ARM: dma-api: fix max_pfn off-by-one error in __dma_supported()
[linux/fpc-iii.git] / net / mptcp / protocol.c
blob3bccee455688157a75499f009d00d9f506217d0f
1 // SPDX-License-Identifier: GPL-2.0
2 /* Multipath TCP
4 * Copyright (c) 2017 - 2019, Intel Corporation.
5 */
7 #define pr_fmt(fmt) "MPTCP: " fmt
9 #include <linux/kernel.h>
10 #include <linux/module.h>
11 #include <linux/netdevice.h>
12 #include <linux/sched/signal.h>
13 #include <linux/atomic.h>
14 #include <net/sock.h>
15 #include <net/inet_common.h>
16 #include <net/inet_hashtables.h>
17 #include <net/protocol.h>
18 #include <net/tcp.h>
19 #if IS_ENABLED(CONFIG_MPTCP_IPV6)
20 #include <net/transp_v6.h>
21 #endif
22 #include <net/mptcp.h>
23 #include "protocol.h"
25 #define MPTCP_SAME_STATE TCP_MAX_STATES
27 static void __mptcp_close(struct sock *sk, long timeout);
29 static const struct proto_ops *tcp_proto_ops(struct sock *sk)
31 #if IS_ENABLED(CONFIG_MPTCP_IPV6)
32 if (sk->sk_family == AF_INET6)
33 return &inet6_stream_ops;
34 #endif
35 return &inet_stream_ops;
38 /* MP_CAPABLE handshake failed, convert msk to plain tcp, replacing
39 * socket->sk and stream ops and destroying msk
40 * return the msk socket, as we can't access msk anymore after this function
41 * completes
42 * Called with msk lock held, releases such lock before returning
44 static struct socket *__mptcp_fallback_to_tcp(struct mptcp_sock *msk,
45 struct sock *ssk)
47 struct mptcp_subflow_context *subflow;
48 struct socket *sock;
49 struct sock *sk;
51 sk = (struct sock *)msk;
52 sock = sk->sk_socket;
53 subflow = mptcp_subflow_ctx(ssk);
55 /* detach the msk socket */
56 list_del_init(&subflow->node);
57 sock_orphan(sk);
58 sock->sk = NULL;
60 /* socket is now TCP */
61 lock_sock(ssk);
62 sock_graft(ssk, sock);
63 if (subflow->conn) {
64 /* We can't release the ULP data on a live socket,
65 * restore the tcp callback
67 mptcp_subflow_tcp_fallback(ssk, subflow);
68 sock_put(subflow->conn);
69 subflow->conn = NULL;
71 release_sock(ssk);
72 sock->ops = tcp_proto_ops(ssk);
74 /* destroy the left-over msk sock */
75 __mptcp_close(sk, 0);
76 return sock;
79 /* If msk has an initial subflow socket, and the MP_CAPABLE handshake has not
80 * completed yet or has failed, return the subflow socket.
81 * Otherwise return NULL.
83 static struct socket *__mptcp_nmpc_socket(const struct mptcp_sock *msk)
85 if (!msk->subflow || READ_ONCE(msk->can_ack))
86 return NULL;
88 return msk->subflow;
91 static bool __mptcp_needs_tcp_fallback(const struct mptcp_sock *msk)
93 return msk->first && !sk_is_mptcp(msk->first);
96 /* if the mp_capable handshake has failed, it fallbacks msk to plain TCP,
97 * releases the socket lock and returns a reference to the now TCP socket.
98 * Otherwise returns NULL
100 static struct socket *__mptcp_tcp_fallback(struct mptcp_sock *msk)
102 sock_owned_by_me((const struct sock *)msk);
104 if (likely(!__mptcp_needs_tcp_fallback(msk)))
105 return NULL;
107 if (msk->subflow) {
108 /* the first subflow is an active connection, discart the
109 * paired socket
111 msk->subflow->sk = NULL;
112 sock_release(msk->subflow);
113 msk->subflow = NULL;
116 return __mptcp_fallback_to_tcp(msk, msk->first);
119 static bool __mptcp_can_create_subflow(const struct mptcp_sock *msk)
121 return !msk->first;
124 static struct socket *__mptcp_socket_create(struct mptcp_sock *msk, int state)
126 struct mptcp_subflow_context *subflow;
127 struct sock *sk = (struct sock *)msk;
128 struct socket *ssock;
129 int err;
131 ssock = __mptcp_nmpc_socket(msk);
132 if (ssock)
133 goto set_state;
135 if (!__mptcp_can_create_subflow(msk))
136 return ERR_PTR(-EINVAL);
138 err = mptcp_subflow_create_socket(sk, &ssock);
139 if (err)
140 return ERR_PTR(err);
142 msk->first = ssock->sk;
143 msk->subflow = ssock;
144 subflow = mptcp_subflow_ctx(ssock->sk);
145 list_add(&subflow->node, &msk->conn_list);
146 subflow->request_mptcp = 1;
148 set_state:
149 if (state != MPTCP_SAME_STATE)
150 inet_sk_state_store(sk, state);
151 return ssock;
154 static struct sock *mptcp_subflow_get(const struct mptcp_sock *msk)
156 struct mptcp_subflow_context *subflow;
158 sock_owned_by_me((const struct sock *)msk);
