tcp_ipv6.c 52.2 KB
Newer Older
Linus Torvalds's avatar
Linus Torvalds committed
1 2
/*
 *	TCP over IPv6
3
 *	Linux INET6 implementation
Linus Torvalds's avatar
Linus Torvalds committed
4 5
 *
 *	Authors:
6
 *	Pedro Roque		<roque@di.fc.ul.pt>
Linus Torvalds's avatar
Linus Torvalds committed
7
 *
8
 *	Based on:
Linus Torvalds's avatar
Linus Torvalds committed
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
 *	linux/net/ipv4/tcp.c
 *	linux/net/ipv4/tcp_input.c
 *	linux/net/ipv4/tcp_output.c
 *
 *	Fixes:
 *	Hideaki YOSHIFUJI	:	sin6_scope_id support
 *	YOSHIFUJI Hideaki @USAGI and:	Support IPV6_V6ONLY socket option, which
 *	Alexey Kuznetsov		allow both IPv4 and IPv6 sockets to bind
 *					a single port at the same time.
 *	YOSHIFUJI Hideaki @USAGI:	convert /proc/net/tcp6 to seq_file.
 *
 *	This program is free software; you can redistribute it and/or
 *      modify it under the terms of the GNU General Public License
 *      as published by the Free Software Foundation; either version
 *      2 of the License, or (at your option) any later version.
 */

26
#include <linux/bottom_half.h>
Linus Torvalds's avatar
Linus Torvalds committed
27 28 29 30 31 32 33 34 35 36 37 38 39 40
#include <linux/module.h>
#include <linux/errno.h>
#include <linux/types.h>
#include <linux/socket.h>
#include <linux/sockios.h>
#include <linux/net.h>
#include <linux/jiffies.h>
#include <linux/in.h>
#include <linux/in6.h>
#include <linux/netdevice.h>
#include <linux/init.h>
#include <linux/jhash.h>
#include <linux/ipsec.h>
#include <linux/times.h>
41
#include <linux/slab.h>
Linus Torvalds's avatar
Linus Torvalds committed
42 43 44 45 46 47 48

#include <linux/ipv6.h>
#include <linux/icmpv6.h>
#include <linux/random.h>

#include <net/tcp.h>
#include <net/ndisc.h>
49
#include <net/inet6_hashtables.h>
50
#include <net/inet6_connection_sock.h>
Linus Torvalds's avatar
Linus Torvalds committed
51 52 53 54 55 56 57 58 59 60
#include <net/ipv6.h>
#include <net/transp_v6.h>
#include <net/addrconf.h>
#include <net/ip6_route.h>
#include <net/ip6_checksum.h>
#include <net/inet_ecn.h>
#include <net/protocol.h>
#include <net/xfrm.h>
#include <net/snmp.h>
#include <net/dsfield.h>
61
#include <net/timewait_sock.h>
62
#include <net/netdma.h>
63
#include <net/inet_common.h>
64
#include <net/secure_seq.h>
Glauber Costa's avatar
Glauber Costa committed
65
#include <net/tcp_memcontrol.h>
Linus Torvalds's avatar
Linus Torvalds committed
66 67 68 69 70 71

#include <asm/uaccess.h>

#include <linux/proc_fs.h>
#include <linux/seq_file.h>

72 73 74 75
#include <linux/crypto.h>
#include <linux/scatterlist.h>

static void	tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb);
76 77
static void	tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb,
				      struct request_sock *req);
Linus Torvalds's avatar
Linus Torvalds committed
78 79

static int	tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb);
80
static void	__tcp_v6_send_check(struct sk_buff *skb,
81 82
				    const struct in6_addr *saddr,
				    const struct in6_addr *daddr);
Linus Torvalds's avatar
Linus Torvalds committed
83

84 85
static const struct inet_connection_sock_af_ops ipv6_mapped;
static const struct inet_connection_sock_af_ops ipv6_specific;
86
#ifdef CONFIG_TCP_MD5SIG
87 88
static const struct tcp_sock_af_ops tcp_sock_ipv6_specific;
static const struct tcp_sock_af_ops tcp_sock_ipv6_mapped_specific;
89 90
#else
static struct tcp_md5sig_key *tcp_v6_md5_do_lookup(struct sock *sk,
91
						   const struct in6_addr *addr)
92 93 94
{
	return NULL;
}
95
#endif
Linus Torvalds's avatar
Linus Torvalds committed
96 97 98 99

static void tcp_v6_hash(struct sock *sk)
{
	if (sk->sk_state != TCP_CLOSE) {
100
		if (inet_csk(sk)->icsk_af_ops == &ipv6_mapped) {
Linus Torvalds's avatar
Linus Torvalds committed
101 102 103 104
			tcp_prot.hash(sk);
			return;
		}
		local_bh_disable();
105
		__inet6_hash(sk, NULL);
Linus Torvalds's avatar
Linus Torvalds committed
106 107 108 109
		local_bh_enable();
	}
}

Herbert Xu's avatar
Herbert Xu committed
110
static __inline__ __sum16 tcp_v6_check(int len,
111 112
				   const struct in6_addr *saddr,
				   const struct in6_addr *daddr,
113
				   __wsum base)
Linus Torvalds's avatar
Linus Torvalds committed
114 115 116 117
{
	return csum_ipv6_magic(saddr, daddr, len, IPPROTO_TCP, base);
}

118
static __u32 tcp_v6_init_sequence(const struct sk_buff *skb)
Linus Torvalds's avatar
Linus Torvalds committed
119
{
120 121
	return secure_tcpv6_sequence_number(ipv6_hdr(skb)->daddr.s6_addr32,
					    ipv6_hdr(skb)->saddr.s6_addr32,
122 123
					    tcp_hdr(skb)->dest,
					    tcp_hdr(skb)->source);
Linus Torvalds's avatar
Linus Torvalds committed
124 125
}

126
static int tcp_v6_connect(struct sock *sk, struct sockaddr *uaddr,
Linus Torvalds's avatar
Linus Torvalds committed
127 128 129
			  int addr_len)
{
	struct sockaddr_in6 *usin = (struct sockaddr_in6 *) uaddr;
130
	struct inet_sock *inet = inet_sk(sk);
131
	struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds's avatar
Linus Torvalds committed
132 133
	struct ipv6_pinfo *np = inet6_sk(sk);
	struct tcp_sock *tp = tcp_sk(sk);
134
	struct in6_addr *saddr = NULL, *final_p, final;
135
	struct rt6_info *rt;
136
	struct flowi6 fl6;
Linus Torvalds's avatar
Linus Torvalds committed
137 138 139 140
	struct dst_entry *dst;
	int addr_type;
	int err;

141
	if (addr_len < SIN6_LEN_RFC2133)
Linus Torvalds's avatar
Linus Torvalds committed
142 143
		return -EINVAL;

144
	if (usin->sin6_family != AF_INET6)
Eric Dumazet's avatar
Eric Dumazet committed
145
		return -EAFNOSUPPORT;
Linus Torvalds's avatar
Linus Torvalds committed
146

147
	memset(&fl6, 0, sizeof(fl6));
Linus Torvalds's avatar
Linus Torvalds committed
148 149

	if (np->sndflow) {
150 151 152
		fl6.flowlabel = usin->sin6_flowinfo&IPV6_FLOWINFO_MASK;
		IP6_ECN_flow_init(fl6.flowlabel);
		if (fl6.flowlabel&IPV6_FLOWLABEL_MASK) {
Linus Torvalds's avatar
Linus Torvalds committed
153
			struct ip6_flowlabel *flowlabel;
154
			flowlabel = fl6_sock_lookup(sk, fl6.flowlabel);
Linus Torvalds's avatar
Linus Torvalds committed
155 156
			if (flowlabel == NULL)
				return -EINVAL;
157
			usin->sin6_addr = flowlabel->dst;
Linus Torvalds's avatar
Linus Torvalds committed
158 159 160 161 162
			fl6_sock_release(flowlabel);
		}
	}

	/*
163 164 165 166 167
	 *	connect() to INADDR_ANY means loopback (BSD'ism).
	 */

	if(ipv6_addr_any(&usin->sin6_addr))
		usin->sin6_addr.s6_addr[15] = 0x1;
Linus Torvalds's avatar
Linus Torvalds committed
168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198

	addr_type = ipv6_addr_type(&usin->sin6_addr);

	if(addr_type & IPV6_ADDR_MULTICAST)
		return -ENETUNREACH;

	if (addr_type&IPV6_ADDR_LINKLOCAL) {
		if (addr_len >= sizeof(struct sockaddr_in6) &&
		    usin->sin6_scope_id) {
			/* If interface is set while binding, indices
			 * must coincide.
			 */
			if (sk->sk_bound_dev_if &&
			    sk->sk_bound_dev_if != usin->sin6_scope_id)
				return -EINVAL;

			sk->sk_bound_dev_if = usin->sin6_scope_id;
		}

		/* Connect to link-local address requires an interface */
		if (!sk->sk_bound_dev_if)
			return -EINVAL;
	}

	if (tp->rx_opt.ts_recent_stamp &&
	    !ipv6_addr_equal(&np->daddr, &usin->sin6_addr)) {
		tp->rx_opt.ts_recent = 0;
		tp->rx_opt.ts_recent_stamp = 0;
		tp->write_seq = 0;
	}

199
	np->daddr = usin->sin6_addr;
200
	np->flow_label = fl6.flowlabel;
Linus Torvalds's avatar
Linus Torvalds committed
201 202 203 204 205 206

	/*
	 *	TCP over IPv4
	 */

	if (addr_type == IPV6_ADDR_MAPPED) {
207
		u32 exthdrlen = icsk->icsk_ext_hdr_len;
Linus Torvalds's avatar
Linus Torvalds committed
208 209 210 211 212 213 214 215 216 217 218
		struct sockaddr_in sin;

		SOCK_DEBUG(sk, "connect: ipv4 mapped\n");

		if (__ipv6_only_sock(sk))
			return -ENETUNREACH;

		sin.sin_family = AF_INET;
		sin.sin_port = usin->sin6_port;
		sin.sin_addr.s_addr = usin->sin6_addr.s6_addr32[3];

219
		icsk->icsk_af_ops = &ipv6_mapped;
Linus Torvalds's avatar
Linus Torvalds committed
220
		sk->sk_backlog_rcv = tcp_v4_do_rcv;
221 222 223
#ifdef CONFIG_TCP_MD5SIG
		tp->af_specific = &tcp_sock_ipv6_mapped_specific;
#endif
Linus Torvalds's avatar
Linus Torvalds committed
224 225 226 227

		err = tcp_v4_connect(sk, (struct sockaddr *)&sin, sizeof(sin));

		if (err) {
228 229
			icsk->icsk_ext_hdr_len = exthdrlen;
			icsk->icsk_af_ops = &ipv6_specific;
Linus Torvalds's avatar
Linus Torvalds committed
230
			sk->sk_backlog_rcv = tcp_v6_do_rcv;
231 232 233
#ifdef CONFIG_TCP_MD5SIG
			tp->af_specific = &tcp_sock_ipv6_specific;
#endif
Linus Torvalds's avatar
Linus Torvalds committed
234 235
			goto failure;
		} else {
236 237 238
			ipv6_addr_set_v4mapped(inet->inet_saddr, &np->saddr);
			ipv6_addr_set_v4mapped(inet->inet_rcv_saddr,
					       &np->rcv_saddr);
Linus Torvalds's avatar
Linus Torvalds committed
239 240 241 242 243 244 245 246
		}

		return err;
	}

	if (!ipv6_addr_any(&np->rcv_saddr))
		saddr = &np->rcv_saddr;

247
	fl6.flowi6_proto = IPPROTO_TCP;
248 249
	fl6.daddr = np->daddr;
	fl6.saddr = saddr ? *saddr : np->saddr;
250 251
	fl6.flowi6_oif = sk->sk_bound_dev_if;
	fl6.flowi6_mark = sk->sk_mark;
252 253
	fl6.fl6_dport = usin->sin6_port;
	fl6.fl6_sport = inet->inet_sport;
Linus Torvalds's avatar
Linus Torvalds committed
254

255
	final_p = fl6_update_dst(&fl6, np->opt, &final);
Linus Torvalds's avatar
Linus Torvalds committed
256

257
	security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
258

259
	dst = ip6_dst_lookup_flow(sk, &fl6, final_p, true);
260 261
	if (IS_ERR(dst)) {
		err = PTR_ERR(dst);
Linus Torvalds's avatar
Linus Torvalds committed
262
		goto failure;
263
	}
Linus Torvalds's avatar
Linus Torvalds committed
264 265

	if (saddr == NULL) {
266
		saddr = &fl6.saddr;
267
		np->rcv_saddr = *saddr;
Linus Torvalds's avatar
Linus Torvalds committed
268 269 270
	}

