1f870fa0bSMat Martineau // SPDX-License-Identifier: GPL-2.0 2f870fa0bSMat Martineau /* Multipath TCP 3f870fa0bSMat Martineau * 4f870fa0bSMat Martineau * Copyright (c) 2017 - 2019, Intel Corporation. 5f870fa0bSMat Martineau */ 6f870fa0bSMat Martineau 7f870fa0bSMat Martineau #define pr_fmt(fmt) "MPTCP: " fmt 8f870fa0bSMat Martineau 9f870fa0bSMat Martineau #include <linux/kernel.h> 10f870fa0bSMat Martineau #include <linux/module.h> 11f870fa0bSMat Martineau #include <linux/netdevice.h> 12f870fa0bSMat Martineau #include <net/sock.h> 13f870fa0bSMat Martineau #include <net/inet_common.h> 14f870fa0bSMat Martineau #include <net/inet_hashtables.h> 15f870fa0bSMat Martineau #include <net/protocol.h> 16f870fa0bSMat Martineau #include <net/tcp.h> 17cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 18cf7da0d6SPeter Krystad #include <net/transp_v6.h> 19cf7da0d6SPeter Krystad #endif 20f870fa0bSMat Martineau #include <net/mptcp.h> 21f870fa0bSMat Martineau #include "protocol.h" 22f870fa0bSMat Martineau 232303f994SPeter Krystad #define MPTCP_SAME_STATE TCP_MAX_STATES 242303f994SPeter Krystad 252303f994SPeter Krystad /* If msk has an initial subflow socket, and the MP_CAPABLE handshake has not 262303f994SPeter Krystad * completed yet or has failed, return the subflow socket. 272303f994SPeter Krystad * Otherwise return NULL. 282303f994SPeter Krystad */ 292303f994SPeter Krystad static struct socket *__mptcp_nmpc_socket(const struct mptcp_sock *msk) 302303f994SPeter Krystad { 31cec37a6eSPeter Krystad if (!msk->subflow || mptcp_subflow_ctx(msk->subflow->sk)->fourth_ack) 322303f994SPeter Krystad return NULL; 332303f994SPeter Krystad 342303f994SPeter Krystad return msk->subflow; 352303f994SPeter Krystad } 362303f994SPeter Krystad 37cec37a6eSPeter Krystad /* if msk has a single subflow, and the mp_capable handshake is failed, 38cec37a6eSPeter Krystad * return it. 39cec37a6eSPeter Krystad * Otherwise returns NULL 40cec37a6eSPeter Krystad */ 41cec37a6eSPeter Krystad static struct socket *__mptcp_tcp_fallback(const struct mptcp_sock *msk) 42cec37a6eSPeter Krystad { 43cec37a6eSPeter Krystad struct socket *ssock = __mptcp_nmpc_socket(msk); 44cec37a6eSPeter Krystad 45cec37a6eSPeter Krystad sock_owned_by_me((const struct sock *)msk); 46cec37a6eSPeter Krystad 47cec37a6eSPeter Krystad if (!ssock || sk_is_mptcp(ssock->sk)) 48cec37a6eSPeter Krystad return NULL; 49cec37a6eSPeter Krystad 50cec37a6eSPeter Krystad return ssock; 51cec37a6eSPeter Krystad } 52cec37a6eSPeter Krystad 532303f994SPeter Krystad static bool __mptcp_can_create_subflow(const struct mptcp_sock *msk) 542303f994SPeter Krystad { 552303f994SPeter Krystad return ((struct sock *)msk)->sk_state == TCP_CLOSE; 562303f994SPeter Krystad } 572303f994SPeter Krystad 582303f994SPeter Krystad static struct socket *__mptcp_socket_create(struct mptcp_sock *msk, int state) 592303f994SPeter Krystad { 602303f994SPeter Krystad struct mptcp_subflow_context *subflow; 612303f994SPeter Krystad struct sock *sk = (struct sock *)msk; 622303f994SPeter Krystad struct socket *ssock; 632303f994SPeter Krystad int err; 642303f994SPeter Krystad 652303f994SPeter Krystad ssock = __mptcp_nmpc_socket(msk); 662303f994SPeter Krystad if (ssock) 672303f994SPeter Krystad goto set_state; 682303f994SPeter Krystad 692303f994SPeter Krystad if (!