160 mptcp_for_each_subflow(msk, subflow) {
161 return mptcp_subflow_tcp_sock(subflow);
164 return NULL;
167 static bool mptcp_ext_cache_refill(struct mptcp_sock *msk)
169 if (!msk->cached_ext)
170 msk->cached_ext = __skb_ext_alloc();
172 return !!msk->cached_ext;
175 static struct sock *mptcp_subflow_recv_lookup(const struct mptcp_sock *msk)
177 struct mptcp_subflow_context *subflow;
178 struct sock *sk = (struct sock *)msk;
180 sock_owned_by_me(sk);
182 mptcp_for_each_subflow(msk, subflow) {
183 if (subflow->data_avail)
184 return mptcp_subflow_tcp_sock(subflow);
187 return NULL;
190 static inline bool mptcp_skb_can_collapse_to(const struct mptcp_sock *msk,
191 const struct sk_buff *skb,
192 const struct mptcp_ext *mpext)
194 if (!tcp_skb_can_collapse_to(skb))
195 return false;
197 /* can collapse only if MPTCP level sequence is in order */
198 return mpext && mpext->data_seq + mpext->data_len == msk->write_seq;
201 static int mptcp_sendmsg_frag(struct sock *sk, struct sock *ssk,
202 struct msghdr *msg, long *timeo, int *pmss_now,
203 int *ps_goal)
205 int mss_now, avail_size, size_goal, ret;
206 struct mptcp_sock *msk = mptcp_sk(sk);
207 struct mptcp_ext *mpext = NULL;
208 struct sk_buff *skb, *tail;
209 bool can_collapse = false;
210 struct page_frag *pfrag;
211 size_t psize;
213 /* use the mptcp page cache so that we can easily move the data
214 * from one substream to another, but do per subflow memory accounting
216 pfrag = sk_page_frag(sk);
217 while (!sk_page_frag_refill(ssk, pfrag) ||
218 !mptcp_ext_cache_refill(msk)) {
219 ret = sk_stream_wait_memory(ssk, timeo);
220 if (ret)
221 return ret;
222 if (unlikely(__mptcp_needs_tcp_fallback(msk)))
223 return 0;
226 /* compute copy limit */
227 mss_now = tcp_send_mss(ssk, &size_goal, msg->msg_flags);
228 *pmss_now = mss_now;
229 *ps_goal = size_goal;
230 avail_size = size_goal;
231 skb = tcp_write_queue_tail(ssk);
232 if (skb) {
233 mpext = skb_ext_find(skb, SKB_EXT_MPTCP);
235 /* Limit the write to the size available in the
236 * current skb, if any, so that we create at most a new skb.
237 * Explicitly tells TCP internals to avoid collapsing on later
238 * queue management operation, to avoid breaking the ext <->
239 * SSN association set here
241 can_collapse = (size_goal - skb->len > 0) &&
242 mptcp_skb_can_collapse_to(msk, skb, mpext);
243 if (!can_collapse)
244 TCP_SKB_CB(skb)->eor = 1;
245 else
246 avail_size = size_goal - skb->len;
248 psize = min_t(size_t, pfrag->size - pfrag->offset, avail_size);
250 /* Copy to page */
251 pr_debug("left=%zu", msg_data_left(msg));
252 psize = copy_page_from_iter(pfrag->page, pfrag->offset,
253 min_t(size_t, msg_data_left(msg), psize),
254 &msg->msg_iter);
255 pr_debug("left=%zu", msg_data_left(msg));
256 if (!psize)
257 return -EINVAL;
259 /* tell the TCP stack to delay the push so that we can safely
260 * access the skb after the sendpages call
262 ret = do_tcp_sendpages(ssk, pfrag->page, pfrag->offset, psize,
263 msg->msg_flags | MSG_SENDPAGE_NOTLAST);
264 if (ret <= 0)
265 return ret;
266 if (unlikely(ret < psize))
267 iov_iter_revert(&msg->msg_iter, psize - ret);
269 /* if the tail skb extension is still the cached one, collapsing
270 * really happened. Note: we can't check for 'same skb' as the sk_buff
271 * hdr on tail can be transmitted, freed and re-allocated by the
272 * do_tcp_sendpages() call
274 tail = tcp_write_queue_tail(ssk);
275 if (mpext && tail && mpext == skb_ext_find(tail, SKB_EXT_MPTCP)) {
276 WARN_ON_ONCE(!can_collapse);
277 mpext->data_len += ret;
278 goto out;
281 skb = tcp_write_queue_tail(ssk);
282 mpext = __skb_ext_set(skb, SKB_EXT_MPTCP, msk->cached_ext);
283 msk->cached_ext = NULL;
285 memset(mpext, 0, sizeof(*mpext));
286 mpext->data_seq = msk->write_seq;
287 mpext->subflow_seq = mptcp_subflow_ctx(ssk)->rel_write_seq;
288 mpext->data_len = ret;
289 mpext->use_map = 1;
290 mpext->dsn64 = 1;
292 pr_debug("data_seq=%llu subflow_seq=%u data_len=%u dsn64=%d",
293 mpext->data_seq, mpext->subflow_seq, mpext->data_len,
294 mpext->dsn64);
296 out:
297 pfrag->offset += ret;
298 msk->write_seq += ret;
299 mptcp_subflow_ctx(ssk)->rel_write_seq += ret;
301 return ret;
304 static void ssk_check_wmem(struct mptcp_sock *msk, struct sock *ssk)