	/* set the source address */
271
	np->saddr = *saddr;
272
	inet->inet_rcv_saddr = LOOPBACK4_IPV6;
Linus Torvalds's avatar
Linus Torvalds committed
273

274
	sk->sk_gso_type = SKB_GSO_TCPV6;
275
	__ip6_dst_store(sk, dst, NULL, NULL);
Linus Torvalds's avatar
Linus Torvalds committed
276

277 278 279
	rt = (struct rt6_info *) dst;
	if (tcp_death_row.sysctl_tw_recycle &&
	    !tp->rx_opt.ts_recent_stamp &&
280 281
	    ipv6_addr_equal(&rt->rt6i_dst.addr, &np->daddr))
		tcp_fetch_timewait_stamp(sk, dst);
282

283
	icsk->icsk_ext_hdr_len = 0;
Linus Torvalds's avatar
Linus Torvalds committed
284
	if (np->opt)
285 286
		icsk->icsk_ext_hdr_len = (np->opt->opt_flen +
					  np->opt->opt_nflen);
Linus Torvalds's avatar
Linus Torvalds committed
287 288 289

	tp->rx_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - sizeof(struct ipv6hdr);

290
	inet->inet_dport = usin->sin6_port;
Linus Torvalds's avatar
Linus Torvalds committed
291 292

	tcp_set_state(sk, TCP_SYN_SENT);
293
	err = inet6_hash_connect(&tcp_death_row, sk);
Linus Torvalds's avatar
Linus Torvalds committed
294 295 296 297 298 299
	if (err)
		goto late_failure;

	if (!tp->write_seq)
		tp->write_seq = secure_tcpv6_sequence_number(np->saddr.s6_addr32,
							     np->daddr.s6_addr32,
300 301
							     inet->inet_sport,
							     inet->inet_dport);
Linus Torvalds's avatar
Linus Torvalds committed
302 303 304 305 306 307 308 309 310 311 312

	err = tcp_connect(sk);
	if (err)
		goto late_failure;

	return 0;

late_failure:
	tcp_set_state(sk, TCP_CLOSE);
	__sk_dst_reset(sk);
failure:
313
	inet->inet_dport = 0;
Linus Torvalds's avatar
Linus Torvalds committed
314 315 316 317 318
	sk->sk_route_caps = 0;
	return err;
}

static void tcp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
319
		u8 type, u8 code, int offset, __be32 info)
Linus Torvalds's avatar
Linus Torvalds committed
320
{
321
	const struct ipv6hdr *hdr = (const struct ipv6hdr*)skb->data;
322
	const struct tcphdr *th = (struct tcphdr *)(skb->data+offset);
Linus Torvalds's avatar
Linus Torvalds committed
323 324 325
	struct ipv6_pinfo *np;
	struct sock *sk;
	int err;
326
	struct tcp_sock *tp;
Linus Torvalds's avatar
Linus Torvalds committed
327
	__u32 seq;
328
	struct net *net = dev_net(skb->dev);
Linus Torvalds's avatar
Linus Torvalds committed
329

330
	sk = inet6_lookup(net, &tcp_hashinfo, &hdr->daddr,
331
			th->dest, &hdr->saddr, th->source, skb->dev->ifindex);
Linus Torvalds's avatar
Linus Torvalds committed
332 333

	if (sk == NULL) {
334 335
		ICMP6_INC_STATS_BH(net, __in6_dev_get(skb->dev),
				   ICMP6_MIB_INERRORS);
Linus Torvalds's avatar
Linus Torvalds committed
336 337 338 339
		return;
	}

	if (sk->sk_state == TCP_TIME_WAIT) {
340
		inet_twsk_put(inet_twsk(sk));
Linus Torvalds's avatar
Linus Torvalds committed
341 342 343 344 345
		return;
	}

	bh_lock_sock(sk);
	if (sock_owned_by_user(sk))
346
		NET_INC_STATS_BH(net, LINUX_MIB_LOCKDROPPEDICMPS);
Linus Torvalds's avatar
Linus Torvalds committed
347 348 349 350

	if (sk->sk_state == TCP_CLOSE)
		goto out;

351 352 353 354 355
	if (ipv6_hdr(skb)->hop_limit < inet6_sk(sk)->min_hopcount) {
		NET_INC_STATS_BH(net, LINUX_MIB_TCPMINTTLDROP);
		goto out;
	}

Linus Torvalds's avatar
Linus Torvalds committed
356
	tp = tcp_sk(sk);
357
	seq = ntohl(th->seq);
Linus Torvalds's avatar
Linus Torvalds committed
358 359
	if (sk->sk_state != TCP_LISTEN &&
	    !between(seq, tp->snd_una, tp->snd_nxt)) {
360
		NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
Linus Torvalds's avatar
Linus Torvalds committed
361 362 363 364 365 366
		goto out;
	}

	np = inet6_sk(sk);

	if (type == ICMPV6_PKT_TOOBIG) {
367
		struct dst_entry *dst;
Linus Torvalds's avatar
Linus Torvalds committed
368 369 370 371 372 373 374 375 376 377 378

		if (sock_owned_by_user(sk))
			goto out;
		if ((1 << sk->sk_state) & (TCPF_LISTEN | TCPF_CLOSE))
			goto out;

		/* icmp should have updated the destination cache entry */
		dst = __sk_dst_check(sk, np->dst_cookie);

		if (dst == NULL) {
			struct inet_sock *inet = inet_sk(sk);
379
			struct flowi6 fl6;
Linus Torvalds's avatar
Linus Torvalds committed
380 381 382 383 384

			/* BUGGG_FUTURE: Again, it is not clear how
			   to handle rthdr case. Ignore this complexity
			   for now.
			 */
385 386
			memset(&fl6, 0, sizeof(fl6));
			fl6.flowi6_proto = IPPROTO_TCP;
387 388
			fl6.daddr = np->daddr;
			fl6.saddr = np->saddr;
389 390
			fl6.flowi6_oif = sk->sk_bound_dev_if;
			fl6.flowi6_mark = sk->sk_mark;
391 392
			fl6.fl6_dport = inet->inet_dport;
			fl6.fl6_sport = inet->inet_sport;
393 394 395
			security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));

			dst = ip6_dst_lookup_flow(sk, &fl6, NULL, false);
396 397
			if (IS_ERR(dst)) {
				sk->sk_err_soft = -PTR_ERR(dst);
Linus Torvalds's avatar
Linus Torvalds committed
398 399 400 401 402 403
				goto out;
			}

		} else
			dst_hold(dst);

404 405
		dst->ops->update_pmtu(dst, ntohl(info));

406
		if (inet_csk(sk)->icsk_pmtu_cookie > dst_mtu(dst)) {
Linus Torvalds's avatar
Linus Torvalds committed
407 408 409 410 411 412 413 414 415
			tcp_sync_mss(sk, dst_mtu(dst));
			tcp_simple_retransmit(sk);
		} /* else let the usual retransmit timer handle it */
		dst_release(dst);
		goto out;
	}

	icmpv6_err_convert(type, code, &err);

416
	/* Might be for an request_sock */
Linus Torvalds's avatar
Linus Torvalds committed
417
	switch (sk->sk_state) {
418
		struct request_sock *req, **prev;
Linus Torvalds's avatar
Linus Torvalds committed
419 420 421 422
	case TCP_LISTEN:
		if (sock_owned_by_user(sk))
			goto out;

423 424
		req = inet6_csk_search_req(sk, &prev, th->dest, &hdr->daddr,
					   &hdr->saddr, inet6_iif(skb));
Linus Torvalds's avatar
Linus Torvalds committed
425 426 427 428 429 430
		if (!req)
			goto out;

		/* ICMPs are not backlogged, hence we cannot get
		 * an established socket here.
		 */
431
		WARN_ON(req->sk != NULL);
Linus Torvalds's avatar
Linus Torvalds committed
432

433
		if (seq != tcp_rsk(req)->snt_isn) {
434
			NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
Linus Torvalds's avatar
Linus Torvalds committed
435 436 437
			goto out;
		}

438
		inet_csk_reqsk_queue_drop(sk, req, prev);
Linus Torvalds's avatar
Linus Torvalds committed
439 440 441 442
		goto out;

	case TCP_SYN_SENT:
	case TCP_SYN_RECV:  /* Cannot happen.
443
			       It can, it SYNs are crossed. --ANK */
Linus Torvalds's avatar
Linus Torvalds committed
444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465
		if (!sock_owned_by_user(sk)) {
			sk->sk_err = err;
			sk->sk_error_report(sk);		/* Wake people up to see the error (see connect in sock.c) */

			tcp_done(sk);
		} else
			sk->sk_err_soft = err;
		goto out;
	}

	if (!sock_owned_by_user(sk) && np->recverr) {
		sk->sk_err = err;
		sk->sk_error_report(sk);
	} else
		sk->sk_err_soft = err;

out:
	bh_unlock_sock(sk);
	sock_put(sk);
}


466 467
static int tcp_v6_send_synack(struct sock *sk, struct dst_entry *dst,
			      struct flowi6 *fl6,
468
			      struct request_sock *req,
469 470
			      struct request_values *rvp,
			      u16 queue_mapping)
Linus Torvalds's avatar
Linus Torvalds committed
471
{
472
	struct inet6_request_sock *treq = inet6_rsk(req);
Linus Torvalds's avatar
Linus Torvalds committed
473 474
	struct ipv6_pinfo *np = inet6_sk(sk);
	struct sk_buff * skb;
475
	int err = -ENOMEM;
Linus Torvalds's avatar
Linus Torvalds committed
476

477 478
	/* First, grab a route. */
	if (!dst && (dst = inet6_csk_route_req(sk, fl6, req)) == NULL)
479
		goto done;
480

481
	skb = tcp_make_synack(sk, dst, req, rvp);
482

Linus Torvalds's avatar
Linus Torvalds committed
483
	if (skb) {
484
		__tcp_v6_send_check(skb, &treq->loc_addr, &treq->rmt_addr);
Linus Torvalds's avatar
Linus Torvalds committed
485

486
		fl6->daddr = treq->rmt_addr;
487
		skb_set_queue_mapping(skb, queue_mapping);
488
		err = ip6_xmit(sk, skb, fl6, np->opt, np->tclass);
489
		err = net_xmit_eval(err);
Linus Torvalds's avatar
Linus Torvalds committed
490 491 492 493 494 495
	}

done:
	return err;
}

496 497 498
static int tcp_v6_rtx_synack(struct sock *sk, struct request_sock *req,
			     struct request_values *rvp)
{
499 500
	struct flowi6 fl6;

501
	TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_RETRANSSEGS);
502
	return tcp_v6_send_synack(sk, NULL, &fl6, req, rvp, 0);
503 504
}

505
static void tcp_v6_reqsk_destructor(struct request_sock *req)
Linus Torvalds's avatar
Linus Torvalds committed
506
{
507
	kfree_skb(inet6_rsk(req)->pktopts);
Linus Torvalds's avatar
Linus Torvalds committed
508 509
}

510 511
#ifdef CONFIG_TCP_MD5SIG
static struct tcp_md5sig_key *tcp_v6_md5_do_lookup(struct sock *sk,
512
						   const struct in6_addr *addr)
513
{
Eric Dumazet's avatar
Eric Dumazet committed
514
	return tcp_md5_do_lookup(sk, (union tcp_md5_addr *)addr, AF_INET6);
515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544
}

static struct tcp_md5sig_key *tcp_v6_md5_lookup(struct sock *sk,
						struct sock *addr_sk)
{
	return tcp_v6_md5_do_lookup(sk, &inet6_sk(addr_sk)->daddr);
}

static struct tcp_md5sig_key *tcp_v6_reqsk_md5_lookup(struct sock *sk,
						      struct request_sock *req)
{
	return tcp_v6_md5_do_lookup(sk, &inet6_rsk(req)->rmt_addr);
}

static int tcp_v6_parse_md5_keys (struct sock *sk, char __user *optval,
				  int optlen)
{
	struct tcp_md5sig cmd;
	struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)&cmd.tcpm_addr;

	if (optlen < sizeof(cmd))
		return -EINVAL;

	if (copy_from_user(&cmd, optval, sizeof(cmd)))
		return -EFAULT;

	if (sin6->sin6_family != AF_INET6)
		return -EINVAL;

	if (!cmd.tcpm_keylen) {
545
		if (ipv6_addr_v4mapped(&sin6->sin6_addr))
Eric Dumazet's avatar
Eric Dumazet committed
546 547 548 549
			return tcp_md5_do_del(sk, (union tcp_md5_addr *)&sin6->sin6_addr.s6_addr32[3],
					      AF_INET);
		return tcp_md5_do_del(sk, (union tcp_md5_addr *)&sin6->sin6_addr,
				      AF_INET6);
550 551 552 553 554
	}

	if (cmd.tcpm_keylen > TCP_MD5SIG_MAXKEYLEN)
		return -EINVAL;

