1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26#include <linux/bottom_half.h>
27#include <linux/module.h>
28#include <linux/errno.h>
29#include <linux/types.h>
30#include <linux/socket.h>
31#include <linux/sockios.h>
32#include <linux/net.h>
33#include <linux/jiffies.h>
34#include <linux/in.h>
35#include <linux/in6.h>
36#include <linux/netdevice.h>
37#include <linux/init.h>
38#include <linux/jhash.h>
39#include <linux/ipsec.h>
40#include <linux/times.h>
41#include <linux/slab.h>
42
43#include <linux/ipv6.h>
44#include <linux/icmpv6.h>
45#include <linux/random.h>
46
47#include <net/tcp.h>
48#include <net/ndisc.h>
49#include <net/inet6_hashtables.h>
50#include <net/inet6_connection_sock.h>
51#include <net/ipv6.h>
52#include <net/transp_v6.h>
53#include <net/addrconf.h>
54#include <net/ip6_route.h>
55#include <net/ip6_checksum.h>
56#include <net/inet_ecn.h>
57#include <net/protocol.h>
58#include <net/xfrm.h>
59#include <net/snmp.h>
60#include <net/dsfield.h>
61#include <net/timewait_sock.h>
62#include <net/netdma.h>
63#include <net/inet_common.h>
64
65#include <asm/uaccess.h>
66
67#include <linux/proc_fs.h>
68#include <linux/seq_file.h>
69
70#include <linux/crypto.h>
71#include <linux/scatterlist.h>
72
73static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb);
74static void tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb,
75 struct request_sock *req);
76
77static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb);
78static void __tcp_v6_send_check(struct sk_buff *skb,
79 struct in6_addr *saddr,
80 struct in6_addr *daddr);
81
82static const struct inet_connection_sock_af_ops ipv6_mapped;
83static const struct inet_connection_sock_af_ops ipv6_specific;
84#ifdef CONFIG_TCP_MD5SIG
85static const struct tcp_sock_af_ops tcp_sock_ipv6_specific;
86static const struct tcp_sock_af_ops tcp_sock_ipv6_mapped_specific;
87#else
88static struct tcp_md5sig_key *tcp_v6_md5_do_lookup(struct sock *sk,
89 struct in6_addr *addr)
90{
91 return NULL;
92}
93#endif
94
95static void tcp_v6_hash(struct sock *sk)
96{
97 if (sk->sk_state != TCP_CLOSE) {
98 if (inet_csk(sk)->icsk_af_ops == &ipv6_mapped) {
99 tcp_prot.hash(sk);
100 return;
101 }
102 local_bh_disable();
103 __inet6_hash(sk, NULL);
104 local_bh_enable();
105 }
106}
107
108static __inline__ __sum16 tcp_v6_check(int len,
109 struct in6_addr *saddr,
110 struct in6_addr *daddr,
111 __wsum base)
112{
113 return csum_ipv6_magic(saddr, daddr, len, IPPROTO_TCP, base);
114}
115
116static __u32 tcp_v6_init_sequence(struct sk_buff *skb)
117{
118 return secure_tcpv6_sequence_number(ipv6_hdr(skb)->daddr.s6_addr32,
119 ipv6_hdr(skb)->saddr.s6_addr32,
120 tcp_hdr(skb)->dest,
121 tcp_hdr(skb)->source);
122}
123
124static int tcp_v6_connect(struct sock *sk, struct sockaddr *uaddr,
125 int addr_len)
126{
127 struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
128 struct inet_sock *inet = inet_sk(sk);
129 struct inet_connection_sock *icsk = inet_csk(sk);
130 struct ipv6_pinfo *np = inet6_sk(sk);
131 struct tcp_sock *tp = tcp_sk(sk);
132 struct in6_addr *saddr = NULL, *final_p, final;
133 struct flowi fl;
134 struct dst_entry *dst;
135 int addr_type;
136 int err;
137
138 if (addr_len < SIN6_LEN_RFC2133)
139 return -EINVAL;
140
141 if (usin->sin6_family != AF_INET6)
142 return -EAFNOSUPPORT;
143
144 memset(&fl, 0, sizeof(fl));
145
146 if (np->sndflow) {
147 fl.fl6_flowlabel = usin->sin6_flowinfo&IPV6_FLOWINFO_MASK;
148 IP6_ECN_flow_init(fl.fl6_flowlabel);
149 if (fl.fl6_flowlabel&IPV6_FLOWLABEL_MASK) {
150 struct ip6_flowlabel *flowlabel;
151 flowlabel = fl6_sock_lookup(sk, fl.fl6_flowlabel);
152 if (flowlabel == NULL)
153 return -EINVAL;
154 ipv6_addr_copy(&usin->sin6_addr, &flowlabel->dst);
155 fl6_sock_release(flowlabel);
156 }
157 }
158
159
160
161
162
163 if(ipv6_addr_any(&usin->sin6_addr))
164 usin->sin6_addr.s6_addr[15] = 0x1;
165
166 addr_type = ipv6_addr_type(&usin->sin6_addr);
167
168 if(addr_type & IPV6_ADDR_MULTICAST)
169 return -ENETUNREACH;
170
171 if (addr_type&IPV6_ADDR_LINKLOCAL) {
172 if (addr_len >= sizeof(struct sockaddr_in6) &&
173 usin->sin6_scope_id) {
174
175
176
177 if (sk->sk_bound_dev_if &&
178 sk->sk_bound_dev_if != usin->sin6_scope_id)
179 return -EINVAL;
180
181 sk->sk_bound_dev_if = usin->sin6_scope_id;
182 }
183
184
185 if (!sk->sk_bound_dev_if)
186 return -EINVAL;
187 }
188
189 if (tp->rx_opt.ts_recent_stamp &&
190 !ipv6_addr_equal(&np->daddr, &usin->sin6_addr)) {
191 tp->rx_opt.ts_recent = 0;
192 tp->rx_opt.ts_recent_stamp = 0;
193 tp->write_seq = 0;
194 }
195
196 ipv6_addr_copy(&np->daddr, &usin->sin6_addr);
197 np->flow_label = fl.fl6_flowlabel;
198
199
200
201
202
203 if (addr_type == IPV6_ADDR_MAPPED) {
204 u32 exthdrlen = icsk->icsk_ext_hdr_len;
205 struct sockaddr_in sin;
206
207 SOCK_DEBUG(sk, "connect: ipv4 mapped\n");
208
209 if (__ipv6_only_sock(sk))
210 return -ENETUNREACH;
211
212 sin.sin_family = AF_INET;
213 sin.sin_port = usin->sin6_port;
214 sin.sin_addr.s_addr = usin->sin6_addr.s6_addr32[3];
215
216 icsk->icsk_af_ops = &ipv6_mapped;
217 sk->sk_backlog_rcv = tcp_v4_do_rcv;
218#ifdef CONFIG_TCP_MD5SIG
219 tp->af_specific = &tcp_sock_ipv6_mapped_specific;
220#endif
221
222 err = tcp_v4_connect(sk, (struct sockaddr *)&sin, sizeof(sin));
223
224 if (err) {
225 icsk->icsk_ext_hdr_len = exthdrlen;
226 icsk->icsk_af_ops = &ipv6_specific;
227 sk->sk_backlog_rcv = tcp_v6_do_rcv;
228#ifdef CONFIG_TCP_MD5SIG
229 tp->af_specific = &tcp_sock_ipv6_specific;
230#endif
231 goto failure;
232 } else {
233 ipv6_addr_set_v4mapped(inet->inet_saddr, &np->saddr);
234 ipv6_addr_set_v4mapped(inet->inet_rcv_saddr,
235 &np->rcv_saddr);
236 }
237
238 return err;
239 }
240
241 if (!ipv6_addr_any(&np->rcv_saddr))
242 saddr = &np->rcv_saddr;
243
244 fl.proto = IPPROTO_TCP;
245 ipv6_addr_copy(&fl.fl6_dst, &np->daddr);
246 ipv6_addr_copy(&fl.fl6_src,
247 (saddr ? saddr : &np->saddr));
248 fl.oif = sk->sk_bound_dev_if;
249 fl.mark = sk->sk_mark;
250 fl.fl_ip_dport = usin->sin6_port;
251 fl.fl_ip_sport = inet->inet_sport;
252
253 final_p = fl6_update_dst(&fl, np->opt, &final);
254
255 security_sk_classify_flow(sk, &fl);
256
257 err = ip6_dst_lookup(sk, &dst, &fl);
258 if (err)
259 goto failure;
260 if (final_p)
261 ipv6_addr_copy(&fl.fl6_dst, final_p);
262
263 err = __xfrm_lookup(sock_net(sk), &dst, &fl, sk, XFRM_LOOKUP_WAIT);
264 if (err < 0) {
265 if (err == -EREMOTE)
266 err = ip6_dst_blackhole(sk, &dst, &fl);
267 if (err < 0)
268 goto failure;
269 }
270
271 if (saddr == NULL) {
272 saddr = &fl.fl6_src;
273 ipv6_addr_copy(&np->rcv_saddr, saddr);
274 }
275
276
277 ipv6_addr_copy(&np->saddr, saddr);
278 inet->inet_rcv_saddr = LOOPBACK4_IPV6;
279
280 sk->sk_gso_type = SKB_GSO_TCPV6;
281 __ip6_dst_store(sk, dst, NULL, NULL);
282
283 icsk->icsk_ext_hdr_len = 0;
284 if (np->opt)
285 icsk->icsk_ext_hdr_len = (np->opt->opt_flen +
286 np->opt->opt_nflen);
287
288 tp->rx_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - sizeof(struct ipv6hdr);
289
290 inet->inet_dport = usin->sin6_port;
291
292 tcp_set_state(sk, TCP_SYN_SENT);
293 err = inet6_hash_connect(&tcp_death_row, sk);
294 if (err)
295 goto late_failure;
296
297 if (!tp->write_seq)
298 tp->write_seq = secure_tcpv6_sequence_number(np->saddr.s6_addr32,
