blob: 1ababbb41131309441d925955c81e02adc1f192e [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * TCP over IPv6
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09003 * Linux INET6 implementation
Linus Torvalds1da177e2005-04-16 15:20:36 -07004 *
5 * Authors:
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09006 * Pedro Roque <roque@di.fc.ul.pt>
Linus Torvalds1da177e2005-04-16 15:20:36 -07007 *
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09008 * Based on:
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 * linux/net/ipv4/tcp.c
10 * linux/net/ipv4/tcp_input.c
11 * linux/net/ipv4/tcp_output.c
12 *
13 * Fixes:
14 * Hideaki YOSHIFUJI : sin6_scope_id support
15 * YOSHIFUJI Hideaki @USAGI and: Support IPV6_V6ONLY socket option, which
16 * Alexey Kuznetsov allow both IPv4 and IPv6 sockets to bind
17 * a single port at the same time.
18 * YOSHIFUJI Hideaki @USAGI: convert /proc/net/tcp6 to seq_file.
19 *
20 * This program is free software; you can redistribute it and/or
21 * modify it under the terms of the GNU General Public License
22 * as published by the Free Software Foundation; either version
23 * 2 of the License, or (at your option) any later version.
24 */
25
Herbert Xueb4dea52008-12-29 23:04:08 -080026#include <linux/bottom_half.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028#include <linux/errno.h>
29#include <linux/types.h>
30#include <linux/socket.h>
31#include <linux/sockios.h>
32#include <linux/net.h>
33#include <linux/jiffies.h>
34#include <linux/in.h>
35#include <linux/in6.h>
36#include <linux/netdevice.h>
37#include <linux/init.h>
38#include <linux/jhash.h>
39#include <linux/ipsec.h>
40#include <linux/times.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090041#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
43#include <linux/ipv6.h>
44#include <linux/icmpv6.h>
45#include <linux/random.h>
46
47#include <net/tcp.h>
48#include <net/ndisc.h>
Arnaldo Carvalho de Melo5324a042005-08-12 09:26:18 -030049#include <net/inet6_hashtables.h>
Arnaldo Carvalho de Melo81297652005-12-13 23:15:24 -080050#include <net/inet6_connection_sock.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070051#include <net/ipv6.h>
52#include <net/transp_v6.h>
53#include <net/addrconf.h>
54#include <net/ip6_route.h>
55#include <net/ip6_checksum.h>
56#include <net/inet_ecn.h>
57#include <net/protocol.h>
58#include <net/xfrm.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070059#include <net/snmp.h>
60#include <net/dsfield.h>
Arnaldo Carvalho de Melo6d6ee432005-12-13 23:25:19 -080061#include <net/timewait_sock.h>
Jeff Garzik18134be2007-10-26 22:53:14 -070062#include <net/netdma.h>
Denis V. Lunev3d58b5f2008-04-03 14:22:32 -070063#include <net/inet_common.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070064
65#include <asm/uaccess.h>
66
67#include <linux/proc_fs.h>
68#include <linux/seq_file.h>
69
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -080070#include <linux/crypto.h>
71#include <linux/scatterlist.h>
72
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -080073static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb);
Gui Jianfeng6edafaa2008-08-06 23:50:04 -070074static void tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb,
75 struct request_sock *req);
Linus Torvalds1da177e2005-04-16 15:20:36 -070076
77static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb);
Herbert Xu8ad50d92010-04-11 02:15:54 +000078static void __tcp_v6_send_check(struct sk_buff *skb,
79 struct in6_addr *saddr,
80 struct in6_addr *daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -070081
Stephen Hemminger3b401a82009-09-01 19:25:04 +000082static const struct inet_connection_sock_af_ops ipv6_mapped;
83static const struct inet_connection_sock_af_ops ipv6_specific;
David S. Millera9286302006-11-14 19:53:22 -080084#ifdef CONFIG_TCP_MD5SIG
Stephen Hemmingerb2e4b3d2009-09-01 19:25:03 +000085static const struct tcp_sock_af_ops tcp_sock_ipv6_specific;
86static const struct tcp_sock_af_ops tcp_sock_ipv6_mapped_specific;
YOSHIFUJI Hideaki9501f972008-04-18 12:45:16 +090087#else
88static struct tcp_md5sig_key *tcp_v6_md5_do_lookup(struct sock *sk,
89 struct in6_addr *addr)
90{
91 return NULL;
92}
David S. Millera9286302006-11-14 19:53:22 -080093#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070094
Linus Torvalds1da177e2005-04-16 15:20:36 -070095static void tcp_v6_hash(struct sock *sk)
96{
97 if (sk->sk_state != TCP_CLOSE) {
Arnaldo Carvalho de Melo8292a172005-12-13 23:15:52 -080098 if (inet_csk(sk)->icsk_af_ops == &ipv6_mapped) {
Linus Torvalds1da177e2005-04-16 15:20:36 -070099 tcp_prot.hash(sk);
100 return;
101 }
102 local_bh_disable();
Eric Dumazet9327f702009-12-04 03:46:54 +0000103 __inet6_hash(sk, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104 local_bh_enable();
105 }
106}
107
Herbert Xu684f2172009-01-08 10:41:23 -0800108static __inline__ __sum16 tcp_v6_check(int len,
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900109 struct in6_addr *saddr,
110 struct in6_addr *daddr,
Al Viro868c86b2006-11-14 21:35:48 -0800111 __wsum base)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112{
113 return csum_ipv6_magic(saddr, daddr, len, IPPROTO_TCP, base);
114}
115
Gerrit Renkera94f7232006-11-10 14:06:49 -0800116static __u32 tcp_v6_init_sequence(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700117{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700118 return secure_tcpv6_sequence_number(ipv6_hdr(skb)->daddr.s6_addr32,
119 ipv6_hdr(skb)->saddr.s6_addr32,
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -0700120 tcp_hdr(skb)->dest,
121 tcp_hdr(skb)->source);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122}
123
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900124static int tcp_v6_connect(struct sock *sk, struct sockaddr *uaddr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125 int addr_len)
126{
127 struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900128 struct inet_sock *inet = inet_sk(sk);
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800129 struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130 struct ipv6_pinfo *np = inet6_sk(sk);
131 struct tcp_sock *tp = tcp_sk(sk);
132 struct in6_addr *saddr = NULL, *final_p = NULL, final;
133 struct flowi fl;
134 struct dst_entry *dst;
135 int addr_type;
136 int err;
137
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900138 if (addr_len < SIN6_LEN_RFC2133)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139 return -EINVAL;
140
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900141 if (usin->sin6_family != AF_INET6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700142 return(-EAFNOSUPPORT);
143
144 memset(&fl, 0, sizeof(fl));
145
146 if (np->sndflow) {
147 fl.fl6_flowlabel = usin->sin6_flowinfo&IPV6_FLOWINFO_MASK;
148 IP6_ECN_flow_init(fl.fl6_flowlabel);
149 if (fl.fl6_flowlabel&IPV6_FLOWLABEL_MASK) {
150 struct ip6_flowlabel *flowlabel;
151 flowlabel = fl6_sock_lookup(sk, fl.fl6_flowlabel);
152 if (flowlabel == NULL)
153 return -EINVAL;
154 ipv6_addr_copy(&usin->sin6_addr, &flowlabel->dst);
155 fl6_sock_release(flowlabel);
156 }
157 }
158
159 /*
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900160 * connect() to INADDR_ANY means loopback (BSD'ism).
161 */
162
163 if(ipv6_addr_any(&usin->sin6_addr))
164 usin->sin6_addr.s6_addr[15] = 0x1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165
166 addr_type = ipv6_addr_type(&usin->sin6_addr);
167
168 if(addr_type & IPV6_ADDR_MULTICAST)
169 return -ENETUNREACH;
170
171 if (addr_type&IPV6_ADDR_LINKLOCAL) {
172 if (addr_len >= sizeof(struct sockaddr_in6) &&
173 usin->sin6_scope_id) {
174 /* If interface is set while binding, indices
175 * must coincide.
176 */
177 if (sk->sk_bound_dev_if &&
178 sk->sk_bound_dev_if != usin->sin6_scope_id)
179 return -EINVAL;
180
181 sk->sk_bound_dev_if = usin->sin6_scope_id;
182 }
183
184 /* Connect to link-local address requires an interface */
185 if (!sk->sk_bound_dev_if)
186 return -EINVAL;
187 }
188
189 if (tp->rx_opt.ts_recent_stamp &&
190 !ipv6_addr_equal(&np->daddr, &usin->sin6_addr)) {
191 tp->rx_opt.ts_recent = 0;
192 tp->rx_opt.ts_recent_stamp = 0;
193 tp->write_seq = 0;
194 }
195
196 ipv6_addr_copy(&np->daddr, &usin->sin6_addr);
197 np->flow_label = fl.fl6_flowlabel;
198
199 /*
200 * TCP over IPv4
201 */
202
203 if (addr_type == IPV6_ADDR_MAPPED) {
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800204 u32 exthdrlen = icsk->icsk_ext_hdr_len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700205 struct sockaddr_in sin;
206
207 SOCK_DEBUG(sk, "connect: ipv4 mapped\n");
208
209 if (__ipv6_only_sock(sk))
210 return -ENETUNREACH;
211
212 sin.sin_family = AF_INET;
213 sin.sin_port = usin->sin6_port;
214 sin.sin_addr.s_addr = usin->sin6_addr.s6_addr32[3];
215
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800216 icsk->icsk_af_ops = &ipv6_mapped;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217 sk->sk_backlog_rcv = tcp_v4_do_rcv;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800218#ifdef CONFIG_TCP_MD5SIG
219 tp->af_specific = &tcp_sock_ipv6_mapped_specific;
220#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700221
222 err = tcp_v4_connect(sk, (struct sockaddr *)&sin, sizeof(sin));
223
224 if (err) {
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800225 icsk->icsk_ext_hdr_len = exthdrlen;
226 icsk->icsk_af_ops = &ipv6_specific;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227 sk->sk_backlog_rcv = tcp_v6_do_rcv;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800228#ifdef CONFIG_TCP_MD5SIG
229 tp->af_specific = &tcp_sock_ipv6_specific;
230#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700231 goto failure;
232 } else {
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000233 ipv6_addr_set_v4mapped(inet->inet_saddr, &np->saddr);
234 ipv6_addr_set_v4mapped(inet->inet_rcv_saddr,
235 &np->rcv_saddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236 }
237
238 return err;
239 }
240
241 if (!ipv6_addr_any(&np->rcv_saddr))
242 saddr = &np->rcv_saddr;
243
244 fl.proto = IPPROTO_TCP;
245 ipv6_addr_copy(&fl.fl6_dst, &np->daddr);
246 ipv6_addr_copy(&fl.fl6_src,
247 (saddr ? saddr : &np->saddr));
248 fl.oif = sk->sk_bound_dev_if;
Brian Haley51953d52009-10-05 08:24:16 +0000249 fl.mark = sk->sk_mark;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700250 fl.fl_ip_dport = usin->sin6_port;
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000251 fl.fl_ip_sport = inet->inet_sport;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252
253 if (np->opt && np->opt->srcrt) {
254 struct rt0_hdr *rt0 = (struct rt0_hdr *)np->opt->srcrt;
255 ipv6_addr_copy(&final, &fl.fl6_dst);
256 ipv6_addr_copy(&fl.fl6_dst, rt0->addr);
257 final_p = &final;
258 }
259
Venkat Yekkiralabeb8d132006-08-04 23:12:42 -0700260 security_sk_classify_flow(sk, &fl);
261
Linus Torvalds1da177e2005-04-16 15:20:36 -0700262 err = ip6_dst_lookup(sk, &dst, &fl);
263 if (err)
264 goto failure;
265 if (final_p)
266 ipv6_addr_copy(&fl.fl6_dst, final_p);
267
Alexey Dobriyan52479b62008-11-25 17:35:18 -0800268 err = __xfrm_lookup(sock_net(sk), &dst, &fl, sk, XFRM_LOOKUP_WAIT);
269 if (err < 0) {
David S. Miller14e50e52007-05-24 18:17:54 -0700270 if (err == -EREMOTE)
271 err = ip6_dst_blackhole(sk, &dst, &fl);
272 if (err < 0)
273 goto failure;
274 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700275
276 if (saddr == NULL) {
277 saddr = &fl.fl6_src;
278 ipv6_addr_copy(&np->rcv_saddr, saddr);
279 }
280
281 /* set the source address */
282 ipv6_addr_copy(&np->saddr, saddr);
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000283 inet->inet_rcv_saddr = LOOPBACK4_IPV6;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284
Herbert Xuf83ef8c2006-06-30 13:37:03 -0700285 sk->sk_gso_type = SKB_GSO_TCPV6;
YOSHIFUJI Hideaki8e1ef0a2006-08-29 17:15:09 -0700286 __ip6_dst_store(sk, dst, NULL, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700287
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800288 icsk->icsk_ext_hdr_len = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700289 if (np->opt)
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800290 icsk->icsk_ext_hdr_len = (np->opt->opt_flen +
291 np->opt->opt_nflen);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292
293 tp->rx_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - sizeof(struct ipv6hdr);
294
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000295 inet->inet_dport = usin->sin6_port;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700296
297 tcp_set_state(sk, TCP_SYN_SENT);
Arnaldo Carvalho de Melod8313f52005-12-13 23:25:44 -0800298 err = inet6_hash_connect(&tcp_death_row, sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299 if (err)
300 goto late_failure;
301
302 if (!tp->write_seq)
303 tp->write_seq = secure_tcpv6_sequence_number(np->saddr.s6_addr32,
304 np->daddr.s6_addr32,
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000305 inet->inet_sport,
306 inet->inet_dport);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700307
308 err = tcp_connect(sk);
309 if (err)
310 goto late_failure;
311
312 return 0;
313
314late_failure:
315 tcp_set_state(sk, TCP_CLOSE);
316 __sk_dst_reset(sk);
317failure:
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000318 inet->inet_dport = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700319 sk->sk_route_caps = 0;
320 return err;
321}
322
323static void tcp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
Brian Haleyd5fdd6b2009-06-23 04:31:07 -0700324 u8 type, u8 code, int offset, __be32 info)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700325{
326 struct ipv6hdr *hdr = (struct ipv6hdr*)skb->data;
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -0300327 const struct tcphdr *th = (struct tcphdr *)(skb->data+offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700328 struct ipv6_pinfo *np;
329 struct sock *sk;
330 int err;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900331 struct tcp_sock *tp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700332 __u32 seq;
Pavel Emelyanovca12a1a2008-07-16 20:28:42 -0700333 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700334
Pavel Emelyanovca12a1a2008-07-16 20:28:42 -0700335 sk = inet6_lookup(net, &tcp_hashinfo, &hdr->daddr,
Pavel Emelyanovd86e0da2008-01-31 05:07:21 -0800336 th->dest, &hdr->saddr, th->source, skb->dev->ifindex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700337
338 if (sk == NULL) {
Denis V. Luneve41b5362008-10-08 10:33:26 -0700339 ICMP6_INC_STATS_BH(net, __in6_dev_get(skb->dev),
340 ICMP6_MIB_INERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700341 return;
342 }
343
344 if (sk->sk_state == TCP_TIME_WAIT) {
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -0700345 inet_twsk_put(inet_twsk(sk));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346 return;
347 }
348
349 bh_lock_sock(sk);
350 if (sock_owned_by_user(sk))
Pavel Emelyanovde0744a2008-07-16 20:31:16 -0700351 NET_INC_STATS_BH(net, LINUX_MIB_LOCKDROPPEDICMPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700352
353 if (sk->sk_state == TCP_CLOSE)
354 goto out;
355
356 tp = tcp_sk(sk);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900357 seq = ntohl(th->seq);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700358 if (sk->sk_state != TCP_LISTEN &&
359 !between(seq, tp->snd_una, tp->snd_nxt)) {
Pavel Emelyanovde0744a2008-07-16 20:31:16 -0700360 NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700361 goto out;
362 }
363
364 np = inet6_sk(sk);
365
366 if (type == ICMPV6_PKT_TOOBIG) {
367 struct dst_entry *dst = NULL;
368
369 if (sock_owned_by_user(sk))
370 goto out;
371 if ((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE))
372 goto out;
373
374 /* icmp should have updated the destination cache entry */
375 dst = __sk_dst_check(sk, np->dst_cookie);
376
377 if (dst == NULL) {
378 struct inet_sock *inet = inet_sk(sk);
379 struct flowi fl;
380
381 /* BUGGG_FUTURE: Again, it is not clear how
382 to handle rthdr case. Ignore this complexity
383 for now.