306 struct socket *sock;
308 if (likely(sk_stream_is_writeable(ssk)))
309 return;
311 sock = READ_ONCE(ssk->sk_socket);
313 if (sock) {
314 clear_bit(MPTCP_SEND_SPACE, &msk->flags);
315 smp_mb__after_atomic();
316 /* set NOSPACE only after clearing SEND_SPACE flag */
317 set_bit(SOCK_NOSPACE, &sock->flags);
321 static int mptcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
323 int mss_now = 0, size_goal = 0, ret = 0;
324 struct mptcp_sock *msk = mptcp_sk(sk);
325 struct socket *ssock;
326 size_t copied = 0;
327 struct sock *ssk;
328 long timeo;
330 if (msg->msg_flags & ~(MSG_MORE | MSG_DONTWAIT | MSG_NOSIGNAL))
331 return -EOPNOTSUPP;
333 lock_sock(sk);
334 ssock = __mptcp_tcp_fallback(msk);
335 if (unlikely(ssock)) {
336 fallback:
337 pr_debug("fallback passthrough");
338 ret = sock_sendmsg(ssock, msg);
339 return ret >= 0 ? ret + copied : (copied ? copied : ret);
342 timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
344 ssk = mptcp_subflow_get(msk);
345 if (!ssk) {
346 release_sock(sk);
347 return -ENOTCONN;
350 pr_debug("conn_list->subflow=%p", ssk);
352 lock_sock(ssk);
353 while (msg_data_left(msg)) {
354 ret = mptcp_sendmsg_frag(sk, ssk, msg, &timeo, &mss_now,
355 &size_goal);
356 if (ret < 0)
357 break;
358 if (ret == 0 && unlikely(__mptcp_needs_tcp_fallback(msk))) {
359 release_sock(ssk);
360 ssock = __mptcp_tcp_fallback(msk);
361 goto fallback;
364 copied += ret;
367 if (copied) {
368 ret = copied;
369 tcp_push(ssk, msg->msg_flags, mss_now, tcp_sk(ssk)->nonagle,
370 size_goal);
373 ssk_check_wmem(msk, ssk);
374 release_sock(ssk);
375 release_sock(sk);
376 return ret;
379 int mptcp_read_actor(read_descriptor_t *desc, struct sk_buff *skb,
380 unsigned int offset, size_t len)
382 struct mptcp_read_arg *arg = desc->arg.data;
383 size_t copy_len;
385 copy_len = min(desc->count, len);
387 if (likely(arg->msg)) {
388 int err;
390 err = skb_copy_datagram_msg(skb, offset, arg->msg, copy_len);
391 if (err) {
392 pr_debug("error path");
393 desc->error = err;
394 return err;
396 } else {
397 pr_debug("Flushing skb payload");
400 desc->count -= copy_len;
402 pr_debug("consumed %zu bytes, %zu left", copy_len, desc->count);
403 return copy_len;
406 static void mptcp_wait_data(struct sock *sk, long *timeo)
408 DEFINE_WAIT_FUNC(wait, woken_wake_function);
409 struct mptcp_sock *msk = mptcp_sk(sk);
411 add_wait_queue(sk_sleep(sk), &wait);
412 sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk);
414 sk_wait_event(sk, timeo,
415 test_and_clear_bit(MPTCP_DATA_READY, &msk->flags), &wait);
417 sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk);
418 remove_wait_queue(sk_sleep(sk), &wait);
421 static int mptcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len,
422 int nonblock, int flags, int *addr_len)
424 struct mptcp_sock *msk = mptcp_sk(sk);
425 struct mptcp_subflow_context *subflow;
426 bool more_data_avail = false;
427 struct mptcp_read_arg arg;
428 read_descriptor_t desc;
429 bool wait_data = false;
430 struct socket *ssock;
431 struct tcp_sock *tp;
432 bool done = false;
433 struct sock *ssk;
434 int copied = 0;
435 int target;
436 long timeo;
438 if (msg->msg_flags & ~(MSG_WAITALL | MSG_DONTWAIT))
439 return -EOPNOTSUPP;
441 lock_sock(sk);
442 ssock = __mptcp_tcp_fallback(msk);
443 if (unlikely(ssock)) {
444 fallback:
445 pr_debug("fallback-read subflow=%p",
446 mptcp_subflow_ctx(ssock->sk));
447 copied = sock_recvmsg(ssock, msg, flags);
448 return copied;
451 arg.msg = msg;
452 desc.arg.data = &arg;
453 desc.error = 0;
455 timeo = sock_rcvtimeo(sk, nonblock);
457 len = min_t(size_t, len, INT_MAX);
458 target = sock_rcvlowat(sk, flags & MSG_WAITALL, len);
460 while (!done) {
461 u32 map_remaining;
462 int bytes_read;
464 ssk = mptcp_subflow_recv_lookup(msk);
465 pr_debug("msk=%p ssk=%p", msk, ssk);
466 if (!ssk)
467 goto wait_for_data;
469 subflow = mptcp_subflow_ctx(ssk);
470 tp = tcp_sk(ssk);
472 lock_sock(ssk);
473 do {
474 /* try to read as much data as available */
475 map_remaining = subflow->map_data_len -
476 mptcp_subflow_get_map_offset(subflow);
477 desc.count = min_t(size_t, len - copied, map_remaining);
478 pr_debug("reading %zu bytes, copied %d", desc.count,