299 np->daddr.s6_addr32,
300 inet->inet_sport,
301 inet->inet_dport);
302
303 err = tcp_connect(sk);
304 if (err)
305 goto late_failure;
306
307 return 0;
308
309late_failure:
310 tcp_set_state(sk, TCP_CLOSE);
311 __sk_dst_reset(sk);
312failure:
313 inet->inet_dport = 0;
314 sk->sk_route_caps = 0;
315 return err;
316}
317
318static void tcp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
319 u8 type, u8 code, int offset, __be32 info)
320{
321 struct ipv6hdr *hdr = (struct ipv6hdr*)skb->data;
322 const struct tcphdr *th = (struct tcphdr *)(skb->data+offset);
323 struct ipv6_pinfo *np;
324 struct sock *sk;
325 int err;
326 struct tcp_sock *tp;
327 __u32 seq;
328 struct net *net = dev_net(skb->dev);
329
330 sk = inet6_lookup(net, &tcp_hashinfo, &hdr->daddr,
331 th->dest, &hdr->saddr, th->source, skb->dev->ifindex);
332
333 if (sk == NULL) {
334 ICMP6_INC_STATS_BH(net, __in6_dev_get(skb->dev),
335 ICMP6_MIB_INERRORS);
336 return;
337 }
338
339 if (sk->sk_state == TCP_TIME_WAIT) {
340 inet_twsk_put(inet_twsk(sk));
341 return;
342 }
343
344 bh_lock_sock(sk);
345 if (sock_owned_by_user(sk))
346 NET_INC_STATS_BH(net, LINUX_MIB_LOCKDROPPEDICMPS);
347
348 if (sk->sk_state == TCP_CLOSE)
349 goto out;
350
351 if (ipv6_hdr(skb)->hop_limit < inet6_sk(sk)->min_hopcount) {
352 NET_INC_STATS_BH(net, LINUX_MIB_TCPMINTTLDROP);
353 goto out;
354 }
355
356 tp = tcp_sk(sk);
357 seq = ntohl(th->seq);
358 if (sk->sk_state != TCP_LISTEN &&
359 !between(seq, tp->snd_una, tp->snd_nxt)) {
360 NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
361 goto out;
362 }
363
364 np = inet6_sk(sk);
365
366 if (type == ICMPV6_PKT_TOOBIG) {
367 struct dst_entry *dst = NULL;
368
369 if (sock_owned_by_user(sk))
370 goto out;
371 if ((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE))
372 goto out;
373
374
375 dst = __sk_dst_check(sk, np->dst_cookie);
376
377 if (dst == NULL) {
378 struct inet_sock *inet = inet_sk(sk);
379 struct flowi fl;
380
381
382
383
384
385 memset(&fl, 0, sizeof(fl));
386 fl.proto = IPPROTO_TCP;
387 ipv6_addr_copy(&fl.fl6_dst, &np->daddr);
388 ipv6_addr_copy(&fl.fl6_src, &np->saddr);
389 fl.oif = sk->sk_bound_dev_if;
390 fl.mark = sk->sk_mark;
391 fl.fl_ip_dport = inet->inet_dport;
392 fl.fl_ip_sport = inet->inet_sport;
393 security_skb_classify_flow(skb, &fl);
394
395 if ((err = ip6_dst_lookup(sk, &dst, &fl))) {
396 sk->sk_err_soft = -err;
397 goto out;
398 }
399
400 if ((err = xfrm_lookup(net, &dst, &fl, sk, 0)) < 0) {
401 sk->sk_err_soft = -err;
402 goto out;
403 }
404
405 } else
406 dst_hold(dst);
407
408 if (inet_csk(sk)->icsk_pmtu_cookie > dst_mtu(dst)) {
409 tcp_sync_mss(sk, dst_mtu(dst));
410 tcp_simple_retransmit(sk);
411 }
412 dst_release(dst);
413 goto out;
414 }
415
416 icmpv6_err_convert(type, code, &err);
417
418
419 switch (sk->sk_state) {
420 struct request_sock *req, **prev;
421 case TCP_LISTEN:
422 if (sock_owned_by_user(sk))
423 goto out;
424
425 req = inet6_csk_search_req(sk, &prev, th->dest, &hdr->daddr,
426 &hdr->saddr, inet6_iif(skb));
427 if (!req)
428 goto out;
429
430
431
432
433 WARN_ON(req->sk != NULL);
434
435 if (seq != tcp_rsk(req)->snt_isn) {
436 NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
437 goto out;
438 }
439
440 inet_csk_reqsk_queue_drop(sk, req, prev);
441 goto out;
442
443 case TCP_SYN_SENT:
444 case TCP_SYN_RECV:
445
446 if (!sock_owned_by_user(sk)) {
447 sk->sk_err = err;
448 sk->sk_error_report(sk);
449
450 tcp_done(sk);
451 } else
452 sk->sk_err_soft = err;
453 goto out;
454 }
455
456 if (!sock_owned_by_user(sk) && np->recverr) {
457 sk->sk_err = err;
458 sk->sk_error_report(sk);
459 } else
460 sk->sk_err_soft = err;
461
462out:
463 bh_unlock_sock(sk);
464 sock_put(sk);
465}
466
467
468static int tcp_v6_send_synack(struct sock *sk, struct request_sock *req,
469 struct request_values *rvp)
470{
471 struct inet6_request_sock *treq = inet6_rsk(req);
472 struct ipv6_pinfo *np = inet6_sk(sk);
473 struct sk_buff * skb;
474 struct ipv6_txoptions *opt = NULL;
475 struct in6_addr * final_p, final;
476 struct flowi fl;
477 struct dst_entry *dst;
478 int err = -1;
479
480 memset(&fl, 0, sizeof(fl));
481 fl.proto = IPPROTO_TCP;
482 ipv6_addr_copy(&fl.fl6_dst, &treq->rmt_addr);
483 ipv6_addr_copy(&fl.fl6_src, &treq->loc_addr);
484 fl.fl6_flowlabel = 0;
485 fl.oif = treq->iif;
486 fl.mark = sk->sk_mark;
487 fl.fl_ip_dport = inet_rsk(req)->rmt_port;
488 fl.fl_ip_sport = inet_rsk(req)->loc_port;
489 security_req_classify_flow(req, &fl);
490
491 opt = np->opt;
492 final_p = fl6_update_dst(&fl, opt, &final);
493
494 err = ip6_dst_lookup(sk, &dst, &fl);
495 if (err)
496 goto done;
497 if (final_p)
498 ipv6_addr_copy(&fl.fl6_dst, final_p);
499 if ((err = xfrm_lookup(sock_net(sk), &dst, &fl, sk, 0)) < 0)
500 goto done;
501
502 skb = tcp_make_synack(sk, dst, req, rvp);
503 if (skb) {
504 __tcp_v6_send_check(skb, &treq->loc_addr, &treq->rmt_addr);
505
506 ipv6_addr_copy(&fl.fl6_dst, &treq->rmt_addr);
507 err = ip6_xmit(sk, skb, &fl, opt);
508 err = net_xmit_eval(err);
509 }
510
511done:
512 if (opt && opt != np->opt)
513 sock_kfree_s(sk, opt, opt->tot_len);
514 dst_release(dst);
515 return err;
516}
517
518static int tcp_v6_rtx_synack(struct sock *sk, struct request_sock *req,
519 struct request_values *rvp)
520{
521 TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_RETRANSSEGS);
522 return tcp_v6_send_synack(sk, req, rvp);
523}
524
525static inline void syn_flood_warning(struct sk_buff *skb)
526{
527#ifdef CONFIG_SYN_COOKIES
528 if (sysctl_tcp_syncookies)
529 printk(KERN_INFO
530 "TCPv6: Possible SYN flooding on port %d. "
531 "Sending cookies.\n", ntohs(tcp_hdr(skb)->dest));
532 else
533#endif
534 printk(KERN_INFO
535 "TCPv6: Possible SYN flooding on port %d. "
536 "Dropping request.\n", ntohs(tcp_hdr(skb)->dest));
537}
538
539static void tcp_v6_reqsk_destructor(struct request_sock *req)
540{
541 kfree_skb(inet6_rsk(req)->pktopts);
542}
543
544#ifdef CONFIG_TCP_MD5SIG
545static struct tcp_md5sig_key *tcp_v6_md5_do_lookup(struct sock *sk,
546 struct in6_addr *addr)
547{
548 struct tcp_sock *tp = tcp_sk(sk);
549 int i;
550
551 BUG_ON(tp == NULL);
552
553 if (!tp->md5sig_info || !tp->md5sig_info->entries6)
554 return NULL;
555
556 for (i = 0; i < tp->md5sig_info->entries6; i++) {
557 if (ipv6_addr_equal(&tp->md5sig_info->keys6[i].addr, addr))
558 return &tp->md5sig_info->keys6[i].base;
559 }
560 return NULL;
561}
562
563static struct tcp_md5sig_key *tcp_v6_md5_lookup(struct sock *sk,
564 struct sock *addr_sk)
565{
566 return tcp_v6_md5_do_lookup(sk, &inet6_sk(addr_sk)->daddr);
567}
568
569static struct tcp_md5sig_key *tcp_v6_reqsk_md5_lookup(struct sock *sk,
570 struct request_sock *req)
571{
572 return tcp_v6_md5_do_lookup(sk, &inet6_rsk(req)->rmt_addr);
573}
574
575static int tcp_v6_md5_do_add(struct sock *sk, struct in6_addr *peer,
576 char *newkey, u8 newkeylen)
577{
578
579 struct tcp_md5sig_key *key;
580 struct tcp_sock *tp = tcp_sk(sk);
581 struct tcp6_md5sig_key *keys;
582
583 key = tcp_v6_md5_do_lookup(sk, peer);
584 if (key) {
585
586 kfree(key->key);
587 key->key = newkey;
588 key->keylen = newkeylen;
589 } else {
590
591 if (!tp->md5sig_info) {
592 tp->md5sig_info = kzalloc(sizeof(*tp->md5sig_info), GFP_ATOMIC);