384 */
385 memset(&fl, 0, sizeof(fl));
386 fl.proto = IPPROTO_TCP;
387 ipv6_addr_copy(&fl.fl6_dst, &np->daddr);
388 ipv6_addr_copy(&fl.fl6_src, &np->saddr);
389 fl.oif = sk->sk_bound_dev_if;
Brian Haley51953d52009-10-05 08:24:16 +0000390 fl.mark = sk->sk_mark;
Eric Dumazetc720c7e2009-10-15 06:30:45 +0000391 fl.fl_ip_dport = inet->inet_dport;
392 fl.fl_ip_sport = inet->inet_sport;
Venkat Yekkiralabeb8d132006-08-04 23:12:42 -0700393 security_skb_classify_flow(skb, &fl);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700394
395 if ((err = ip6_dst_lookup(sk, &dst, &fl))) {
396 sk->sk_err_soft = -err;
397 goto out;
398 }
399
Alexey Dobriyan52479b62008-11-25 17:35:18 -0800400 if ((err = xfrm_lookup(net, &dst, &fl, sk, 0)) < 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700401 sk->sk_err_soft = -err;
402 goto out;
403 }
404
405 } else
406 dst_hold(dst);
407
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -0800408 if (inet_csk(sk)->icsk_pmtu_cookie > dst_mtu(dst)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409 tcp_sync_mss(sk, dst_mtu(dst));
410 tcp_simple_retransmit(sk);
411 } /* else let the usual retransmit timer handle it */
412 dst_release(dst);
413 goto out;
414 }
415
416 icmpv6_err_convert(type, code, &err);
417
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700418 /* Might be for an request_sock */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700419 switch (sk->sk_state) {
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700420 struct request_sock *req, **prev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700421 case TCP_LISTEN:
422 if (sock_owned_by_user(sk))
423 goto out;
424
Arnaldo Carvalho de Melo81297652005-12-13 23:15:24 -0800425 req = inet6_csk_search_req(sk, &prev, th->dest, &hdr->daddr,
426 &hdr->saddr, inet6_iif(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700427 if (!req)
428 goto out;
429
430 /* ICMPs are not backlogged, hence we cannot get
431 * an established socket here.
432 */
Ilpo Järvinen547b7922008-07-25 21:43:18 -0700433 WARN_ON(req->sk != NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700434
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -0700435 if (seq != tcp_rsk(req)->snt_isn) {
Pavel Emelyanovde0744a2008-07-16 20:31:16 -0700436 NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437 goto out;
438 }
439
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -0700440 inet_csk_reqsk_queue_drop(sk, req, prev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700441 goto out;
442
443 case TCP_SYN_SENT:
444 case TCP_SYN_RECV: /* Cannot happen.
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900445 It can, it SYNs are crossed. --ANK */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700446 if (!sock_owned_by_user(sk)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700447 sk->sk_err = err;
448 sk->sk_error_report(sk); /* Wake people up to see the error (see connect in sock.c) */
449
450 tcp_done(sk);
451 } else
452 sk->sk_err_soft = err;
453 goto out;
454 }
455
456 if (!sock_owned_by_user(sk) && np->recverr) {
457 sk->sk_err = err;
458 sk->sk_error_report(sk);
459 } else
460 sk->sk_err_soft = err;
461
462out:
463 bh_unlock_sock(sk);
464 sock_put(sk);
465}
466
467
William Allen Simpsone6b4d112009-12-02 18:07:39 +0000468static int tcp_v6_send_synack(struct sock *sk, struct request_sock *req,
469 struct request_values *rvp)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700470{
Arnaldo Carvalho de Meloca304b62005-12-13 23:15:40 -0800471 struct inet6_request_sock *treq = inet6_rsk(req);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700472 struct ipv6_pinfo *np = inet6_sk(sk);
473 struct sk_buff * skb;
474 struct ipv6_txoptions *opt = NULL;
475 struct in6_addr * final_p = NULL, final;
476 struct flowi fl;
Denis V. Lunevfd80eb92008-02-29 11:43:03 -0800477 struct dst_entry *dst;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700478 int err = -1;
479
480 memset(&fl, 0, sizeof(fl));
481 fl.proto = IPPROTO_TCP;
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -0700482 ipv6_addr_copy(&fl.fl6_dst, &treq->rmt_addr);
483 ipv6_addr_copy(&fl.fl6_src, &treq->loc_addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700484 fl.fl6_flowlabel = 0;
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -0700485 fl.oif = treq->iif;
Brian Haley51953d52009-10-05 08:24:16 +0000486 fl.mark = sk->sk_mark;
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -0700487 fl.fl_ip_dport = inet_rsk(req)->rmt_port;
KOVACS Krisztianfd507032008-10-19 23:35:58 -0700488 fl.fl_ip_sport = inet_rsk(req)->loc_port;
Venkat Yekkirala4237c752006-07-24 23:32:50 -0700489 security_req_classify_flow(req, &fl);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700490
Denis V. Lunevfd80eb92008-02-29 11:43:03 -0800491 opt = np->opt;
492 if (opt && opt->srcrt) {
493 struct rt0_hdr *rt0 = (struct rt0_hdr *) opt->srcrt;
494 ipv6_addr_copy(&final, &fl.fl6_dst);
495 ipv6_addr_copy(&fl.fl6_dst, rt0->addr);
496 final_p = &final;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700497 }
498
Denis V. Lunevfd80eb92008-02-29 11:43:03 -0800499 err = ip6_dst_lookup(sk, &dst, &fl);
500 if (err)
501 goto done;
502 if (final_p)
503 ipv6_addr_copy(&fl.fl6_dst, final_p);
Alexey Dobriyan52479b62008-11-25 17:35:18 -0800504 if ((err = xfrm_lookup(sock_net(sk), &dst, &fl, sk, 0)) < 0)
Denis V. Lunevfd80eb92008-02-29 11:43:03 -0800505 goto done;
506
William Allen Simpsone6b4d112009-12-02 18:07:39 +0000507 skb = tcp_make_synack(sk, dst, req, rvp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700508 if (skb) {
Herbert Xu8ad50d92010-04-11 02:15:54 +0000509 __tcp_v6_send_check(skb, &treq->loc_addr, &treq->rmt_addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700510
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -0700511 ipv6_addr_copy(&fl.fl6_dst, &treq->rmt_addr);
Shan Wei4e15ed42010-04-15 16:43:08 +0000512 err = ip6_xmit(sk, skb, &fl, opt);
Gerrit Renkerb9df3cb2006-11-14 11:21:36 -0200513 err = net_xmit_eval(err);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700514 }
515
516done:
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900517 if (opt && opt != np->opt)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700518 sock_kfree_s(sk, opt, opt->tot_len);
Eric W. Biederman78b91042006-01-31 17:51:44 -0800519 dst_release(dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700520 return err;
521}
522
Octavian Purdila72659ec2010-01-17 19:09:39 -0800523static int tcp_v6_rtx_synack(struct sock *sk, struct request_sock *req,
524 struct request_values *rvp)
525{
526 TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_RETRANSSEGS);
527 return tcp_v6_send_synack(sk, req, rvp);
528}
529
Glenn Griffinc6aefaf2008-02-07 21:49:26 -0800530static inline void syn_flood_warning(struct sk_buff *skb)
531{
532#ifdef CONFIG_SYN_COOKIES
533 if (sysctl_tcp_syncookies)
534 printk(KERN_INFO
535 "TCPv6: Possible SYN flooding on port %d. "
536 "Sending cookies.\n", ntohs(tcp_hdr(skb)->dest));
537 else
538#endif
539 printk(KERN_INFO
540 "TCPv6: Possible SYN flooding on port %d. "
541 "Dropping request.\n", ntohs(tcp_hdr(skb)->dest));
542}
543
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700544static void tcp_v6_reqsk_destructor(struct request_sock *req)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700545{
Wei Yongjun800d55f2009-02-23 21:45:33 +0000546 kfree_skb(inet6_rsk(req)->pktopts);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700547}
548
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800549#ifdef CONFIG_TCP_MD5SIG
550static struct tcp_md5sig_key *tcp_v6_md5_do_lookup(struct sock *sk,
551 struct in6_addr *addr)
552{
553 struct tcp_sock *tp = tcp_sk(sk);
554 int i;
555
556 BUG_ON(tp == NULL);
557
558 if (!tp->md5sig_info || !tp->md5sig_info->entries6)
559 return NULL;
560
561 for (i = 0; i < tp->md5sig_info->entries6; i++) {
YOSHIFUJI Hideakicaad2952008-04-10 15:42:07 +0900562 if (ipv6_addr_equal(&tp->md5sig_info->keys6[i].addr, addr))
David S. Millerf8ab18d2007-09-28 15:18:35 -0700563 return &tp->md5sig_info->keys6[i].base;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800564 }
565 return NULL;
566}
567
568static struct tcp_md5sig_key *tcp_v6_md5_lookup(struct sock *sk,
569 struct sock *addr_sk)
570{
571 return tcp_v6_md5_do_lookup(sk, &inet6_sk(addr_sk)->daddr);
572}
573
574static struct tcp_md5sig_key *tcp_v6_reqsk_md5_lookup(struct sock *sk,
575 struct request_sock *req)
576{
577 return tcp_v6_md5_do_lookup(sk, &inet6_rsk(req)->rmt_addr);
578}
579
580static int tcp_v6_md5_do_add(struct sock *sk, struct in6_addr *peer,
581 char *newkey, u8 newkeylen)
582{
583 /* Add key to the list */
Matthias M. Dellwegb0a713e2007-10-29 20:55:27 -0700584 struct tcp_md5sig_key *key;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800585 struct tcp_sock *tp = tcp_sk(sk);
586 struct tcp6_md5sig_key *keys;
587
Matthias M. Dellwegb0a713e2007-10-29 20:55:27 -0700588 key = tcp_v6_md5_do_lookup(sk, peer);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800589 if (key) {
590 /* modify existing entry - just update that one */
Matthias M. Dellwegb0a713e2007-10-29 20:55:27 -0700591 kfree(key->key);
592 key->key = newkey;
593 key->keylen = newkeylen;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800594 } else {
595 /* reallocate new list if current one is full. */
596 if (!tp->md5sig_info) {
597 tp->md5sig_info = kzalloc(sizeof(*tp->md5sig_info), GFP_ATOMIC);
598 if (!tp->md5sig_info) {
599 kfree(newkey);
600 return -ENOMEM;
601 }
David S. Miller3d7dbea2007-06-12 14:36:42 -0700602 sk->sk_route_caps &= ~NETIF_F_GSO_MASK;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800603 }
Wu Fengguangaa133072009-09-02 23:45:45 -0700604 if (tcp_alloc_md5sig_pool(sk) == NULL) {
YOSHIFUJI Hideakiaacbe8c2007-11-20 17:30:56 -0800605 kfree(newkey);
606 return -ENOMEM;
607 }
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800608 if (tp->md5sig_info->alloced6 == tp->md5sig_info->entries6) {
609 keys = kmalloc((sizeof (tp->md5sig_info->keys6[0]) *
610 (tp->md5sig_info->entries6 + 1)), GFP_ATOMIC);
611
612 if (!keys) {
613 tcp_free_md5sig_pool();
614 kfree(newkey);
615 return -ENOMEM;
616 }
617
618 if (tp->md5sig_info->entries6)
619 memmove(keys, tp->md5sig_info->keys6,
620 (sizeof (tp->md5sig_info->keys6[0]) *
621 tp->md5sig_info->entries6));
622
623 kfree(tp->md5sig_info->keys6);
624 tp->md5sig_info->keys6 = keys;
625 tp->md5sig_info->alloced6++;
626 }
627
628 ipv6_addr_copy(&tp->md5sig_info->keys6[tp->md5sig_info->entries6].addr,
629 peer);
David S. Millerf8ab18d2007-09-28 15:18:35 -0700630 tp->md5sig_info->keys6[tp->md5sig_info->entries6].base.key = newkey;
631 tp->md5sig_info->keys6[tp->md5sig_info->entries6].base.keylen = newkeylen;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800632
633 tp->md5sig_info->entries6++;
634 }
635 return 0;
636}
637
638static int tcp_v6_md5_add_func(struct sock *sk, struct sock *addr_sk,
639 u8 *newkey, __u8 newkeylen)
640{
641 return tcp_v6_md5_do_add(sk, &inet6_sk(addr_sk)->daddr,
642 newkey, newkeylen);
643}
644
645static int tcp_v6_md5_do_del(struct sock *sk, struct in6_addr *peer)
646{
647 struct tcp_sock *tp = tcp_sk(sk);
648 int i;
649
650 for (i = 0; i < tp->md5sig_info->entries6; i++) {
YOSHIFUJI Hideakicaad2952008-04-10 15:42:07 +0900651 if (ipv6_addr_equal(&tp->md5sig_info->keys6[i].addr, peer)) {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800652 /* Free the key */
David S. Millerf8ab18d2007-09-28 15:18:35 -0700653 kfree(tp->md5sig_info->keys6[i].base.key);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800654 tp->md5sig_info->entries6--;
655
656 if (tp->md5sig_info->entries6 == 0) {
657 kfree(tp->md5sig_info->keys6);
658 tp->md5sig_info->keys6 = NULL;
YOSHIFUJI Hideakica983ce2007-07-24 15:27:30 -0700659 tp->md5sig_info->alloced6 = 0;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800660 } else {