479 copied);
480 bytes_read = tcp_read_sock(ssk, &desc,
481 mptcp_read_actor);
482 if (bytes_read < 0) {
483 if (!copied)
484 copied = bytes_read;
485 done = true;
486 goto next;
489 pr_debug("msk ack_seq=%llx -> %llx", msk->ack_seq,
490 msk->ack_seq + bytes_read);
491 msk->ack_seq += bytes_read;
492 copied += bytes_read;
493 if (copied >= len) {
494 done = true;
495 goto next;
497 if (tp->urg_data && tp->urg_seq == tp->copied_seq) {
498 pr_err("Urgent data present, cannot proceed");
499 done = true;
500 goto next;
502 next:
503 more_data_avail = mptcp_subflow_data_available(ssk);
504 } while (more_data_avail && !done);
505 release_sock(ssk);
506 continue;
508 wait_for_data:
509 more_data_avail = false;
511 /* only the master socket status is relevant here. The exit
512 * conditions mirror closely tcp_recvmsg()
514 if (copied >= target)
515 break;
517 if (copied) {
518 if (sk->sk_err ||
519 sk->sk_state == TCP_CLOSE ||
520 (sk->sk_shutdown & RCV_SHUTDOWN) ||
521 !timeo ||
522 signal_pending(current))
523 break;
524 } else {
525 if (sk->sk_err) {
526 copied = sock_error(sk);
527 break;
530 if (sk->sk_shutdown & RCV_SHUTDOWN)
531 break;
533 if (sk->sk_state == TCP_CLOSE) {
534 copied = -ENOTCONN;
535 break;
538 if (!timeo) {
539 copied = -EAGAIN;
540 break;
543 if (signal_pending(current)) {
544 copied = sock_intr_errno(timeo);
545 break;
549 pr_debug("block timeout %ld", timeo);
550 wait_data = true;
551 mptcp_wait_data(sk, &timeo);
552 if (unlikely(__mptcp_tcp_fallback(msk)))
553 goto fallback;
556 if (more_data_avail) {
557 if (!test_bit(MPTCP_DATA_READY, &msk->flags))
558 set_bit(MPTCP_DATA_READY, &msk->flags);
559 } else if (!wait_data) {
560 clear_bit(MPTCP_DATA_READY, &msk->flags);
562 /* .. race-breaker: ssk might get new data after last
563 * data_available() returns false.
565 ssk = mptcp_subflow_recv_lookup(msk);
566 if (unlikely(ssk))
567 set_bit(MPTCP_DATA_READY, &msk->flags);
570 release_sock(sk);
571 return copied;
574 /* subflow sockets can be either outgoing (connect) or incoming
575 * (accept).
577 * Outgoing subflows use in-kernel sockets.
578 * Incoming subflows do not have their own 'struct socket' allocated,
579 * so we need to use tcp_close() after detaching them from the mptcp
580 * parent socket.
582 static void __mptcp_close_ssk(struct sock *sk, struct sock *ssk,
583 struct mptcp_subflow_context *subflow,
584 long timeout)
586 struct socket *sock = READ_ONCE(ssk->sk_socket);
588 list_del(&subflow->node);
590 if (sock && sock != sk->sk_socket) {
591 /* outgoing subflow */
592 sock_release(sock);
593 } else {
594 /* incoming subflow */
595 tcp_close(ssk, timeout);
599 static int __mptcp_init_sock(struct sock *sk)
601 struct mptcp_sock *msk = mptcp_sk(sk);
603 INIT_LIST_HEAD(&msk->conn_list);
604 __set_bit(MPTCP_SEND_SPACE, &msk->flags);
606 msk->first = NULL;
608 return 0;
611 static int mptcp_init_sock(struct sock *sk)
613 if (!mptcp_is_enabled(sock_net(sk)))
614 return -ENOPROTOOPT;
616 return __mptcp_init_sock(sk);
619 static void mptcp_subflow_shutdown(struct sock *ssk, int how)
621 lock_sock(ssk);
623 switch (ssk->sk_state) {
624 case TCP_LISTEN:
625 if (!(how & RCV_SHUTDOWN))
626 break;
627 /* fall through */
628 case TCP_SYN_SENT:
629 tcp_disconnect(ssk, O_NONBLOCK);
630 break;
631 default:
632 ssk->sk_shutdown |= how;
633 tcp_shutdown(ssk, how);
634 break;
637 /* Wake up anyone sleeping in poll. */
638 ssk->sk_state_change(ssk);
639 release_sock(ssk);
642 /* Called with msk lock held, releases such lock before returning */
643 static void __mptcp_close(struct sock *sk, long timeout)
645 struct mptcp_subflow_context *subflow, *tmp;
646 struct mptcp_sock *msk = mptcp_sk(sk);
647 LIST_HEAD(conn_list);
649 mptcp_token_destroy(msk->token);
650 inet_sk_state_store(sk, TCP_CLOSE);
652 list_splice_init(&msk->conn_list, &conn_list);
654 release_sock(sk);
656 list_for_each_entry_safe(subflow, tmp, &conn_list, node) {
657 struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
659 __mptcp_close_ssk(sk, ssk, subflow, timeout);
662 sk_common_release(sk);
665 static void mptcp_close(struct sock *sk, long timeout)
667 lock_sock(sk);
668 __mptcp_close(sk, timeout);