__mptcp_can_create_subflow(msk)) 702303f994SPeter Krystad return ERR_PTR(-EINVAL); 712303f994SPeter Krystad 722303f994SPeter Krystad err = mptcp_subflow_create_socket(sk, &ssock); 732303f994SPeter Krystad if (err) 742303f994SPeter Krystad return ERR_PTR(err); 752303f994SPeter Krystad 762303f994SPeter Krystad msk->subflow = ssock; 772303f994SPeter Krystad subflow = mptcp_subflow_ctx(ssock->sk); 78cec37a6eSPeter Krystad list_add(&subflow->node, &msk->conn_list); 792303f994SPeter Krystad subflow->request_mptcp = 1; 802303f994SPeter Krystad 812303f994SPeter Krystad set_state: 822303f994SPeter Krystad if (state != MPTCP_SAME_STATE) 832303f994SPeter Krystad inet_sk_state_store(sk, state); 842303f994SPeter Krystad return ssock; 852303f994SPeter Krystad } 862303f994SPeter Krystad 87cec37a6eSPeter Krystad static struct sock *mptcp_subflow_get(const struct mptcp_sock *msk) 88cec37a6eSPeter Krystad { 89cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow; 90cec37a6eSPeter Krystad 91cec37a6eSPeter Krystad sock_owned_by_me((const struct sock *)msk); 92cec37a6eSPeter Krystad 93cec37a6eSPeter Krystad mptcp_for_each_subflow(msk, subflow) { 94cec37a6eSPeter Krystad return mptcp_subflow_tcp_sock(subflow); 95cec37a6eSPeter Krystad } 96cec37a6eSPeter Krystad 97cec37a6eSPeter Krystad return NULL; 98cec37a6eSPeter Krystad } 99cec37a6eSPeter Krystad 100f870fa0bSMat Martineau static int mptcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) 101f870fa0bSMat Martineau { 102f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 103cec37a6eSPeter Krystad struct socket *ssock; 104cec37a6eSPeter Krystad struct sock *ssk; 105cec37a6eSPeter Krystad int ret; 106f870fa0bSMat Martineau 107f870fa0bSMat Martineau if (msg->msg_flags & ~(MSG_MORE | MSG_DONTWAIT | MSG_NOSIGNAL)) 108f870fa0bSMat Martineau return -EOPNOTSUPP; 109f870fa0bSMat Martineau 110cec37a6eSPeter Krystad lock_sock(sk); 111cec37a6eSPeter Krystad ssock = __mptcp_tcp_fallback(msk); 112cec37a6eSPeter Krystad if (ssock) { 113cec37a6eSPeter Krystad pr_debug("fallback passthrough"); 114cec37a6eSPeter Krystad ret = sock_sendmsg(ssock, msg); 115cec37a6eSPeter Krystad release_sock(sk); 116cec37a6eSPeter Krystad return ret; 117cec37a6eSPeter Krystad } 118cec37a6eSPeter Krystad 119cec37a6eSPeter Krystad ssk = mptcp_subflow_get(msk); 120cec37a6eSPeter Krystad if (!ssk) { 121cec37a6eSPeter Krystad release_sock(sk); 122cec37a6eSPeter Krystad return -ENOTCONN; 123cec37a6eSPeter Krystad } 124cec37a6eSPeter Krystad 125cec37a6eSPeter Krystad ret = sock_sendmsg(ssk->sk_socket, msg); 126cec37a6eSPeter Krystad 127cec37a6eSPeter Krystad release_sock(sk); 128cec37a6eSPeter Krystad return ret; 129f870fa0bSMat Martineau } 130f870fa0bSMat Martineau 131f870fa0bSMat Martineau static int mptcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len, 132f870fa0bSMat Martineau int nonblock, int flags, int *addr_len) 133f870fa0bSMat Martineau { 134f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 135cec37a6eSPeter Krystad struct socket *ssock; 136cec37a6eSPeter Krystad struct sock *ssk; 137cec37a6eSPeter Krystad int copied = 0; 138f870fa0bSMat Martineau 139f870fa0bSMat Martineau if (msg->msg_flags & ~(MSG_WAITALL | MSG_DONTWAIT)) 140f870fa0bSMat Martineau return -EOPNOTSUPP; 141f870fa0bSMat Martineau 142cec37a6eSPeter Krystad