_seq-tp->snd_una,
1797 (sp->sk_state == TCP_LISTEN) ? sp->sk_ack_backlog : (tp->rcv_nxt - tp->copied_seq),
Linus Torvalds1da177e2005-04-16 15:20:36 -07001798 timer_active,
Eric Dumazeta399a802012-08-08 21:13:53 +00001799 jiffies_delta_to_clock_t(timer_expires - jiffies),
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07001800 icsk->icsk_retransmits,
Eric W. Biedermana7cb5a42012-05-24 01:10:10 -06001801 from_kuid_munged(seq_user_ns(seq), sock_i_uid(sp)),
Arnaldo Carvalho de Melo6687e982005-08-10 04:03:31 -03001802 icsk->icsk_probes_out,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001803 sock_i_ino(sp),
1804 atomic_read(&sp->sk_refcnt), sp,
Stephen Hemminger7be87352008-06-27 20:00:19 -07001805 jiffies_to_clock_t(icsk->icsk_rto),
1806 jiffies_to_clock_t(icsk->icsk_ack.ato),
Weilong Chen4c99aa42013-12-19 18:44:34 +08001807 (icsk->icsk_ack.quick << 1) | icsk->icsk_ack.pingpong,
Ilpo Järvinen0b6a05c2009-09-15 01:30:10 -07001808 tp->snd_cwnd,
1809 tcp_in_initial_slowstart(tp) ? -1 : tp->snd_ssthresh
Linus Torvalds1da177e2005-04-16 15:20:36 -07001810 );
1811}
1812
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001813static void get_timewait6_sock(struct seq_file *seq,
Arnaldo Carvalho de Melo8feaf0c02005-08-09 20:09:30 -07001814 struct inet_timewait_sock *tw, int i)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001815{
Eric Dumazetb71d1d42011-04-22 04:53:02 +00001816 const struct in6_addr *dest, *src;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001817 __u16 destp, srcp;
Eric Dumazet96f817f2013-10-03 14:27:25 -07001818 s32 delta = tw->tw_ttd - inet_tw_time_stamp();
Linus Torvalds1da177e2005-04-16 15:20:36 -07001819
Eric Dumazetefe42082013-10-03 15:42:29 -07001820 dest = &tw->tw_v6_daddr;
1821 src = &tw->tw_v6_rcv_saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001822 destp = ntohs(tw->tw_dport);
1823 srcp = ntohs(tw->tw_sport);
1824
1825 seq_printf(seq,
1826 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
Dan Rosenberg71338aa2011-05-23 12:17:35 +00001827 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %d %d %pK\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -07001828 i,
1829 src->s6_addr32[0], src->s6_addr32[1],
1830 src->s6_addr32[2], src->s6_addr32[3], srcp,
1831 dest->s6_addr32[0], dest->s6_addr32[1],
1832 dest->s6_addr32[2], dest->s6_addr32[3], destp,
1833 tw->tw_substate, 0, 0,
Eric Dumazeta399a802012-08-08 21:13:53 +00001834 3, jiffies_delta_to_clock_t(delta), 0, 0, 0, 0,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001835 atomic_read(&tw->tw_refcnt), tw);
1836}
1837
Linus Torvalds1da177e2005-04-16 15:20:36 -07001838static int tcp6_seq_show(struct seq_file *seq, void *v)
1839{
1840 struct tcp_iter_state *st;
Eric Dumazet05dbc7b2013-10-03 00:22:02 -07001841 struct sock *sk = v;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001842
1843 if (v == SEQ_START_TOKEN) {
1844 seq_puts(seq,
1845 " sl "
1846 "local_address "
1847 "remote_address "
1848 "st tx_queue rx_queue tr tm->when retrnsmt"
1849 " uid timeout inode\n");
1850 goto out;
1851 }
1852 st = seq->private;
1853
1854 switch (st->state) {
1855 case TCP_SEQ_STATE_LISTENING:
1856 case TCP_SEQ_STATE_ESTABLISHED:
Eric Dumazet05dbc7b2013-10-03 00:22:02 -07001857 if (sk->sk_state == TCP_TIME_WAIT)
1858 get_timewait6_sock(seq, v, st->num);
1859 else
1860 get_tcp6_sock(seq, v, st->num);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001861 break;
1862 case TCP_SEQ_STATE_OPENREQ:
1863 get_openreq6(seq, st->syn_wait_sk, v, st->num, st->uid);
1864 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001865 }
1866out:
1867 return 0;
1868}
1869
Arjan van de Ven73cb88e2011-10-30 06:46:30 +00001870static const struct file_operations tcp6_afinfo_seq_fops = {
1871 .owner = THIS_MODULE,
1872 .open = tcp_seq_open,
1873 .read = seq_read,
1874 .llseek = seq_lseek,
1875 .release = seq_release_net
1876};
1877
Linus Torvalds1da177e2005-04-16 15:20:36 -07001878static struct tcp_seq_afinfo tcp6_seq_afinfo = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001879 .name = "tcp6",