593 if (!tp->md5sig_info) {
594 kfree(newkey);
595 return -ENOMEM;
596 }
597 sk_nocaps_add(sk, NETIF_F_GSO_MASK);
598 }
599 if (tcp_alloc_md5sig_pool(sk) == NULL) {
600 kfree(newkey);
601 return -ENOMEM;
602 }
603 if (tp->md5sig_info->alloced6 == tp->md5sig_info->entries6) {
604 keys = kmalloc((sizeof (tp->md5sig_info->keys6[0]) *
605 (tp->md5sig_info->entries6 + 1)), GFP_ATOMIC);
606
607 if (!keys) {
608 tcp_free_md5sig_pool();
609 kfree(newkey);
610 return -ENOMEM;
611 }
612
613 if (tp->md5sig_info->entries6)
614 memmove(keys, tp->md5sig_info->keys6,
615 (sizeof (tp->md5sig_info->keys6[0]) *
616 tp->md5sig_info->entries6));
617
618 kfree(tp->md5sig_info->keys6);
619 tp->md5sig_info->keys6 = keys;
620 tp->md5sig_info->alloced6++;
621 }
622
623 ipv6_addr_copy(&tp->md5sig_info->keys6[tp->md5sig_info->entries6].addr,
624 peer);
625 tp->md5sig_info->keys6[tp->md5sig_info->entries6].base.key = newkey;
626 tp->md5sig_info->keys6[tp->md5sig_info->entries6].base.keylen = newkeylen;
627
628 tp->md5sig_info->entries6++;
629 }
630 return 0;
631}
632
633static int tcp_v6_md5_add_func(struct sock *sk, struct sock *addr_sk,
634 u8 *newkey, __u8 newkeylen)
635{
636 return tcp_v6_md5_do_add(sk, &inet6_sk(addr_sk)->daddr,
637 newkey, newkeylen);
638}
639
640static int tcp_v6_md5_do_del(struct sock *sk, struct in6_addr *peer)
641{
642 struct tcp_sock *tp = tcp_sk(sk);
643 int i;
644
645 for (i = 0; i < tp->md5sig_info->entries6; i++) {
646 if (ipv6_addr_equal(&tp->md5sig_info->keys6[i].addr, peer)) {
647
648 kfree(tp->md5sig_info->keys6[i].base.key);
649 tp->md5sig_info->entries6--;
650
651 if (tp->md5sig_info->entries6 == 0) {
652 kfree(tp->md5sig_info->keys6);
653 tp->md5sig_info->keys6 = NULL;
654 tp->md5sig_info->alloced6 = 0;
655 } else {
656
657 if (tp->md5sig_info->entries6 != i)
658 memmove(&tp->md5sig_info->keys6[i],
659 &tp->md5sig_info->keys6[i+1],
660 (tp->md5sig_info->entries6 - i)
661 * sizeof (tp->md5sig_info->keys6[0]));
662 }
663 tcp_free_md5sig_pool();
664 return 0;
665 }
666 }
667 return -ENOENT;
668}
669
670static void tcp_v6_clear_md5_list (struct sock *sk)
671{
672 struct tcp_sock *tp = tcp_sk(sk);
673 int i;
674
675 if (tp->md5sig_info->entries6) {
676 for (i = 0; i < tp->md5sig_info->entries6; i++)
677 kfree(tp->md5sig_info->keys6[i].base.key);
678 tp->md5sig_info->entries6 = 0;
679 tcp_free_md5sig_pool();
680 }
681
682 kfree(tp->md5sig_info->keys6);
683 tp->md5sig_info->keys6 = NULL;
684 tp->md5sig_info->alloced6 = 0;
685
686 if (tp->md5sig_info->entries4) {
687 for (i = 0; i < tp->md5sig_info->entries4; i++)
688 kfree(tp->md5sig_info->keys4[i].base.key);
689 tp->md5sig_info->entries4 = 0;
690 tcp_free_md5sig_pool();
691 }
692
693 kfree(tp->md5sig_info->keys4);
694 tp->md5sig_info->keys4 = NULL;
695 tp->md5sig_info->alloced4 = 0;
696}
697
698static int tcp_v6_parse_md5_keys (struct sock *sk, char __user *optval,
699 int optlen)
700{
701 struct tcp_md5sig cmd;
702 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)&cmd.tcpm_addr;
703 u8 *newkey;
704
705 if (optlen < sizeof(cmd))
706 return -EINVAL;
707
708 if (copy_from_user(&cmd, optval, sizeof(cmd)))
709 return -EFAULT;
710
711 if (sin6->sin6_family != AF_INET6)
712 return -EINVAL;
713
714 if (!cmd.tcpm_keylen) {
715 if (!tcp_sk(sk)->md5sig_info)
716 return -ENOENT;
717 if (ipv6_addr_v4mapped(&sin6->sin6_addr))
718 return tcp_v4_md5_do_del(sk, sin6->sin6_addr.s6_addr32[3]);
719 return tcp_v6_md5_do_del(sk, &sin6->sin6_addr);
720 }
721
722 if (cmd.tcpm_keylen > TCP_MD5SIG_MAXKEYLEN)
723 return -EINVAL;
724
725 if (!tcp_sk(sk)->md5sig_info) {
726 struct tcp_sock *tp = tcp_sk(sk);
727 struct tcp_md5sig_info *p;
728
729 p = kzalloc(sizeof(struct tcp_md5sig_info), GFP_KERNEL);
730 if (!p)
731 return -ENOMEM;
732
733 tp->md5sig_info = p;
734 sk_nocaps_add(sk, NETIF_F_GSO_MASK);
735 }
736
737 newkey = kmemdup(cmd.tcpm_key, cmd.tcpm_keylen, GFP_KERNEL);
738 if (!newkey)
739 return -ENOMEM;
740 if (ipv6_addr_v4mapped(&sin6->sin6_addr)) {
741 return tcp_v4_md5_do_add(sk, sin6->sin6_addr.s6_addr32[3],
742 newkey, cmd.tcpm_keylen);
743 }
744 return tcp_v6_md5_do_add(sk, &sin6->sin6_addr, newkey, cmd.tcpm_keylen);
745}
746
747static int tcp_v6_md5_hash_pseudoheader(struct tcp_md5sig_pool *hp,
748 struct in6_addr *daddr,
749 struct in6_addr *saddr, int nbytes)
750{
751 struct tcp6_pseudohdr *bp;
752 struct scatterlist sg;
753
754 bp = &hp->md5_blk.ip6;
755
756 ipv6_addr_copy(&bp->saddr, saddr);
757 ipv6_addr_copy(&bp->daddr, daddr);
758 bp->protocol = cpu_to_be32(IPPROTO_TCP);
759 bp->len = cpu_to_be32(nbytes);
760
761 sg_init_one(&sg, bp, sizeof(*bp));
762 return crypto_hash_update(&hp->md5_desc, &sg, sizeof(*bp));
763}
764
765static int tcp_v6_md5_hash_hdr(char *md5_hash, struct tcp_md5sig_key *key,
766 struct in6_addr *daddr, struct in6_addr *saddr,
767 struct tcphdr *th)
768{
769 struct tcp_md5sig_pool *hp;
770 struct hash_desc *desc;
771
772 hp = tcp_get_md5sig_pool();
773 if (!hp)
774 goto clear_hash_noput;
775 desc = &hp->md5_desc;
776
777 if (crypto_hash_init(desc))
778 goto clear_hash;
779 if (tcp_v6_md5_hash_pseudoheader(hp, daddr, saddr, th->doff << 2))
780 goto clear_hash;
781 if (tcp_md5_hash_header(hp, th))
782 goto clear_hash;
783 if (tcp_md5_hash_key(hp, key))
784 goto clear_hash;
785 if (crypto_hash_final(desc, md5_hash))
786 goto clear_hash;
787
788 tcp_put_md5sig_pool();
789 return 0;
790
791clear_hash:
792 tcp_put_md5sig_pool();
793clear_hash_noput:
794 memset(md5_hash, 0, 16);
795 return 1;
796}
797
798static int tcp_v6_md5_hash_skb(char *md5_hash, struct tcp_md5sig_key *key,
799 struct sock *sk, struct request_sock *req,
800 struct sk_buff *skb)
801{
802 struct in6_addr *saddr, *daddr;
803 struct tcp_md5sig_pool *hp;
804 struct hash_desc *desc;
805 struct tcphdr *th = tcp_hdr(skb);
806
807 if (sk) {
808 saddr = &inet6_sk(sk)->saddr;
809 daddr = &inet6_sk(sk)->daddr;
810 } else if (req) {
811 saddr = &inet6_rsk(req)->loc_addr;
812 daddr = &inet6_rsk(req)->rmt_addr;
813 } else {
814 struct ipv6hdr *ip6h = ipv6_hdr(skb);
815 saddr = &ip6h->saddr;
816 daddr = &ip6h->daddr;
817 }
818
819 hp = tcp_get_md5sig_pool();
820 if (!hp)
821 goto clear_hash_noput;
822 desc = &hp->md5_desc;
823
824 if (crypto_hash_init(desc))
825 goto clear_hash;
826
827 if (tcp_v6_md5_hash_pseudoheader(hp, daddr, saddr, skb->len))
828 goto clear_hash;
829 if (tcp_md5_hash_header(hp, th))
830 goto clear_hash;
831 if (tcp_md5_hash_skb_data(hp, skb, th->doff << 2))
832 goto clear_hash;
833 if (tcp_md5_hash_key(hp, key))
834 goto clear_hash;
835 if (crypto_hash_final(desc, md5_hash))
836 goto clear_hash;
837
838 tcp_put_md5sig_pool();
839 return 0;
840
841clear_hash:
842 tcp_put_md5sig_pool();
843clear_hash_noput:
844 memset(md5_hash, 0, 16);
845 return 1;
846}
847
848static int tcp_v6_inbound_md5_hash (struct sock *sk, struct sk_buff *skb)
849{
850 __u8 *hash_location = NULL;
851 struct tcp_md5sig_key *hash_expected;
852 struct ipv6hdr *ip6h = ipv6_hdr(skb);
853 struct tcphdr *th = tcp_hdr(skb);
854 int genhash;
855 u8 newhash[16];
856
857 hash_expected = tcp_v6_md5_do_lookup(sk, &ip6h->saddr);
858 hash_location = tcp_parse_md5sig_option(th);
859
860
861 if (!hash_expected && !hash_location)