lock_sock(sk); 143cec37a6eSPeter Krystad ssock = __mptcp_tcp_fallback(msk); 144cec37a6eSPeter Krystad if (ssock) { 145cec37a6eSPeter Krystad pr_debug("fallback-read subflow=%p", 146cec37a6eSPeter Krystad mptcp_subflow_ctx(ssock->sk)); 147cec37a6eSPeter Krystad copied = sock_recvmsg(ssock, msg, flags); 148cec37a6eSPeter Krystad release_sock(sk); 149cec37a6eSPeter Krystad return copied; 150cec37a6eSPeter Krystad } 151cec37a6eSPeter Krystad 152cec37a6eSPeter Krystad ssk = mptcp_subflow_get(msk); 153cec37a6eSPeter Krystad if (!ssk) { 154cec37a6eSPeter Krystad release_sock(sk); 155cec37a6eSPeter Krystad return -ENOTCONN; 156cec37a6eSPeter Krystad } 157cec37a6eSPeter Krystad 158cec37a6eSPeter Krystad copied = sock_recvmsg(ssk->sk_socket, msg, flags); 159cec37a6eSPeter Krystad 160cec37a6eSPeter Krystad release_sock(sk); 161cec37a6eSPeter Krystad 162cec37a6eSPeter Krystad return copied; 163cec37a6eSPeter Krystad } 164cec37a6eSPeter Krystad 165cec37a6eSPeter Krystad /* subflow sockets can be either outgoing (connect) or incoming 166cec37a6eSPeter Krystad * (accept). 167cec37a6eSPeter Krystad * 168cec37a6eSPeter Krystad * Outgoing subflows use in-kernel sockets. 169cec37a6eSPeter Krystad * Incoming subflows do not have their own 'struct socket' allocated, 170cec37a6eSPeter Krystad * so we need to use tcp_close() after detaching them from the mptcp 171cec37a6eSPeter Krystad * parent socket. 172cec37a6eSPeter Krystad */ 173cec37a6eSPeter Krystad static void __mptcp_close_ssk(struct sock *sk, struct sock *ssk, 174cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow, 175cec37a6eSPeter Krystad long timeout) 176cec37a6eSPeter Krystad { 177cec37a6eSPeter Krystad struct socket *sock = READ_ONCE(ssk->sk_socket); 178cec37a6eSPeter Krystad 179cec37a6eSPeter Krystad list_del(&subflow->node); 180cec37a6eSPeter Krystad 181cec37a6eSPeter Krystad if (sock && sock != sk->sk_socket) { 182cec37a6eSPeter Krystad /* outgoing subflow */ 183cec37a6eSPeter Krystad sock_release(sock); 184cec37a6eSPeter Krystad } else { 185cec37a6eSPeter Krystad /* incoming subflow */ 186cec37a6eSPeter Krystad tcp_close(ssk, timeout); 187cec37a6eSPeter Krystad } 188f870fa0bSMat Martineau } 189f870fa0bSMat Martineau 190f870fa0bSMat Martineau static int mptcp_init_sock(struct sock *sk) 191f870fa0bSMat Martineau { 192cec37a6eSPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 193cec37a6eSPeter Krystad 194cec37a6eSPeter Krystad INIT_LIST_HEAD(&msk->conn_list); 195cec37a6eSPeter Krystad 196f870fa0bSMat Martineau return 0; 197f870fa0bSMat Martineau } 198f870fa0bSMat Martineau 199*21498490SPeter Krystad static void mptcp_subflow_shutdown(struct sock *ssk, int how) 200*21498490SPeter Krystad { 201*21498490SPeter Krystad lock_sock(ssk); 202*21498490SPeter Krystad 203*21498490SPeter Krystad switch (ssk->sk_state) { 204*21498490SPeter Krystad case TCP_LISTEN: 205*21498490SPeter Krystad if (!