661 /* shrink the database */
662 if (tp->md5sig_info->entries6 != i)
663 memmove(&tp->md5sig_info->keys6[i],
664 &tp->md5sig_info->keys6[i+1],
665 (tp->md5sig_info->entries6 - i)
666 * sizeof (tp->md5sig_info->keys6[0]));
667 }
YOSHIFUJI Hideaki77adefd2007-11-20 17:31:23 -0800668 tcp_free_md5sig_pool();
669 return 0;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800670 }
671 }
672 return -ENOENT;
673}
674
675static void tcp_v6_clear_md5_list (struct sock *sk)
676{
677 struct tcp_sock *tp = tcp_sk(sk);
678 int i;
679
680 if (tp->md5sig_info->entries6) {
681 for (i = 0; i < tp->md5sig_info->entries6; i++)
David S. Millerf8ab18d2007-09-28 15:18:35 -0700682 kfree(tp->md5sig_info->keys6[i].base.key);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800683 tp->md5sig_info->entries6 = 0;
684 tcp_free_md5sig_pool();
685 }
686
687 kfree(tp->md5sig_info->keys6);
688 tp->md5sig_info->keys6 = NULL;
689 tp->md5sig_info->alloced6 = 0;
690
691 if (tp->md5sig_info->entries4) {
692 for (i = 0; i < tp->md5sig_info->entries4; i++)
David S. Millerf8ab18d2007-09-28 15:18:35 -0700693 kfree(tp->md5sig_info->keys4[i].base.key);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800694 tp->md5sig_info->entries4 = 0;
695 tcp_free_md5sig_pool();
696 }
697
698 kfree(tp->md5sig_info->keys4);
699 tp->md5sig_info->keys4 = NULL;
700 tp->md5sig_info->alloced4 = 0;
701}
702
703static int tcp_v6_parse_md5_keys (struct sock *sk, char __user *optval,
704 int optlen)
705{
706 struct tcp_md5sig cmd;
707 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)&cmd.tcpm_addr;
708 u8 *newkey;
709
710 if (optlen < sizeof(cmd))
711 return -EINVAL;
712
713 if (copy_from_user(&cmd, optval, sizeof(cmd)))
714 return -EFAULT;
715
716 if (sin6->sin6_family != AF_INET6)
717 return -EINVAL;
718
719 if (!cmd.tcpm_keylen) {
720 if (!tcp_sk(sk)->md5sig_info)
721 return -ENOENT;
Brian Haleye773e4f2007-08-24 23:16:08 -0700722 if (ipv6_addr_v4mapped(&sin6->sin6_addr))
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800723 return tcp_v4_md5_do_del(sk, sin6->sin6_addr.s6_addr32[3]);
724 return tcp_v6_md5_do_del(sk, &sin6->sin6_addr);
725 }
726
727 if (cmd.tcpm_keylen > TCP_MD5SIG_MAXKEYLEN)
728 return -EINVAL;
729
730 if (!tcp_sk(sk)->md5sig_info) {
731 struct tcp_sock *tp = tcp_sk(sk);
732 struct tcp_md5sig_info *p;
733
734 p = kzalloc(sizeof(struct tcp_md5sig_info), GFP_KERNEL);
735 if (!p)
736 return -ENOMEM;
737
738 tp->md5sig_info = p;
David S. Miller3d7dbea2007-06-12 14:36:42 -0700739 sk->sk_route_caps &= ~NETIF_F_GSO_MASK;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800740 }
741
Arnaldo Carvalho de Meloaf879cc2006-11-17 12:14:37 -0200742 newkey = kmemdup(cmd.tcpm_key, cmd.tcpm_keylen, GFP_KERNEL);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800743 if (!newkey)
744 return -ENOMEM;
Brian Haleye773e4f2007-08-24 23:16:08 -0700745 if (ipv6_addr_v4mapped(&sin6->sin6_addr)) {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800746 return tcp_v4_md5_do_add(sk, sin6->sin6_addr.s6_addr32[3],
747 newkey, cmd.tcpm_keylen);
748 }
749 return tcp_v6_md5_do_add(sk, &sin6->sin6_addr, newkey, cmd.tcpm_keylen);
750}
751
Adam Langley49a72df2008-07-19 00:01:42 -0700752static int tcp_v6_md5_hash_pseudoheader(struct tcp_md5sig_pool *hp,
753 struct in6_addr *daddr,
754 struct in6_addr *saddr, int nbytes)
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800755{
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800756 struct tcp6_pseudohdr *bp;
Adam Langley49a72df2008-07-19 00:01:42 -0700757 struct scatterlist sg;
YOSHIFUJI Hideaki8d26d762008-04-17 13:19:16 +0900758
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800759 bp = &hp->md5_blk.ip6;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800760 /* 1. TCP pseudo-header (RFC2460) */
761 ipv6_addr_copy(&bp->saddr, saddr);
762 ipv6_addr_copy(&bp->daddr, daddr);
Adam Langley49a72df2008-07-19 00:01:42 -0700763 bp->protocol = cpu_to_be32(IPPROTO_TCP);
Adam Langley00b13042008-07-31 21:36:07 -0700764 bp->len = cpu_to_be32(nbytes);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800765
Adam Langley49a72df2008-07-19 00:01:42 -0700766 sg_init_one(&sg, bp, sizeof(*bp));
767 return crypto_hash_update(&hp->md5_desc, &sg, sizeof(*bp));
768}
David S. Millerc7da57a2007-10-26 00:41:21 -0700769
Adam Langley49a72df2008-07-19 00:01:42 -0700770static int tcp_v6_md5_hash_hdr(char *md5_hash, struct tcp_md5sig_key *key,
771 struct in6_addr *daddr, struct in6_addr *saddr,
772 struct tcphdr *th)
773{
774 struct tcp_md5sig_pool *hp;
775 struct hash_desc *desc;
776
777 hp = tcp_get_md5sig_pool();
778 if (!hp)
779 goto clear_hash_noput;
780 desc = &hp->md5_desc;
781
782 if (crypto_hash_init(desc))
783 goto clear_hash;
784 if (tcp_v6_md5_hash_pseudoheader(hp, daddr, saddr, th->doff << 2))
785 goto clear_hash;
786 if (tcp_md5_hash_header(hp, th))
787 goto clear_hash;
788 if (tcp_md5_hash_key(hp, key))
789 goto clear_hash;
790 if (crypto_hash_final(desc, md5_hash))
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800791 goto clear_hash;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800792
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800793 tcp_put_md5sig_pool();
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800794 return 0;
Adam Langley49a72df2008-07-19 00:01:42 -0700795
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800796clear_hash:
797 tcp_put_md5sig_pool();
798clear_hash_noput:
799 memset(md5_hash, 0, 16);
Adam Langley49a72df2008-07-19 00:01:42 -0700800 return 1;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800801}
802
Adam Langley49a72df2008-07-19 00:01:42 -0700803static int tcp_v6_md5_hash_skb(char *md5_hash, struct tcp_md5sig_key *key,
804 struct sock *sk, struct request_sock *req,
805 struct sk_buff *skb)
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800806{
807 struct in6_addr *saddr, *daddr;
Adam Langley49a72df2008-07-19 00:01:42 -0700808 struct tcp_md5sig_pool *hp;
809 struct hash_desc *desc;
810 struct tcphdr *th = tcp_hdr(skb);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800811
812 if (sk) {
813 saddr = &inet6_sk(sk)->saddr;
814 daddr = &inet6_sk(sk)->daddr;
Adam Langley49a72df2008-07-19 00:01:42 -0700815 } else if (req) {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800816 saddr = &inet6_rsk(req)->loc_addr;
817 daddr = &inet6_rsk(req)->rmt_addr;
Adam Langley49a72df2008-07-19 00:01:42 -0700818 } else {
819 struct ipv6hdr *ip6h = ipv6_hdr(skb);
820 saddr = &ip6h->saddr;
821 daddr = &ip6h->daddr;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800822 }
Adam Langley49a72df2008-07-19 00:01:42 -0700823
824 hp = tcp_get_md5sig_pool();
825 if (!hp)
826 goto clear_hash_noput;
827 desc = &hp->md5_desc;
828
829 if (crypto_hash_init(desc))
830 goto clear_hash;
831
832 if (tcp_v6_md5_hash_pseudoheader(hp, daddr, saddr, skb->len))
833 goto clear_hash;
834 if (tcp_md5_hash_header(hp, th))
835 goto clear_hash;
836 if (tcp_md5_hash_skb_data(hp, skb, th->doff << 2))
837 goto clear_hash;
838 if (tcp_md5_hash_key(hp, key))
839 goto clear_hash;
840 if (crypto_hash_final(desc, md5_hash))
841 goto clear_hash;
842
843 tcp_put_md5sig_pool();
844 return 0;
845
846clear_hash:
847 tcp_put_md5sig_pool();
848clear_hash_noput:
849 memset(md5_hash, 0, 16);
850 return 1;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800851}
852
853static int tcp_v6_inbound_md5_hash (struct sock *sk, struct sk_buff *skb)
854{
855 __u8 *hash_location = NULL;
856 struct tcp_md5sig_key *hash_expected;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700857 struct ipv6hdr *ip6h = ipv6_hdr(skb);
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -0700858 struct tcphdr *th = tcp_hdr(skb);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800859 int genhash;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800860 u8 newhash[16];
861
862 hash_expected = tcp_v6_md5_do_lookup(sk, &ip6h->saddr);
YOSHIFUJI Hideaki7d5d5522008-04-17 12:29:53 +0900863 hash_location = tcp_parse_md5sig_option(th);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800864
David S. Miller785957d2008-07-30 03:03:15 -0700865 /* We've parsed the options - do we have a hash? */
866 if (!hash_expected && !hash_location)
867 return 0;
868
869 if (hash_expected && !hash_location) {
870 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPMD5NOTFOUND);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800871 return 1;
872 }
873
David S. Miller785957d2008-07-30 03:03:15 -0700874 if (!hash_expected && hash_location) {
875 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPMD5UNEXPECTED);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800876 return 1;
877 }
878
879 /* check the signature */
Adam Langley49a72df2008-07-19 00:01:42 -0700880 genhash = tcp_v6_md5_hash_skb(newhash,
881 hash_expected,
882 NULL, NULL, skb);
883
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800884 if (genhash || memcmp(hash_location, newhash, 16) != 0) {
885 if (net_ratelimit()) {
Joe Perches5856b602010-01-08 00:59:52 -0800886 printk(KERN_INFO "MD5 Hash %s for [%pI6c]:%u->[%pI6c]:%u\n",
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800887 genhash ? "failed" : "mismatch",
Harvey Harrison0c6ce782008-10-28 16:09:23 -0700888 &ip6h->saddr, ntohs(th->source),
889 &ip6h->daddr, ntohs(th->dest));
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800890 }
891 return 1;
892 }
893 return 0;
894}
895#endif
896
Glenn Griffinc6aefaf2008-02-07 21:49:26 -0800897struct request_sock_ops tcp6_request_sock_ops __read_mostly = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700898 .family = AF_INET6,
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -0700899 .obj_size = sizeof(struct tcp6_request_sock),
Octavian Purdila72659ec2010-01-17 19:09:39 -0800900 .rtx_syn_ack = tcp_v6_rtx_synack,
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -0700901 .send_ack = tcp_v6_reqsk_send_ack,
902 .destructor = tcp_v6_reqsk_destructor,
Octavian Purdila72659ec2010-01-17 19:09:39 -0800903 .send_reset = tcp_v6_send_reset,
904 .syn_ack_timeout = tcp_syn_ack_timeout,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700905};
906
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800907#ifdef CONFIG_TCP_MD5SIG
Stephen Hemmingerb2e4b3d2009-09-01 19:25:03 +0000908static const struct tcp_request_sock_ops tcp_request_sock_ipv6_ops = {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800909 .md5_lookup = tcp_v6_reqsk_md5_lookup,
John Dykstrae3afe7b2009-07-16 05:04:51 +0000910 .calc_md5_hash = tcp_v6_md5_hash_skb,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800911};
Andrew Mortonb6332e62006-11-30 19:16:28 -0800912#endif
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800913
Arnaldo Carvalho de Melo6d6ee432005-12-13 23:25:19 -0800914static struct timewait_sock_ops tcp6_timewait_sock_ops = {
915 .twsk_obj_size = sizeof(struct tcp6_timewait_sock),
916 .twsk_unique = tcp_twsk_unique,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -0800917 .twsk_destructor= tcp_twsk_destructor,
Arnaldo Carvalho de Melo6d6ee432005-12-13 23:25:19 -0800918};
919
Herbert Xu8ad50d92010-04-11 02:15:54 +0000920static void __tcp_v6_send_check(struct sk_buff *skb,
921 struct in6_addr *saddr, struct in6_addr *daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700922{
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -0700923 struct tcphdr *th = tcp_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700924
Patrick McHardy84fa7932006-08-29 16:44:56 -0700925 if (skb->ip_summed == CHECKSUM_PARTIAL) {
Herbert Xu8ad50d92010-04-11 02:15:54 +0000926 th->check = ~tcp_v6_check(skb->len, saddr, daddr, 0);
Herbert Xu663ead32007-04-09 11:59:07 -0700927 skb->csum_start = skb_transport_header(skb) - skb->head;
Al Viroff1dcad2006-11-20 18:07:29 -0800928 skb->csum_offset = offsetof(struct tcphdr, check);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700929 } else {