Eric Dumazet's avatar
Eric Dumazet committed
555 556 557
	if (ipv6_addr_v4mapped(&sin6->sin6_addr))
		return tcp_md5_do_add(sk, (union tcp_md5_addr *)&sin6->sin6_addr.s6_addr32[3],
				      AF_INET, cmd.tcpm_key, cmd.tcpm_keylen, GFP_KERNEL);
558

Eric Dumazet's avatar
Eric Dumazet committed
559 560
	return tcp_md5_do_add(sk, (union tcp_md5_addr *)&sin6->sin6_addr,
			      AF_INET6, cmd.tcpm_key, cmd.tcpm_keylen, GFP_KERNEL);
561 562
}

563
static int tcp_v6_md5_hash_pseudoheader(struct tcp_md5sig_pool *hp,
564 565
					const struct in6_addr *daddr,
					const struct in6_addr *saddr, int nbytes)
566 567
{
	struct tcp6_pseudohdr *bp;
568
	struct scatterlist sg;
569

570 571
	bp = &hp->md5_blk.ip6;
	/* 1. TCP pseudo-header (RFC2460) */
572 573
	bp->saddr = *saddr;
	bp->daddr = *daddr;
574
	bp->protocol = cpu_to_be32(IPPROTO_TCP);
Adam Langley's avatar
Adam Langley committed
575
	bp->len = cpu_to_be32(nbytes);
576

577 578 579
	sg_init_one(&sg, bp, sizeof(*bp));
	return crypto_hash_update(&hp->md5_desc, &sg, sizeof(*bp));
}
580

581
static int tcp_v6_md5_hash_hdr(char *md5_hash, struct tcp_md5sig_key *key,
582
			       const struct in6_addr *daddr, struct in6_addr *saddr,
583
			       const struct tcphdr *th)
584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601
{
	struct tcp_md5sig_pool *hp;
	struct hash_desc *desc;

	hp = tcp_get_md5sig_pool();
	if (!hp)
		goto clear_hash_noput;
	desc = &hp->md5_desc;

	if (crypto_hash_init(desc))
		goto clear_hash;
	if (tcp_v6_md5_hash_pseudoheader(hp, daddr, saddr, th->doff << 2))
		goto clear_hash;
	if (tcp_md5_hash_header(hp, th))
		goto clear_hash;
	if (tcp_md5_hash_key(hp, key))
		goto clear_hash;
	if (crypto_hash_final(desc, md5_hash))
602 603 604 605
		goto clear_hash;

	tcp_put_md5sig_pool();
	return 0;
606

607 608 609 610
clear_hash:
	tcp_put_md5sig_pool();
clear_hash_noput:
	memset(md5_hash, 0, 16);
611
	return 1;
612 613
}

614
static int tcp_v6_md5_hash_skb(char *md5_hash, struct tcp_md5sig_key *key,
615 616 617
			       const struct sock *sk,
			       const struct request_sock *req,
			       const struct sk_buff *skb)
618
{
619
	const struct in6_addr *saddr, *daddr;
620 621
	struct tcp_md5sig_pool *hp;
	struct hash_desc *desc;
622
	const struct tcphdr *th = tcp_hdr(skb);
623 624 625 626

	if (sk) {
		saddr = &inet6_sk(sk)->saddr;
		daddr = &inet6_sk(sk)->daddr;
627
	} else if (req) {
628 629
		saddr = &inet6_rsk(req)->loc_addr;
		daddr = &inet6_rsk(req)->rmt_addr;
630
	} else {
631
		const struct ipv6hdr *ip6h = ipv6_hdr(skb);
632 633
		saddr = &ip6h->saddr;
		daddr = &ip6h->daddr;
634
	}
635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662

	hp = tcp_get_md5sig_pool();
	if (!hp)
		goto clear_hash_noput;
	desc = &hp->md5_desc;

	if (crypto_hash_init(desc))
		goto clear_hash;

	if (tcp_v6_md5_hash_pseudoheader(hp, daddr, saddr, skb->len))
		goto clear_hash;
	if (tcp_md5_hash_header(hp, th))
		goto clear_hash;
	if (tcp_md5_hash_skb_data(hp, skb, th->doff << 2))
		goto clear_hash;
	if (tcp_md5_hash_key(hp, key))
		goto clear_hash;
	if (crypto_hash_final(desc, md5_hash))
		goto clear_hash;

	tcp_put_md5sig_pool();
	return 0;

clear_hash:
	tcp_put_md5sig_pool();
clear_hash_noput:
	memset(md5_hash, 0, 16);
	return 1;
663 664
}

665
static int tcp_v6_inbound_md5_hash(struct sock *sk, const struct sk_buff *skb)
666
{
667
	const __u8 *hash_location = NULL;
668
	struct tcp_md5sig_key *hash_expected;
669
	const struct ipv6hdr *ip6h = ipv6_hdr(skb);
670
	const struct tcphdr *th = tcp_hdr(skb);
671 672 673 674
	int genhash;
	u8 newhash[16];

	hash_expected = tcp_v6_md5_do_lookup(sk, &ip6h->saddr);
675
	hash_location = tcp_parse_md5sig_option(th);
676

677 678 679 680 681 682
	/* We've parsed the options - do we have a hash? */
	if (!hash_expected && !hash_location)
		return 0;

	if (hash_expected && !hash_location) {
		NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPMD5NOTFOUND);
683 684 685
		return 1;
	}

686 687
	if (!hash_expected && hash_location) {
		NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_TCPMD5UNEXPECTED);
688 689 690 691
		return 1;
	}

	/* check the signature */
692 693 694 695
	genhash = tcp_v6_md5_hash_skb(newhash,
				      hash_expected,
				      NULL, NULL, skb);

696
	if (genhash || memcmp(hash_location, newhash, 16) != 0) {
697 698 699 700
		net_info_ratelimited("MD5 Hash %s for [%pI6c]:%u->[%pI6c]:%u\n",
				     genhash ? "failed" : "mismatch",
				     &ip6h->saddr, ntohs(th->source),
				     &ip6h->daddr, ntohs(th->dest));
701 702 703 704 705 706
		return 1;
	}
	return 0;
}
#endif

707
struct request_sock_ops tcp6_request_sock_ops __read_mostly = {
Linus Torvalds's avatar
Linus Torvalds committed
708
	.family		=	AF_INET6,
709
	.obj_size	=	sizeof(struct tcp6_request_sock),
710
	.rtx_syn_ack	=	tcp_v6_rtx_synack,
711 712
	.send_ack	=	tcp_v6_reqsk_send_ack,
	.destructor	=	tcp_v6_reqsk_destructor,
713 714
	.send_reset	=	tcp_v6_send_reset,
	.syn_ack_timeout = 	tcp_syn_ack_timeout,
Linus Torvalds's avatar
Linus Torvalds committed
715 716
};

717
#ifdef CONFIG_TCP_MD5SIG
718
static const struct tcp_request_sock_ops tcp_request_sock_ipv6_ops = {
719
	.md5_lookup	=	tcp_v6_reqsk_md5_lookup,
720
	.calc_md5_hash	=	tcp_v6_md5_hash_skb,
721
};
722
#endif
723

724
static void __tcp_v6_send_check(struct sk_buff *skb,
725
				const struct in6_addr *saddr, const struct in6_addr *daddr)
Linus Torvalds's avatar
Linus Torvalds committed
726
{
727
	struct tcphdr *th = tcp_hdr(skb);
Linus Torvalds's avatar
Linus Torvalds committed
728

729
	if (skb->ip_summed == CHECKSUM_PARTIAL) {
730
		th->check = ~tcp_v6_check(skb->len, saddr, daddr, 0);
731
		skb->csum_start = skb_transport_header(skb) - skb->head;
Al Viro's avatar
Al Viro committed
732
		skb->csum_offset = offsetof(struct tcphdr, check);
Linus Torvalds's avatar
Linus Torvalds committed
733
	} else {
734 735 736
		th->check = tcp_v6_check(skb->len, saddr, daddr,
					 csum_partial(th, th->doff << 2,
						      skb->csum));
Linus Torvalds's avatar
Linus Torvalds committed
737 738 739
	}
}

740
static void tcp_v6_send_check(struct sock *sk, struct sk_buff *skb)
741 742 743 744 745 746
{
	struct ipv6_pinfo *np = inet6_sk(sk);

	__tcp_v6_send_check(skb, &np->saddr, &np->daddr);
}

747 748
static int tcp_v6_gso_send_check(struct sk_buff *skb)
{
749
	const struct ipv6hdr *ipv6h;
750 751 752 753 754
	struct tcphdr *th;

	if (!pskb_may_pull(skb, sizeof(*th)))
		return -EINVAL;

755
	ipv6h = ipv6_hdr(skb);
756
	th = tcp_hdr(skb);
757 758

	th->check = 0;
759
	skb->ip_summed = CHECKSUM_PARTIAL;
760
	__tcp_v6_send_check(skb, &ipv6h->saddr, &ipv6h->daddr);
761 762
	return 0;
}
Linus Torvalds's avatar
Linus Torvalds committed
763

764 765
static struct sk_buff **tcp6_gro_receive(struct sk_buff **head,
					 struct sk_buff *skb)
Herbert Xu's avatar
Herbert Xu committed
766
{
767
	const struct ipv6hdr *iph = skb_gro_network_header(skb);
Herbert Xu's avatar
Herbert Xu committed
768 769 770

	switch (skb->ip_summed) {
	case CHECKSUM_COMPLETE:
771
		if (!tcp_v6_check(skb_gro_len(skb), &iph->saddr, &iph->daddr,
Herbert Xu's avatar
Herbert Xu committed
772 773 774 775 776 777 778 779 780 781 782 783 784 785
				  skb->csum)) {
			skb->ip_summed = CHECKSUM_UNNECESSARY;
			break;
		}

		/* fall through */
	case CHECKSUM_NONE:
		NAPI_GRO_CB(skb)->flush = 1;
		return NULL;
	}

	return tcp_gro_receive(head, skb);
}

786
static int tcp6_gro_complete(struct sk_buff *skb)
Herbert Xu's avatar
Herbert Xu committed
787
{
788
	const struct ipv6hdr *iph = ipv6_hdr(skb);
Herbert Xu's avatar
Herbert Xu committed
789 790 791 792 793 794 795 796 797
	struct tcphdr *th = tcp_hdr(skb);

	th->check = ~tcp_v6_check(skb->len - skb_transport_offset(skb),
				  &iph->saddr, &iph->daddr, 0);
	skb_shinfo(skb)->gso_type = SKB_GSO_TCPV6;

	return tcp_gro_complete(skb);
}

798
static void tcp_v6_send_response(struct sk_buff *skb, u32 seq, u32 ack, u32 win,
799
				 u32 ts, struct tcp_md5sig_key *key, int rst, u8 tclass)
Linus Torvalds's avatar
Linus Torvalds committed
800
{
801 802
	const struct tcphdr *th = tcp_hdr(skb);
	struct tcphdr *t1;
Linus Torvalds's avatar
Linus Torvalds committed
803
	struct sk_buff *buff;
804
	struct flowi6 fl6;
Eric Dumazet's avatar
Eric Dumazet committed
805
	struct net *net = dev_net(skb_dst(skb)->dev);
806
	struct sock *ctl_sk = net->ipv6.tcp_sk;
807
	unsigned int tot_len = sizeof(struct tcphdr);
Eric Dumazet's avatar
Eric Dumazet committed
808
	struct dst_entry *dst;
809
	__be32 *topt;
Linus Torvalds's avatar
Linus Torvalds committed
810

811 812
	if (ts)
		tot_len += TCPOLEN_TSTAMP_ALIGNED;
813 814 815 816 817 818
#ifdef CONFIG_TCP_MD5SIG
	if (key)
		tot_len += TCPOLEN_MD5SIG_ALIGNED;
#endif

	buff = alloc_skb(MAX_HEADER + sizeof(struct ipv6hdr) + tot_len,
Linus Torvalds's avatar
Linus Torvalds committed
819
			 GFP_ATOMIC);
820 821
	if (buff == NULL)
		return;
Linus Torvalds's avatar
Linus Torvalds committed
822