671 static void mptcp_copy_inaddrs(struct sock *msk, const struct sock *ssk)
673 #if IS_ENABLED(CONFIG_MPTCP_IPV6)
674 const struct ipv6_pinfo *ssk6 = inet6_sk(ssk);
675 struct ipv6_pinfo *msk6 = inet6_sk(msk);
677 msk->sk_v6_daddr = ssk->sk_v6_daddr;
678 msk->sk_v6_rcv_saddr = ssk->sk_v6_rcv_saddr;
680 if (msk6 && ssk6) {
681 msk6->saddr = ssk6->saddr;
682 msk6->flow_label = ssk6->flow_label;
684 #endif
686 inet_sk(msk)->inet_num = inet_sk(ssk)->inet_num;
687 inet_sk(msk)->inet_dport = inet_sk(ssk)->inet_dport;
688 inet_sk(msk)->inet_sport = inet_sk(ssk)->inet_sport;
689 inet_sk(msk)->inet_daddr = inet_sk(ssk)->inet_daddr;
690 inet_sk(msk)->inet_saddr = inet_sk(ssk)->inet_saddr;
691 inet_sk(msk)->inet_rcv_saddr = inet_sk(ssk)->inet_rcv_saddr;
694 static struct sock *mptcp_accept(struct sock *sk, int flags, int *err,
695 bool kern)
697 struct mptcp_sock *msk = mptcp_sk(sk);
698 struct socket *listener;
699 struct sock *newsk;
701 listener = __mptcp_nmpc_socket(msk);
702 if (WARN_ON_ONCE(!listener)) {
703 *err = -EINVAL;
704 return NULL;
707 pr_debug("msk=%p, listener=%p", msk, mptcp_subflow_ctx(listener->sk));
708 newsk = inet_csk_accept(listener->sk, flags, err, kern);
709 if (!newsk)
710 return NULL;
712 pr_debug("msk=%p, subflow is mptcp=%d", msk, sk_is_mptcp(newsk));
714 if (sk_is_mptcp(newsk)) {
715 struct mptcp_subflow_context *subflow;
716 struct sock *new_mptcp_sock;
717 struct sock *ssk = newsk;
718 u64 ack_seq;
720 subflow = mptcp_subflow_ctx(newsk);
721 lock_sock(sk);
723 local_bh_disable();
724 new_mptcp_sock = sk_clone_lock(sk, GFP_ATOMIC);
725 if (!new_mptcp_sock) {
726 *err = -ENOBUFS;
727 local_bh_enable();
728 release_sock(sk);
729 mptcp_subflow_shutdown(newsk, SHUT_RDWR + 1);
730 tcp_close(newsk, 0);
731 return NULL;
734 __mptcp_init_sock(new_mptcp_sock);
736 msk = mptcp_sk(new_mptcp_sock);
737 msk->local_key = subflow->local_key;
738 msk->token = subflow->token;
739 msk->subflow = NULL;
740 msk->first = newsk;
742 mptcp_token_update_accept(newsk, new_mptcp_sock);
744 msk->write_seq = subflow->idsn + 1;
745 if (subflow->can_ack) {
746 msk->can_ack = true;
747 msk->remote_key = subflow->remote_key;
748 mptcp_crypto_key_sha(msk->remote_key, NULL, &ack_seq);
749 ack_seq++;
750 msk->ack_seq = ack_seq;
752 newsk = new_mptcp_sock;
753 mptcp_copy_inaddrs(newsk, ssk);
754 list_add(&subflow->node, &msk->conn_list);
756 /* will be fully established at mptcp_stream_accept()
757 * completion.
759 inet_sk_state_store(new_mptcp_sock, TCP_SYN_RECV);
760 bh_unlock_sock(new_mptcp_sock);
761 local_bh_enable();
762 release_sock(sk);
764 /* the subflow can already receive packet, avoid racing with
765 * the receive path and process the pending ones
767 lock_sock(ssk);
768 subflow->rel_write_seq = 1;
769 subflow->tcp_sock = ssk;
770 subflow->conn = new_mptcp_sock;
771 if (unlikely(!skb_queue_empty(&ssk->sk_receive_queue)))
772 mptcp_subflow_data_available(ssk);
773 release_sock(ssk);
776 return newsk;
779 static void mptcp_destroy(struct sock *sk)
781 struct mptcp_sock *msk = mptcp_sk(sk);
783 if (msk->cached_ext)
784 __skb_ext_put(msk->cached_ext);
787 static int mptcp_setsockopt(struct sock *sk, int level, int optname,
788 char __user *optval, unsigned int optlen)
790 struct mptcp_sock *msk = mptcp_sk(sk);
791 int ret = -EOPNOTSUPP;
792 struct socket *ssock;
793 struct sock *ssk;
795 pr_debug("msk=%p", msk);
797 /* @@ the meaning of setsockopt() when the socket is connected and
798 * there are multiple subflows is not defined.
800 lock_sock(sk);
801 ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE);
802 if (IS_ERR(ssock)) {
803 release_sock(sk);
804 return ret;
807 ssk = ssock->sk;
808 sock_hold(ssk);
809 release_sock(sk);
811 ret = tcp_setsockopt(ssk, level, optname, optval, optlen);
812 sock_put(ssk);
814 return ret;
817 static int mptcp_getsockopt(struct sock *sk, int level, int optname,
818 char __user *optval, int __user *option)
820 struct mptcp_sock *msk = mptcp_sk(sk);
821 int ret = -EOPNOTSUPP;
822 struct socket *ssock;
823 struct sock *ssk;
825 pr_debug("msk=%p", msk);
827 /* @@ the meaning of getsockopt() when the socket is connected and
828 * there are multiple subflows is not defined.