(how & RCV_SHUTDOWN)) 206*21498490SPeter Krystad break; 207*21498490SPeter Krystad /* fall through */ 208*21498490SPeter Krystad case TCP_SYN_SENT: 209*21498490SPeter Krystad tcp_disconnect(ssk, O_NONBLOCK); 210*21498490SPeter Krystad break; 211*21498490SPeter Krystad default: 212*21498490SPeter Krystad ssk->sk_shutdown |= how; 213*21498490SPeter Krystad tcp_shutdown(ssk, how); 214*21498490SPeter Krystad break; 215*21498490SPeter Krystad } 216*21498490SPeter Krystad 217*21498490SPeter Krystad /* Wake up anyone sleeping in poll. */ 218*21498490SPeter Krystad ssk->sk_state_change(ssk); 219*21498490SPeter Krystad release_sock(ssk); 220*21498490SPeter Krystad } 221*21498490SPeter Krystad 222f870fa0bSMat Martineau static void mptcp_close(struct sock *sk, long timeout) 223f870fa0bSMat Martineau { 224cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow, *tmp; 225f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 226f870fa0bSMat Martineau 22779c0949eSPeter Krystad mptcp_token_destroy(msk->token); 228f870fa0bSMat Martineau inet_sk_state_store(sk, TCP_CLOSE); 229f870fa0bSMat Martineau 230cec37a6eSPeter Krystad lock_sock(sk); 231cec37a6eSPeter Krystad 232cec37a6eSPeter Krystad list_for_each_entry_safe(subflow, tmp, &msk->conn_list, node) { 233cec37a6eSPeter Krystad struct sock *ssk = mptcp_subflow_tcp_sock(subflow); 234cec37a6eSPeter Krystad 235cec37a6eSPeter Krystad __mptcp_close_ssk(sk, ssk, subflow, timeout); 236f870fa0bSMat Martineau } 237f870fa0bSMat Martineau 238cec37a6eSPeter Krystad release_sock(sk); 239cec37a6eSPeter Krystad sk_common_release(sk); 240f870fa0bSMat Martineau } 241f870fa0bSMat Martineau 242cf7da0d6SPeter Krystad static void mptcp_copy_inaddrs(struct sock *msk, const struct sock *ssk) 243cf7da0d6SPeter Krystad { 244cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 245cf7da0d6SPeter Krystad const struct ipv6_pinfo *ssk6 = inet6_sk(ssk); 246cf7da0d6SPeter Krystad struct ipv6_pinfo *msk6 = inet6_sk(msk); 247cf7da0d6SPeter Krystad 248cf7da0d6SPeter Krystad msk->sk_v6_daddr = ssk->sk_v6_daddr; 249cf7da0d6SPeter Krystad msk->sk_v6_rcv_saddr = ssk->sk_v6_rcv_saddr; 250cf7da0d6SPeter Krystad 251cf7da0d6SPeter Krystad if (msk6 && ssk6) { 252cf7da0d6SPeter Krystad msk6->saddr = ssk6->saddr; 253cf7da0d6SPeter Krystad msk6->flow_label = ssk6->flow_label; 254cf7da0d6SPeter Krystad } 255cf7da0d6SPeter Krystad #endif 256cf7da0d6SPeter Krystad 257cf7da0d6SPeter Krystad inet_sk(msk)->inet_num = inet_sk(ssk)->inet_num; 258cf7da0d6SPeter Krystad inet_sk(msk)->inet_dport = inet_sk(ssk)->inet_dport; 259cf7da0d6SPeter Krystad inet_sk(msk)->inet_sport = inet_sk(ssk)->inet_sport; 260cf7da0d6SPeter Krystad inet_sk(msk)->inet_daddr = inet_sk(ssk)->inet_daddr; 261cf7da0d6SPeter Krystad inet_sk(msk)->inet_saddr = inet_sk(ssk)->inet_saddr; 262cf7da0d6SPeter Krystad inet_sk(msk)->inet_rcv_saddr = inet_sk(ssk)->inet_rcv_saddr; 263cf7da0d6SPeter Krystad } 264cf7da0d6SPeter Krystad 265cf7da0d6SPeter Krystad static struct sock *mptcp_accept(struct sock *sk, int flags, int *err, 266cf7da0d6SPeter Krystad bool kern) 267cf7da0d6SPeter Krystad { 268cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 269cf7da0d6SPeter Krystad struct socket *listener; 270cf7da0d6SPeter Krystad struct sock *newsk; 271cf7da0d6SPeter Krystad 272cf7da0d6SPeter Krystad listener = __mptcp_nmpc_socket(msk); 273cf7da0d6SPeter Krystad if (WARN_ON_ONCE(!listener)) { 274cf7da0d6SPeter Krystad *err = -EINVAL; 275cf7da0d6SPeter Krystad return NULL; 276cf7da0d6SPeter Krystad } 277cf7da0d6SPeter Krystad 278cf7da0d6SPeter Krystad pr_debug("msk=%p, listener=%p", msk, mptcp_subflow_ctx(listener->sk)); 279cf7da0d6SPeter Krystad newsk = inet_csk_accept(listener->sk, flags, err, kern); 