823
	skb_reserve(buff, MAX_HEADER + sizeof(struct ipv6hdr) + tot_len);
Linus Torvalds's avatar
Linus Torvalds committed
824

825
	t1 = (struct tcphdr *) skb_push(buff, tot_len);
826
	skb_reset_transport_header(buff);
Linus Torvalds's avatar
Linus Torvalds committed
827 828 829 830 831

	/* Swap the send and the receive. */
	memset(t1, 0, sizeof(*t1));
	t1->dest = th->source;
	t1->source = th->dest;
832
	t1->doff = tot_len / 4;
833 834 835 836 837
	t1->seq = htonl(seq);
	t1->ack_seq = htonl(ack);
	t1->ack = !rst || !th->ack;
	t1->rst = rst;
	t1->window = htons(win);
Linus Torvalds's avatar
Linus Torvalds committed
838

839 840
	topt = (__be32 *)(t1 + 1);

841 842 843 844 845 846 847
	if (ts) {
		*topt++ = htonl((TCPOPT_NOP << 24) | (TCPOPT_NOP << 16) |
				(TCPOPT_TIMESTAMP << 8) | TCPOLEN_TIMESTAMP);
		*topt++ = htonl(tcp_time_stamp);
		*topt++ = htonl(ts);
	}

848 849
#ifdef CONFIG_TCP_MD5SIG
	if (key) {
850 851 852
		*topt++ = htonl((TCPOPT_NOP << 24) | (TCPOPT_NOP << 16) |
				(TCPOPT_MD5SIG << 8) | TCPOLEN_MD5SIG);
		tcp_v6_md5_hash_hdr((__u8 *)topt, key,
853 854
				    &ipv6_hdr(skb)->saddr,
				    &ipv6_hdr(skb)->daddr, t1);
855 856 857
	}
#endif

858
	memset(&fl6, 0, sizeof(fl6));
859 860
	fl6.daddr = ipv6_hdr(skb)->saddr;
	fl6.saddr = ipv6_hdr(skb)->daddr;
Linus Torvalds's avatar
Linus Torvalds committed
861

862 863 864
	buff->ip_summed = CHECKSUM_PARTIAL;
	buff->csum = 0;

865
	__tcp_v6_send_check(buff, &fl6.saddr, &fl6.daddr);
Linus Torvalds's avatar
Linus Torvalds committed
866

867 868
	fl6.flowi6_proto = IPPROTO_TCP;
	fl6.flowi6_oif = inet6_iif(skb);
869 870
	fl6.fl6_dport = t1->dest;
	fl6.fl6_sport = t1->source;
871
	security_skb_classify_flow(skb, flowi6_to_flowi(&fl6));
Linus Torvalds's avatar
Linus Torvalds committed
872

873 874 875 876
	/* Pass a socket to ip6_dst_lookup either it is for RST
	 * Underlying function will use this to retrieve the network
	 * namespace
	 */
877
	dst = ip6_dst_lookup_flow(ctl_sk, &fl6, NULL, false);
878 879
	if (!IS_ERR(dst)) {
		skb_dst_set(buff, dst);
880
		ip6_xmit(ctl_sk, buff, &fl6, NULL, tclass);
881 882 883 884
		TCP_INC_STATS_BH(net, TCP_MIB_OUTSEGS);
		if (rst)
			TCP_INC_STATS_BH(net, TCP_MIB_OUTRSTS);
		return;
Linus Torvalds's avatar
Linus Torvalds committed
885 886 887 888 889
	}

	kfree_skb(buff);
}

890
static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb)
Linus Torvalds's avatar
Linus Torvalds committed
891
{
892
	const struct tcphdr *th = tcp_hdr(skb);
893
	u32 seq = 0, ack_seq = 0;
894
	struct tcp_md5sig_key *key = NULL;
895 896 897 898 899 900 901
#ifdef CONFIG_TCP_MD5SIG
	const __u8 *hash_location = NULL;
	struct ipv6hdr *ipv6h = ipv6_hdr(skb);
	unsigned char newhash[16];
	int genhash;
	struct sock *sk1 = NULL;
#endif
Linus Torvalds's avatar
Linus Torvalds committed
902

903
	if (th->rst)
Linus Torvalds's avatar
Linus Torvalds committed
904 905
		return;

906 907
	if (!ipv6_unicast_destination(skb))
		return;
Linus Torvalds's avatar
Linus Torvalds committed
908

909
#ifdef CONFIG_TCP_MD5SIG
910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935
	hash_location = tcp_parse_md5sig_option(th);
	if (!sk && hash_location) {
		/*
		 * active side is lost. Try to find listening socket through
		 * source port, and then find md5 key through listening socket.
		 * we are not loose security here:
		 * Incoming packet is checked with md5 hash with finding key,
		 * no RST generated if md5 hash doesn't match.
		 */
		sk1 = inet6_lookup_listener(dev_net(skb_dst(skb)->dev),
					   &tcp_hashinfo, &ipv6h->daddr,
					   ntohs(th->source), inet6_iif(skb));
		if (!sk1)
			return;

		rcu_read_lock();
		key = tcp_v6_md5_do_lookup(sk1, &ipv6h->saddr);
		if (!key)
			goto release_sk1;

		genhash = tcp_v6_md5_hash_skb(newhash, key, NULL, NULL, skb);
		if (genhash || memcmp(hash_location, newhash, 16) != 0)
			goto release_sk1;
	} else {
		key = sk ? tcp_v6_md5_do_lookup(sk, &ipv6h->saddr) : NULL;
	}
936 937
#endif

938 939 940 941 942
	if (th->ack)
		seq = ntohl(th->ack_seq);
	else
		ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len -
			  (th->doff << 2);
Linus Torvalds's avatar
Linus Torvalds committed
943

944
	tcp_v6_send_response(skb, seq, ack_seq, 0, 0, key, 1, 0);
945 946 947 948 949 950 951 952

#ifdef CONFIG_TCP_MD5SIG
release_sk1:
	if (sk1) {
		rcu_read_unlock();
		sock_put(sk1);
	}
#endif
953
}
Linus Torvalds's avatar
Linus Torvalds committed
954

955
static void tcp_v6_send_ack(struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 ts,
956
			    struct tcp_md5sig_key *key, u8 tclass)
957
{
958
	tcp_v6_send_response(skb, seq, ack, win, ts, key, 0, tclass);
Linus Torvalds's avatar
Linus Torvalds committed
959 960 961 962
}

static void tcp_v6_timewait_ack(struct sock *sk, struct sk_buff *skb)
{
963
	struct inet_timewait_sock *tw = inet_twsk(sk);
964
	struct tcp_timewait_sock *tcptw = tcp_twsk(sk);
Linus Torvalds's avatar
Linus Torvalds committed
965

966
	tcp_v6_send_ack(skb, tcptw->tw_snd_nxt, tcptw->tw_rcv_nxt,
967
			tcptw->tw_rcv_wnd >> tw->tw_rcv_wscale,
968 969
			tcptw->tw_ts_recent, tcp_twsk_md5_key(tcptw),
			tw->tw_tclass);
Linus Torvalds's avatar
Linus Torvalds committed
970

971
	inet_twsk_put(tw);
Linus Torvalds's avatar
Linus Torvalds committed
972 973
}

974 975
static void tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb,
				  struct request_sock *req)
Linus Torvalds's avatar
Linus Torvalds committed
976
{
977
	tcp_v6_send_ack(skb, tcp_rsk(req)->snt_isn + 1, tcp_rsk(req)->rcv_isn + 1, req->rcv_wnd, req->ts_recent,
978
			tcp_v6_md5_do_lookup(sk, &ipv6_hdr(skb)->daddr), 0);
Linus Torvalds's avatar
Linus Torvalds committed
979 980 981 982 983
}


static struct sock *tcp_v6_hnd_req(struct sock *sk,struct sk_buff *skb)
{
984
	struct request_sock *req, **prev;
985
	const struct tcphdr *th = tcp_hdr(skb);
Linus Torvalds's avatar
Linus Torvalds committed
986 987 988
	struct sock *nsk;

	/* Find possible connection requests. */
989
	req = inet6_csk_search_req(sk, &prev, th->source,
990 991
				   &ipv6_hdr(skb)->saddr,
				   &ipv6_hdr(skb)->daddr, inet6_iif(skb));
Linus Torvalds's avatar
Linus Torvalds committed
992 993 994
	if (req)
		return tcp_check_req(sk, skb, req, prev);

995
	nsk = __inet6_lookup_established(sock_net(sk), &tcp_hashinfo,
996 997
			&ipv6_hdr(skb)->saddr, th->source,
			&ipv6_hdr(skb)->daddr, ntohs(th->dest), inet6_iif(skb));
Linus Torvalds's avatar
Linus Torvalds committed
998 999 1000 1001 1002 1003

	if (nsk) {
		if (nsk->sk_state != TCP_TIME_WAIT) {
			bh_lock_sock(nsk);
			return nsk;
		}
1004
		inet_twsk_put(inet_twsk(nsk));
Linus Torvalds's avatar
Linus Torvalds committed
1005 1006 1007
		return NULL;
	}

1008
#ifdef CONFIG_SYN_COOKIES
1009
	if (!th->syn)
1010
		sk = cookie_v6_check(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1011 1012 1013 1014 1015 1016 1017 1018 1019
#endif
	return sk;
}

/* FIXME: this is substantially similar to the ipv4 code.
 * Can some kind of merge be done? -- erics
 */
static int tcp_v6_conn_request(struct sock *sk, struct sk_buff *skb)
{
1020
	struct tcp_extend_values tmp_ext;
1021
	struct tcp_options_received tmp_opt;
1022
	const u8 *hash_location;
1023
	struct request_sock *req;
1024
	struct inet6_request_sock *treq;
Linus Torvalds's avatar
Linus Torvalds committed
1025 1026
	struct ipv6_pinfo *np = inet6_sk(sk);
	struct tcp_sock *tp = tcp_sk(sk);
1027
	__u32 isn = TCP_SKB_CB(skb)->when;
1028
	struct dst_entry *dst = NULL;
1029
	struct flowi6 fl6;
Eric Dumazet's avatar
Eric Dumazet committed
1030
	bool want_cookie = false;
Linus Torvalds's avatar
Linus Torvalds committed
1031 1032 1033 1034 1035

	if (skb->protocol == htons(ETH_P_IP))
		return tcp_v4_conn_request(sk, skb);

	if (!ipv6_unicast_destination(skb))
1036
		goto drop;
Linus Torvalds's avatar
Linus Torvalds committed
1037

1038
	if (inet_csk_reqsk_queue_is_full(sk) && !isn) {
1039 1040 1041
		want_cookie = tcp_syn_flood_action(sk, skb, "TCPv6");
		if (!want_cookie)
			goto drop;
Linus Torvalds's avatar
Linus Torvalds committed
1042 1043
	}

1044
	if (sk_acceptq_is_full(sk) && inet_csk_reqsk_queue_young(sk) > 1)
Linus Torvalds's avatar
Linus Torvalds committed
1045 1046
		goto drop;

1047
	req = inet6_reqsk_alloc(&tcp6_request_sock_ops);
Linus Torvalds's avatar
Linus Torvalds committed
1048 1049 1050
	if (req == NULL)
		goto drop;

1051 1052 1053 1054
#ifdef CONFIG_TCP_MD5SIG
	tcp_rsk(req)->af_specific = &tcp_request_sock_ipv6_ops;
#endif

Linus Torvalds's avatar
Linus Torvalds committed
1055 1056 1057
	tcp_clear_options(&tmp_opt);
	tmp_opt.mss_clamp = IPV6_MIN_MTU - sizeof(struct tcphdr) - sizeof(struct ipv6hdr);
	tmp_opt.user_mss = tp->rx_opt.user_mss;
1058
	tcp_parse_options(skb, &tmp_opt, &hash_location, 0);
1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074

	if (tmp_opt.cookie_plus > 0 &&
	    tmp_opt.saw_tstamp &&
	    !tp->rx_opt.cookie_out_never &&
	    (sysctl_tcp_cookie_size > 0 ||
	     (tp->cookie_values != NULL &&
	      tp->cookie_values->cookie_desired > 0))) {
		u8 *c;
		u32 *d;
		u32 *mess = &tmp_ext.cookie_bakery[COOKIE_DIGEST_WORDS];
		int l = tmp_opt.cookie_plus - TCPOLEN_COOKIE_BASE;

		if (tcp_cookie_generator(&tmp_ext.cookie_bakery[0]) != 0)
			goto drop_and_free;