862 return 0;
863
864 if (hash_expected && !hash_location) {
865 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPMD5NOTFOUND);
866 return 1;
867 }
868
869 if (!hash_expected && hash_location) {
870 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPMD5UNEXPECTED);
871 return 1;
872 }
873
874
875 genhash = tcp_v6_md5_hash_skb(newhash,
876 hash_expected,
877 NULL, NULL, skb);
878
879 if (genhash || memcmp(hash_location, newhash, 16) != 0) {
880 if (net_ratelimit()) {
881 printk(KERN_INFO "MD5 Hash %s for [%pI6c]:%u->[%pI6c]:%u\n",
882 genhash ? "failed" : "mismatch",
883 &ip6h->saddr, ntohs(th->source),
884 &ip6h->daddr, ntohs(th->dest));
885 }
886 return 1;
887 }
888 return 0;
889}
890#endif
891
892struct request_sock_ops tcp6_request_sock_ops __read_mostly = {
893 .family = AF_INET6,
894 .obj_size = sizeof(struct tcp6_request_sock),
895 .rtx_syn_ack = tcp_v6_rtx_synack,
896 .send_ack = tcp_v6_reqsk_send_ack,
897 .destructor = tcp_v6_reqsk_destructor,
898 .send_reset = tcp_v6_send_reset,
899 .syn_ack_timeout = tcp_syn_ack_timeout,
900};
901
902#ifdef CONFIG_TCP_MD5SIG
903static const struct tcp_request_sock_ops tcp_request_sock_ipv6_ops = {
904 .md5_lookup = tcp_v6_reqsk_md5_lookup,
905 .calc_md5_hash = tcp_v6_md5_hash_skb,
906};
907#endif
908
909static struct timewait_sock_ops tcp6_timewait_sock_ops = {
910 .twsk_obj_size = sizeof(struct tcp6_timewait_sock),
911 .twsk_unique = tcp_twsk_unique,
912 .twsk_destructor= tcp_twsk_destructor,
913};
914
915static void __tcp_v6_send_check(struct sk_buff *skb,
916 struct in6_addr *saddr, struct in6_addr *daddr)
917{
918 struct tcphdr *th = tcp_hdr(skb);
919
920 if (skb->ip_summed == CHECKSUM_PARTIAL) {
921 th->check = ~tcp_v6_check(skb->len, saddr, daddr, 0);
922 skb->csum_start = skb_transport_header(skb) - skb->head;
923 skb->csum_offset = offsetof(struct tcphdr, check);
924 } else {
925 th->check = tcp_v6_check(skb->len, saddr, daddr,
926 csum_partial(th, th->doff << 2,
927 skb->csum));
928 }
929}
930
931static void tcp_v6_send_check(struct sock *sk, struct sk_buff *skb)
932{
933 struct ipv6_pinfo *np = inet6_sk(sk);
934
935 __tcp_v6_send_check(skb, &np->saddr, &np->daddr);
936}
937
938static int tcp_v6_gso_send_check(struct sk_buff *skb)
939{
940 struct ipv6hdr *ipv6h;
941 struct tcphdr *th;
942
943 if (!pskb_may_pull(skb, sizeof(*th)))
944 return -EINVAL;
945
946 ipv6h = ipv6_hdr(skb);
947 th = tcp_hdr(skb);
948
949 th->check = 0;
950 skb->ip_summed = CHECKSUM_PARTIAL;
951 __tcp_v6_send_check(skb, &ipv6h->saddr, &ipv6h->daddr);
952 return 0;
953}
954
955static struct sk_buff **tcp6_gro_receive(struct sk_buff **head,
956 struct sk_buff *skb)
957{
958 struct ipv6hdr *iph = skb_gro_network_header(skb);
959
960 switch (skb->ip_summed) {
961 case CHECKSUM_COMPLETE:
962 if (!tcp_v6_check(skb_gro_len(skb), &iph->saddr, &iph->daddr,
963 skb->csum)) {
964 skb->ip_summed = CHECKSUM_UNNECESSARY;
965 break;
966 }
967
968
969 case CHECKSUM_NONE:
970 NAPI_GRO_CB(skb)->flush = 1;
971 return NULL;
972 }
973
974 return tcp_gro_receive(head, skb);
975}
976
977static int tcp6_gro_complete(struct sk_buff *skb)
978{
979 struct ipv6hdr *iph = ipv6_hdr(skb);
980 struct tcphdr *th = tcp_hdr(skb);
981
982 th->check = ~tcp_v6_check(skb->len - skb_transport_offset(skb),
983 &iph->saddr, &iph->daddr, 0);
984 skb_shinfo(skb)->gso_type = SKB_GSO_TCPV6;
985
986 return tcp_gro_complete(skb);
987}
988
989static void tcp_v6_send_response(struct sk_buff *skb, u32 seq, u32 ack, u32 win,
990 u32 ts, struct tcp_md5sig_key *key, int rst)
991{
992 struct tcphdr *th = tcp_hdr(skb), *t1;
993 struct sk_buff *buff;
994 struct flowi fl;
995 struct net *net = dev_net(skb_dst(skb)->dev);
996 struct sock *ctl_sk = net->ipv6.tcp_sk;
997 unsigned int tot_len = sizeof(struct tcphdr);
998 struct dst_entry *dst;
999 __be32 *topt;
1000
1001 if (ts)
1002 tot_len += TCPOLEN_TSTAMP_ALIGNED;
1003#ifdef CONFIG_TCP_MD5SIG
1004 if (key)
1005 tot_len += TCPOLEN_MD5SIG_ALIGNED;
1006#endif
1007
1008 buff = alloc_skb(MAX_HEADER + sizeof(struct ipv6hdr) + tot_len,
1009 GFP_ATOMIC);
1010 if (buff == NULL)
1011 return;
1012
1013 skb_reserve(buff, MAX_HEADER + sizeof(struct ipv6hdr) + tot_len);
1014
1015 t1 = (struct tcphdr *) skb_push(buff, tot_len);
1016 skb_reset_transport_header(buff);
1017
1018
1019 memset(t1, 0, sizeof(*t1));
1020 t1->dest = th->source;
1021 t1->source = th->dest;
1022 t1->doff = tot_len / 4;
1023 t1->seq = htonl(seq);
1024 t1->ack_seq = htonl(ack);
1025 t1->ack = !rst || !th->ack;
1026 t1->rst = rst;
1027 t1->window = htons(win);
1028
1029 topt = (__be32 *)(t1 + 1);
1030
1031 if (ts) {
1032 *topt++ = htonl((TCPOPT_NOP << 24) | (TCPOPT_NOP << 16) |
1033 (TCPOPT_TIMESTAMP << 8) | TCPOLEN_TIMESTAMP);
1034 *topt++ = htonl(tcp_time_stamp);
1035 *topt++ = htonl(ts);
1036 }
1037
1038#ifdef CONFIG_TCP_MD5SIG
1039 if (key) {
1040 *topt++ = htonl((TCPOPT_NOP << 24) | (TCPOPT_NOP << 16) |
1041 (TCPOPT_MD5SIG << 8) | TCPOLEN_MD5SIG);
1042 tcp_v6_md5_hash_hdr((__u8 *)topt, key,
1043 &ipv6_hdr(skb)->saddr,
1044 &ipv6_hdr(skb)->daddr, t1);
1045 }
1046#endif
1047
1048 memset(&fl, 0, sizeof(fl));
1049 ipv6_addr_copy(&fl.fl6_dst, &ipv6_hdr(skb)->saddr);
1050 ipv6_addr_copy(&fl.fl6_src, &ipv6_hdr(skb)->daddr);
1051
1052 buff->ip_summed = CHECKSUM_PARTIAL;
1053 buff->csum = 0;
1054
1055 __tcp_v6_send_check(buff, &fl.fl6_src, &fl.fl6_dst);
1056
1057 fl.proto = IPPROTO_TCP;
1058 fl.oif = inet6_iif(skb);
1059 fl.fl_ip_dport = t1->dest;
1060 fl.fl_ip_sport = t1->source;
1061 security_skb_classify_flow(skb, &fl);
1062
1063
1064
1065
1066
1067 if (!ip6_dst_lookup(ctl_sk, &dst, &fl)) {
1068 if (xfrm_lookup(net, &dst, &fl, NULL, 0) >= 0) {
1069 skb_dst_set(buff, dst);
1070 ip6_xmit(ctl_sk, buff, &fl, NULL);
1071 TCP_INC_STATS_BH(net, TCP_MIB_OUTSEGS);
1072 if (rst)
1073 TCP_INC_STATS_BH(net, TCP_MIB_OUTRSTS);
1074 return;
1075 }
1076 }
1077
1078 kfree_skb(buff);
1079}
1080
1081static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb)
1082{
1083 struct tcphdr *th = tcp_hdr(skb);
1084 u32 seq = 0, ack_seq = 0;
1085 struct tcp_md5sig_key *key = NULL;
1086
1087 if (th->rst)
1088 return;
1089
1090 if (!ipv6_unicast_destination(skb))
1091 return;
1092
1093#ifdef CONFIG_TCP_MD5SIG
1094 if (sk)
1095 key = tcp_v6_md5_do_lookup(sk, &ipv6_hdr(skb)->daddr);
1096#endif
1097
1098 if (th->ack)
1099 seq = ntohl(th->ack_seq);
1100 else
1101 ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len -
1102 (th->doff << 2);
1103
1104 tcp_v6_send_response(skb, seq, ack_seq, 0, 0, key, 1);
1105}
1106
1107static void tcp_v6_send_ack(struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 ts,
1108 struct tcp_md5sig_key *key)
1109{
1110 tcp_v6_send_response(skb, seq, ack, win, ts, key, 0);
1111}
1112
1113static void tcp_v6_timewait_ack(struct sock *sk, struct sk_buff *skb)
1114{
1115 struct inet_timewait_sock *tw = inet_twsk(sk);
1116 struct tcp_timewait_sock *tcptw = tcp_twsk(sk);
1117
1118 tcp_v6_send_ack(skb, tcptw->tw_snd_nxt, tcptw->tw_rcv_nxt,
1119 tcptw->tw_rcv_wnd >> tw->tw_rcv_wscale,
1120 tcptw->tw_ts_recent, tcp_twsk_md5_key(tcptw));
1121
1122 inet_twsk_put(tw);
1123}
1124
1125static void tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb,
1126 struct request_sock *req)