830 lock_sock(sk);
831 ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE);
832 if (IS_ERR(ssock)) {
833 release_sock(sk);
834 return ret;
837 ssk = ssock->sk;
838 sock_hold(ssk);
839 release_sock(sk);
841 ret = tcp_getsockopt(ssk, level, optname, optval, option);
842 sock_put(ssk);
844 return ret;
847 static int mptcp_get_port(struct sock *sk, unsigned short snum)
849 struct mptcp_sock *msk = mptcp_sk(sk);
850 struct socket *ssock;
852 ssock = __mptcp_nmpc_socket(msk);
853 pr_debug("msk=%p, subflow=%p", msk, ssock);
854 if (WARN_ON_ONCE(!ssock))
855 return -EINVAL;
857 return inet_csk_get_port(ssock->sk, snum);
860 void mptcp_finish_connect(struct sock *ssk)
862 struct mptcp_subflow_context *subflow;
863 struct mptcp_sock *msk;
864 struct sock *sk;
865 u64 ack_seq;
867 subflow = mptcp_subflow_ctx(ssk);
869 if (!subflow->mp_capable)
870 return;
872 sk = subflow->conn;
873 msk = mptcp_sk(sk);
875 pr_debug("msk=%p, token=%u", sk, subflow->token);
877 mptcp_crypto_key_sha(subflow->remote_key, NULL, &ack_seq);
878 ack_seq++;
879 subflow->map_seq = ack_seq;
880 subflow->map_subflow_seq = 1;
881 subflow->rel_write_seq = 1;
883 /* the socket is not connected yet, no msk/subflow ops can access/race
884 * accessing the field below
886 WRITE_ONCE(msk->remote_key, subflow->remote_key);
887 WRITE_ONCE(msk->local_key, subflow->local_key);
888 WRITE_ONCE(msk->token, subflow->token);
889 WRITE_ONCE(msk->write_seq, subflow->idsn + 1);
890 WRITE_ONCE(msk->ack_seq, ack_seq);
891 WRITE_ONCE(msk->can_ack, 1);
894 static void mptcp_sock_graft(struct sock *sk, struct socket *parent)
896 write_lock_bh(&sk->sk_callback_lock);
897 rcu_assign_pointer(sk->sk_wq, &parent->wq);
898 sk_set_socket(sk, parent);
899 sk->sk_uid = SOCK_INODE(parent)->i_uid;
900 write_unlock_bh(&sk->sk_callback_lock);
903 static bool mptcp_memory_free(const struct sock *sk, int wake)
905 struct mptcp_sock *msk = mptcp_sk(sk);
907 return wake ? test_bit(MPTCP_SEND_SPACE, &msk->flags) : true;
910 static struct proto mptcp_prot = {
911 .name = "MPTCP",
912 .owner = THIS_MODULE,
913 .init = mptcp_init_sock,
914 .close = mptcp_close,
915 .accept = mptcp_accept,
916 .setsockopt = mptcp_setsockopt,
917 .getsockopt = mptcp_getsockopt,
918 .shutdown = tcp_shutdown,
919 .destroy = mptcp_destroy,
920 .sendmsg = mptcp_sendmsg,
921 .recvmsg = mptcp_recvmsg,
922 .hash = inet_hash,
923 .unhash = inet_unhash,
924 .get_port = mptcp_get_port,
925 .stream_memory_free = mptcp_memory_free,
926 .obj_size = sizeof(struct mptcp_sock),
927 .no_autobind = true,
930 static int mptcp_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
932 struct mptcp_sock *msk = mptcp_sk(sock->sk);
933 struct socket *ssock;
934 int err;
936 lock_sock(sock->sk);
937 ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE);
938 if (IS_ERR(ssock)) {
939 err = PTR_ERR(ssock);
940 goto unlock;
943 err = ssock->ops->bind(ssock, uaddr, addr_len);
944 if (!err)
945 mptcp_copy_inaddrs(sock->sk, ssock->sk);
947 unlock:
948 release_sock(sock->sk);
949 return err;
952 static int mptcp_stream_connect(struct socket *sock, struct sockaddr *uaddr,
953 int addr_len, int flags)
955 struct mptcp_sock *msk = mptcp_sk(sock->sk);
956 struct socket *ssock;
957 int err;
959 lock_sock(sock->sk);
960 ssock = __mptcp_socket_create(msk, TCP_SYN_SENT);
961 if (IS_ERR(ssock)) {
962 err = PTR_ERR(ssock);
963 goto unlock;
966 #ifdef CONFIG_TCP_MD5SIG
967 /* no MPTCP if MD5SIG is enabled on this socket or we may run out of
968 * TCP option space.
970 if (rcu_access_pointer(tcp_sk(ssock->sk)->md5sig_info))
971 mptcp_subflow_ctx(ssock->sk)->request_mptcp = 0;
972 #endif
974 err = ssock->ops->connect(ssock, uaddr, addr_len, flags);
975 inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk));
976 mptcp_copy_inaddrs(sock->sk, ssock->sk);
978 unlock:
979 release_sock(sock->sk);
980 return err;
983 static int mptcp_v4_getname(struct socket *sock, struct sockaddr *uaddr,
984 int peer)
986 if (sock->sk->sk_prot == &tcp_prot) {
987 /* we are being invoked from __sys_accept4, after
988 * mptcp_accept() has just accepted a non-mp-capable
989 * flow: sk is a tcp_sk, not an mptcp one.