		/* Secret recipe starts with IP addresses */
1075
		d = (__force u32 *)&ipv6_hdr(skb)->daddr.s6_addr32[0];
1076 1077 1078 1079
		*mess++ ^= *d++;
		*mess++ ^= *d++;
		*mess++ ^= *d++;
		*mess++ ^= *d++;
1080
		d = (__force u32 *)&ipv6_hdr(skb)->saddr.s6_addr32[0];
1081 1082 1083 1084 1085 1086 1087 1088 1089
		*mess++ ^= *d++;
		*mess++ ^= *d++;
		*mess++ ^= *d++;
		*mess++ ^= *d++;

		/* plus variable length Initiator Cookie */
		c = (u8 *)mess;
		while (l-- > 0)
			*c++ ^= *hash_location++;
Linus Torvalds's avatar
Linus Torvalds committed
1090

Eric Dumazet's avatar
Eric Dumazet committed
1091
		want_cookie = false;	/* not our kind of cookie */
1092 1093 1094 1095 1096 1097 1098 1099 1100 1101
		tmp_ext.cookie_out_never = 0; /* false */
		tmp_ext.cookie_plus = tmp_opt.cookie_plus;
	} else if (!tp->rx_opt.cookie_in_always) {
		/* redundant indications, but ensure initialization. */
		tmp_ext.cookie_out_never = 1; /* true */
		tmp_ext.cookie_plus = 0;
	} else {
		goto drop_and_free;
	}
	tmp_ext.cookie_in_always = tp->rx_opt.cookie_in_always;
Linus Torvalds's avatar
Linus Torvalds committed
1102

1103
	if (want_cookie && !tmp_opt.saw_tstamp)
1104 1105
		tcp_clear_options(&tmp_opt);

Linus Torvalds's avatar
Linus Torvalds committed
1106 1107 1108
	tmp_opt.tstamp_ok = tmp_opt.saw_tstamp;
	tcp_openreq_init(req, &tmp_opt, skb);

1109
	treq = inet6_rsk(req);
1110 1111
	treq->rmt_addr = ipv6_hdr(skb)->saddr;
	treq->loc_addr = ipv6_hdr(skb)->daddr;
1112
	if (!want_cookie || tmp_opt.tstamp_ok)
1113
		TCP_ECN_create_request(req, skb);
1114

1115 1116 1117 1118 1119 1120 1121
	treq->iif = sk->sk_bound_dev_if;

	/* So that link locals have meaning */
	if (!sk->sk_bound_dev_if &&
	    ipv6_addr_type(&treq->rmt_addr) & IPV6_ADDR_LINKLOCAL)
		treq->iif = inet6_iif(skb);

1122
	if (!isn) {
1123 1124 1125 1126 1127 1128
		if (ipv6_opt_accepted(sk, skb) ||
		    np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo ||
		    np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim) {
			atomic_inc(&skb->users);
			treq->pktopts = skb;
		}
1129 1130

		if (want_cookie) {
1131 1132
			isn = cookie_v6_init_sequence(sk, skb, &req->mss);
			req->cookie_ts = tmp_opt.tstamp_ok;
1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146
			goto have_isn;
		}

		/* VJ's idea. We save last timestamp seen
		 * from the destination in peer table, when entering
		 * state TIME-WAIT, and check against it before
		 * accepting new connection request.
		 *
		 * If "isn" is not zero, this request hit alive
		 * timewait bucket, so that all the necessary checks
		 * are made in the function processing timewait state.
		 */
		if (tmp_opt.saw_tstamp &&
		    tcp_death_row.sysctl_tw_recycle &&
1147 1148
		    (dst = inet6_csk_route_req(sk, &fl6, req)) != NULL) {
			if (!tcp_peer_is_proven(req, dst, true)) {
1149 1150 1151 1152 1153 1154 1155 1156
				NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_PAWSPASSIVEREJECTED);
				goto drop_and_release;
			}
		}
		/* Kill the following clause, if you dislike this way. */
		else if (!sysctl_tcp_syncookies &&
			 (sysctl_max_syn_backlog - inet_csk_reqsk_queue_len(sk) <
			  (sysctl_max_syn_backlog >> 2)) &&
1157
			 !tcp_peer_is_proven(req, dst, false)) {
1158 1159 1160 1161 1162 1163 1164 1165 1166 1167
			/* Without syncookies last quarter of
			 * backlog is filled with destinations,
			 * proven to be alive.
			 * It means that we continue to communicate
			 * to destinations, already remembered
			 * to the moment of synflood.
			 */
			LIMIT_NETDEBUG(KERN_DEBUG "TCP: drop open request from %pI6/%u\n",
				       &treq->rmt_addr, ntohs(tcp_hdr(skb)->source));
			goto drop_and_release;
1168
		}
1169 1170

		isn = tcp_v6_init_sequence(skb);
1171
	}
1172
have_isn:
1173
	tcp_rsk(req)->snt_isn = isn;
1174
	tcp_rsk(req)->snt_synack = tcp_time_stamp;
Linus Torvalds's avatar
Linus Torvalds committed
1175

1176 1177
	if (security_inet_conn_request(sk, skb, req))
		goto drop_and_release;
1178

1179
	if (tcp_v6_send_synack(sk, dst, &fl6, req,
1180 1181
			       (struct request_values *)&tmp_ext,
			       skb_get_queue_mapping(skb)) ||
1182
	    want_cookie)
1183
		goto drop_and_free;
Linus Torvalds's avatar
Linus Torvalds committed
1184

1185 1186
	inet6_csk_reqsk_queue_hash_add(sk, req, TCP_TIMEOUT_INIT);
	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
1187

1188 1189
drop_and_release:
	dst_release(dst);
1190 1191
drop_and_free:
	reqsk_free(req);
Linus Torvalds's avatar
Linus Torvalds committed
1192 1193 1194 1195 1196
drop:
	return 0; /* don't send reset */
}

static struct sock * tcp_v6_syn_recv_sock(struct sock *sk, struct sk_buff *skb,
1197
					  struct request_sock *req,
Linus Torvalds's avatar
Linus Torvalds committed
1198 1199
					  struct dst_entry *dst)
{
1200
	struct inet6_request_sock *treq;
Linus Torvalds's avatar
Linus Torvalds committed
1201 1202 1203 1204 1205
	struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
	struct tcp6_sock *newtcp6sk;
	struct inet_sock *newinet;
	struct tcp_sock *newtp;
	struct sock *newsk;
1206 1207 1208
#ifdef CONFIG_TCP_MD5SIG
	struct tcp_md5sig_key *key;
#endif
1209
	struct flowi6 fl6;
Linus Torvalds's avatar
Linus Torvalds committed
1210 1211 1212 1213 1214 1215 1216 1217

	if (skb->protocol == htons(ETH_P_IP)) {
		/*
		 *	v6 mapped
		 */

		newsk = tcp_v4_syn_recv_sock(sk, skb, req, dst);

1218
		if (newsk == NULL)
Linus Torvalds's avatar
Linus Torvalds committed
1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229
			return NULL;

		newtcp6sk = (struct tcp6_sock *)newsk;
		inet_sk(newsk)->pinet6 = &newtcp6sk->inet6;

		newinet = inet_sk(newsk);
		newnp = inet6_sk(newsk);
		newtp = tcp_sk(newsk);

		memcpy(newnp, np, sizeof(struct ipv6_pinfo));

1230
		ipv6_addr_set_v4mapped(newinet->inet_daddr, &newnp->daddr);
Linus Torvalds's avatar
Linus Torvalds committed
1231

1232
		ipv6_addr_set_v4mapped(newinet->inet_saddr, &newnp->saddr);
Linus Torvalds's avatar
Linus Torvalds committed
1233

1234
		newnp->rcv_saddr = newnp->saddr;
Linus Torvalds's avatar
Linus Torvalds committed
1235

1236
		inet_csk(newsk)->icsk_af_ops = &ipv6_mapped;
Linus Torvalds's avatar
Linus Torvalds committed
1237
		newsk->sk_backlog_rcv = tcp_v4_do_rcv;
1238 1239 1240 1241
#ifdef CONFIG_TCP_MD5SIG
		newtp->af_specific = &tcp_sock_ipv6_mapped_specific;
#endif

1242 1243
		newnp->ipv6_ac_list = NULL;
		newnp->ipv6_fl_list = NULL;
Linus Torvalds's avatar
Linus Torvalds committed
1244 1245
		newnp->pktoptions  = NULL;
		newnp->opt	   = NULL;
1246
		newnp->mcast_oif   = inet6_iif(skb);
1247
		newnp->mcast_hops  = ipv6_hdr(skb)->hop_limit;
1248
		newnp->rcv_tclass  = ipv6_tclass(ipv6_hdr(skb));
Linus Torvalds's avatar
Linus Torvalds committed
1249

1250 1251 1252 1253
		/*
		 * No need to charge this sock to the relevant IPv6 refcnt debug socks count
		 * here, tcp_create_openreq_child now does this for us, see the comment in
		 * that function for the gory details. -acme
Linus Torvalds's avatar
Linus Torvalds committed
1254 1255 1256
		 */

		/* It is tricky place. Until this moment IPv4 tcp
1257
		   worked with IPv6 icsk.icsk_af_ops.
Linus Torvalds's avatar
Linus Torvalds committed
1258 1259
		   Sync it now.
		 */
1260
		tcp_sync_mss(newsk, inet_csk(newsk)->icsk_pmtu_cookie);
Linus Torvalds's avatar
Linus Torvalds committed
1261 1262 1263 1264

		return newsk;
	}

1265
	treq = inet6_rsk(req);
Linus Torvalds's avatar
Linus Torvalds committed
1266 1267 1268 1269

	if (sk_acceptq_is_full(sk))
		goto out_overflow;

1270
	if (!dst) {
1271
		dst = inet6_csk_route_req(sk, &fl6, req);
1272
		if (!dst)
Linus Torvalds's avatar
Linus Torvalds committed
1273
			goto out;
1274
	}
Linus Torvalds's avatar
Linus Torvalds committed
1275 1276 1277

	newsk = tcp_create_openreq_child(sk, req, skb);
	if (newsk == NULL)
1278
		goto out_nonewsk;
Linus Torvalds's avatar
Linus Torvalds committed
1279

1280 1281 1282 1283 1284
	/*
	 * No need to charge this sock to the relevant IPv6 refcnt debug socks
	 * count here, tcp_create_openreq_child now does this for us, see the
	 * comment in that function for the gory details. -acme
	 */
Linus Torvalds's avatar
Linus Torvalds committed
1285

1286
	newsk->sk_gso_type = SKB_GSO_TCPV6;
1287
	__ip6_dst_store(newsk, dst, NULL, NULL);
Linus Torvalds's avatar
Linus Torvalds committed
1288 1289 1290 1291 1292 1293 1294 1295 1296 1297

	newtcp6sk = (struct tcp6_sock *)newsk;
	inet_sk(newsk)->pinet6 = &newtcp6sk->inet6;

	newtp = tcp_sk(newsk);
	newinet = inet_sk(newsk);
	newnp = inet6_sk(newsk);

	memcpy(newnp, np, sizeof(struct ipv6_pinfo));

1298 1299 1300
	newnp->daddr = treq->rmt_addr;
	newnp->saddr = treq->loc_addr;
	newnp->rcv_saddr = treq->loc_addr;
1301
	newsk->sk_bound_dev_if = treq->iif;
Linus Torvalds's avatar
Linus Torvalds committed
1302

1303
	/* Now IPv6 options...
Linus Torvalds's avatar
Linus Torvalds committed
1304 1305 1306

	   First: no IPv4 options.
	 */
1307
	newinet->inet_opt = NULL;
1308
	newnp->ipv6_ac_list = NULL;
1309
	newnp->ipv6_fl_list = NULL;
Linus Torvalds's avatar
Linus Torvalds committed
1310 1311 1312 1313 1314 1315

	/* Clone RX bits */
	newnp->rxopt.all = np->rxopt.all;

	/* Clone pktoptions received with SYN */
	newnp->pktoptions = NULL;
1316 1317
	if (treq->pktopts != NULL) {
		newnp->pktoptions = skb_clone(treq->pktopts, GFP_ATOMIC);
1318
		consume_skb(treq->pktopts);
1319
		treq->pktopts = NULL;
Linus Torvalds's avatar
Linus Torvalds committed
1320 1321 1322 1323
		if (newnp->pktoptions)
			skb_set_owner_r(newnp->pktoptions, newsk);
	}
	newnp->opt	  = NULL;
1324
	newnp->mcast_oif  = inet6_iif(skb);
1325
	newnp->mcast_hops = ipv6_hdr(skb)->hop_limit;
1326
	newnp->rcv_tclass = ipv6_tclass(ipv6_hdr(skb));
Linus Torvalds's avatar
Linus Torvalds committed
1327 1328 1329 1330 1331 1332 1333