1127{
1128 tcp_v6_send_ack(skb, tcp_rsk(req)->snt_isn + 1, tcp_rsk(req)->rcv_isn + 1, req->rcv_wnd, req->ts_recent,
1129 tcp_v6_md5_do_lookup(sk, &ipv6_hdr(skb)->daddr));
1130}
1131
1132
1133static struct sock *tcp_v6_hnd_req(struct sock *sk,struct sk_buff *skb)
1134{
1135 struct request_sock *req, **prev;
1136 const struct tcphdr *th = tcp_hdr(skb);
1137 struct sock *nsk;
1138
1139
1140 req = inet6_csk_search_req(sk, &prev, th->source,
1141 &ipv6_hdr(skb)->saddr,
1142 &ipv6_hdr(skb)->daddr, inet6_iif(skb));
1143 if (req)
1144 return tcp_check_req(sk, skb, req, prev);
1145
1146 nsk = __inet6_lookup_established(sock_net(sk), &tcp_hashinfo,
1147 &ipv6_hdr(skb)->saddr, th->source,
1148 &ipv6_hdr(skb)->daddr, ntohs(th->dest), inet6_iif(skb));
1149
1150 if (nsk) {
1151 if (nsk->sk_state != TCP_TIME_WAIT) {
1152 bh_lock_sock(nsk);
1153 return nsk;
1154 }
1155 inet_twsk_put(inet_twsk(nsk));
1156 return NULL;
1157 }
1158
1159#ifdef CONFIG_SYN_COOKIES
1160 if (!th->syn)
1161 sk = cookie_v6_check(sk, skb);
1162#endif
1163 return sk;
1164}
1165
1166
1167
1168
1169static int tcp_v6_conn_request(struct sock *sk, struct sk_buff *skb)
1170{
1171 struct tcp_extend_values tmp_ext;
1172 struct tcp_options_received tmp_opt;
1173 u8 *hash_location;
1174 struct request_sock *req;
1175 struct inet6_request_sock *treq;
1176 struct ipv6_pinfo *np = inet6_sk(sk);
1177 struct tcp_sock *tp = tcp_sk(sk);
1178 __u32 isn = TCP_SKB_CB(skb)->when;
1179#ifdef CONFIG_SYN_COOKIES
1180 int want_cookie = 0;
1181#else
1182#define want_cookie 0
1183#endif
1184
1185 if (skb->protocol == htons(ETH_P_IP))
1186 return tcp_v4_conn_request(sk, skb);
1187
1188 if (!ipv6_unicast_destination(skb))
1189 goto drop;
1190
1191 if (inet_csk_reqsk_queue_is_full(sk) && !isn) {
1192 if (net_ratelimit())
1193 syn_flood_warning(skb);
1194#ifdef CONFIG_SYN_COOKIES
1195 if (sysctl_tcp_syncookies)
1196 want_cookie = 1;
1197 else
1198#endif
1199 goto drop;
1200 }
1201
1202 if (sk_acceptq_is_full(sk) && inet_csk_reqsk_queue_young(sk) > 1)
1203 goto drop;
1204
1205 req = inet6_reqsk_alloc(&tcp6_request_sock_ops);
1206 if (req == NULL)
1207 goto drop;
1208
1209#ifdef CONFIG_TCP_MD5SIG
1210 tcp_rsk(req)->af_specific = &tcp_request_sock_ipv6_ops;
1211#endif
1212
1213 tcp_clear_options(&tmp_opt);
1214 tmp_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - sizeof(struct ipv6hdr);
1215 tmp_opt.user_mss = tp->rx_opt.user_mss;
1216 tcp_parse_options(skb, &tmp_opt, &hash_location, 0);
1217
1218 if (tmp_opt.cookie_plus > 0 &&
1219 tmp_opt.saw_tstamp &&
1220 !tp->rx_opt.cookie_out_never &&
1221 (sysctl_tcp_cookie_size > 0 ||
1222 (tp->cookie_values != NULL &&
1223 tp->cookie_values->cookie_desired > 0))) {
1224 u8 *c;
1225 u32 *d;
1226 u32 *mess = &tmp_ext.cookie_bakery[COOKIE_DIGEST_WORDS];
1227 int l = tmp_opt.cookie_plus - TCPOLEN_COOKIE_BASE;
1228
1229 if (tcp_cookie_generator(&tmp_ext.cookie_bakery[0]) != 0)
1230 goto drop_and_free;
1231
1232
1233 d = (__force u32 *)&ipv6_hdr(skb)->daddr.s6_addr32[0];
1234 *mess++ ^= *d++;
1235 *mess++ ^= *d++;
1236 *mess++ ^= *d++;
1237 *mess++ ^= *d++;
1238 d = (__force u32 *)&ipv6_hdr(skb)->saddr.s6_addr32[0];
1239 *mess++ ^= *d++;
1240 *mess++ ^= *d++;
1241 *mess++ ^= *d++;
1242 *mess++ ^= *d++;
1243
1244
1245 c = (u8 *)mess;
1246 while (l-- > 0)
1247 *c++ ^= *hash_location++;
1248
1249#ifdef CONFIG_SYN_COOKIES
1250 want_cookie = 0;
1251#endif
1252 tmp_ext.cookie_out_never = 0;
1253 tmp_ext.cookie_plus = tmp_opt.cookie_plus;
1254 } else if (!tp->rx_opt.cookie_in_always) {
1255
1256 tmp_ext.cookie_out_never = 1;
1257 tmp_ext.cookie_plus = 0;
1258 } else {
1259 goto drop_and_free;
1260 }
1261 tmp_ext.cookie_in_always = tp->rx_opt.cookie_in_always;
1262
1263 if (want_cookie && !tmp_opt.saw_tstamp)
1264 tcp_clear_options(&tmp_opt);
1265
1266 tmp_opt.tstamp_ok = tmp_opt.saw_tstamp;
1267 tcp_openreq_init(req, &tmp_opt, skb);
1268
1269 treq = inet6_rsk(req);
1270 ipv6_addr_copy(&treq->rmt_addr, &ipv6_hdr(skb)->saddr);
1271 ipv6_addr_copy(&treq->loc_addr, &ipv6_hdr(skb)->daddr);
1272 if (!want_cookie || tmp_opt.tstamp_ok)
1273 TCP_ECN_create_request(req, tcp_hdr(skb));
1274
1275 if (!isn) {
1276 if (ipv6_opt_accepted(sk, skb) ||
1277 np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo ||
1278 np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim) {
1279 atomic_inc(&skb->users);
1280 treq->pktopts = skb;
1281 }
1282 treq->iif = sk->sk_bound_dev_if;
1283
1284
1285 if (!sk->sk_bound_dev_if &&
1286 ipv6_addr_type(&treq->rmt_addr) & IPV6_ADDR_LINKLOCAL)
1287 treq->iif = inet6_iif(skb);
1288 if (!want_cookie) {
1289 isn = tcp_v6_init_sequence(skb);
1290 } else {
1291 isn = cookie_v6_init_sequence(sk, skb, &req->mss);
1292 req->cookie_ts = tmp_opt.tstamp_ok;
1293 }
1294 }
1295 tcp_rsk(req)->snt_isn = isn;
1296
1297 security_inet_conn_request(sk, skb, req);
1298
1299 if (tcp_v6_send_synack(sk, req,
1300 (struct request_values *)&tmp_ext) ||
1301 want_cookie)
1302 goto drop_and_free;
1303
1304 inet6_csk_reqsk_queue_hash_add(sk, req, TCP_TIMEOUT_INIT);
1305 return 0;
1306
1307drop_and_free:
1308 reqsk_free(req);
1309drop:
1310 return 0;
1311}
1312
1313static struct sock * tcp_v6_syn_recv_sock(struct sock *sk, struct sk_buff *skb,
1314 struct request_sock *req,
1315 struct dst_entry *dst)
1316{
1317 struct inet6_request_sock *treq;
1318 struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
1319 struct tcp6_sock *newtcp6sk;
1320 struct inet_sock *newinet;
1321 struct tcp_sock *newtp;
1322 struct sock *newsk;
1323 struct ipv6_txoptions *opt;
1324#ifdef CONFIG_TCP_MD5SIG
1325 struct tcp_md5sig_key *key;
1326#endif
1327
1328 if (skb->protocol == htons(ETH_P_IP)) {
1329
1330
1331
1332
1333 newsk = tcp_v4_syn_recv_sock(sk, skb, req, dst);
1334
1335 if (newsk == NULL)
1336 return NULL;
1337
1338 newtcp6sk = (struct tcp6_sock *)newsk;
1339 inet_sk(newsk)->pinet6 = &newtcp6sk->inet6;
1340
1341 newinet = inet_sk(newsk);
1342 newnp = inet6_sk(newsk);
1343 newtp = tcp_sk(newsk);
1344
1345 memcpy(newnp, np, sizeof(struct ipv6_pinfo));
1346
1347 ipv6_addr_set_v4mapped(newinet->inet_daddr, &newnp->daddr);
1348
1349 ipv6_addr_set_v4mapped(newinet->inet_saddr, &newnp->saddr);
1350
1351 ipv6_addr_copy(&newnp->rcv_saddr, &newnp->saddr);
1352
1353 inet_csk(newsk)->icsk_af_ops = &ipv6_mapped;
1354 newsk->sk_backlog_rcv = tcp_v4_do_rcv;
1355#ifdef CONFIG_TCP_MD5SIG
1356 newtp->af_specific = &tcp_sock_ipv6_mapped_specific;
1357#endif
1358
1359 newnp->pktoptions = NULL;
1360 newnp->opt = NULL;
1361 newnp->mcast_oif = inet6_iif(skb);
1362 newnp->mcast_hops = ipv6_hdr(skb)->hop_limit;
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374 tcp_sync_mss(newsk, inet_csk(newsk)->icsk_pmtu_cookie);
1375
1376 return newsk;
1377 }
1378
1379 treq = inet6_rsk(req);
1380 opt = np->opt;
1381
1382 if (sk_acceptq_is_full(sk))
1383 goto out_overflow;
1384
1385 if (dst == NULL) {
1386 struct in6_addr *final_p, final;
1387 struct flowi fl;
1388
1389 memset(&fl, 0, sizeof(fl));
1390 fl.proto = IPPROTO_TCP;
1391 ipv6_addr_copy(&fl.fl6_dst, &treq->rmt_addr);
1392 final_p = fl6_update_dst(&fl, opt, &final);
1393 ipv6_addr_copy(&fl.fl6_src, &treq->loc_addr);
1394 fl.oif = sk->sk_bound_dev_if;
1395 fl.mark = sk->sk_mark;