1880 .family = AF_INET6,
Arjan van de Ven73cb88e2011-10-30 06:46:30 +00001881 .seq_fops = &tcp6_afinfo_seq_fops,
Denis V. Lunev9427c4b2008-04-13 22:12:13 -07001882 .seq_ops = {
1883 .show = tcp6_seq_show,
1884 },
Linus Torvalds1da177e2005-04-16 15:20:36 -07001885};
1886
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001887int __net_init tcp6_proc_init(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001888{
Daniel Lezcano6f8b13b2008-03-21 04:14:45 -07001889 return tcp_proc_register(net, &tcp6_seq_afinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001890}
1891
Daniel Lezcano6f8b13b2008-03-21 04:14:45 -07001892void tcp6_proc_exit(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001893{
Daniel Lezcano6f8b13b2008-03-21 04:14:45 -07001894 tcp_proc_unregister(net, &tcp6_seq_afinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001895}
1896#endif
1897
Eric Dumazetf77d6022013-05-09 10:28:16 +00001898static void tcp_v6_clear_sk(struct sock *sk, int size)
1899{
1900 struct inet_sock *inet = inet_sk(sk);
1901
1902 /* we do not want to clear pinet6 field, because of RCU lookups */
1903 sk_prot_clear_nulls(sk, offsetof(struct inet_sock, pinet6));
1904
1905 size -= offsetof(struct inet_sock, pinet6) + sizeof(inet->pinet6);
1906 memset(&inet->pinet6 + 1, 0, size);
1907}
1908
Linus Torvalds1da177e2005-04-16 15:20:36 -07001909struct proto tcpv6_prot = {
1910 .name = "TCPv6",
1911 .owner = THIS_MODULE,
1912 .close = tcp_close,
1913 .connect = tcp_v6_connect,
1914 .disconnect = tcp_disconnect,
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07001915 .accept = inet_csk_accept,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001916 .ioctl = tcp_ioctl,
1917 .init = tcp_v6_init_sock,
1918 .destroy = tcp_v6_destroy_sock,
1919 .shutdown = tcp_shutdown,
1920 .setsockopt = tcp_setsockopt,
1921 .getsockopt = tcp_getsockopt,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001922 .recvmsg = tcp_recvmsg,
Changli Gao7ba42912010-07-10 20:41:55 +00001923 .sendmsg = tcp_sendmsg,
1924 .sendpage = tcp_sendpage,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001925 .backlog_rcv = tcp_v6_do_rcv,
Eric Dumazet46d3cea2012-07-11 05:50:31 +00001926 .release_cb = tcp_release_cb,
Eric Dumazet563d34d2012-07-23 09:48:52 +02001927 .mtu_reduced = tcp_v6_mtu_reduced,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001928 .hash = tcp_v6_hash,
Arnaldo Carvalho de Meloab1e0a12008-02-03 04:06:04 -08001929 .unhash = inet_unhash,
1930 .get_port = inet_csk_get_port,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001931 .enter_memory_pressure = tcp_enter_memory_pressure,
Eric Dumazetc9bee3b72013-07-22 20:27:07 -07001932 .stream_memory_free = tcp_stream_memory_free,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001933 .sockets_allocated = &tcp_sockets_allocated,
1934 .memory_allocated = &tcp_memory_allocated,
1935 .memory_pressure = &tcp_memory_pressure,
Arnaldo Carvalho de Melo0a5578c2005-08-09 20:11:41 -07001936 .orphan_count = &tcp_orphan_count,
Eric W. Biedermana4fe34b2013-10-19 16:25:36 -07001937 .sysctl_mem = sysctl_tcp_mem,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001938 .sysctl_wmem = sysctl_tcp_wmem,
1939 .sysctl_rmem = sysctl_tcp_rmem,
1940 .max_header = MAX_TCP_HEADER,
1941 .obj_size = sizeof(struct tcp6_sock),
Eric Dumazet3ab5aee2008-11-16 19:40:17 -08001942 .slab_flags = SLAB_DESTROY_BY_RCU,
Arnaldo Carvalho de Melo6d6ee432005-12-13 23:25:19 -08001943 .twsk_prot = &tcp6_timewait_sock_ops,
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -07001944 .rsk_prot = &tcp6_request_sock_ops,
Pavel Emelyanov39d8cda2008-03-22 16:50:58 -07001945 .h.hashinfo = &tcp_hashinfo,
Changli Gao7ba42912010-07-10 20:41:55 +00001946 .no_autobind = true,
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001947#ifdef CONFIG_COMPAT
1948 .compat_setsockopt = compat_tcp_setsockopt,
1949 .compat_getsockopt = compat_tcp_getsockopt,
1950#endif
Andrew Mortonc255a452012-07-31 16:43:02 -07001951#ifdef CONFIG_MEMCG_KMEM