	/* Clone native IPv6 options from listening socket (if any)

	   Yes, keeping reference count would be much more clever,
	   but we make one more one thing there: reattach optmem
	   to newsk.
	 */
1334 1335
	if (np->opt)
		newnp->opt = ipv6_dup_options(newsk, np->opt);
Linus Torvalds's avatar
Linus Torvalds committed
1336

1337
	inet_csk(newsk)->icsk_ext_hdr_len = 0;
Linus Torvalds's avatar
Linus Torvalds committed
1338
	if (newnp->opt)
1339 1340
		inet_csk(newsk)->icsk_ext_hdr_len = (newnp->opt->opt_nflen +
						     newnp->opt->opt_flen);
Linus Torvalds's avatar
Linus Torvalds committed
1341

John Heffner's avatar
John Heffner committed
1342
	tcp_mtup_init(newsk);
Linus Torvalds's avatar
Linus Torvalds committed
1343
	tcp_sync_mss(newsk, dst_mtu(dst));
1344
	newtp->advmss = dst_metric_advmss(dst);
1345 1346 1347 1348
	if (tcp_sk(sk)->rx_opt.user_mss &&
	    tcp_sk(sk)->rx_opt.user_mss < newtp->advmss)
		newtp->advmss = tcp_sk(sk)->rx_opt.user_mss;

Linus Torvalds's avatar
Linus Torvalds committed
1349
	tcp_initialize_rcv_mss(newsk);
1350 1351 1352 1353
	if (tcp_rsk(req)->snt_synack)
		tcp_valid_rtt_meas(newsk,
		    tcp_time_stamp - tcp_rsk(req)->snt_synack);
	newtp->total_retrans = req->retrans;
Linus Torvalds's avatar
Linus Torvalds committed
1354

1355 1356
	newinet->inet_daddr = newinet->inet_saddr = LOOPBACK4_IPV6;
	newinet->inet_rcv_saddr = LOOPBACK4_IPV6;
Linus Torvalds's avatar
Linus Torvalds committed
1357

1358 1359 1360 1361 1362 1363 1364 1365
#ifdef CONFIG_TCP_MD5SIG
	/* Copy over the MD5 key from the original socket */
	if ((key = tcp_v6_md5_do_lookup(sk, &newnp->daddr)) != NULL) {
		/* We're using one, so create a matching key
		 * on the newsk structure. If we fail to get
		 * memory, then we end up not copying the key
		 * across. Shucks.
		 */
Eric Dumazet's avatar
Eric Dumazet committed
1366 1367
		tcp_md5_do_add(newsk, (union tcp_md5_addr *)&newnp->daddr,
			       AF_INET6, key->key, key->keylen, GFP_ATOMIC);
1368 1369 1370
	}
#endif

1371 1372 1373 1374
	if (__inet_inherit_port(sk, newsk) < 0) {
		sock_put(newsk);
		goto out;
	}
1375
	__inet6_hash(newsk, NULL);
Linus Torvalds's avatar
Linus Torvalds committed
1376 1377 1378 1379

	return newsk;

out_overflow:
1380
	NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS);
1381
out_nonewsk:
Linus Torvalds's avatar
Linus Torvalds committed
1382
	dst_release(dst);
1383 1384
out:
	NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENDROPS);
Linus Torvalds's avatar
Linus Torvalds committed
1385 1386 1387
	return NULL;
}

1388
static __sum16 tcp_v6_checksum_init(struct sk_buff *skb)
Linus Torvalds's avatar
Linus Torvalds committed
1389
{
1390
	if (skb->ip_summed == CHECKSUM_COMPLETE) {
Herbert Xu's avatar
Herbert Xu committed
1391
		if (!tcp_v6_check(skb->len, &ipv6_hdr(skb)->saddr,
1392
				  &ipv6_hdr(skb)->daddr, skb->csum)) {
1393
			skb->ip_summed = CHECKSUM_UNNECESSARY;
Linus Torvalds's avatar
Linus Torvalds committed
1394
			return 0;
1395
		}
Linus Torvalds's avatar
Linus Torvalds committed
1396
	}
1397

Herbert Xu's avatar
Herbert Xu committed
1398
	skb->csum = ~csum_unfold(tcp_v6_check(skb->len,
1399 1400
					      &ipv6_hdr(skb)->saddr,
					      &ipv6_hdr(skb)->daddr, 0));
1401

Linus Torvalds's avatar
Linus Torvalds committed
1402
	if (skb->len <= 76) {
1403
		return __skb_checksum_complete(skb);
Linus Torvalds's avatar
Linus Torvalds committed
1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432
	}
	return 0;
}

/* The socket must have it's spinlock held when we get
 * here.
 *
 * We have a potential double-lock case here, so even when
 * doing backlog processing we use the BH locking scheme.
 * This is because we cannot sleep with the original spinlock
 * held.
 */
static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb)
{
	struct ipv6_pinfo *np = inet6_sk(sk);
	struct tcp_sock *tp;
	struct sk_buff *opt_skb = NULL;

	/* Imagine: socket is IPv6. IPv4 packet arrives,
	   goes to IPv4 receive handler and backlogged.
	   From backlog it always goes here. Kerboom...
	   Fortunately, tcp_rcv_established and rcv_established
	   handle them correctly, but it is not case with
	   tcp_v6_hnd_req and tcp_v6_send_reset().   --ANK
	 */

	if (skb->protocol == htons(ETH_P_IP))
		return tcp_v4_do_rcv(sk, skb);

1433 1434 1435 1436 1437
#ifdef CONFIG_TCP_MD5SIG
	if (tcp_v6_inbound_md5_hash (sk, skb))
		goto discard;
#endif

1438
	if (sk_filter(sk, skb))
Linus Torvalds's avatar
Linus Torvalds committed
1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456
		goto discard;

	/*
	 *	socket locking is here for SMP purposes as backlog rcv
	 *	is currently called with bh processing disabled.
	 */

	/* Do Stevens' IPV6_PKTOPTIONS.

	   Yes, guys, it is the only place in our code, where we
	   may make it not affecting IPv4.
	   The rest of code is protocol independent,
	   and I do not like idea to uglify IPv4.

	   Actually, all the idea behind IPV6_PKTOPTIONS
	   looks not very well thought. For now we latch
	   options, received in the last packet, enqueued
	   by tcp. Feel free to propose better solution.
1457
					       --ANK (980728)
Linus Torvalds's avatar
Linus Torvalds committed
1458 1459 1460 1461 1462
	 */
	if (np->rxopt.all)
		opt_skb = skb_clone(skb, GFP_ATOMIC);

	if (sk->sk_state == TCP_ESTABLISHED) { /* Fast path */
1463
		sock_rps_save_rxhash(sk, skb);
1464
		if (tcp_rcv_established(sk, skb, tcp_hdr(skb), skb->len))
Linus Torvalds's avatar
Linus Torvalds committed
1465 1466 1467 1468 1469 1470
			goto reset;
		if (opt_skb)
			goto ipv6_pktoptions;
		return 0;
	}

1471
	if (skb->len < tcp_hdrlen(skb) || tcp_checksum_complete(skb))
Linus Torvalds's avatar
Linus Torvalds committed
1472 1473
		goto csum_err;

1474
	if (sk->sk_state == TCP_LISTEN) {
Linus Torvalds's avatar
Linus Torvalds committed
1475 1476 1477 1478 1479 1480 1481 1482 1483
		struct sock *nsk = tcp_v6_hnd_req(sk, skb);
		if (!nsk)
			goto discard;

		/*
		 * Queue it on the new socket if the new socket is active,
		 * otherwise we just shortcircuit this and continue with
		 * the new socket..
		 */
1484
		if(nsk != sk) {
1485
			sock_rps_save_rxhash(nsk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1486 1487 1488 1489 1490 1491
			if (tcp_child_process(sk, nsk, skb))
				goto reset;
			if (opt_skb)
				__kfree_skb(opt_skb);
			return 0;
		}
1492
	} else
1493
		sock_rps_save_rxhash(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1494

1495
	if (tcp_rcv_state_process(sk, skb, tcp_hdr(skb), skb->len))
Linus Torvalds's avatar
Linus Torvalds committed
1496 1497 1498 1499 1500 1501
		goto reset;
	if (opt_skb)
		goto ipv6_pktoptions;
	return 0;

reset:
1502
	tcp_v6_send_reset(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1503 1504 1505 1506 1507 1508
discard:
	if (opt_skb)
		__kfree_skb(opt_skb);
	kfree_skb(skb);
	return 0;
csum_err:
1509
	TCP_INC_STATS_BH(sock_net(sk), TCP_MIB_INERRS);
Linus Torvalds's avatar
Linus Torvalds committed
1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523
	goto discard;


ipv6_pktoptions:
	/* Do you ask, what is it?

	   1. skb was enqueued by tcp.
	   2. skb is added to tail of read queue, rather than out of order.
	   3. socket is not in passive state.
	   4. Finally, it really contains options, which user wants to receive.
	 */
	tp = tcp_sk(sk);
	if (TCP_SKB_CB(opt_skb)->end_seq == tp->rcv_nxt &&
	    !((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_LISTEN))) {
1524
		if (np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo)
1525
			np->mcast_oif = inet6_iif(opt_skb);
1526
		if (np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim)
1527
			np->mcast_hops = ipv6_hdr(opt_skb)->hop_limit;
1528 1529
		if (np->rxopt.bits.rxtclass)
			np->rcv_tclass = ipv6_tclass(ipv6_hdr(skb));
Linus Torvalds's avatar
Linus Torvalds committed
1530 1531 1532 1533 1534 1535 1536 1537 1538
		if (ipv6_opt_accepted(sk, opt_skb)) {
			skb_set_owner_r(opt_skb, sk);
			opt_skb = xchg(&np->pktoptions, opt_skb);
		} else {
			__kfree_skb(opt_skb);
			opt_skb = xchg(&np->pktoptions, NULL);
		}
	}

1539
	kfree_skb(opt_skb);
Linus Torvalds's avatar
Linus Torvalds committed
1540 1541 1542
	return 0;
}

1543
static int tcp_v6_rcv(struct sk_buff *skb)
Linus Torvalds's avatar
Linus Torvalds committed
1544
{
1545
	const struct tcphdr *th;
1546
	const struct ipv6hdr *hdr;
Linus Torvalds's avatar
Linus Torvalds committed
1547 1548
	struct sock *sk;
	int ret;
1549
	struct net *net = dev_net(skb->dev);
Linus Torvalds's avatar
Linus Torvalds committed
1550 1551 1552 1553 1554 1555 1556

	if (skb->pkt_type != PACKET_HOST)
		goto discard_it;

	/*
	 *	Count it even if it's bad.
	 */
1557
	TCP_INC_STATS_BH(net, TCP_MIB_INSEGS);
Linus Torvalds's avatar
Linus Torvalds committed
1558 1559 1560 1561

	if (!pskb_may_pull(skb, sizeof(struct tcphdr)))
		goto discard_it;

1562
	th = tcp_hdr(skb);
Linus Torvalds's avatar
Linus Torvalds committed
1563 1564 1565 1566 1567 1568

	if (th->doff < sizeof(struct tcphdr)/4)
		goto bad_packet;
	if (!pskb_may_pull(skb, th->doff*4))
		goto discard_it;

1569
	if (!skb_csum_unnecessary(skb) && tcp_v6_checksum_init(skb))
Linus Torvalds's avatar
Linus Torvalds committed
1570 1571
		goto bad_packet;

1572
	th = tcp_hdr(skb);
1573
	hdr = ipv6_hdr(skb);
Linus Torvalds's avatar
Linus Torvalds committed
1574 1575 1576 1577 1578
	TCP_SKB_CB(skb)->seq = ntohl(th->seq);
	TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin +
				    skb->len - th->doff*4);
	TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq);
	TCP_SKB_CB(skb)->when = 0;
1579
	TCP_SKB_CB(skb)->ip_dsfield = ipv6_get_dsfield(hdr);
Linus Torvalds's avatar
Linus Torvalds committed
1580 1581
	TCP_SKB_CB(skb)->sacked = 0;