1396 fl.fl_ip_dport = inet_rsk(req)->rmt_port;
1397 fl.fl_ip_sport = inet_rsk(req)->loc_port;
1398 security_req_classify_flow(req, &fl);
1399
1400 if (ip6_dst_lookup(sk, &dst, &fl))
1401 goto out;
1402
1403 if (final_p)
1404 ipv6_addr_copy(&fl.fl6_dst, final_p);
1405
1406 if ((xfrm_lookup(sock_net(sk), &dst, &fl, sk, 0)) < 0)
1407 goto out;
1408 }
1409
1410 newsk = tcp_create_openreq_child(sk, req, skb);
1411 if (newsk == NULL)
1412 goto out_nonewsk;
1413
1414
1415
1416
1417
1418
1419
1420 newsk->sk_gso_type = SKB_GSO_TCPV6;
1421 __ip6_dst_store(newsk, dst, NULL, NULL);
1422
1423 newtcp6sk = (struct tcp6_sock *)newsk;
1424 inet_sk(newsk)->pinet6 = &newtcp6sk->inet6;
1425
1426 newtp = tcp_sk(newsk);
1427 newinet = inet_sk(newsk);
1428 newnp = inet6_sk(newsk);
1429
1430 memcpy(newnp, np, sizeof(struct ipv6_pinfo));
1431
1432 ipv6_addr_copy(&newnp->daddr, &treq->rmt_addr);
1433 ipv6_addr_copy(&newnp->saddr, &treq->loc_addr);
1434 ipv6_addr_copy(&newnp->rcv_saddr, &treq->loc_addr);
1435 newsk->sk_bound_dev_if = treq->iif;
1436
1437
1438
1439
1440
1441 newinet->opt = NULL;
1442 newnp->ipv6_fl_list = NULL;
1443
1444
1445 newnp->rxopt.all = np->rxopt.all;
1446
1447
1448 newnp->pktoptions = NULL;
1449 if (treq->pktopts != NULL) {
1450 newnp->pktoptions = skb_clone(treq->pktopts, GFP_ATOMIC);
1451 kfree_skb(treq->pktopts);
1452 treq->pktopts = NULL;
1453 if (newnp->pktoptions)
1454 skb_set_owner_r(newnp->pktoptions, newsk);
1455 }
1456 newnp->opt = NULL;
1457 newnp->mcast_oif = inet6_iif(skb);
1458 newnp->mcast_hops = ipv6_hdr(skb)->hop_limit;
1459
1460
1461
1462
1463
1464
1465
1466 if (opt) {
1467 newnp->opt = ipv6_dup_options(newsk, opt);
1468 if (opt != np->opt)
1469 sock_kfree_s(sk, opt, opt->tot_len);
1470 }
1471
1472 inet_csk(newsk)->icsk_ext_hdr_len = 0;
1473 if (newnp->opt)
1474 inet_csk(newsk)->icsk_ext_hdr_len = (newnp->opt->opt_nflen +
1475 newnp->opt->opt_flen);
1476
1477 tcp_mtup_init(newsk);
1478 tcp_sync_mss(newsk, dst_mtu(dst));
1479 newtp->advmss = dst_metric(dst, RTAX_ADVMSS);
1480 tcp_initialize_rcv_mss(newsk);
1481
1482 newinet->inet_daddr = newinet->inet_saddr = LOOPBACK4_IPV6;
1483 newinet->inet_rcv_saddr = LOOPBACK4_IPV6;
1484
1485#ifdef CONFIG_TCP_MD5SIG
1486
1487 if ((key = tcp_v6_md5_do_lookup(sk, &newnp->daddr)) != NULL) {
1488
1489
1490
1491
1492
1493 char *newkey = kmemdup(key->key, key->keylen, GFP_ATOMIC);
1494 if (newkey != NULL)
1495 tcp_v6_md5_do_add(newsk, &newnp->daddr,
1496 newkey, key->keylen);
1497 }
1498#endif
1499
1500 if (__inet_inherit_port(sk, newsk) < 0) {
1501 sock_put(newsk);
1502 goto out;
1503 }
1504 __inet6_hash(newsk, NULL);
1505
1506 return newsk;
1507
1508out_overflow:
1509 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS);
1510out_nonewsk:
1511 if (opt && opt != np->opt)
1512 sock_kfree_s(sk, opt, opt->tot_len);
1513 dst_release(dst);
1514out:
1515 NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENDROPS);
1516 return NULL;
1517}
1518
1519static __sum16 tcp_v6_checksum_init(struct sk_buff *skb)
1520{
1521 if (skb->ip_summed == CHECKSUM_COMPLETE) {
1522 if (!tcp_v6_check(skb->len, &ipv6_hdr(skb)->saddr,
1523 &ipv6_hdr(skb)->daddr, skb->csum)) {
1524 skb->ip_summed = CHECKSUM_UNNECESSARY;
1525 return 0;
1526 }
1527 }
1528
1529 skb->csum = ~csum_unfold(tcp_v6_check(skb->len,
1530 &ipv6_hdr(skb)->saddr,
1531 &ipv6_hdr(skb)->daddr, 0));
1532
1533 if (skb->len <= 76) {
1534 return __skb_checksum_complete(skb);
1535 }
1536 return 0;
1537}
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb)
1548{
1549 struct ipv6_pinfo *np = inet6_sk(sk);
1550 struct tcp_sock *tp;
1551 struct sk_buff *opt_skb = NULL;
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561 if (skb->protocol == htons(ETH_P_IP))
1562 return tcp_v4_do_rcv(sk, skb);
1563
1564#ifdef CONFIG_TCP_MD5SIG
1565 if (tcp_v6_inbound_md5_hash (sk, skb))
1566 goto discard;
1567#endif
1568
1569 if (sk_filter(sk, skb))
1570 goto discard;
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590 if (np->rxopt.all)
1591 opt_skb = skb_clone(skb, GFP_ATOMIC);
1592
1593 if (sk->sk_state == TCP_ESTABLISHED) {
1594 TCP_CHECK_TIMER(sk);
1595 if (tcp_rcv_established(sk, skb, tcp_hdr(skb), skb->len))
1596 goto reset;
1597 TCP_CHECK_TIMER(sk);
1598 if (opt_skb)
1599 goto ipv6_pktoptions;
1600 return 0;
1601 }
1602
1603 if (skb->len < tcp_hdrlen(skb) || tcp_checksum_complete(skb))
1604 goto csum_err;
1605
1606 if (sk->sk_state == TCP_LISTEN) {
1607 struct sock *nsk = tcp_v6_hnd_req(sk, skb);
1608 if (!nsk)
1609 goto discard;
1610
1611
1612
1613
1614
1615
1616 if(nsk != sk) {
1617 if (tcp_child_process(sk, nsk, skb))
1618 goto reset;
1619 if (opt_skb)
1620 __kfree_skb(opt_skb);
1621 return 0;
1622 }
1623 }
1624
1625 TCP_CHECK_TIMER(sk);
1626 if (tcp_rcv_state_process(sk, skb, tcp_hdr(skb), skb->len))
1627 goto reset;
1628 TCP_CHECK_TIMER(sk);
1629 if (opt_skb)
1630 goto ipv6_pktoptions;
1631 return 0;
1632
1633reset:
1634 tcp_v6_send_reset(sk, skb);
1635discard:
1636 if (opt_skb)
1637 __kfree_skb(opt_skb);
1638 kfree_skb(skb);
1639 return 0;
1640csum_err:
1641 TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_INERRS);
1642 goto discard;
1643
1644
1645ipv6_pktoptions:
1646
1647
1648
1649
1650
1651
1652
1653 tp = tcp_sk(sk);
1654 if (TCP_SKB_CB(opt_skb)->end_seq == tp->rcv_nxt &&
1655 !((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_LISTEN))) {
1656 if (np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo)
1657 np->mcast_oif = inet6_iif(opt_skb);
1658 if (np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim)
1659 np->mcast_hops = ipv6_hdr(opt_skb)->hop_limit;
1660 if (ipv6_opt_accepted(sk, opt_skb)) {
1661 skb_set_owner_r(opt_skb, sk);
1662 opt_skb = xchg(&np->pktoptions, opt_skb);
1663 } else {
1664 __kfree_skb(opt_skb);
1665 opt_skb = xchg(&np->pktoptions, NULL);
1666 }
1667 }
1668
1669 kfree_skb(opt_skb);
1670 return 0;
1671}
1672
1673static int tcp_v6_rcv(struct sk_buff *skb)
1674{
1675 struct tcphdr *th;
1676 struct ipv6hdr *hdr;
1677 struct sock *sk;
1678 int ret;
1679 struct net *net = dev_net(skb->dev);
1680
1681 if (skb->pkt_type != PACKET_HOST)
1682 goto discard_it;
1683
1684
1685
1686
1687 TCP_INC_STATS_BH(net, TCP_MIB_INSEGS);
1688
1689 if (!pskb_may_pull(skb, sizeof(struct tcphdr)))
1690 goto discard_it;
1691
1692 th = tcp_hdr(skb);
1693
1694 if (th->doff < sizeof(struct tcphdr)/4)
1695 goto bad_packet;
1696 if (!pskb_may_pull(skb, th->doff*4))
1697 goto discard_it;
1698
1699 if (!skb_csum_unnecessary(skb) && tcp_v6_checksum_init(skb))
1700 goto bad_packet;
1701
1702 th = tcp_hdr(skb);
1703 hdr = ipv6_hdr(skb);
1704 TCP_SKB_CB(skb)->seq = ntohl(th->seq);
1705 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin +
1706 skb->len - th->doff*4);
1707 TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq);
1708 TCP_SKB_CB(skb)->when = 0;
1709 TCP_SKB_CB(skb)->flags = ipv6_get_dsfield(hdr);
1710 TCP_SKB_CB(skb)->sacked = 0;
1711
1712 sk = __inet6_lookup_skb(&tcp_hashinfo, skb, th->source, th->dest);
1713 if (!sk)
1714 goto no_tcp_socket;
1715
1716process:
1717 if (sk->sk_state == TCP_TIME_WAIT)
1718 goto do_time_wait;
1719
1720 if (hdr->hop_limit < inet6_sk(sk)->min_hopcount) {
1721 NET_INC_STATS_BH(net, LINUX_MIB_TCPMINTTLDROP);