991 * Hand the socket over to tcp so all further socket ops
992 * bypass mptcp.
994 sock->ops = &inet_stream_ops;
997 return inet_getname(sock, uaddr, peer);
1000 #if IS_ENABLED(CONFIG_MPTCP_IPV6)
1001 static int mptcp_v6_getname(struct socket *sock, struct sockaddr *uaddr,
1002 int peer)
1004 if (sock->sk->sk_prot == &tcpv6_prot) {
1005 /* we are being invoked from __sys_accept4 after
1006 * mptcp_accept() has accepted a non-mp-capable
1007 * subflow: sk is a tcp_sk, not mptcp.
1009 * Hand the socket over to tcp so all further
1010 * socket ops bypass mptcp.
1012 sock->ops = &inet6_stream_ops;
1015 return inet6_getname(sock, uaddr, peer);
1017 #endif
1019 static int mptcp_listen(struct socket *sock, int backlog)
1021 struct mptcp_sock *msk = mptcp_sk(sock->sk);
1022 struct socket *ssock;
1023 int err;
1025 pr_debug("msk=%p", msk);
1027 lock_sock(sock->sk);
1028 ssock = __mptcp_socket_create(msk, TCP_LISTEN);
1029 if (IS_ERR(ssock)) {
1030 err = PTR_ERR(ssock);
1031 goto unlock;
1034 err = ssock->ops->listen(ssock, backlog);
1035 inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk));
1036 if (!err)
1037 mptcp_copy_inaddrs(sock->sk, ssock->sk);
1039 unlock:
1040 release_sock(sock->sk);
1041 return err;
1044 static bool is_tcp_proto(const struct proto *p)
1046 #if IS_ENABLED(CONFIG_MPTCP_IPV6)
1047 return p == &tcp_prot || p == &tcpv6_prot;
1048 #else
1049 return p == &tcp_prot;
1050 #endif
1053 static int mptcp_stream_accept(struct socket *sock, struct socket *newsock,
1054 int flags, bool kern)
1056 struct mptcp_sock *msk = mptcp_sk(sock->sk);
1057 struct socket *ssock;
1058 int err;
1060 pr_debug("msk=%p", msk);
1062 lock_sock(sock->sk);
1063 if (sock->sk->sk_state != TCP_LISTEN)
1064 goto unlock_fail;
1066 ssock = __mptcp_nmpc_socket(msk);
1067 if (!ssock)
1068 goto unlock_fail;
1070 sock_hold(ssock->sk);
1071 release_sock(sock->sk);
1073 err = ssock->ops->accept(sock, newsock, flags, kern);
1074 if (err == 0 && !is_tcp_proto(newsock->sk->sk_prot)) {
1075 struct mptcp_sock *msk = mptcp_sk(newsock->sk);
1076 struct mptcp_subflow_context *subflow;
1078 /* set ssk->sk_socket of accept()ed flows to mptcp socket.
1079 * This is needed so NOSPACE flag can be set from tcp stack.
1081 list_for_each_entry(subflow, &msk->conn_list, node) {
1082 struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
1084 if (!ssk->sk_socket)
1085 mptcp_sock_graft(ssk, newsock);
1088 inet_sk_state_store(newsock->sk, TCP_ESTABLISHED);
1091 sock_put(ssock->sk);
1092 return err;
1094 unlock_fail:
1095 release_sock(sock->sk);
1096 return -EINVAL;
1099 static __poll_t mptcp_poll(struct file *file, struct socket *sock,
1100 struct poll_table_struct *wait)
1102 struct sock *sk = sock->sk;
1103 struct mptcp_sock *msk;
1104 struct socket *ssock;
1105 __poll_t mask = 0;
1107 msk = mptcp_sk(sk);
1108 lock_sock(sk);
1109 ssock = __mptcp_nmpc_socket(msk);
1110 if (ssock) {
1111 mask = ssock->ops->poll(file, ssock, wait);
1112 release_sock(sk);
1113 return mask;
1116 release_sock(sk);
1117 sock_poll_wait(file, sock, wait);
1118 lock_sock(sk);
1119 ssock = __mptcp_tcp_fallback(msk);
1120 if (unlikely(ssock))
1121 return ssock->ops->poll(file, ssock, NULL);
1123 if (test_bit(MPTCP_DATA_READY, &msk->flags))
1124 mask = EPOLLIN | EPOLLRDNORM;
1125 if (sk_stream_is_writeable(sk) &&
1126 test_bit(MPTCP_SEND_SPACE, &msk->flags))
1127 mask |= EPOLLOUT | EPOLLWRNORM;
1128 if (sk->sk_shutdown & RCV_SHUTDOWN)
1129 mask |= EPOLLIN | EPOLLRDNORM | EPOLLRDHUP;
1131 release_sock(sk);
1133 return mask;
1136 static int mptcp_shutdown(struct socket *sock, int how)
1138 struct mptcp_sock *msk = mptcp_sk(sock->sk);
1139 struct mptcp_subflow_context *subflow;