Herbert Xu8ad50d92010-04-11 02:15:54 +0000930 th->check = tcp_v6_check(skb->len, saddr, daddr,
931 csum_partial(th, th->doff << 2,
932 skb->csum));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700933 }
934}
935
Herbert Xubb296242010-04-11 02:15:55 +0000936static void tcp_v6_send_check(struct sock *sk, struct sk_buff *skb)
Herbert Xu8ad50d92010-04-11 02:15:54 +0000937{
938 struct ipv6_pinfo *np = inet6_sk(sk);
939
940 __tcp_v6_send_check(skb, &np->saddr, &np->daddr);
941}
942
Herbert Xua430a432006-07-08 13:34:56 -0700943static int tcp_v6_gso_send_check(struct sk_buff *skb)
944{
945 struct ipv6hdr *ipv6h;
946 struct tcphdr *th;
947
948 if (!pskb_may_pull(skb, sizeof(*th)))
949 return -EINVAL;
950
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700951 ipv6h = ipv6_hdr(skb);
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -0700952 th = tcp_hdr(skb);
Herbert Xua430a432006-07-08 13:34:56 -0700953
954 th->check = 0;
Patrick McHardy84fa7932006-08-29 16:44:56 -0700955 skb->ip_summed = CHECKSUM_PARTIAL;
Herbert Xu8ad50d92010-04-11 02:15:54 +0000956 __tcp_v6_send_check(skb, &ipv6h->saddr, &ipv6h->daddr);
Herbert Xua430a432006-07-08 13:34:56 -0700957 return 0;
958}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700959
Herbert Xu36990672009-05-22 00:45:28 -0700960static struct sk_buff **tcp6_gro_receive(struct sk_buff **head,
961 struct sk_buff *skb)
Herbert Xu684f2172009-01-08 10:41:23 -0800962{
Herbert Xu36e7b1b2009-04-27 05:44:45 -0700963 struct ipv6hdr *iph = skb_gro_network_header(skb);
Herbert Xu684f2172009-01-08 10:41:23 -0800964
965 switch (skb->ip_summed) {
966 case CHECKSUM_COMPLETE:
Herbert Xu86911732009-01-29 14:19:50 +0000967 if (!tcp_v6_check(skb_gro_len(skb), &iph->saddr, &iph->daddr,
Herbert Xu684f2172009-01-08 10:41:23 -0800968 skb->csum)) {
969 skb->ip_summed = CHECKSUM_UNNECESSARY;
970 break;
971 }
972
973 /* fall through */
974 case CHECKSUM_NONE:
975 NAPI_GRO_CB(skb)->flush = 1;
976 return NULL;
977 }
978
979 return tcp_gro_receive(head, skb);
980}
Herbert Xu684f2172009-01-08 10:41:23 -0800981
Herbert Xu36990672009-05-22 00:45:28 -0700982static int tcp6_gro_complete(struct sk_buff *skb)
Herbert Xu684f2172009-01-08 10:41:23 -0800983{
984 struct ipv6hdr *iph = ipv6_hdr(skb);
985 struct tcphdr *th = tcp_hdr(skb);
986
987 th->check = ~tcp_v6_check(skb->len - skb_transport_offset(skb),
988 &iph->saddr, &iph->daddr, 0);
989 skb_shinfo(skb)->gso_type = SKB_GSO_TCPV6;
990
991 return tcp_gro_complete(skb);
992}
Herbert Xu684f2172009-01-08 10:41:23 -0800993
Ilpo Järvinen626e2642008-10-09 14:42:40 -0700994static void tcp_v6_send_response(struct sk_buff *skb, u32 seq, u32 ack, u32 win,
995 u32 ts, struct tcp_md5sig_key *key, int rst)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700996{
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -0700997 struct tcphdr *th = tcp_hdr(skb), *t1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700998 struct sk_buff *buff;
999 struct flowi fl;
Eric Dumazetadf30902009-06-02 05:19:30 +00001000 struct net *net = dev_net(skb_dst(skb)->dev);
Daniel Lezcanoe5047992008-03-07 11:16:26 -08001001 struct sock *ctl_sk = net->ipv6.tcp_sk;
YOSHIFUJI Hideaki9cb57342008-01-12 02:16:03 -08001002 unsigned int tot_len = sizeof(struct tcphdr);
Eric Dumazetadf30902009-06-02 05:19:30 +00001003 struct dst_entry *dst;
Al Viroe69a4ad2006-11-14 20:56:00 -08001004 __be32 *topt;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001005
1006 if (ts)
YOSHIFUJI Hideaki4244f8a2006-10-10 19:40:50 -07001007 tot_len += TCPOLEN_TSTAMP_ALIGNED;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001008#ifdef CONFIG_TCP_MD5SIG
1009 if (key)
1010 tot_len += TCPOLEN_MD5SIG_ALIGNED;
1011#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07001012
1013 buff = alloc_skb(MAX_HEADER + sizeof(struct ipv6hdr) + tot_len,
1014 GFP_ATOMIC);
1015 if (buff == NULL)
1016 return;
1017
1018 skb_reserve(buff, MAX_HEADER + sizeof(struct ipv6hdr) + tot_len);
1019
Ilpo Järvinen77c676d2008-10-09 14:41:38 -07001020 t1 = (struct tcphdr *) skb_push(buff, tot_len);
Herbert Xu6651ffc2010-04-21 00:47:15 -07001021 skb_reset_transport_header(buff);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001022
1023 /* Swap the send and the receive. */
1024 memset(t1, 0, sizeof(*t1));
1025 t1->dest = th->source;
1026 t1->source = th->dest;
Ilpo Järvinen77c676d2008-10-09 14:41:38 -07001027 t1->doff = tot_len / 4;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001028 t1->seq = htonl(seq);
1029 t1->ack_seq = htonl(ack);
Ilpo Järvinen626e2642008-10-09 14:42:40 -07001030 t1->ack = !rst || !th->ack;
1031 t1->rst = rst;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001032 t1->window = htons(win);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001033
Al Viroe69a4ad2006-11-14 20:56:00 -08001034 topt = (__be32 *)(t1 + 1);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001035
Linus Torvalds1da177e2005-04-16 15:20:36 -07001036 if (ts) {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001037 *topt++ = htonl((TCPOPT_NOP << 24) | (TCPOPT_NOP << 16) |
1038 (TCPOPT_TIMESTAMP << 8) | TCPOLEN_TIMESTAMP);
1039 *topt++ = htonl(tcp_time_stamp);
Ilpo Järvinen53b12572008-10-08 14:36:33 -07001040 *topt++ = htonl(ts);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001041 }
1042
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001043#ifdef CONFIG_TCP_MD5SIG
1044 if (key) {
1045 *topt++ = htonl((TCPOPT_NOP << 24) | (TCPOPT_NOP << 16) |
1046 (TCPOPT_MD5SIG << 8) | TCPOLEN_MD5SIG);
Adam Langley49a72df2008-07-19 00:01:42 -07001047 tcp_v6_md5_hash_hdr((__u8 *)topt, key,
Adam Langley90b7e112008-07-31 20:49:48 -07001048 &ipv6_hdr(skb)->saddr,
1049 &ipv6_hdr(skb)->daddr, t1);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001050 }
1051#endif
1052
Linus Torvalds1da177e2005-04-16 15:20:36 -07001053 memset(&fl, 0, sizeof(fl));
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001054 ipv6_addr_copy(&fl.fl6_dst, &ipv6_hdr(skb)->saddr);
1055 ipv6_addr_copy(&fl.fl6_src, &ipv6_hdr(skb)->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001056
David S. Millere5700af2010-04-21 14:59:20 -07001057 buff->ip_summed = CHECKSUM_PARTIAL;
1058 buff->csum = 0;
1059
Herbert Xu8ad50d92010-04-11 02:15:54 +00001060 __tcp_v6_send_check(buff, &fl.fl6_src, &fl.fl6_dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001061
1062 fl.proto = IPPROTO_TCP;
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001063 fl.oif = inet6_iif(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001064 fl.fl_ip_dport = t1->dest;
1065 fl.fl_ip_sport = t1->source;
Venkat Yekkiralabeb8d132006-08-04 23:12:42 -07001066 security_skb_classify_flow(skb, &fl);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001067
Ilpo Järvinen626e2642008-10-09 14:42:40 -07001068 /* Pass a socket to ip6_dst_lookup either it is for RST
1069 * Underlying function will use this to retrieve the network
1070 * namespace
1071 */
Eric Dumazetadf30902009-06-02 05:19:30 +00001072 if (!ip6_dst_lookup(ctl_sk, &dst, &fl)) {
1073 if (xfrm_lookup(net, &dst, &fl, NULL, 0) >= 0) {
1074 skb_dst_set(buff, dst);
Shan Wei4e15ed42010-04-15 16:43:08 +00001075 ip6_xmit(ctl_sk, buff, &fl, NULL);
Pavel Emelyanov63231bd2008-07-16 20:22:25 -07001076 TCP_INC_STATS_BH(net, TCP_MIB_OUTSEGS);
Ilpo Järvinen626e2642008-10-09 14:42:40 -07001077 if (rst)
1078 TCP_INC_STATS_BH(net, TCP_MIB_OUTRSTS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001079 return;
Arnaldo Carvalho de Meloecc51b62005-12-12 14:38:10 -08001080 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001081 }
1082
1083 kfree_skb(buff);
1084}
1085
Ilpo Järvinen626e2642008-10-09 14:42:40 -07001086static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb)
1087{
1088 struct tcphdr *th = tcp_hdr(skb);
1089 u32 seq = 0, ack_seq = 0;
Guo-Fu Tsengfa3e5b42008-10-09 21:11:56 -07001090 struct tcp_md5sig_key *key = NULL;
Ilpo Järvinen626e2642008-10-09 14:42:40 -07001091
1092 if (th->rst)
1093 return;
1094
1095 if (!ipv6_unicast_destination(skb))
1096 return;
1097
1098#ifdef CONFIG_TCP_MD5SIG
1099 if (sk)
1100 key = tcp_v6_md5_do_lookup(sk, &ipv6_hdr(skb)->daddr);
Ilpo Järvinen626e2642008-10-09 14:42:40 -07001101#endif
1102
1103 if (th->ack)
1104 seq = ntohl(th->ack_seq);
1105 else
1106 ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len -
1107 (th->doff << 2);
1108
1109 tcp_v6_send_response(skb, seq, ack_seq, 0, 0, key, 1);
1110}
1111
1112static void tcp_v6_send_ack(struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 ts,
1113 struct tcp_md5sig_key *key)
1114{
1115 tcp_v6_send_response(skb, seq, ack, win, ts, key, 0);
1116}
1117
Linus Torvalds1da177e2005-04-16 15:20:36 -07001118static void tcp_v6_timewait_ack(struct sock *sk, struct sk_buff *skb)
1119{
Arnaldo Carvalho de Melo8feaf0c2005-08-09 20:09:30 -07001120 struct inet_timewait_sock *tw = inet_twsk(sk);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001121 struct tcp_timewait_sock *tcptw = tcp_twsk(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001122
YOSHIFUJI Hideaki9501f972008-04-18 12:45:16 +09001123 tcp_v6_send_ack(skb, tcptw->tw_snd_nxt, tcptw->tw_rcv_nxt,
Arnaldo Carvalho de Melo8feaf0c2005-08-09 20:09:30 -07001124 tcptw->tw_rcv_wnd >> tw->tw_rcv_wscale,
YOSHIFUJI Hideaki9501f972008-04-18 12:45:16 +09001125 tcptw->tw_ts_recent, tcp_twsk_md5_key(tcptw));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001126
Arnaldo Carvalho de Melo8feaf0c2005-08-09 20:09:30 -07001127 inet_twsk_put(tw);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001128}
1129
Gui Jianfeng6edafaa2008-08-06 23:50:04 -07001130static void tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb,
1131 struct request_sock *req)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001132{
YOSHIFUJI Hideaki9501f972008-04-18 12:45:16 +09001133 tcp_v6_send_ack(skb, tcp_rsk(req)->snt_isn + 1, tcp_rsk(req)->rcv_isn + 1, req->rcv_wnd, req->ts_recent,
Gui Jianfeng6edafaa2008-08-06 23:50:04 -07001134 tcp_v6_md5_do_lookup(sk, &ipv6_hdr(skb)->daddr));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001135}
1136
1137
1138static struct sock *tcp_v6_hnd_req(struct sock *sk,struct sk_buff *skb)
1139{
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -07001140 struct request_sock *req, **prev;
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -07001141 const struct tcphdr *th = tcp_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001142 struct sock *nsk;
1143
1144 /* Find possible connection requests. */
Arnaldo Carvalho de Melo81297652005-12-13 23:15:24 -08001145 req = inet6_csk_search_req(sk, &prev, th->source,
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001146 &ipv6_hdr(skb)->saddr,
1147 &ipv6_hdr(skb)->daddr, inet6_iif(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001148 if (req)
1149 return tcp_check_req(sk, skb, req, prev);
1150
YOSHIFUJI Hideaki3b1e0a62008-03-26 02:26:21 +09001151 nsk = __inet6_lookup_established(sock_net(sk), &tcp_hashinfo,
Pavel Emelyanovd86e0da2008-01-31 05:07:21 -08001152 &ipv6_hdr(skb)->saddr, th->source,
1153 &ipv6_hdr(skb)->daddr, ntohs(th->dest), inet6_iif(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001154
1155 if (nsk) {
1156 if (nsk->sk_state != TCP_TIME_WAIT) {
1157 bh_lock_sock(nsk);
1158 return nsk;
1159 }
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -07001160 inet_twsk_put(inet_twsk(nsk));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001161 return NULL;
1162 }
1163
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001164#ifdef CONFIG_SYN_COOKIES
Linus Torvalds1da177e2005-04-16 15:20:36 -07001165 if (!th->rst && !th->syn && th->ack)
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001166 sk = cookie_v6_check(sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001167#endif
1168 return sk;
1169}
1170
Linus Torvalds1da177e2005-04-16 15:20:36 -07001171/* FIXME: this is substantially similar to the ipv4 code.