1722 goto discard_and_relse;
1723 }
1724
1725 if (!xfrm6_policy_check(sk, XFRM_POLICY_IN, skb))
1726 goto discard_and_relse;
1727
1728 if (sk_filter(sk, skb))
1729 goto discard_and_relse;
1730
1731 skb->dev = NULL;
1732
1733 bh_lock_sock_nested(sk);
1734 ret = 0;
1735 if (!sock_owned_by_user(sk)) {
1736#ifdef CONFIG_NET_DMA
1737 struct tcp_sock *tp = tcp_sk(sk);
1738 if (!tp->ucopy.dma_chan && tp->ucopy.pinned_list)
1739 tp->ucopy.dma_chan = dma_find_channel(DMA_MEMCPY);
1740 if (tp->ucopy.dma_chan)
1741 ret = tcp_v6_do_rcv(sk, skb);
1742 else
1743#endif
1744 {
1745 if (!tcp_prequeue(sk, skb))
1746 ret = tcp_v6_do_rcv(sk, skb);
1747 }
1748 } else if (unlikely(sk_add_backlog(sk, skb))) {
1749 bh_unlock_sock(sk);
1750 NET_INC_STATS_BH(net, LINUX_MIB_TCPBACKLOGDROP);
1751 goto discard_and_relse;
1752 }
1753 bh_unlock_sock(sk);
1754
1755 sock_put(sk);
1756 return ret ? -1 : 0;
1757
1758no_tcp_socket:
1759 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb))
1760 goto discard_it;
1761
1762 if (skb->len < (th->doff<<2) || tcp_checksum_complete(skb)) {
1763bad_packet:
1764 TCP_INC_STATS_BH(net, TCP_MIB_INERRS);
1765 } else {
1766 tcp_v6_send_reset(NULL, skb);
1767 }
1768
1769discard_it:
1770
1771
1772
1773
1774
1775 kfree_skb(skb);
1776 return 0;
1777
1778discard_and_relse:
1779 sock_put(sk);
1780 goto discard_it;
1781
1782do_time_wait:
1783 if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
1784 inet_twsk_put(inet_twsk(sk));
1785 goto discard_it;
1786 }
1787
1788 if (skb->len < (th->doff<<2) || tcp_checksum_complete(skb)) {
1789 TCP_INC_STATS_BH(net, TCP_MIB_INERRS);
1790 inet_twsk_put(inet_twsk(sk));
1791 goto discard_it;
1792 }
1793
1794 switch (tcp_timewait_state_process(inet_twsk(sk), skb, th)) {
1795 case TCP_TW_SYN:
1796 {
1797 struct sock *sk2;
1798
1799 sk2 = inet6_lookup_listener(dev_net(skb->dev), &tcp_hashinfo,
1800 &ipv6_hdr(skb)->daddr,
1801 ntohs(th->dest), inet6_iif(skb));
1802 if (sk2 != NULL) {
1803 struct inet_timewait_sock *tw = inet_twsk(sk);
1804 inet_twsk_deschedule(tw, &tcp_death_row);
1805 inet_twsk_put(tw);
1806 sk = sk2;
1807 goto process;
1808 }
1809
1810 }
1811 case TCP_TW_ACK:
1812 tcp_v6_timewait_ack(sk, skb);
1813 break;
1814 case TCP_TW_RST:
1815 goto no_tcp_socket;
1816 case TCP_TW_SUCCESS:;
1817 }
1818 goto discard_it;
1819}
1820
1821static int tcp_v6_remember_stamp(struct sock *sk)
1822{
1823
1824 return 0;
1825}
1826
1827static const struct inet_connection_sock_af_ops ipv6_specific = {
1828 .queue_xmit = inet6_csk_xmit,
1829 .send_check = tcp_v6_send_check,
1830 .rebuild_header = inet6_sk_rebuild_header,
1831 .conn_request = tcp_v6_conn_request,
1832 .syn_recv_sock = tcp_v6_syn_recv_sock,
1833 .remember_stamp = tcp_v6_remember_stamp,
1834 .net_header_len = sizeof(struct ipv6hdr),
1835 .setsockopt = ipv6_setsockopt,
1836 .getsockopt = ipv6_getsockopt,
1837 .addr2sockaddr = inet6_csk_addr2sockaddr,
1838 .sockaddr_len = sizeof(struct sockaddr_in6),
1839 .bind_conflict = inet6_csk_bind_conflict,
1840#ifdef CONFIG_COMPAT
1841 .compat_setsockopt = compat_ipv6_setsockopt,
1842 .compat_getsockopt = compat_ipv6_getsockopt,
1843#endif
1844};
1845
1846#ifdef CONFIG_TCP_MD5SIG
1847static const struct tcp_sock_af_ops tcp_sock_ipv6_specific = {
1848 .md5_lookup = tcp_v6_md5_lookup,
1849 .calc_md5_hash = tcp_v6_md5_hash_skb,
1850 .md5_add = tcp_v6_md5_add_func,
1851 .md5_parse = tcp_v6_parse_md5_keys,
1852};
1853#endif
1854
1855
1856
1857
1858
1859static const struct inet_connection_sock_af_ops ipv6_mapped = {
1860 .queue_xmit = ip_queue_xmit,
1861 .send_check = tcp_v4_send_check,
1862 .rebuild_header = inet_sk_rebuild_header,
1863 .conn_request = tcp_v6_conn_request,
1864 .syn_recv_sock = tcp_v6_syn_recv_sock,
1865 .remember_stamp = tcp_v4_remember_stamp,
1866 .net_header_len = sizeof(struct iphdr),
1867 .setsockopt = ipv6_setsockopt,
1868 .getsockopt = ipv6_getsockopt,
1869 .addr2sockaddr = inet6_csk_addr2sockaddr,
1870 .sockaddr_len = sizeof(struct sockaddr_in6),
1871 .bind_conflict = inet6_csk_bind_conflict,
1872#ifdef CONFIG_COMPAT
1873 .compat_setsockopt = compat_ipv6_setsockopt,
1874 .compat_getsockopt = compat_ipv6_getsockopt,
1875#endif
1876};
1877
1878#ifdef CONFIG_TCP_MD5SIG
1879static const struct tcp_sock_af_ops tcp_sock_ipv6_mapped_specific = {
1880 .md5_lookup = tcp_v4_md5_lookup,
1881 .calc_md5_hash = tcp_v4_md5_hash_skb,
1882 .md5_add = tcp_v6_md5_add_func,
1883 .md5_parse = tcp_v6_parse_md5_keys,
1884};
1885#endif
1886
1887
1888
1889
1890static int tcp_v6_init_sock(struct sock *sk)
1891{
1892 struct inet_connection_sock *icsk = inet_csk(sk);
1893 struct tcp_sock *tp = tcp_sk(sk);
1894
1895 skb_queue_head_init(&tp->out_of_order_queue);
1896 tcp_init_xmit_timers(sk);
1897 tcp_prequeue_init(tp);
1898
1899 icsk->icsk_rto = TCP_TIMEOUT_INIT;
1900 tp->mdev = TCP_TIMEOUT_INIT;
1901
1902
1903
1904
1905
1906
1907 tp->snd_cwnd = 2;
1908
1909
1910
1911
1912 tp->snd_ssthresh = TCP_INFINITE_SSTHRESH;
1913 tp->snd_cwnd_clamp = ~0;
1914 tp->mss_cache = TCP_MSS_DEFAULT;
1915
1916 tp->reordering = sysctl_tcp_reordering;
1917
1918 sk->sk_state = TCP_CLOSE;
1919
1920 icsk->icsk_af_ops = &ipv6_specific;
1921 icsk->icsk_ca_ops = &tcp_init_congestion_ops;
1922 icsk->icsk_sync_mss = tcp_sync_mss;
1923 sk->sk_write_space = sk_stream_write_space;
1924 sock_set_flag(sk, SOCK_USE_WRITE_QUEUE);
1925
1926#ifdef CONFIG_TCP_MD5SIG
1927 tp->af_specific = &tcp_sock_ipv6_specific;
1928#endif
1929
1930
1931 if (sysctl_tcp_cookie_size > 0) {
1932
1933 tp->cookie_values =
1934 kzalloc(sizeof(*tp->cookie_values),
1935 sk->sk_allocation);
1936 if (tp->cookie_values != NULL)
1937 kref_init(&tp->cookie_values->kref);
1938 }
1939
1940
1941
1942
1943 sk->sk_sndbuf = sysctl_tcp_wmem[1];
1944 sk->sk_rcvbuf = sysctl_tcp_rmem[1];
1945
1946 local_bh_disable();
1947 percpu_counter_inc(&tcp_sockets_allocated);
1948 local_bh_enable();
1949
1950 return 0;
1951}
1952
1953static void tcp_v6_destroy_sock(struct sock *sk)
1954{
1955#ifdef CONFIG_TCP_MD5SIG
1956
1957 if (tcp_sk(sk)->md5sig_info)
1958 tcp_v6_clear_md5_list(sk);
1959#endif
1960 tcp_v4_destroy_sock(sk);
1961 inet6_destroy_sock(sk);
1962}
1963
1964#ifdef CONFIG_PROC_FS
1965
1966static void get_openreq6(struct seq_file *seq,
1967 struct sock *sk, struct request_sock *req, int i, int uid)
1968{
1969 int ttd = req->expires - jiffies;
1970 struct in6_addr *src = &inet6_rsk(req)->loc_addr;
1971 struct in6_addr *dest = &inet6_rsk(req)->rmt_addr;
1972
1973 if (ttd < 0)
1974 ttd = 0;
1975
1976 seq_printf(seq,
1977 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
1978 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %d %d %p\n",
1979 i,
1980 src->s6_addr32[0], src->s6_addr32[1],
1981 src->s6_addr32[2], src->s6_addr32[3],
1982 ntohs(inet_rsk(req)->loc_port),
1983 dest->s6_addr32[0], dest->s6_addr32[1],
1984 dest->s6_addr32[2], dest->s6_addr32[3],
1985 ntohs(inet_rsk(req)->rmt_port),
1986 TCP_SYN_RECV,
1987 0,0,
1988 1,
1989 jiffies_to_clock_t(ttd),
1990 req->retrans,
1991 uid,
1992 0,
1993 0,
1994 0, req);
1995}
1996
1997static void get_tcp6_sock(struct seq_file *seq, struct sock *sp, int i)
1998{
1999 struct in6_addr *dest, *src;
2000 __u16 destp, srcp;
2001 int timer_active;