1140 int ret = 0;
1142 pr_debug("sk=%p, how=%d", msk, how);
1144 lock_sock(sock->sk);
1146 if (how == SHUT_WR || how == SHUT_RDWR)
1147 inet_sk_state_store(sock->sk, TCP_FIN_WAIT1);
1149 how++;
1151 if ((how & ~SHUTDOWN_MASK) || !how) {
1152 ret = -EINVAL;
1153 goto out_unlock;
1156 if (sock->state == SS_CONNECTING) {
1157 if ((1 << sock->sk->sk_state) &
1158 (TCPF_SYN_SENT | TCPF_SYN_RECV | TCPF_CLOSE))
1159 sock->state = SS_DISCONNECTING;
1160 else
1161 sock->state = SS_CONNECTED;
1164 mptcp_for_each_subflow(msk, subflow) {
1165 struct sock *tcp_sk = mptcp_subflow_tcp_sock(subflow);
1167 mptcp_subflow_shutdown(tcp_sk, how);
1170 out_unlock:
1171 release_sock(sock->sk);
1173 return ret;
1176 static const struct proto_ops mptcp_stream_ops = {
1177 .family = PF_INET,
1178 .owner = THIS_MODULE,
1179 .release = inet_release,
1180 .bind = mptcp_bind,
1181 .connect = mptcp_stream_connect,
1182 .socketpair = sock_no_socketpair,
1183 .accept = mptcp_stream_accept,
1184 .getname = mptcp_v4_getname,
1185 .poll = mptcp_poll,
1186 .ioctl = inet_ioctl,
1187 .gettstamp = sock_gettstamp,
1188 .listen = mptcp_listen,
1189 .shutdown = mptcp_shutdown,
1190 .setsockopt = sock_common_setsockopt,
1191 .getsockopt = sock_common_getsockopt,
1192 .sendmsg = inet_sendmsg,
1193 .recvmsg = inet_recvmsg,
1194 .mmap = sock_no_mmap,
1195 .sendpage = inet_sendpage,
1196 #ifdef CONFIG_COMPAT
1197 .compat_setsockopt = compat_sock_common_setsockopt,
1198 .compat_getsockopt = compat_sock_common_getsockopt,
1199 #endif
1202 static struct inet_protosw mptcp_protosw = {
1203 .type = SOCK_STREAM,
1204 .protocol = IPPROTO_MPTCP,
1205 .prot = &mptcp_prot,
1206 .ops = &mptcp_stream_ops,
1207 .flags = INET_PROTOSW_ICSK,
1210 void mptcp_proto_init(void)
1212 mptcp_prot.h.hashinfo = tcp_prot.h.hashinfo;
1214 mptcp_subflow_init();
1216 if (proto_register(&mptcp_prot, 1) != 0)
1217 panic("Failed to register MPTCP proto.\n");
1219 inet_register_protosw(&mptcp_protosw);
1222 #if IS_ENABLED(CONFIG_MPTCP_IPV6)
1223 static const struct proto_ops mptcp_v6_stream_ops = {
1224 .family = PF_INET6,
1225 .owner = THIS_MODULE,
1226 .release = inet6_release,
1227 .bind = mptcp_bind,
1228 .connect = mptcp_stream_connect,
1229 .socketpair = sock_no_socketpair,
1230 .accept = mptcp_stream_accept,
1231 .getname = mptcp_v6_getname,
1232 .poll = mptcp_poll,
1233 .ioctl = inet6_ioctl,
1234 .gettstamp = sock_gettstamp,
1235 .listen = mptcp_listen,
1236 .shutdown = mptcp_shutdown,
1237 .setsockopt = sock_common_setsockopt,
1238 .getsockopt = sock_common_getsockopt,
1239 .sendmsg = inet6_sendmsg,
1240 .recvmsg = inet6_recvmsg,
1241 .mmap = sock_no_mmap,
1242 .sendpage = inet_sendpage,
1243 #ifdef CONFIG_COMPAT
1244 .compat_setsockopt = compat_sock_common_setsockopt,
1245 .compat_getsockopt = compat_sock_common_getsockopt,
1246 #endif
1249 static struct proto mptcp_v6_prot;
1251 static void mptcp_v6_destroy(struct sock *sk)
1253 mptcp_destroy(sk);
1254 inet6_destroy_sock(sk);
1257 static struct inet_protosw mptcp_v6_protosw = {
1258 .type = SOCK_STREAM,
1259 .protocol = IPPROTO_MPTCP,
1260 .prot = &mptcp_v6_prot,
1261 .ops = &mptcp_v6_stream_ops,
1262 .flags = INET_PROTOSW_ICSK,
1265 int mptcp_proto_v6_init(void)
1267 int err;
1269 mptcp_v6_prot = mptcp_prot;
1270 strcpy(mptcp_v6_prot.name, "MPTCPv6");
1271 mptcp_v6_prot.slab = NULL;
1272 mptcp_v6_prot.destroy = mptcp_v6_destroy;
1273 mptcp_v6_prot.obj_size = sizeof(struct mptcp_sock) +
1274 sizeof(struct ipv6_pinfo);
1276 err = proto_register(&mptcp_v6_prot, 1);
1277 if (err)
1278 return err;
1280 err = inet6_register_protosw(&mptcp_v6_protosw);
1281 if (err)
1282 proto_unregister(&mptcp_v6_prot);
1284 return err;
1286 #endif