1172 * Can some kind of merge be done? -- erics
1173 */
1174static int tcp_v6_conn_request(struct sock *sk, struct sk_buff *skb)
1175{
William Allen Simpson4957faa2009-12-02 18:25:27 +00001176 struct tcp_extend_values tmp_ext;
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001177 struct tcp_options_received tmp_opt;
William Allen Simpson4957faa2009-12-02 18:25:27 +00001178 u8 *hash_location;
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001179 struct request_sock *req;
Arnaldo Carvalho de Meloca304b62005-12-13 23:15:40 -08001180 struct inet6_request_sock *treq;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001181 struct ipv6_pinfo *np = inet6_sk(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001182 struct tcp_sock *tp = tcp_sk(sk);
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001183 __u32 isn = TCP_SKB_CB(skb)->when;
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001184#ifdef CONFIG_SYN_COOKIES
1185 int want_cookie = 0;
1186#else
1187#define want_cookie 0
1188#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07001189
1190 if (skb->protocol == htons(ETH_P_IP))
1191 return tcp_v4_conn_request(sk, skb);
1192
1193 if (!ipv6_unicast_destination(skb))
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001194 goto drop;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001195
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07001196 if (inet_csk_reqsk_queue_is_full(sk) && !isn) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001197 if (net_ratelimit())
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001198 syn_flood_warning(skb);
1199#ifdef CONFIG_SYN_COOKIES
1200 if (sysctl_tcp_syncookies)
1201 want_cookie = 1;
1202 else
1203#endif
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001204 goto drop;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001205 }
1206
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07001207 if (sk_acceptq_is_full(sk) && inet_csk_reqsk_queue_young(sk) > 1)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001208 goto drop;
1209
Arnaldo Carvalho de Meloca304b62005-12-13 23:15:40 -08001210 req = inet6_reqsk_alloc(&tcp6_request_sock_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001211 if (req == NULL)
1212 goto drop;
1213
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001214#ifdef CONFIG_TCP_MD5SIG
1215 tcp_rsk(req)->af_specific = &tcp_request_sock_ipv6_ops;
1216#endif
1217
Linus Torvalds1da177e2005-04-16 15:20:36 -07001218 tcp_clear_options(&tmp_opt);
1219 tmp_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - sizeof(struct ipv6hdr);
1220 tmp_opt.user_mss = tp->rx_opt.user_mss;
David S. Millerbb5b7c12009-12-15 20:56:42 -08001221 tcp_parse_options(skb, &tmp_opt, &hash_location, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001222
William Allen Simpson4957faa2009-12-02 18:25:27 +00001223 if (tmp_opt.cookie_plus > 0 &&
1224 tmp_opt.saw_tstamp &&
1225 !tp->rx_opt.cookie_out_never &&
1226 (sysctl_tcp_cookie_size > 0 ||
1227 (tp->cookie_values != NULL &&
1228 tp->cookie_values->cookie_desired > 0))) {
1229 u8 *c;
1230 u32 *d;
1231 u32 *mess = &tmp_ext.cookie_bakery[COOKIE_DIGEST_WORDS];
1232 int l = tmp_opt.cookie_plus - TCPOLEN_COOKIE_BASE;
1233
1234 if (tcp_cookie_generator(&tmp_ext.cookie_bakery[0]) != 0)
1235 goto drop_and_free;
1236
1237 /* Secret recipe starts with IP addresses */
Eric Dumazet0eae88f2010-04-20 19:06:52 -07001238 d = (__force u32 *)&ipv6_hdr(skb)->daddr.s6_addr32[0];
William Allen Simpson4957faa2009-12-02 18:25:27 +00001239 *mess++ ^= *d++;
1240 *mess++ ^= *d++;
1241 *mess++ ^= *d++;
1242 *mess++ ^= *d++;
Eric Dumazet0eae88f2010-04-20 19:06:52 -07001243 d = (__force u32 *)&ipv6_hdr(skb)->saddr.s6_addr32[0];
William Allen Simpson4957faa2009-12-02 18:25:27 +00001244 *mess++ ^= *d++;
1245 *mess++ ^= *d++;
1246 *mess++ ^= *d++;
1247 *mess++ ^= *d++;
1248
1249 /* plus variable length Initiator Cookie */
1250 c = (u8 *)mess;
1251 while (l-- > 0)
1252 *c++ ^= *hash_location++;
1253
1254#ifdef CONFIG_SYN_COOKIES
1255 want_cookie = 0; /* not our kind of cookie */
1256#endif
1257 tmp_ext.cookie_out_never = 0; /* false */
1258 tmp_ext.cookie_plus = tmp_opt.cookie_plus;
1259 } else if (!tp->rx_opt.cookie_in_always) {
1260 /* redundant indications, but ensure initialization. */
1261 tmp_ext.cookie_out_never = 1; /* true */
1262 tmp_ext.cookie_plus = 0;
1263 } else {
1264 goto drop_and_free;
1265 }
1266 tmp_ext.cookie_in_always = tp->rx_opt.cookie_in_always;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001267
Florian Westphal4dfc2812008-04-10 03:12:40 -07001268 if (want_cookie && !tmp_opt.saw_tstamp)
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001269 tcp_clear_options(&tmp_opt);
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001270
Linus Torvalds1da177e2005-04-16 15:20:36 -07001271 tmp_opt.tstamp_ok = tmp_opt.saw_tstamp;
1272 tcp_openreq_init(req, &tmp_opt, skb);
1273
Arnaldo Carvalho de Meloca304b62005-12-13 23:15:40 -08001274 treq = inet6_rsk(req);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001275 ipv6_addr_copy(&treq->rmt_addr, &ipv6_hdr(skb)->saddr);
1276 ipv6_addr_copy(&treq->loc_addr, &ipv6_hdr(skb)->daddr);
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001277 if (!want_cookie)
1278 TCP_ECN_create_request(req, tcp_hdr(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001279
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001280 if (want_cookie) {
1281 isn = cookie_v6_init_sequence(sk, skb, &req->mss);
Florian Westphal4dfc2812008-04-10 03:12:40 -07001282 req->cookie_ts = tmp_opt.tstamp_ok;
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001283 } else if (!isn) {
1284 if (ipv6_opt_accepted(sk, skb) ||
1285 np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo ||
1286 np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim) {
1287 atomic_inc(&skb->users);
1288 treq->pktopts = skb;
1289 }
1290 treq->iif = sk->sk_bound_dev_if;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001291
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001292 /* So that link locals have meaning */
1293 if (!sk->sk_bound_dev_if &&
1294 ipv6_addr_type(&treq->rmt_addr) & IPV6_ADDR_LINKLOCAL)
1295 treq->iif = inet6_iif(skb);
1296
Gerrit Renkera94f7232006-11-10 14:06:49 -08001297 isn = tcp_v6_init_sequence(skb);
Glenn Griffinc6aefaf2008-02-07 21:49:26 -08001298 }
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -07001299 tcp_rsk(req)->snt_isn = isn;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001300
Venkat Yekkirala4237c752006-07-24 23:32:50 -07001301 security_inet_conn_request(sk, skb, req);
1302
William Allen Simpson4957faa2009-12-02 18:25:27 +00001303 if (tcp_v6_send_synack(sk, req,
1304 (struct request_values *)&tmp_ext) ||
1305 want_cookie)
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001306 goto drop_and_free;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001307
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001308 inet6_csk_reqsk_queue_hash_add(sk, req, TCP_TIMEOUT_INIT);
1309 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001310
William Allen Simpsone6b4d112009-12-02 18:07:39 +00001311drop_and_free:
1312 reqsk_free(req);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001313drop:
Linus Torvalds1da177e2005-04-16 15:20:36 -07001314 return 0; /* don't send reset */
1315}
1316
1317static struct sock * tcp_v6_syn_recv_sock(struct sock *sk, struct sk_buff *skb,
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -07001318 struct request_sock *req,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001319 struct dst_entry *dst)
1320{
Vegard Nossum78d15e82008-09-12 16:17:43 -07001321 struct inet6_request_sock *treq;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001322 struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
1323 struct tcp6_sock *newtcp6sk;
1324 struct inet_sock *newinet;
1325 struct tcp_sock *newtp;
1326 struct sock *newsk;
1327 struct ipv6_txoptions *opt;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001328#ifdef CONFIG_TCP_MD5SIG
1329 struct tcp_md5sig_key *key;
1330#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07001331
1332 if (skb->protocol == htons(ETH_P_IP)) {
1333 /*
1334 * v6 mapped
1335 */
1336
1337 newsk = tcp_v4_syn_recv_sock(sk, skb, req, dst);
1338
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001339 if (newsk == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001340 return NULL;
1341
1342 newtcp6sk = (struct tcp6_sock *)newsk;
1343 inet_sk(newsk)->pinet6 = &newtcp6sk->inet6;
1344
1345 newinet = inet_sk(newsk);
1346 newnp = inet6_sk(newsk);
1347 newtp = tcp_sk(newsk);
1348
1349 memcpy(newnp, np, sizeof(struct ipv6_pinfo));
1350
Eric Dumazetc720c7e2009-10-15 06:30:45 +00001351 ipv6_addr_set_v4mapped(newinet->inet_daddr, &newnp->daddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001352
Eric Dumazetc720c7e2009-10-15 06:30:45 +00001353 ipv6_addr_set_v4mapped(newinet->inet_saddr, &newnp->saddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001354
1355 ipv6_addr_copy(&newnp->rcv_saddr, &newnp->saddr);
1356
Arnaldo Carvalho de Melo8292a172005-12-13 23:15:52 -08001357 inet_csk(newsk)->icsk_af_ops = &ipv6_mapped;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001358 newsk->sk_backlog_rcv = tcp_v4_do_rcv;
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001359#ifdef CONFIG_TCP_MD5SIG
1360 newtp->af_specific = &tcp_sock_ipv6_mapped_specific;
1361#endif
1362
Linus Torvalds1da177e2005-04-16 15:20:36 -07001363 newnp->pktoptions = NULL;
1364 newnp->opt = NULL;
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001365 newnp->mcast_oif = inet6_iif(skb);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001366 newnp->mcast_hops = ipv6_hdr(skb)->hop_limit;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001367
Arnaldo Carvalho de Meloe6848972005-08-09 19:45:38 -07001368 /*
1369 * No need to charge this sock to the relevant IPv6 refcnt debug socks count
1370 * here, tcp_create_openreq_child now does this for us, see the comment in
1371 * that function for the gory details. -acme
Linus Torvalds1da177e2005-04-16 15:20:36 -07001372 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001373
1374 /* It is tricky place. Until this moment IPv4 tcp
Arnaldo Carvalho de Melo8292a172005-12-13 23:15:52 -08001375 worked with IPv6 icsk.icsk_af_ops.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001376 Sync it now.
1377 */
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08001378 tcp_sync_mss(newsk, inet_csk(newsk)->icsk_pmtu_cookie);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001379
1380 return newsk;
1381 }
1382
Vegard Nossum78d15e82008-09-12 16:17:43 -07001383 treq = inet6_rsk(req);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001384 opt = np->opt;
1385
1386 if (sk_acceptq_is_full(sk))
1387 goto out_overflow;
1388
Linus Torvalds1da177e2005-04-16 15:20:36 -07001389 if (dst == NULL) {
1390 struct in6_addr *final_p = NULL, final;
1391 struct flowi fl;
1392
1393 memset(&fl, 0, sizeof(fl));
1394 fl.proto = IPPROTO_TCP;
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -07001395 ipv6_addr_copy(&fl.fl6_dst, &treq->rmt_addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001396 if (opt && opt->srcrt) {
1397 struct rt0_hdr *rt0 = (struct rt0_hdr *) opt->srcrt;
1398 ipv6_addr_copy(&final, &fl.fl6_dst);
1399 ipv6_addr_copy(&fl.fl6_dst, rt0->addr);
1400 final_p = &final;
1401 }
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -07001402 ipv6_addr_copy(&fl.fl6_src, &treq->loc_addr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001403 fl.oif = sk->sk_bound_dev_if;
Brian Haley51953d52009-10-05 08:24:16 +00001404 fl.mark = sk->sk_mark;
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -07001405 fl.fl_ip_dport = inet_rsk(req)->rmt_port;
KOVACS Krisztianfd507032008-10-19 23:35:58 -07001406 fl.fl_ip_sport = inet_rsk(req)->loc_port;
Venkat Yekkirala4237c752006-07-24 23:32:50 -07001407 security_req_classify_flow(req, &fl);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001408
1409 if (ip6_dst_lookup(sk, &dst, &fl))
1410 goto out;
1411
1412 if (final_p)
1413 ipv6_addr_copy(&fl.fl6_dst, final_p);
1414
Alexey Dobriyan52479b62008-11-25 17:35:18 -08001415 if ((xfrm_lookup(sock_net(sk), &dst, &fl, sk, 0)) < 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001416 goto out;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001417 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001418
1419 newsk = tcp_create_openreq_child(sk, req, skb);
1420 if (newsk == NULL)
1421 goto out;
1422
Arnaldo Carvalho de Meloe6848972005-08-09 19:45:38 -07001423 /*
1424 * No need to charge this sock to the relevant IPv6 refcnt debug socks
1425 * count here, tcp_create_openreq_child now does this for us, see the
1426 * comment in that function for the gory details. -acme
1427 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001428
Stephen Hemminger59eed272006-08-25 15:55:43 -07001429 newsk->sk_gso_type = SKB_GSO_TCPV6;
YOSHIFUJI Hideaki8e1ef0a2006-08-29 17:15:09 -07001430 __ip6_dst_store(newsk, dst, NULL, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001431
1432 newtcp6sk = (struct tcp6_sock *)newsk;
1433 inet_sk(newsk)->pinet6 = &newtcp6sk->inet6;
1434
1435 newtp = tcp_sk(newsk);
1436 newinet = inet_sk(newsk);
1437 newnp = inet6_sk(newsk);
1438
1439 memcpy(newnp, np, sizeof(struct ipv6_pinfo));
1440
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -07001441 ipv6_addr_copy(&newnp->daddr, &treq->rmt_addr);
1442 ipv6_addr_copy(&newnp->saddr, &treq->loc_addr);
1443 ipv6_addr_copy(&newnp->rcv_saddr, &treq->loc_addr);
1444 newsk->sk_bound_dev_if = treq->iif;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001445
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001446 /* Now IPv6 options...