280cf7da0d6SPeter Krystad if (!newsk) 281cf7da0d6SPeter Krystad return NULL; 282cf7da0d6SPeter Krystad 283cf7da0d6SPeter Krystad pr_debug("msk=%p, subflow is mptcp=%d", msk, sk_is_mptcp(newsk)); 284cf7da0d6SPeter Krystad 285cf7da0d6SPeter Krystad if (sk_is_mptcp(newsk)) { 286cf7da0d6SPeter Krystad struct mptcp_subflow_context *subflow; 287cf7da0d6SPeter Krystad struct sock *new_mptcp_sock; 288cf7da0d6SPeter Krystad struct sock *ssk = newsk; 289cf7da0d6SPeter Krystad 290cf7da0d6SPeter Krystad subflow = mptcp_subflow_ctx(newsk); 291cf7da0d6SPeter Krystad lock_sock(sk); 292cf7da0d6SPeter Krystad 293cf7da0d6SPeter Krystad local_bh_disable(); 294cf7da0d6SPeter Krystad new_mptcp_sock = sk_clone_lock(sk, GFP_ATOMIC); 295cf7da0d6SPeter Krystad if (!new_mptcp_sock) { 296cf7da0d6SPeter Krystad *err = -ENOBUFS; 297cf7da0d6SPeter Krystad local_bh_enable(); 298cf7da0d6SPeter Krystad release_sock(sk); 299*21498490SPeter Krystad mptcp_subflow_shutdown(newsk, SHUT_RDWR + 1); 300cf7da0d6SPeter Krystad tcp_close(newsk, 0); 301cf7da0d6SPeter Krystad return NULL; 302cf7da0d6SPeter Krystad } 303cf7da0d6SPeter Krystad 304cf7da0d6SPeter Krystad mptcp_init_sock(new_mptcp_sock); 305cf7da0d6SPeter Krystad 306cf7da0d6SPeter Krystad msk = mptcp_sk(new_mptcp_sock); 307cf7da0d6SPeter Krystad msk->remote_key = subflow->remote_key; 308cf7da0d6SPeter Krystad msk->local_key = subflow->local_key; 30979c0949eSPeter Krystad msk->token = subflow->token; 310cf7da0d6SPeter Krystad msk->subflow = NULL; 311cf7da0d6SPeter Krystad 31279c0949eSPeter Krystad mptcp_token_update_accept(newsk, new_mptcp_sock); 313cf7da0d6SPeter Krystad newsk = new_mptcp_sock; 314cf7da0d6SPeter Krystad mptcp_copy_inaddrs(newsk, ssk); 315cf7da0d6SPeter Krystad list_add(&subflow->node, &msk->conn_list); 316cf7da0d6SPeter Krystad 317cf7da0d6SPeter Krystad /* will be fully established at mptcp_stream_accept() 318cf7da0d6SPeter Krystad * completion. 319cf7da0d6SPeter Krystad */ 320cf7da0d6SPeter Krystad inet_sk_state_store(new_mptcp_sock, TCP_SYN_RECV); 321cf7da0d6SPeter Krystad bh_unlock_sock(new_mptcp_sock); 322cf7da0d6SPeter Krystad local_bh_enable(); 323cf7da0d6SPeter Krystad release_sock(sk); 324cf7da0d6SPeter Krystad } 325cf7da0d6SPeter Krystad 326cf7da0d6SPeter Krystad return newsk; 327cf7da0d6SPeter Krystad } 328cf7da0d6SPeter Krystad 32979c0949eSPeter Krystad static void mptcp_destroy(struct sock *sk) 33079c0949eSPeter Krystad { 33179c0949eSPeter Krystad } 33279c0949eSPeter Krystad 333cec37a6eSPeter Krystad static int mptcp_get_port(struct sock *sk, unsigned short snum) 334f870fa0bSMat Martineau { 335f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 336cec37a6eSPeter Krystad struct socket *ssock; 337f870fa0bSMat Martineau 338cec37a6eSPeter Krystad ssock = __mptcp_nmpc_socket(msk); 339cec37a6eSPeter Krystad pr_debug("msk=%p, subflow=%p", msk, ssock); 340cec37a6eSPeter Krystad if (WARN_ON_ONCE(!ssock)) 341cec37a6eSPeter Krystad return -EINVAL; 342f870fa0bSMat Martineau 343cec37a6eSPeter Krystad return inet_csk_get_port(ssock->sk, snum); 344cec37a6eSPeter Krystad } 345f870fa0bSMat Martineau 346cec37a6eSPeter Krystad void mptcp_finish_connect(struct sock *ssk) 347cec37a6eSPeter Krystad { 348cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow; 349cec37a6eSPeter Krystad struct mptcp_sock *msk; 