1582
	sk = __inet6_lookup_skb(&tcp_hashinfo, skb, th->source, th->dest);
Linus Torvalds's avatar
Linus Torvalds committed
1583 1584 1585 1586 1587 1588 1589
	if (!sk)
		goto no_tcp_socket;

process:
	if (sk->sk_state == TCP_TIME_WAIT)
		goto do_time_wait;

1590 1591 1592 1593 1594
	if (hdr->hop_limit < inet6_sk(sk)->min_hopcount) {
		NET_INC_STATS_BH(net, LINUX_MIB_TCPMINTTLDROP);
		goto discard_and_relse;
	}

Linus Torvalds's avatar
Linus Torvalds committed
1595 1596 1597
	if (!xfrm6_policy_check(sk, XFRM_POLICY_IN, skb))
		goto discard_and_relse;

1598
	if (sk_filter(sk, skb))
Linus Torvalds's avatar
Linus Torvalds committed
1599 1600 1601 1602
		goto discard_and_relse;

	skb->dev = NULL;

1603
	bh_lock_sock_nested(sk);
Linus Torvalds's avatar
Linus Torvalds committed
1604 1605
	ret = 0;
	if (!sock_owned_by_user(sk)) {
1606
#ifdef CONFIG_NET_DMA
1607
		struct tcp_sock *tp = tcp_sk(sk);
1608
		if (!tp->ucopy.dma_chan && tp->ucopy.pinned_list)
1609
			tp->ucopy.dma_chan = net_dma_find_channel();
1610 1611 1612
		if (tp->ucopy.dma_chan)
			ret = tcp_v6_do_rcv(sk, skb);
		else
1613 1614 1615 1616 1617
#endif
		{
			if (!tcp_prequeue(sk, skb))
				ret = tcp_v6_do_rcv(sk, skb);
		}
1618 1619
	} else if (unlikely(sk_add_backlog(sk, skb,
					   sk->sk_rcvbuf + sk->sk_sndbuf))) {
Zhu Yi's avatar
Zhu Yi committed
1620
		bh_unlock_sock(sk);
1621
		NET_INC_STATS_BH(net, LINUX_MIB_TCPBACKLOGDROP);
Zhu Yi's avatar
Zhu Yi committed
1622 1623
		goto discard_and_relse;
	}
Linus Torvalds's avatar
Linus Torvalds committed
1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634
	bh_unlock_sock(sk);

	sock_put(sk);
	return ret ? -1 : 0;

no_tcp_socket:
	if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb))
		goto discard_it;

	if (skb->len < (th->doff<<2) || tcp_checksum_complete(skb)) {
bad_packet:
1635
		TCP_INC_STATS_BH(net, TCP_MIB_INERRS);
Linus Torvalds's avatar
Linus Torvalds committed
1636
	} else {
1637
		tcp_v6_send_reset(NULL, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654
	}

discard_it:

	/*
	 *	Discard frame
	 */

	kfree_skb(skb);
	return 0;

discard_and_relse:
	sock_put(sk);
	goto discard_it;

do_time_wait:
	if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
1655
		inet_twsk_put(inet_twsk(sk));
Linus Torvalds's avatar
Linus Torvalds committed
1656 1657 1658 1659
		goto discard_it;
	}

	if (skb->len < (th->doff<<2) || tcp_checksum_complete(skb)) {
1660
		TCP_INC_STATS_BH(net, TCP_MIB_INERRS);
1661
		inet_twsk_put(inet_twsk(sk));
Linus Torvalds's avatar
Linus Torvalds committed
1662 1663 1664
		goto discard_it;
	}

1665
	switch (tcp_timewait_state_process(inet_twsk(sk), skb, th)) {
Linus Torvalds's avatar
Linus Torvalds committed
1666 1667 1668 1669
	case TCP_TW_SYN:
	{
		struct sock *sk2;

1670
		sk2 = inet6_lookup_listener(dev_net(skb->dev), &tcp_hashinfo,
1671
					    &ipv6_hdr(skb)->daddr,
1672
					    ntohs(th->dest), inet6_iif(skb));
Linus Torvalds's avatar
Linus Torvalds committed
1673
		if (sk2 != NULL) {
1674 1675 1676
			struct inet_timewait_sock *tw = inet_twsk(sk);
			inet_twsk_deschedule(tw, &tcp_death_row);
			inet_twsk_put(tw);
Linus Torvalds's avatar
Linus Torvalds committed
1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691
			sk = sk2;
			goto process;
		}
		/* Fall through to ACK */
	}
	case TCP_TW_ACK:
		tcp_v6_timewait_ack(sk, skb);
		break;
	case TCP_TW_RST:
		goto no_tcp_socket;
	case TCP_TW_SUCCESS:;
	}
	goto discard_it;
}

1692 1693 1694 1695 1696 1697
static struct timewait_sock_ops tcp6_timewait_sock_ops = {
	.twsk_obj_size	= sizeof(struct tcp6_timewait_sock),
	.twsk_unique	= tcp_twsk_unique,
	.twsk_destructor= tcp_twsk_destructor,
};

1698
static const struct inet_connection_sock_af_ops ipv6_specific = {
1699 1700 1701 1702 1703 1704
	.queue_xmit	   = inet6_csk_xmit,
	.send_check	   = tcp_v6_send_check,
	.rebuild_header	   = inet6_sk_rebuild_header,
	.conn_request	   = tcp_v6_conn_request,
	.syn_recv_sock	   = tcp_v6_syn_recv_sock,
	.net_header_len	   = sizeof(struct ipv6hdr),
1705
	.net_frag_header_len = sizeof(struct frag_hdr),
1706 1707 1708 1709
	.setsockopt	   = ipv6_setsockopt,
	.getsockopt	   = ipv6_getsockopt,
	.addr2sockaddr	   = inet6_csk_addr2sockaddr,
	.sockaddr_len	   = sizeof(struct sockaddr_in6),
1710
	.bind_conflict	   = inet6_csk_bind_conflict,
1711
#ifdef CONFIG_COMPAT
1712 1713
	.compat_setsockopt = compat_ipv6_setsockopt,
	.compat_getsockopt = compat_ipv6_getsockopt,
1714
#endif
Linus Torvalds's avatar
Linus Torvalds committed
1715 1716
};

1717
#ifdef CONFIG_TCP_MD5SIG
1718
static const struct tcp_sock_af_ops tcp_sock_ipv6_specific = {
1719
	.md5_lookup	=	tcp_v6_md5_lookup,
1720
	.calc_md5_hash	=	tcp_v6_md5_hash_skb,
1721 1722
	.md5_parse	=	tcp_v6_parse_md5_keys,
};
1723
#endif
1724

Linus Torvalds's avatar
Linus Torvalds committed
1725 1726 1727 1728
/*
 *	TCP over IPv4 via INET6 API
 */

1729
static const struct inet_connection_sock_af_ops ipv6_mapped = {
1730 1731 1732 1733 1734 1735 1736 1737 1738 1739
	.queue_xmit	   = ip_queue_xmit,
	.send_check	   = tcp_v4_send_check,
	.rebuild_header	   = inet_sk_rebuild_header,
	.conn_request	   = tcp_v6_conn_request,
	.syn_recv_sock	   = tcp_v6_syn_recv_sock,
	.net_header_len	   = sizeof(struct iphdr),
	.setsockopt	   = ipv6_setsockopt,
	.getsockopt	   = ipv6_getsockopt,
	.addr2sockaddr	   = inet6_csk_addr2sockaddr,
	.sockaddr_len	   = sizeof(struct sockaddr_in6),
1740
	.bind_conflict	   = inet6_csk_bind_conflict,
1741
#ifdef CONFIG_COMPAT
1742 1743
	.compat_setsockopt = compat_ipv6_setsockopt,
	.compat_getsockopt = compat_ipv6_getsockopt,
1744
#endif
Linus Torvalds's avatar
Linus Torvalds committed
1745 1746
};

1747
#ifdef CONFIG_TCP_MD5SIG
1748
static const struct tcp_sock_af_ops tcp_sock_ipv6_mapped_specific = {
1749
	.md5_lookup	=	tcp_v4_md5_lookup,
1750
	.calc_md5_hash	=	tcp_v4_md5_hash_skb,
1751 1752
	.md5_parse	=	tcp_v6_parse_md5_keys,
};
1753
#endif
1754

Linus Torvalds's avatar
Linus Torvalds committed
1755 1756 1757 1758 1759
/* NOTE: A lot of things set to zero explicitly by call to
 *       sk_alloc() so need not be done here.
 */
static int tcp_v6_init_sock(struct sock *sk)
{
1760
	struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds's avatar
Linus Torvalds committed
1761

1762
	tcp_init_sock(sk);
Linus Torvalds's avatar
Linus Torvalds committed
1763

1764
	icsk->icsk_af_ops = &ipv6_specific;
Linus Torvalds's avatar
Linus Torvalds committed
1765

1766
#ifdef CONFIG_TCP_MD5SIG
1767
	tcp_sk(sk)->af_specific = &tcp_sock_ipv6_specific;
1768 1769
#endif

Linus Torvalds's avatar
Linus Torvalds committed
1770 1771 1772
	return 0;
}

1773
static void tcp_v6_destroy_sock(struct sock *sk)
Linus Torvalds's avatar
Linus Torvalds committed
1774 1775
{
	tcp_v4_destroy_sock(sk);
1776
	inet6_destroy_sock(sk);
Linus Torvalds's avatar
Linus Torvalds committed
1777 1778
}

1779
#ifdef CONFIG_PROC_FS
Linus Torvalds's avatar
Linus Torvalds committed
1780
/* Proc filesystem TCPv6 sock list dumping. */
1781
static void get_openreq6(struct seq_file *seq,
1782
			 const struct sock *sk, struct request_sock *req, int i, int uid)
Linus Torvalds's avatar
Linus Torvalds committed
1783 1784
{
	int ttd = req->expires - jiffies;
1785 1786
	const struct in6_addr *src = &inet6_rsk(req)->loc_addr;
	const struct in6_addr *dest = &inet6_rsk(req)->rmt_addr;
Linus Torvalds's avatar
Linus Torvalds committed
1787 1788 1789 1790 1791 1792

	if (ttd < 0)
		ttd = 0;

	seq_printf(seq,
		   "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
Dan Rosenberg's avatar
Dan Rosenberg committed
1793
		   "%02X %08X:%08X %02X:%08lX %08X %5d %8d %d %d %pK\n",
Linus Torvalds's avatar
Linus Torvalds committed
1794 1795 1796
		   i,
		   src->s6_addr32[0], src->s6_addr32[1],
		   src->s6_addr32[2], src->s6_addr32[3],
1797
		   ntohs(inet_rsk(req)->loc_port),
Linus Torvalds's avatar
Linus Torvalds committed
1798 1799
		   dest->s6_addr32[0], dest->s6_addr32[1],
		   dest->s6_addr32[2], dest->s6_addr32[3],
1800
		   ntohs(inet_rsk(req)->rmt_port),
Linus Torvalds's avatar
Linus Torvalds committed
1801 1802
		   TCP_SYN_RECV,
		   0,0, /* could print option size, but that is af dependent. */
1803 1804
		   1,   /* timers active (only the expire timer) */
		   jiffies_to_clock_t(ttd),
Linus Torvalds's avatar
Linus Torvalds committed
1805 1806
		   req->retrans,
		   uid,
1807
		   0,  /* non standard timer */
Linus Torvalds's avatar
Linus Torvalds committed
1808 1809 1810 1811 1812 1813
		   0, /* open_requests have no inode */
		   0, req);
}

static void get_tcp6_sock(struct seq_file *seq, struct sock *sp, int i)
{
1814
	const struct in6_addr *dest, *src;
Linus Torvalds's avatar
Linus Torvalds committed
1815 1816 1817
	__u16 destp, srcp;
	int timer_active;
	unsigned long timer_expires;
1818 1819
	const struct inet_sock *inet = inet_sk(sp);
	const struct tcp_sock *tp = tcp_sk(sp);
1820
	const struct inet_connection_sock *icsk = inet_csk(sp);
1821
	const struct ipv6_pinfo *np = inet6_sk(sp);
Linus Torvalds's avatar
Linus Torvalds committed
1822 1823 1824

	dest  = &np->daddr;
	src   = &np->rcv_saddr;
1825 1826
	destp = ntohs(inet->inet_dport);
	srcp  = ntohs(inet->inet_sport);
1827 1828