Linus Torvalds1da177e2005-04-16 15:20:36 -07001447
1448 First: no IPv4 options.
1449 */
1450 newinet->opt = NULL;
Masayuki Nakagawad35690b2007-03-16 16:14:03 -07001451 newnp->ipv6_fl_list = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001452
1453 /* Clone RX bits */
1454 newnp->rxopt.all = np->rxopt.all;
1455
1456 /* Clone pktoptions received with SYN */
1457 newnp->pktoptions = NULL;
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -07001458 if (treq->pktopts != NULL) {
1459 newnp->pktoptions = skb_clone(treq->pktopts, GFP_ATOMIC);
1460 kfree_skb(treq->pktopts);
1461 treq->pktopts = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001462 if (newnp->pktoptions)
1463 skb_set_owner_r(newnp->pktoptions, newsk);
1464 }
1465 newnp->opt = NULL;
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001466 newnp->mcast_oif = inet6_iif(skb);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001467 newnp->mcast_hops = ipv6_hdr(skb)->hop_limit;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001468
1469 /* Clone native IPv6 options from listening socket (if any)
1470
1471 Yes, keeping reference count would be much more clever,
1472 but we make one more one thing there: reattach optmem
1473 to newsk.
1474 */
1475 if (opt) {
1476 newnp->opt = ipv6_dup_options(newsk, opt);
1477 if (opt != np->opt)
1478 sock_kfree_s(sk, opt, opt->tot_len);
1479 }
1480
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08001481 inet_csk(newsk)->icsk_ext_hdr_len = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001482 if (newnp->opt)
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08001483 inet_csk(newsk)->icsk_ext_hdr_len = (newnp->opt->opt_nflen +
1484 newnp->opt->opt_flen);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001485
John Heffner5d424d52006-03-20 17:53:41 -08001486 tcp_mtup_init(newsk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001487 tcp_sync_mss(newsk, dst_mtu(dst));
1488 newtp->advmss = dst_metric(dst, RTAX_ADVMSS);
1489 tcp_initialize_rcv_mss(newsk);
1490
Eric Dumazetc720c7e2009-10-15 06:30:45 +00001491 newinet->inet_daddr = newinet->inet_saddr = LOOPBACK4_IPV6;
1492 newinet->inet_rcv_saddr = LOOPBACK4_IPV6;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001493
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001494#ifdef CONFIG_TCP_MD5SIG
1495 /* Copy over the MD5 key from the original socket */
1496 if ((key = tcp_v6_md5_do_lookup(sk, &newnp->daddr)) != NULL) {
1497 /* We're using one, so create a matching key
1498 * on the newsk structure. If we fail to get
1499 * memory, then we end up not copying the key
1500 * across. Shucks.
1501 */
Arnaldo Carvalho de Meloaf879cc2006-11-17 12:14:37 -02001502 char *newkey = kmemdup(key->key, key->keylen, GFP_ATOMIC);
1503 if (newkey != NULL)
John Dykstrae547bc12009-07-17 09:23:22 +00001504 tcp_v6_md5_do_add(newsk, &newnp->daddr,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001505 newkey, key->keylen);
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001506 }
1507#endif
1508
Eric Dumazet9327f702009-12-04 03:46:54 +00001509 __inet6_hash(newsk, NULL);
Pavel Emelyanove56d8b82008-04-17 23:17:34 -07001510 __inet_inherit_port(sk, newsk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001511
1512 return newsk;
1513
1514out_overflow:
Pavel Emelyanovde0744a2008-07-16 20:31:16 -07001515 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001516out:
Pavel Emelyanovde0744a2008-07-16 20:31:16 -07001517 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENDROPS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001518 if (opt && opt != np->opt)
1519 sock_kfree_s(sk, opt, opt->tot_len);
1520 dst_release(dst);
1521 return NULL;
1522}
1523
Al Virob51655b2006-11-14 21:40:42 -08001524static __sum16 tcp_v6_checksum_init(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001525{
Patrick McHardy84fa7932006-08-29 16:44:56 -07001526 if (skb->ip_summed == CHECKSUM_COMPLETE) {
Herbert Xu684f2172009-01-08 10:41:23 -08001527 if (!tcp_v6_check(skb->len, &ipv6_hdr(skb)->saddr,
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001528 &ipv6_hdr(skb)->daddr, skb->csum)) {
Herbert Xufb286bb2005-11-10 13:01:24 -08001529 skb->ip_summed = CHECKSUM_UNNECESSARY;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001530 return 0;
Herbert Xufb286bb2005-11-10 13:01:24 -08001531 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001532 }
Herbert Xufb286bb2005-11-10 13:01:24 -08001533
Herbert Xu684f2172009-01-08 10:41:23 -08001534 skb->csum = ~csum_unfold(tcp_v6_check(skb->len,
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001535 &ipv6_hdr(skb)->saddr,
1536 &ipv6_hdr(skb)->daddr, 0));
Herbert Xufb286bb2005-11-10 13:01:24 -08001537
Linus Torvalds1da177e2005-04-16 15:20:36 -07001538 if (skb->len <= 76) {
Herbert Xufb286bb2005-11-10 13:01:24 -08001539 return __skb_checksum_complete(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001540 }
1541 return 0;
1542}
1543
1544/* The socket must have it's spinlock held when we get
1545 * here.
1546 *
1547 * We have a potential double-lock case here, so even when
1548 * doing backlog processing we use the BH locking scheme.
1549 * This is because we cannot sleep with the original spinlock
1550 * held.
1551 */
1552static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb)
1553{
1554 struct ipv6_pinfo *np = inet6_sk(sk);
1555 struct tcp_sock *tp;
1556 struct sk_buff *opt_skb = NULL;
1557
1558 /* Imagine: socket is IPv6. IPv4 packet arrives,
1559 goes to IPv4 receive handler and backlogged.
1560 From backlog it always goes here. Kerboom...
1561 Fortunately, tcp_rcv_established and rcv_established
1562 handle them correctly, but it is not case with
1563 tcp_v6_hnd_req and tcp_v6_send_reset(). --ANK
1564 */
1565
1566 if (skb->protocol == htons(ETH_P_IP))
1567 return tcp_v4_do_rcv(sk, skb);
1568
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001569#ifdef CONFIG_TCP_MD5SIG
1570 if (tcp_v6_inbound_md5_hash (sk, skb))
1571 goto discard;
1572#endif
1573
Dmitry Mishinfda9ef52006-08-31 15:28:39 -07001574 if (sk_filter(sk, skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001575 goto discard;
1576
1577 /*
1578 * socket locking is here for SMP purposes as backlog rcv
1579 * is currently called with bh processing disabled.
1580 */
1581
1582 /* Do Stevens' IPV6_PKTOPTIONS.
1583
1584 Yes, guys, it is the only place in our code, where we
1585 may make it not affecting IPv4.
1586 The rest of code is protocol independent,
1587 and I do not like idea to uglify IPv4.
1588
1589 Actually, all the idea behind IPV6_PKTOPTIONS
1590 looks not very well thought. For now we latch
1591 options, received in the last packet, enqueued
1592 by tcp. Feel free to propose better solution.
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001593 --ANK (980728)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001594 */
1595 if (np->rxopt.all)
1596 opt_skb = skb_clone(skb, GFP_ATOMIC);
1597
1598 if (sk->sk_state == TCP_ESTABLISHED) { /* Fast path */
1599 TCP_CHECK_TIMER(sk);
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -07001600 if (tcp_rcv_established(sk, skb, tcp_hdr(skb), skb->len))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001601 goto reset;
1602 TCP_CHECK_TIMER(sk);
1603 if (opt_skb)
1604 goto ipv6_pktoptions;
1605 return 0;
1606 }
1607
Arnaldo Carvalho de Meloab6a5bb2007-03-18 17:43:48 -07001608 if (skb->len < tcp_hdrlen(skb) || tcp_checksum_complete(skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001609 goto csum_err;
1610
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001611 if (sk->sk_state == TCP_LISTEN) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001612 struct sock *nsk = tcp_v6_hnd_req(sk, skb);
1613 if (!nsk)
1614 goto discard;
1615
1616 /*
1617 * Queue it on the new socket if the new socket is active,
1618 * otherwise we just shortcircuit this and continue with
1619 * the new socket..
1620 */
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001621 if(nsk != sk) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001622 if (tcp_child_process(sk, nsk, skb))
1623 goto reset;
1624 if (opt_skb)
1625 __kfree_skb(opt_skb);
1626 return 0;
1627 }
1628 }
1629
1630 TCP_CHECK_TIMER(sk);
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -07001631 if (tcp_rcv_state_process(sk, skb, tcp_hdr(skb), skb->len))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001632 goto reset;
1633 TCP_CHECK_TIMER(sk);
1634 if (opt_skb)
1635 goto ipv6_pktoptions;
1636 return 0;
1637
1638reset:
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001639 tcp_v6_send_reset(sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001640discard:
1641 if (opt_skb)
1642 __kfree_skb(opt_skb);
1643 kfree_skb(skb);
1644 return 0;
1645csum_err:
Pavel Emelyanov63231bd2008-07-16 20:22:25 -07001646 TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_INERRS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001647 goto discard;
1648
1649
1650ipv6_pktoptions:
1651 /* Do you ask, what is it?
1652
1653 1. skb was enqueued by tcp.
1654 2. skb is added to tail of read queue, rather than out of order.
1655 3. socket is not in passive state.
1656 4. Finally, it really contains options, which user wants to receive.
1657 */
1658 tp = tcp_sk(sk);
1659 if (TCP_SKB_CB(opt_skb)->end_seq == tp->rcv_nxt &&
1660 !((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_LISTEN))) {
YOSHIFUJI Hideaki333fad52005-09-08 09:59:17 +09001661 if (np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo)
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001662 np->mcast_oif = inet6_iif(opt_skb);
YOSHIFUJI Hideaki333fad52005-09-08 09:59:17 +09001663 if (np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim)
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001664 np->mcast_hops = ipv6_hdr(opt_skb)->hop_limit;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001665 if (ipv6_opt_accepted(sk, opt_skb)) {
1666 skb_set_owner_r(opt_skb, sk);
1667 opt_skb = xchg(&np->pktoptions, opt_skb);
1668 } else {
1669 __kfree_skb(opt_skb);
1670 opt_skb = xchg(&np->pktoptions, NULL);
1671 }
1672 }
1673
Wei Yongjun800d55f2009-02-23 21:45:33 +00001674 kfree_skb(opt_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001675 return 0;
1676}
1677
Herbert Xue5bbef22007-10-15 12:50:28 -07001678static int tcp_v6_rcv(struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001679{
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001680 struct tcphdr *th;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001681 struct sock *sk;
1682 int ret;
Pavel Emelyanova86b1e32008-07-16 20:20:58 -07001683 struct net *net = dev_net(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001684
1685 if (skb->pkt_type != PACKET_HOST)
1686 goto discard_it;
1687
1688 /*
1689 * Count it even if it's bad.