Glauber Costad1a4c0b2011-12-11 21:47:04 +00001952 .proto_cgroup = tcp_proto_cgroup,
1953#endif
Eric Dumazetf77d6022013-05-09 10:28:16 +00001954 .clear_sk = tcp_v6_clear_sk,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001955};
1956
Alexey Dobriyan41135cc2009-09-14 12:22:28 +00001957static const struct inet6_protocol tcpv6_protocol = {
Eric Dumazetc7109982012-07-26 12:18:11 +00001958 .early_demux = tcp_v6_early_demux,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001959 .handler = tcp_v6_rcv,
1960 .err_handler = tcp_v6_err,
1961 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
1962};
1963
Linus Torvalds1da177e2005-04-16 15:20:36 -07001964static struct inet_protosw tcpv6_protosw = {
1965 .type = SOCK_STREAM,
1966 .protocol = IPPROTO_TCP,
1967 .prot = &tcpv6_prot,
1968 .ops = &inet6_stream_ops,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001969 .no_check = 0,
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08001970 .flags = INET_PROTOSW_PERMANENT |
1971 INET_PROTOSW_ICSK,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001972};
1973
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001974static int __net_init tcpv6_net_init(struct net *net)
Daniel Lezcano93ec9262008-03-07 11:16:02 -08001975{
Denis V. Lunev56772422008-04-03 14:28:30 -07001976 return inet_ctl_sock_create(&net->ipv6.tcp_sk, PF_INET6,
1977 SOCK_RAW, IPPROTO_TCP, net);
Daniel Lezcano93ec9262008-03-07 11:16:02 -08001978}
1979
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001980static void __net_exit tcpv6_net_exit(struct net *net)
Daniel Lezcano93ec9262008-03-07 11:16:02 -08001981{
Denis V. Lunev56772422008-04-03 14:28:30 -07001982 inet_ctl_sock_destroy(net->ipv6.tcp_sk);
Eric W. Biedermanb099ce22009-12-03 02:29:09 +00001983}
1984
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00001985static void __net_exit tcpv6_net_exit_batch(struct list_head *net_exit_list)
Eric W. Biedermanb099ce22009-12-03 02:29:09 +00001986{
1987 inet_twsk_purge(&tcp_hashinfo, &tcp_death_row, AF_INET6);
Daniel Lezcano93ec9262008-03-07 11:16:02 -08001988}
1989
1990static struct pernet_operations tcpv6_net_ops = {
Eric W. Biedermanb099ce22009-12-03 02:29:09 +00001991 .init = tcpv6_net_init,
1992 .exit = tcpv6_net_exit,
1993 .exit_batch = tcpv6_net_exit_batch,
Daniel Lezcano93ec9262008-03-07 11:16:02 -08001994};
1995
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08001996int __init tcpv6_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001997{
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08001998 int ret;
David Woodhouseae0f7d52006-01-11 15:53:04 -08001999
Vlad Yasevich33362882012-11-15 08:49:15 +00002000 ret = inet6_add_protocol(&tcpv6_protocol, IPPROTO_TCP);
2001 if (ret)
Vlad Yasevichc6b641a2012-11-15 08:49:22 +00002002 goto out;
Vlad Yasevich33362882012-11-15 08:49:15 +00002003
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002004 /* register inet6 protocol */
2005 ret = inet6_register_protosw(&tcpv6_protosw);
2006 if (ret)
2007 goto out_tcpv6_protocol;
2008
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002009 ret = register_pernet_subsys(&tcpv6_net_ops);
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002010 if (ret)
2011 goto out_tcpv6_protosw;
2012out:
2013 return ret;
2014
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002015out_tcpv6_protosw:
2016 inet6_unregister_protosw(&tcpv6_protosw);
Vlad Yasevich33362882012-11-15 08:49:15 +00002017out_tcpv6_protocol:
2018 inet6_del_protocol(&tcpv6_protocol, IPPROTO_TCP);
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002019 goto out;
2020}
2021
Daniel Lezcano09f77092007-12-13 05:34:58 -08002022void tcpv6_exit(void)
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002023{
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002024 unregister_pernet_subsys(&tcpv6_net_ops);
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002025 inet6_unregister_protosw(&tcpv6_protosw);
2026 inet6_del_protocol(&tcpv6_protocol, IPPROTO_TCP);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002027}