	if (icsk->icsk_pending == ICSK_TIME_RETRANS) {
Linus Torvalds's avatar
Linus Torvalds committed
1829
		timer_active	= 1;
1830 1831
		timer_expires	= icsk->icsk_timeout;
	} else if (icsk->icsk_pending == ICSK_TIME_PROBE0) {
Linus Torvalds's avatar
Linus Torvalds committed
1832
		timer_active	= 4;
1833
		timer_expires	= icsk->icsk_timeout;
Linus Torvalds's avatar
Linus Torvalds committed
1834 1835 1836 1837 1838 1839 1840 1841 1842 1843
	} else if (timer_pending(&sp->sk_timer)) {
		timer_active	= 2;
		timer_expires	= sp->sk_timer.expires;
	} else {
		timer_active	= 0;
		timer_expires = jiffies;
	}

	seq_printf(seq,
		   "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
Dan Rosenberg's avatar
Dan Rosenberg committed
1844
		   "%02X %08X:%08X %02X:%08lX %08X %5d %8d %lu %d %pK %lu %lu %u %u %d\n",
Linus Torvalds's avatar
Linus Torvalds committed
1845 1846 1847 1848 1849
		   i,
		   src->s6_addr32[0], src->s6_addr32[1],
		   src->s6_addr32[2], src->s6_addr32[3], srcp,
		   dest->s6_addr32[0], dest->s6_addr32[1],
		   dest->s6_addr32[2], dest->s6_addr32[3], destp,
1850
		   sp->sk_state,
1851 1852
		   tp->write_seq-tp->snd_una,
		   (sp->sk_state == TCP_LISTEN) ? sp->sk_ack_backlog : (tp->rcv_nxt - tp->copied_seq),
Linus Torvalds's avatar
Linus Torvalds committed
1853 1854
		   timer_active,
		   jiffies_to_clock_t(timer_expires - jiffies),
1855
		   icsk->icsk_retransmits,
Linus Torvalds's avatar
Linus Torvalds committed
1856
		   sock_i_uid(sp),
1857
		   icsk->icsk_probes_out,
Linus Torvalds's avatar
Linus Torvalds committed
1858 1859
		   sock_i_ino(sp),
		   atomic_read(&sp->sk_refcnt), sp,
1860 1861
		   jiffies_to_clock_t(icsk->icsk_rto),
		   jiffies_to_clock_t(icsk->icsk_ack.ato),
1862
		   (icsk->icsk_ack.quick << 1 ) | icsk->icsk_ack.pingpong,
1863 1864
		   tp->snd_cwnd,
		   tcp_in_initial_slowstart(tp) ? -1 : tp->snd_ssthresh
Linus Torvalds's avatar
Linus Torvalds committed
1865 1866 1867
		   );
}

1868
static void get_timewait6_sock(struct seq_file *seq,
1869
			       struct inet_timewait_sock *tw, int i)
Linus Torvalds's avatar
Linus Torvalds committed
1870
{
1871
	const struct in6_addr *dest, *src;
Linus Torvalds's avatar
Linus Torvalds committed
1872
	__u16 destp, srcp;
1873
	const struct inet6_timewait_sock *tw6 = inet6_twsk((struct sock *)tw);
Linus Torvalds's avatar
Linus Torvalds committed
1874 1875 1876 1877 1878
	int ttd = tw->tw_ttd - jiffies;

	if (ttd < 0)
		ttd = 0;

1879 1880
	dest = &tw6->tw_v6_daddr;
	src  = &tw6->tw_v6_rcv_saddr;
Linus Torvalds's avatar
Linus Torvalds committed
1881 1882 1883 1884 1885
	destp = ntohs(tw->tw_dport);
	srcp  = ntohs(tw->tw_sport);

	seq_printf(seq,
		   "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
Dan Rosenberg's avatar
Dan Rosenberg committed
1886
		   "%02X %08X:%08X %02X:%08lX %08X %5d %8d %d %d %pK\n",
Linus Torvalds's avatar
Linus Torvalds committed
1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927
		   i,
		   src->s6_addr32[0], src->s6_addr32[1],
		   src->s6_addr32[2], src->s6_addr32[3], srcp,
		   dest->s6_addr32[0], dest->s6_addr32[1],
		   dest->s6_addr32[2], dest->s6_addr32[3], destp,
		   tw->tw_substate, 0, 0,
		   3, jiffies_to_clock_t(ttd), 0, 0, 0, 0,
		   atomic_read(&tw->tw_refcnt), tw);
}

static int tcp6_seq_show(struct seq_file *seq, void *v)
{
	struct tcp_iter_state *st;

	if (v == SEQ_START_TOKEN) {
		seq_puts(seq,
			 "  sl  "
			 "local_address                         "
			 "remote_address                        "
			 "st tx_queue rx_queue tr tm->when retrnsmt"
			 "   uid  timeout inode\n");
		goto out;
	}
	st = seq->private;

	switch (st->state) {
	case TCP_SEQ_STATE_LISTENING:
	case TCP_SEQ_STATE_ESTABLISHED:
		get_tcp6_sock(seq, v, st->num);
		break;
	case TCP_SEQ_STATE_OPENREQ:
		get_openreq6(seq, st->syn_wait_sk, v, st->num, st->uid);
		break;
	case TCP_SEQ_STATE_TIME_WAIT:
		get_timewait6_sock(seq, v, st->num);
		break;
	}
out:
	return 0;
}

1928 1929 1930 1931 1932 1933 1934 1935
static const struct file_operations tcp6_afinfo_seq_fops = {
	.owner   = THIS_MODULE,
	.open    = tcp_seq_open,
	.read    = seq_read,
	.llseek  = seq_lseek,
	.release = seq_release_net
};

Linus Torvalds's avatar
Linus Torvalds committed
1936 1937 1938
static struct tcp_seq_afinfo tcp6_seq_afinfo = {
	.name		= "tcp6",
	.family		= AF_INET6,
1939
	.seq_fops	= &tcp6_afinfo_seq_fops,
1940 1941 1942
	.seq_ops	= {
		.show		= tcp6_seq_show,
	},
Linus Torvalds's avatar
Linus Torvalds committed
1943 1944
};

1945
int __net_init tcp6_proc_init(struct net *net)
Linus Torvalds's avatar
Linus Torvalds committed
1946
{
1947
	return tcp_proc_register(net, &tcp6_seq_afinfo);
Linus Torvalds's avatar
Linus Torvalds committed
1948 1949
}

1950
void tcp6_proc_exit(struct net *net)
Linus Torvalds's avatar
Linus Torvalds committed
1951
{
1952
	tcp_proc_unregister(net, &tcp6_seq_afinfo);
Linus Torvalds's avatar
Linus Torvalds committed
1953 1954 1955 1956 1957 1958 1959 1960 1961
}
#endif

struct proto tcpv6_prot = {
	.name			= "TCPv6",
	.owner			= THIS_MODULE,
	.close			= tcp_close,
	.connect		= tcp_v6_connect,
	.disconnect		= tcp_disconnect,
1962
	.accept			= inet_csk_accept,
Linus Torvalds's avatar
Linus Torvalds committed
1963 1964 1965 1966 1967 1968 1969
	.ioctl			= tcp_ioctl,
	.init			= tcp_v6_init_sock,
	.destroy		= tcp_v6_destroy_sock,
	.shutdown		= tcp_shutdown,
	.setsockopt		= tcp_setsockopt,
	.getsockopt		= tcp_getsockopt,
	.recvmsg		= tcp_recvmsg,
1970 1971
	.sendmsg		= tcp_sendmsg,
	.sendpage		= tcp_sendpage,
Linus Torvalds's avatar
Linus Torvalds committed
1972 1973
	.backlog_rcv		= tcp_v6_do_rcv,
	.hash			= tcp_v6_hash,
1974 1975
	.unhash			= inet_unhash,
	.get_port		= inet_csk_get_port,
Linus Torvalds's avatar
Linus Torvalds committed
1976 1977 1978 1979
	.enter_memory_pressure	= tcp_enter_memory_pressure,
	.sockets_allocated	= &tcp_sockets_allocated,
	.memory_allocated	= &tcp_memory_allocated,
	.memory_pressure	= &tcp_memory_pressure,
1980
	.orphan_count		= &tcp_orphan_count,
Linus Torvalds's avatar
Linus Torvalds committed
1981 1982 1983 1984
	.sysctl_wmem		= sysctl_tcp_wmem,
	.sysctl_rmem		= sysctl_tcp_rmem,
	.max_header		= MAX_TCP_HEADER,
	.obj_size		= sizeof(struct tcp6_sock),
1985
	.slab_flags		= SLAB_DESTROY_BY_RCU,
1986
	.twsk_prot		= &tcp6_timewait_sock_ops,
1987
	.rsk_prot		= &tcp6_request_sock_ops,
1988
	.h.hashinfo		= &tcp_hashinfo,
1989
	.no_autobind		= true,
1990 1991 1992 1993
#ifdef CONFIG_COMPAT
	.compat_setsockopt	= compat_tcp_setsockopt,
	.compat_getsockopt	= compat_tcp_getsockopt,
#endif
Glauber Costa's avatar
Glauber Costa committed
1994 1995 1996
#ifdef CONFIG_CGROUP_MEM_RES_CTLR_KMEM
	.proto_cgroup		= tcp_proto_cgroup,
#endif
Linus Torvalds's avatar
Linus Torvalds committed
1997 1998
};

1999
static const struct inet6_protocol tcpv6_protocol = {
Linus Torvalds's avatar
Linus Torvalds committed
2000 2001
	.handler	=	tcp_v6_rcv,
	.err_handler	=	tcp_v6_err,
2002
	.gso_send_check	=	tcp_v6_gso_send_check,
2003
	.gso_segment	=	tcp_tso_segment,
Herbert Xu's avatar
Herbert Xu committed
2004 2005
	.gro_receive	=	tcp6_gro_receive,
	.gro_complete	=	tcp6_gro_complete,
Linus Torvalds's avatar
Linus Torvalds committed
2006 2007 2008 2009 2010 2011 2012 2013 2014
	.flags		=	INET6_PROTO_NOPOLICY|INET6_PROTO_FINAL,
};

static struct inet_protosw tcpv6_protosw = {
	.type		=	SOCK_STREAM,
	.protocol	=	IPPROTO_TCP,
	.prot		=	&tcpv6_prot,
	.ops		=	&inet6_stream_ops,
	.no_check	=	0,
2015 2016
	.flags		=	INET_PROTOSW_PERMANENT |
				INET_PROTOSW_ICSK,
Linus Torvalds's avatar
Linus Torvalds committed
2017 2018
};

2019
static int __net_init tcpv6_net_init(struct net *net)
2020
{
2021 2022
	return inet_ctl_sock_create(&net->ipv6.tcp_sk, PF_INET6,
				    SOCK_RAW, IPPROTO_TCP, net);
2023 2024
}

2025
static void __net_exit tcpv6_net_exit(struct net *net)
2026
{
2027
	inet_ctl_sock_destroy(net->ipv6.tcp_sk);
2028 2029
}

2030
static void __net_exit tcpv6_net_exit_batch(struct list_head *net_exit_list)
2031 2032
{
	inet_twsk_purge(&tcp_hashinfo, &tcp_death_row, AF_INET6);
2033 2034 2035
}

static struct pernet_operations tcpv6_net_ops = {
2036 2037 2038
	.init	    = tcpv6_net_init,
	.exit	    = tcpv6_net_exit,
	.exit_batch = tcpv6_net_exit_batch,
2039 2040
};

2041
int __init tcpv6_init(void)
Linus Torvalds's avatar
Linus Torvalds committed
2042
{
2043 2044 2045 2046 2047 2048
	int ret;

	ret = inet6_add_protocol(&tcpv6_protocol, IPPROTO_TCP);
	if (ret)
		goto out;

Linus Torvalds's avatar
Linus Torvalds committed
2049
	/* register inet6 protocol */
2050 2051 2052 2053
	ret = inet6_register_protosw(&tcpv6_protosw);
	if (ret)
		goto out_tcpv6_protocol;

2054
	ret = register_pernet_subsys(&tcpv6_net_ops);
2055 2056 2057 2058
	if (ret)
		goto out_tcpv6_protosw;
out:
	return ret;
2059

2060 2061 2062 2063 2064 2065 2066
out_tcpv6_protocol:
	inet6_del_protocol(&tcpv6_protocol, IPPROTO_TCP);
out_tcpv6_protosw:
	inet6_unregister_protosw(&tcpv6_protosw);
	goto out;
}

2067
void tcpv6_exit(void)
2068
{
2069
	unregister_pernet_subsys(&tcpv6_net_ops);
2070 2071
	inet6_unregister_protosw(&tcpv6_protosw);
	inet6_del_protocol(&tcpv6_protocol, IPPROTO_TCP);
Linus Torvalds's avatar
Linus Torvalds committed
2072
}