1690 */
Pavel Emelyanov63231bd2008-07-16 20:22:25 -07001691 TCP_INC_STATS_BH(net, TCP_MIB_INSEGS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001692
1693 if (!pskb_may_pull(skb, sizeof(struct tcphdr)))
1694 goto discard_it;
1695
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -07001696 th = tcp_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001697
1698 if (th->doff < sizeof(struct tcphdr)/4)
1699 goto bad_packet;
1700 if (!pskb_may_pull(skb, th->doff*4))
1701 goto discard_it;
1702
Herbert Xu60476372007-04-09 11:59:39 -07001703 if (!skb_csum_unnecessary(skb) && tcp_v6_checksum_init(skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001704 goto bad_packet;
1705
Arnaldo Carvalho de Meloaa8223c2007-04-10 21:04:22 -07001706 th = tcp_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001707 TCP_SKB_CB(skb)->seq = ntohl(th->seq);
1708 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin +
1709 skb->len - th->doff*4);
1710 TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq);
1711 TCP_SKB_CB(skb)->when = 0;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001712 TCP_SKB_CB(skb)->flags = ipv6_get_dsfield(ipv6_hdr(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001713 TCP_SKB_CB(skb)->sacked = 0;
1714
Arnaldo Carvalho de Melo9a1f27c2008-10-07 11:41:57 -07001715 sk = __inet6_lookup_skb(&tcp_hashinfo, skb, th->source, th->dest);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001716 if (!sk)
1717 goto no_tcp_socket;
1718
1719process:
1720 if (sk->sk_state == TCP_TIME_WAIT)
1721 goto do_time_wait;
1722
1723 if (!xfrm6_policy_check(sk, XFRM_POLICY_IN, skb))
1724 goto discard_and_relse;
1725
Dmitry Mishinfda9ef52006-08-31 15:28:39 -07001726 if (sk_filter(sk, skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001727 goto discard_and_relse;
1728
1729 skb->dev = NULL;
1730
Fabio Olive Leite293b9c42006-09-25 22:28:47 -07001731 bh_lock_sock_nested(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001732 ret = 0;
1733 if (!sock_owned_by_user(sk)) {
Chris Leech1a2449a2006-05-23 18:05:53 -07001734#ifdef CONFIG_NET_DMA
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001735 struct tcp_sock *tp = tcp_sk(sk);
David S. Millerb4caea82007-10-26 04:20:13 -07001736 if (!tp->ucopy.dma_chan && tp->ucopy.pinned_list)
Dan Williamsf67b4592009-01-06 11:38:15 -07001737 tp->ucopy.dma_chan = dma_find_channel(DMA_MEMCPY);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001738 if (tp->ucopy.dma_chan)
1739 ret = tcp_v6_do_rcv(sk, skb);
1740 else
Chris Leech1a2449a2006-05-23 18:05:53 -07001741#endif
1742 {
1743 if (!tcp_prequeue(sk, skb))
1744 ret = tcp_v6_do_rcv(sk, skb);
1745 }
Eric Dumazet6cce09f2010-03-07 23:21:57 +00001746 } else if (unlikely(sk_add_backlog(sk, skb))) {
Zhu Yi6b03a532010-03-04 18:01:41 +00001747 bh_unlock_sock(sk);
Eric Dumazet6cce09f2010-03-07 23:21:57 +00001748 NET_INC_STATS_BH(net, LINUX_MIB_TCPBACKLOGDROP);
Zhu Yi6b03a532010-03-04 18:01:41 +00001749 goto discard_and_relse;
1750 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001751 bh_unlock_sock(sk);
1752
1753 sock_put(sk);
1754 return ret ? -1 : 0;
1755
1756no_tcp_socket:
1757 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb))
1758 goto discard_it;
1759
1760 if (skb->len < (th->doff<<2) || tcp_checksum_complete(skb)) {
1761bad_packet:
Pavel Emelyanov63231bd2008-07-16 20:22:25 -07001762 TCP_INC_STATS_BH(net, TCP_MIB_INERRS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001763 } else {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001764 tcp_v6_send_reset(NULL, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001765 }
1766
1767discard_it:
1768
1769 /*
1770 * Discard frame
1771 */
1772
1773 kfree_skb(skb);
1774 return 0;
1775
1776discard_and_relse:
1777 sock_put(sk);
1778 goto discard_it;
1779
1780do_time_wait:
1781 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -07001782 inet_twsk_put(inet_twsk(sk));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001783 goto discard_it;
1784 }
1785
1786 if (skb->len < (th->doff<<2) || tcp_checksum_complete(skb)) {
Pavel Emelyanov63231bd2008-07-16 20:22:25 -07001787 TCP_INC_STATS_BH(net, TCP_MIB_INERRS);
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -07001788 inet_twsk_put(inet_twsk(sk));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001789 goto discard_it;
1790 }
1791
YOSHIFUJI Hideaki9469c7b2006-10-10 19:41:46 -07001792 switch (tcp_timewait_state_process(inet_twsk(sk), skb, th)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001793 case TCP_TW_SYN:
1794 {
1795 struct sock *sk2;
1796
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +09001797 sk2 = inet6_lookup_listener(dev_net(skb->dev), &tcp_hashinfo,
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001798 &ipv6_hdr(skb)->daddr,
Arnaldo Carvalho de Melo505cbfc2005-08-12 09:19:38 -03001799 ntohs(th->dest), inet6_iif(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001800 if (sk2 != NULL) {
Arnaldo Carvalho de Melo295ff7e2005-08-09 20:44:40 -07001801 struct inet_timewait_sock *tw = inet_twsk(sk);
1802 inet_twsk_deschedule(tw, &tcp_death_row);
1803 inet_twsk_put(tw);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001804 sk = sk2;
1805 goto process;
1806 }
1807 /* Fall through to ACK */
1808 }
1809 case TCP_TW_ACK:
1810 tcp_v6_timewait_ack(sk, skb);
1811 break;
1812 case TCP_TW_RST:
1813 goto no_tcp_socket;
1814 case TCP_TW_SUCCESS:;
1815 }
1816 goto discard_it;
1817}
1818
Linus Torvalds1da177e2005-04-16 15:20:36 -07001819static int tcp_v6_remember_stamp(struct sock *sk)
1820{
1821 /* Alas, not yet... */
1822 return 0;
1823}
1824
Stephen Hemminger3b401a82009-09-01 19:25:04 +00001825static const struct inet_connection_sock_af_ops ipv6_specific = {
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001826 .queue_xmit = inet6_csk_xmit,
1827 .send_check = tcp_v6_send_check,
1828 .rebuild_header = inet6_sk_rebuild_header,
1829 .conn_request = tcp_v6_conn_request,
1830 .syn_recv_sock = tcp_v6_syn_recv_sock,
1831 .remember_stamp = tcp_v6_remember_stamp,
1832 .net_header_len = sizeof(struct ipv6hdr),
1833 .setsockopt = ipv6_setsockopt,
1834 .getsockopt = ipv6_getsockopt,
1835 .addr2sockaddr = inet6_csk_addr2sockaddr,
1836 .sockaddr_len = sizeof(struct sockaddr_in6),
Arnaldo Carvalho de Meloab1e0a12008-02-03 04:06:04 -08001837 .bind_conflict = inet6_csk_bind_conflict,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -08001838#ifdef CONFIG_COMPAT
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001839 .compat_setsockopt = compat_ipv6_setsockopt,
1840 .compat_getsockopt = compat_ipv6_getsockopt,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -08001841#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07001842};
1843
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001844#ifdef CONFIG_TCP_MD5SIG
Stephen Hemmingerb2e4b3d2009-09-01 19:25:03 +00001845static const struct tcp_sock_af_ops tcp_sock_ipv6_specific = {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001846 .md5_lookup = tcp_v6_md5_lookup,
Adam Langley49a72df2008-07-19 00:01:42 -07001847 .calc_md5_hash = tcp_v6_md5_hash_skb,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001848 .md5_add = tcp_v6_md5_add_func,
1849 .md5_parse = tcp_v6_parse_md5_keys,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001850};
David S. Millera9286302006-11-14 19:53:22 -08001851#endif
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001852
Linus Torvalds1da177e2005-04-16 15:20:36 -07001853/*
1854 * TCP over IPv4 via INET6 API
1855 */
1856
Stephen Hemminger3b401a82009-09-01 19:25:04 +00001857static const struct inet_connection_sock_af_ops ipv6_mapped = {
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001858 .queue_xmit = ip_queue_xmit,
1859 .send_check = tcp_v4_send_check,
1860 .rebuild_header = inet_sk_rebuild_header,
1861 .conn_request = tcp_v6_conn_request,
1862 .syn_recv_sock = tcp_v6_syn_recv_sock,
1863 .remember_stamp = tcp_v4_remember_stamp,
1864 .net_header_len = sizeof(struct iphdr),
1865 .setsockopt = ipv6_setsockopt,
1866 .getsockopt = ipv6_getsockopt,
1867 .addr2sockaddr = inet6_csk_addr2sockaddr,
1868 .sockaddr_len = sizeof(struct sockaddr_in6),
Arnaldo Carvalho de Meloab1e0a12008-02-03 04:06:04 -08001869 .bind_conflict = inet6_csk_bind_conflict,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -08001870#ifdef CONFIG_COMPAT
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08001871 .compat_setsockopt = compat_ipv6_setsockopt,
1872 .compat_getsockopt = compat_ipv6_getsockopt,
Dmitry Mishin3fdadf72006-03-20 22:45:21 -08001873#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07001874};
1875
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001876#ifdef CONFIG_TCP_MD5SIG
Stephen Hemmingerb2e4b3d2009-09-01 19:25:03 +00001877static const struct tcp_sock_af_ops tcp_sock_ipv6_mapped_specific = {
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001878 .md5_lookup = tcp_v4_md5_lookup,
Adam Langley49a72df2008-07-19 00:01:42 -07001879 .calc_md5_hash = tcp_v4_md5_hash_skb,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001880 .md5_add = tcp_v6_md5_add_func,
1881 .md5_parse = tcp_v6_parse_md5_keys,
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001882};
David S. Millera9286302006-11-14 19:53:22 -08001883#endif
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001884
Linus Torvalds1da177e2005-04-16 15:20:36 -07001885/* NOTE: A lot of things set to zero explicitly by call to
1886 * sk_alloc() so need not be done here.
1887 */
1888static int tcp_v6_init_sock(struct sock *sk)
1889{
Arnaldo Carvalho de Melo6687e982005-08-10 04:03:31 -03001890 struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001891 struct tcp_sock *tp = tcp_sk(sk);
1892
1893 skb_queue_head_init(&tp->out_of_order_queue);
1894 tcp_init_xmit_timers(sk);
1895 tcp_prequeue_init(tp);
1896
Arnaldo Carvalho de Melo6687e982005-08-10 04:03:31 -03001897 icsk->icsk_rto = TCP_TIMEOUT_INIT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001898 tp->mdev = TCP_TIMEOUT_INIT;
1899
1900 /* So many TCP implementations out there (incorrectly) count the
1901 * initial SYN frame in their delayed-ACK and congestion control
1902 * algorithms that we must have the following bandaid to talk
1903 * efficiently to them. -DaveM
1904 */
1905 tp->snd_cwnd = 2;
1906
1907 /* See draft-stevens-tcpca-spec-01 for discussion of the
1908 * initialization of these values.
1909 */
Ilpo Järvinen0b6a05c2009-09-15 01:30:10 -07001910 tp->snd_ssthresh = TCP_INFINITE_SSTHRESH;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001911 tp->snd_cwnd_clamp = ~0;
William Allen Simpsonbee7ca92009-11-10 09:51:18 +00001912 tp->mss_cache = TCP_MSS_DEFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001913
1914 tp->reordering = sysctl_tcp_reordering;
1915
1916 sk->sk_state = TCP_CLOSE;
1917
Arnaldo Carvalho de Melo8292a172005-12-13 23:15:52 -08001918 icsk->icsk_af_ops = &ipv6_specific;
Arnaldo Carvalho de Melo6687e982005-08-10 04:03:31 -03001919 icsk->icsk_ca_ops = &tcp_init_congestion_ops;
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08001920 icsk->icsk_sync_mss = tcp_sync_mss;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001921 sk->sk_write_space = sk_stream_write_space;
1922 sock_set_flag(sk, SOCK_USE_WRITE_QUEUE);
1923
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001924#ifdef CONFIG_TCP_MD5SIG
1925 tp->af_specific = &tcp_sock_ipv6_specific;
1926#endif
1927
William Allen Simpson435cf552009-12-02 18:17:05 +00001928 /* TCP Cookie Transactions */
1929 if (sysctl_tcp_cookie_size > 0) {
1930 /* Default, cookies without s_data_payload. */
1931 tp->cookie_values =
1932 kzalloc(sizeof(*tp->cookie_values),
1933 sk->sk_allocation);
1934 if (tp->cookie_values != NULL)
1935 kref_init(&tp->cookie_values->kref);
1936 }
1937 /* Presumed zeroed, in order of appearance:
1938 * cookie_in_always, cookie_out_never,
1939 * s_data_constant, s_data_in, s_data_out
1940 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001941 sk->sk_sndbuf = sysctl_tcp_wmem[1];
1942 sk->sk_rcvbuf = sysctl_tcp_rmem[1];
1943
Herbert Xueb4dea52008-12-29 23:04:08 -08001944 local_bh_disable();
Eric Dumazet17483762008-11-25 21:16:35 -08001945 percpu_counter_inc(&tcp_sockets_allocated);
Herbert Xueb4dea52008-12-29 23:04:08 -08001946 local_bh_enable();
Linus Torvalds1da177e2005-04-16 15:20:36 -07001947
1948 return 0;
1949}
1950
Brian Haley7d06b2e2008-06-14 17:04:49 -07001951static void tcp_v6_destroy_sock(struct sock *sk)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001952{
YOSHIFUJI Hideakicfb6eeb2006-11-14 19:07:45 -08001953#ifdef CONFIG_TCP_MD5SIG
1954 /* Clean up the MD5 key list */
1955 if (tcp_sk(sk)->md5sig_info)
1956 tcp_v6_clear_md5_list(sk);
1957#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07001958 tcp_v4_destroy_sock(sk);
Brian Haley7d06b2e2008-06-14 17:04:49 -07001959 inet6_destroy_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001960}
1961
YOSHIFUJI Hideaki952a10b2007-04-21 20:13:44 +09001962#ifdef CONFIG_PROC_FS
Linus Torvalds1da177e2005-04-16 15:20:36 -07001963/* Proc filesystem TCPv6 sock list dumping. */
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001964static void get_openreq6(struct seq_file *seq,
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -07001965 struct sock *sk, struct request_sock *req, int i, int uid)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001966{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001967 int ttd = req->expires - jiffies;