2002 unsigned long timer_expires;
2003 struct inet_sock *inet = inet_sk(sp);
2004 struct tcp_sock *tp = tcp_sk(sp);
2005 const struct inet_connection_sock *icsk = inet_csk(sp);
2006 struct ipv6_pinfo *np = inet6_sk(sp);
2007
2008 dest = &np->daddr;
2009 src = &np->rcv_saddr;
2010 destp = ntohs(inet->inet_dport);
2011 srcp = ntohs(inet->inet_sport);
2012
2013 if (icsk->icsk_pending == ICSK_TIME_RETRANS) {
2014 timer_active = 1;
2015 timer_expires = icsk->icsk_timeout;
2016 } else if (icsk->icsk_pending == ICSK_TIME_PROBE0) {
2017 timer_active = 4;
2018 timer_expires = icsk->icsk_timeout;
2019 } else if (timer_pending(&sp->sk_timer)) {
2020 timer_active = 2;
2021 timer_expires = sp->sk_timer.expires;
2022 } else {
2023 timer_active = 0;
2024 timer_expires = jiffies;
2025 }
2026
2027 seq_printf(seq,
2028 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
2029 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %lu %d %p %lu %lu %u %u %d\n",
2030 i,
2031 src->s6_addr32[0], src->s6_addr32[1],
2032 src->s6_addr32[2], src->s6_addr32[3], srcp,
2033 dest->s6_addr32[0], dest->s6_addr32[1],
2034 dest->s6_addr32[2], dest->s6_addr32[3], destp,
2035 sp->sk_state,
2036 tp->write_seq-tp->snd_una,
2037 (sp->sk_state == TCP_LISTEN) ? sp->sk_ack_backlog : (tp->rcv_nxt - tp->copied_seq),
2038 timer_active,
2039 jiffies_to_clock_t(timer_expires - jiffies),
2040 icsk->icsk_retransmits,
2041 sock_i_uid(sp),
2042 icsk->icsk_probes_out,
2043 sock_i_ino(sp),
2044 atomic_read(&sp->sk_refcnt), sp,
2045 jiffies_to_clock_t(icsk->icsk_rto),
2046 jiffies_to_clock_t(icsk->icsk_ack.ato),
2047 (icsk->icsk_ack.quick << 1 ) | icsk->icsk_ack.pingpong,
2048 tp->snd_cwnd,
2049 tcp_in_initial_slowstart(tp) ? -1 : tp->snd_ssthresh
2050 );
2051}
2052
2053static void get_timewait6_sock(struct seq_file *seq,
2054 struct inet_timewait_sock *tw, int i)
2055{
2056 struct in6_addr *dest, *src;
2057 __u16 destp, srcp;
2058 struct inet6_timewait_sock *tw6 = inet6_twsk((struct sock *)tw);
2059 int ttd = tw->tw_ttd - jiffies;
2060
2061 if (ttd < 0)
2062 ttd = 0;
2063
2064 dest = &tw6->tw_v6_daddr;
2065 src = &tw6->tw_v6_rcv_saddr;
2066 destp = ntohs(tw->tw_dport);
2067 srcp = ntohs(tw->tw_sport);
2068
2069 seq_printf(seq,
2070 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
2071 "%02X %08X:%08X %02X:%08lX %08X %5d %8d %d %d %p\n",
2072 i,
2073 src->s6_addr32[0], src->s6_addr32[1],
2074 src->s6_addr32[2], src->s6_addr32[3], srcp,
2075 dest->s6_addr32[0], dest->s6_addr32[1],
2076 dest->s6_addr32[2], dest->s6_addr32[3], destp,
2077 tw->tw_substate, 0, 0,
2078 3, jiffies_to_clock_t(ttd), 0, 0, 0, 0,
2079 atomic_read(&tw->tw_refcnt), tw);
2080}
2081
2082static int tcp6_seq_show(struct seq_file *seq, void *v)
2083{
2084 struct tcp_iter_state *st;
2085
2086 if (v == SEQ_START_TOKEN) {
2087 seq_puts(seq,
2088 " sl "
2089 "local_address "
2090 "remote_address "
2091 "st tx_queue rx_queue tr tm->when retrnsmt"
2092 " uid timeout inode\n");
2093 goto out;
2094 }
2095 st = seq->private;
2096
2097 switch (st->state) {
2098 case TCP_SEQ_STATE_LISTENING:
2099 case TCP_SEQ_STATE_ESTABLISHED:
2100 get_tcp6_sock(seq, v, st->num);
2101 break;
2102 case TCP_SEQ_STATE_OPENREQ:
2103 get_openreq6(seq, st->syn_wait_sk, v, st->num, st->uid);
2104 break;
2105 case TCP_SEQ_STATE_TIME_WAIT:
2106 get_timewait6_sock(seq, v, st->num);
2107 break;
2108 }
2109out:
2110 return 0;
2111}
2112
2113static struct tcp_seq_afinfo tcp6_seq_afinfo = {
2114 .name = "tcp6",
2115 .family = AF_INET6,
2116 .seq_fops = {
2117 .owner = THIS_MODULE,
2118 },
2119 .seq_ops = {
2120 .show = tcp6_seq_show,
2121 },
2122};
2123
2124int __net_init tcp6_proc_init(struct net *net)
2125{
2126 return tcp_proc_register(net, &tcp6_seq_afinfo);
2127}
2128
2129void tcp6_proc_exit(struct net *net)
2130{
2131 tcp_proc_unregister(net, &tcp6_seq_afinfo);
2132}
2133#endif
2134
2135struct proto tcpv6_prot = {
2136 .name = "TCPv6",
2137 .owner = THIS_MODULE,
2138 .close = tcp_close,
2139 .connect = tcp_v6_connect,
2140 .disconnect = tcp_disconnect,
2141 .accept = inet_csk_accept,
2142 .ioctl = tcp_ioctl,
2143 .init = tcp_v6_init_sock,
2144 .destroy = tcp_v6_destroy_sock,
2145 .shutdown = tcp_shutdown,
2146 .setsockopt = tcp_setsockopt,
2147 .getsockopt = tcp_getsockopt,
2148 .recvmsg = tcp_recvmsg,
2149 .sendmsg = tcp_sendmsg,
2150 .sendpage = tcp_sendpage,
2151 .backlog_rcv = tcp_v6_do_rcv,
2152 .hash = tcp_v6_hash,
2153 .unhash = inet_unhash,
2154 .get_port = inet_csk_get_port,
2155 .enter_memory_pressure = tcp_enter_memory_pressure,
2156 .sockets_allocated = &tcp_sockets_allocated,
2157 .memory_allocated = &tcp_memory_allocated,
2158 .memory_pressure = &tcp_memory_pressure,
2159 .orphan_count = &tcp_orphan_count,
2160 .sysctl_mem = sysctl_tcp_mem,
2161 .sysctl_wmem = sysctl_tcp_wmem,
2162 .sysctl_rmem = sysctl_tcp_rmem,
2163 .max_header = MAX_TCP_HEADER,
2164 .obj_size = sizeof(struct tcp6_sock),
2165 .slab_flags = SLAB_DESTROY_BY_RCU,
2166 .twsk_prot = &tcp6_timewait_sock_ops,
2167 .rsk_prot = &tcp6_request_sock_ops,
2168 .h.hashinfo = &tcp_hashinfo,
2169 .no_autobind = true,
2170#ifdef CONFIG_COMPAT
2171 .compat_setsockopt = compat_tcp_setsockopt,
2172 .compat_getsockopt = compat_tcp_getsockopt,
2173#endif
2174};
2175
2176static const struct inet6_protocol tcpv6_protocol = {
2177 .handler = tcp_v6_rcv,
2178 .err_handler = tcp_v6_err,
2179 .gso_send_check = tcp_v6_gso_send_check,
2180 .gso_segment = tcp_tso_segment,
2181 .gro_receive = tcp6_gro_receive,
2182 .gro_complete = tcp6_gro_complete,
2183 .flags = INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
2184};
2185
2186static struct inet_protosw tcpv6_protosw = {
2187 .type = SOCK_STREAM,
2188 .protocol = IPPROTO_TCP,
2189 .prot = &tcpv6_prot,
2190 .ops = &inet6_stream_ops,
2191 .no_check = 0,
2192 .flags = INET_PROTOSW_PERMANENT |
2193 INET_PROTOSW_ICSK,
2194};
2195
2196static int __net_init tcpv6_net_init(struct net *net)
2197{
2198 return inet_ctl_sock_create(&net->ipv6.tcp_sk, PF_INET6,
2199 SOCK_RAW, IPPROTO_TCP, net);
2200}
2201
2202static void __net_exit tcpv6_net_exit(struct net *net)
2203{
2204 inet_ctl_sock_destroy(net->ipv6.tcp_sk);
2205}
2206
2207static void __net_exit tcpv6_net_exit_batch(struct list_head *net_exit_list)
2208{
2209 inet_twsk_purge(&tcp_hashinfo, &tcp_death_row, AF_INET6);
2210}
2211
2212static struct pernet_operations tcpv6_net_ops = {
2213 .init = tcpv6_net_init,
2214 .exit = tcpv6_net_exit,
2215 .exit_batch = tcpv6_net_exit_batch,
2216};
2217
2218int __init tcpv6_init(void)
2219{
2220 int ret;
2221
2222 ret = inet6_add_protocol(&tcpv6_protocol, IPPROTO_TCP);
2223 if (ret)
2224 goto out;
2225
2226
2227 ret = inet6_register_protosw(&tcpv6_protosw);
2228 if (ret)
2229 goto out_tcpv6_protocol;
2230
2231 ret = register_pernet_subsys(&tcpv6_net_ops);
2232 if (ret)
2233 goto out_tcpv6_protosw;
2234out:
2235 return ret;
2236
2237out_tcpv6_protocol:
2238 inet6_del_protocol(&tcpv6_protocol, IPPROTO_TCP);
2239out_tcpv6_protosw:
2240 inet6_unregister_protosw(&tcpv6_protosw);
2241 goto out;
2242}
2243
2244void tcpv6_exit(void)
2245{
2246 unregister_pernet_subsys(&tcpv6_net_ops);
2247 inet6_unregister_protosw(&tcpv6_protosw);
2248 inet6_del_protocol(&tcpv6_protocol, IPPROTO_TCP);
2249}
2250