Arnaldo Carvalho de Meloca304b62005-12-13 23:15:40 -08001968 struct in6_addr *src = &inet6_rsk(req)->loc_addr;
1969 struct in6_addr *dest = &inet6_rsk(req)->rmt_addr;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001970
1971 if (ttd < 0)
1972 ttd = 0;
1973
Linus Torvalds1da177e2005-04-16 15:20:36 -07001974 seq_printf(seq,
1975 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
1976 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %d %d %p\n",
1977 i,
1978 src->s6_addr32[0], src->s6_addr32[1],
1979 src->s6_addr32[2], src->s6_addr32[3],
KOVACS Krisztianfd507032008-10-19 23:35:58 -07001980 ntohs(inet_rsk(req)->loc_port),
Linus Torvalds1da177e2005-04-16 15:20:36 -07001981 dest->s6_addr32[0], dest->s6_addr32[1],
1982 dest->s6_addr32[2], dest->s6_addr32[3],
Arnaldo Carvalho de Melo2e6599c2005-06-18 22:46:52 -07001983 ntohs(inet_rsk(req)->rmt_port),
Linus Torvalds1da177e2005-04-16 15:20:36 -07001984 TCP_SYN_RECV,
1985 0,0, /* could print option size, but that is af dependent. */
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001986 1, /* timers active (only the expire timer) */
1987 jiffies_to_clock_t(ttd),
Linus Torvalds1da177e2005-04-16 15:20:36 -07001988 req->retrans,
1989 uid,
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001990 0, /* non standard timer */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001991 0, /* open_requests have no inode */
1992 0, req);
1993}
1994
1995static void get_tcp6_sock(struct seq_file *seq, struct sock *sp, int i)
1996{
1997 struct in6_addr *dest, *src;
1998 __u16 destp, srcp;
1999 int timer_active;
2000 unsigned long timer_expires;
2001 struct inet_sock *inet = inet_sk(sp);
2002 struct tcp_sock *tp = tcp_sk(sp);
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07002003 const struct inet_connection_sock *icsk = inet_csk(sp);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002004 struct ipv6_pinfo *np = inet6_sk(sp);
2005
2006 dest = &np->daddr;
2007 src = &np->rcv_saddr;
Eric Dumazetc720c7e2009-10-15 06:30:45 +00002008 destp = ntohs(inet->inet_dport);
2009 srcp = ntohs(inet->inet_sport);
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07002010
2011 if (icsk->icsk_pending == ICSK_TIME_RETRANS) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07002012 timer_active = 1;
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07002013 timer_expires = icsk->icsk_timeout;
2014 } else if (icsk->icsk_pending == ICSK_TIME_PROBE0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07002015 timer_active = 4;
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07002016 timer_expires = icsk->icsk_timeout;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002017 } else if (timer_pending(&sp->sk_timer)) {
2018 timer_active = 2;
2019 timer_expires = sp->sk_timer.expires;
2020 } else {
2021 timer_active = 0;
2022 timer_expires = jiffies;
2023 }
2024
2025 seq_printf(seq,
2026 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
Stephen Hemminger7be87352008-06-27 20:00:19 -07002027 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %lu %d %p %lu %lu %u %u %d\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -07002028 i,
2029 src->s6_addr32[0], src->s6_addr32[1],
2030 src->s6_addr32[2], src->s6_addr32[3], srcp,
2031 dest->s6_addr32[0], dest->s6_addr32[1],
2032 dest->s6_addr32[2], dest->s6_addr32[3], destp,
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09002033 sp->sk_state,
Sridhar Samudrala47da8ee2006-06-27 13:29:00 -07002034 tp->write_seq-tp->snd_una,
2035 (sp->sk_state == TCP_LISTEN) ? sp->sk_ack_backlog : (tp->rcv_nxt - tp->copied_seq),
Linus Torvalds1da177e2005-04-16 15:20:36 -07002036 timer_active,
2037 jiffies_to_clock_t(timer_expires - jiffies),
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07002038 icsk->icsk_retransmits,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002039 sock_i_uid(sp),
Arnaldo Carvalho de Melo6687e982005-08-10 04:03:31 -03002040 icsk->icsk_probes_out,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002041 sock_i_ino(sp),
2042 atomic_read(&sp->sk_refcnt), sp,
Stephen Hemminger7be87352008-06-27 20:00:19 -07002043 jiffies_to_clock_t(icsk->icsk_rto),
2044 jiffies_to_clock_t(icsk->icsk_ack.ato),
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07002045 (icsk->icsk_ack.quick << 1 ) | icsk->icsk_ack.pingpong,
Ilpo Järvinen0b6a05c2009-09-15 01:30:10 -07002046 tp->snd_cwnd,
2047 tcp_in_initial_slowstart(tp) ? -1 : tp->snd_ssthresh
Linus Torvalds1da177e2005-04-16 15:20:36 -07002048 );
2049}
2050
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09002051static void get_timewait6_sock(struct seq_file *seq,
Arnaldo Carvalho de Melo8feaf0c2005-08-09 20:09:30 -07002052 struct inet_timewait_sock *tw, int i)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002053{
2054 struct in6_addr *dest, *src;
2055 __u16 destp, srcp;
Arnaldo Carvalho de Melo0fa1a532005-12-13 23:23:09 -08002056 struct inet6_timewait_sock *tw6 = inet6_twsk((struct sock *)tw);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002057 int ttd = tw->tw_ttd - jiffies;
2058
2059 if (ttd < 0)
2060 ttd = 0;
2061
Arnaldo Carvalho de Melo0fa1a532005-12-13 23:23:09 -08002062 dest = &tw6->tw_v6_daddr;
2063 src = &tw6->tw_v6_rcv_saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -07002064 destp = ntohs(tw->tw_dport);
2065 srcp = ntohs(tw->tw_sport);
2066
2067 seq_printf(seq,
2068 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
2069 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %d %d %p\n",
2070 i,
2071 src->s6_addr32[0], src->s6_addr32[1],
2072 src->s6_addr32[2], src->s6_addr32[3], srcp,
2073 dest->s6_addr32[0], dest->s6_addr32[1],
2074 dest->s6_addr32[2], dest->s6_addr32[3], destp,
2075 tw->tw_substate, 0, 0,
2076 3, jiffies_to_clock_t(ttd), 0, 0, 0, 0,
2077 atomic_read(&tw->tw_refcnt), tw);
2078}
2079
Linus Torvalds1da177e2005-04-16 15:20:36 -07002080static int tcp6_seq_show(struct seq_file *seq, void *v)
2081{
2082 struct tcp_iter_state *st;
2083
2084 if (v == SEQ_START_TOKEN) {
2085 seq_puts(seq,
2086 " sl "
2087 "local_address "
2088 "remote_address "
2089 "st tx_queue rx_queue tr tm->when retrnsmt"
2090 " uid timeout inode\n");
2091 goto out;
2092 }
2093 st = seq->private;
2094
2095 switch (st->state) {
2096 case TCP_SEQ_STATE_LISTENING:
2097 case TCP_SEQ_STATE_ESTABLISHED:
2098 get_tcp6_sock(seq, v, st->num);
2099 break;
2100 case TCP_SEQ_STATE_OPENREQ:
2101 get_openreq6(seq, st->syn_wait_sk, v, st->num, st->uid);
2102 break;
2103 case TCP_SEQ_STATE_TIME_WAIT:
2104 get_timewait6_sock(seq, v, st->num);
2105 break;
2106 }
2107out:
2108 return 0;
2109}
2110
Linus Torvalds1da177e2005-04-16 15:20:36 -07002111static struct tcp_seq_afinfo tcp6_seq_afinfo = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07002112 .name = "tcp6",
2113 .family = AF_INET6,
Denis V. Lunev5f4472c2008-04-13 22:13:53 -07002114 .seq_fops = {
2115 .owner = THIS_MODULE,
2116 },
Denis V. Lunev9427c4b2008-04-13 22:12:13 -07002117 .seq_ops = {
2118 .show = tcp6_seq_show,
2119 },
Linus Torvalds1da177e2005-04-16 15:20:36 -07002120};
2121
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00002122int __net_init tcp6_proc_init(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002123{
Daniel Lezcano6f8b13b2008-03-21 04:14:45 -07002124 return tcp_proc_register(net, &tcp6_seq_afinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002125}
2126
Daniel Lezcano6f8b13b2008-03-21 04:14:45 -07002127void tcp6_proc_exit(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002128{
Daniel Lezcano6f8b13b2008-03-21 04:14:45 -07002129 tcp_proc_unregister(net, &tcp6_seq_afinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002130}
2131#endif
2132
2133struct proto tcpv6_prot = {
2134 .name = "TCPv6",
2135 .owner = THIS_MODULE,
2136 .close = tcp_close,
2137 .connect = tcp_v6_connect,
2138 .disconnect = tcp_disconnect,
Arnaldo Carvalho de Melo463c84b2005-08-09 20:10:42 -07002139 .accept = inet_csk_accept,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002140 .ioctl = tcp_ioctl,
2141 .init = tcp_v6_init_sock,
2142 .destroy = tcp_v6_destroy_sock,
2143 .shutdown = tcp_shutdown,
2144 .setsockopt = tcp_setsockopt,
2145 .getsockopt = tcp_getsockopt,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002146 .recvmsg = tcp_recvmsg,
2147 .backlog_rcv = tcp_v6_do_rcv,
2148 .hash = tcp_v6_hash,
Arnaldo Carvalho de Meloab1e0a12008-02-03 04:06:04 -08002149 .unhash = inet_unhash,
2150 .get_port = inet_csk_get_port,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002151 .enter_memory_pressure = tcp_enter_memory_pressure,
2152 .sockets_allocated = &tcp_sockets_allocated,
2153 .memory_allocated = &tcp_memory_allocated,
2154 .memory_pressure = &tcp_memory_pressure,
Arnaldo Carvalho de Melo0a5578c2005-08-09 20:11:41 -07002155 .orphan_count = &tcp_orphan_count,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002156 .sysctl_mem = sysctl_tcp_mem,
2157 .sysctl_wmem = sysctl_tcp_wmem,
2158 .sysctl_rmem = sysctl_tcp_rmem,
2159 .max_header = MAX_TCP_HEADER,
2160 .obj_size = sizeof(struct tcp6_sock),
Eric Dumazet3ab5aee2008-11-16 19:40:17 -08002161 .slab_flags = SLAB_DESTROY_BY_RCU,
Arnaldo Carvalho de Melo6d6ee432005-12-13 23:25:19 -08002162 .twsk_prot = &tcp6_timewait_sock_ops,
Arnaldo Carvalho de Melo60236fd2005-06-18 22:47:21 -07002163 .rsk_prot = &tcp6_request_sock_ops,
Pavel Emelyanov39d8cda2008-03-22 16:50:58 -07002164 .h.hashinfo = &tcp_hashinfo,
Arnaldo Carvalho de Melo543d9cf2006-03-20 22:48:35 -08002165#ifdef CONFIG_COMPAT
2166 .compat_setsockopt = compat_tcp_setsockopt,
2167 .compat_getsockopt = compat_tcp_getsockopt,
2168#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -07002169};
2170
Alexey Dobriyan41135cc2009-09-14 12:22:28 +00002171static const struct inet6_protocol tcpv6_protocol = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07002172 .handler = tcp_v6_rcv,
2173 .err_handler = tcp_v6_err,
Herbert Xua430a432006-07-08 13:34:56 -07002174 .gso_send_check = tcp_v6_gso_send_check,
Herbert Xuadcfc7d2006-06-30 13:36:15 -07002175 .gso_segment = tcp_tso_segment,
Herbert Xu684f2172009-01-08 10:41:23 -08002176 .gro_receive = tcp6_gro_receive,
2177 .gro_complete = tcp6_gro_complete,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002178 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
2179};
2180
Linus Torvalds1da177e2005-04-16 15:20:36 -07002181static struct inet_protosw tcpv6_protosw = {
2182 .type = SOCK_STREAM,
2183 .protocol = IPPROTO_TCP,
2184 .prot = &tcpv6_prot,
2185 .ops = &inet6_stream_ops,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002186 .no_check = 0,
Arnaldo Carvalho de Melod83d8462005-12-13 23:26:10 -08002187 .flags = INET_PROTOSW_PERMANENT |
2188 INET_PROTOSW_ICSK,
Linus Torvalds1da177e2005-04-16 15:20:36 -07002189};
2190
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00002191static int __net_init tcpv6_net_init(struct net *net)
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002192{
Denis V. Lunev56772422008-04-03 14:28:30 -07002193 return inet_ctl_sock_create(&net->ipv6.tcp_sk, PF_INET6,
2194 SOCK_RAW, IPPROTO_TCP, net);
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002195}
2196
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00002197static void __net_exit tcpv6_net_exit(struct net *net)
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002198{
Denis V. Lunev56772422008-04-03 14:28:30 -07002199 inet_ctl_sock_destroy(net->ipv6.tcp_sk);
Eric W. Biedermanb099ce22009-12-03 02:29:09 +00002200}
2201
Alexey Dobriyan2c8c1e72010-01-17 03:35:32 +00002202static void __net_exit tcpv6_net_exit_batch(struct list_head *net_exit_list)
Eric W. Biedermanb099ce22009-12-03 02:29:09 +00002203{
2204 inet_twsk_purge(&tcp_hashinfo, &tcp_death_row, AF_INET6);
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002205}
2206
2207static struct pernet_operations tcpv6_net_ops = {
Eric W. Biedermanb099ce22009-12-03 02:29:09 +00002208 .init = tcpv6_net_init,
2209 .exit = tcpv6_net_exit,
2210 .exit_batch = tcpv6_net_exit_batch,
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002211};
2212
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002213int __init tcpv6_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -07002214{
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002215 int ret;
David Woodhouseae0f7d52006-01-11 15:53:04 -08002216
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002217 ret = inet6_add_protocol(&tcpv6_protocol, IPPROTO_TCP);
2218 if (ret)
2219 goto out;
2220
2221 /* register inet6 protocol */
2222 ret = inet6_register_protosw(&tcpv6_protosw);
2223 if (ret)
2224 goto out_tcpv6_protocol;
2225
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002226 ret = register_pernet_subsys(&tcpv6_net_ops);
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002227 if (ret)
2228 goto out_tcpv6_protosw;
2229out:
2230 return ret;
2231
2232out_tcpv6_protocol:
2233 inet6_del_protocol(&tcpv6_protocol, IPPROTO_TCP);
2234out_tcpv6_protosw:
2235 inet6_unregister_protosw(&tcpv6_protosw);
2236 goto out;
2237}
2238
Daniel Lezcano09f77092007-12-13 05:34:58 -08002239void tcpv6_exit(void)
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002240{
Daniel Lezcano93ec9262008-03-07 11:16:02 -08002241 unregister_pernet_subsys(&tcpv6_net_ops);
Daniel Lezcano7f4e4862007-12-11 02:25:35 -08002242 inet6_unregister_protosw(&tcpv6_protosw);
2243 inet6_del_protocol(&tcpv6_protocol, IPPROTO_TCP);
Linus Torvalds1da177e2005-04-16 15:20:36 -07002244}