350cec37a6eSPeter Krystad struct sock *sk; 351f870fa0bSMat Martineau 352cec37a6eSPeter Krystad subflow = mptcp_subflow_ctx(ssk); 353f870fa0bSMat Martineau 354cec37a6eSPeter Krystad if (!subflow->mp_capable) 355cec37a6eSPeter Krystad return; 356cec37a6eSPeter Krystad 357cec37a6eSPeter Krystad sk = subflow->conn; 358cec37a6eSPeter Krystad msk = mptcp_sk(sk); 359cec37a6eSPeter Krystad 360cec37a6eSPeter Krystad /* the socket is not connected yet, no msk/subflow ops can access/race 361cec37a6eSPeter Krystad * accessing the field below 362cec37a6eSPeter Krystad */ 363cec37a6eSPeter Krystad WRITE_ONCE(msk->remote_key, subflow->remote_key); 364cec37a6eSPeter Krystad WRITE_ONCE(msk->local_key, subflow->local_key); 36579c0949eSPeter Krystad WRITE_ONCE(msk->token, subflow->token); 366f870fa0bSMat Martineau } 367f870fa0bSMat Martineau 368cf7da0d6SPeter Krystad static void mptcp_sock_graft(struct sock *sk, struct socket *parent) 369cf7da0d6SPeter Krystad { 370cf7da0d6SPeter Krystad write_lock_bh(&sk->sk_callback_lock); 371cf7da0d6SPeter Krystad rcu_assign_pointer(sk->sk_wq, &parent->wq); 372cf7da0d6SPeter Krystad sk_set_socket(sk, parent); 373cf7da0d6SPeter Krystad sk->sk_uid = SOCK_INODE(parent)->i_uid; 374cf7da0d6SPeter Krystad write_unlock_bh(&sk->sk_callback_lock); 375cf7da0d6SPeter Krystad } 376cf7da0d6SPeter Krystad 377f870fa0bSMat Martineau static struct proto mptcp_prot = { 378f870fa0bSMat Martineau .name = "MPTCP", 379f870fa0bSMat Martineau .owner = THIS_MODULE, 380f870fa0bSMat Martineau .init = mptcp_init_sock, 381f870fa0bSMat Martineau .close = mptcp_close, 382cf7da0d6SPeter Krystad .accept = mptcp_accept, 383f870fa0bSMat Martineau .shutdown = tcp_shutdown, 38479c0949eSPeter Krystad .destroy = mptcp_destroy, 385f870fa0bSMat Martineau .sendmsg = mptcp_sendmsg, 386f870fa0bSMat Martineau .recvmsg = mptcp_recvmsg, 387f870fa0bSMat Martineau .hash = inet_hash, 388f870fa0bSMat Martineau .unhash = inet_unhash, 389cec37a6eSPeter Krystad .get_port = mptcp_get_port, 390f870fa0bSMat Martineau .obj_size = sizeof(struct mptcp_sock), 391f870fa0bSMat Martineau .no_autobind = true, 392f870fa0bSMat Martineau }; 393f870fa0bSMat Martineau 3942303f994SPeter Krystad static int mptcp_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) 3952303f994SPeter Krystad { 3962303f994SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 3972303f994SPeter Krystad struct socket *ssock; 398cf7da0d6SPeter Krystad int err; 3992303f994SPeter Krystad 4002303f994SPeter Krystad lock_sock(sock->sk); 4012303f994SPeter Krystad ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE); 4022303f994SPeter Krystad if (IS_ERR(ssock)) { 4032303f994SPeter Krystad err = PTR_ERR(ssock); 4042303f994SPeter Krystad goto unlock; 4052303f994SPeter Krystad } 4062303f994SPeter Krystad 4072303f994SPeter Krystad err = ssock->ops->bind(ssock, uaddr, addr_len); 408cf7da0d6SPeter Krystad if (!err) 409cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 4102303f994SPeter Krystad 4112303f994SPeter Krystad unlock: 4122303f994SPeter Krystad release_sock(sock->sk); 4132303f994SPeter Krystad return err; 4142303f994SPeter Krystad } 4152303f994SPeter Krystad 4162303f994SPeter Krystad static int mptcp_stream_connect(struct socket *sock, struct sockaddr *uaddr, 4172303f994SPeter Krystad int addr_len, int flags) 4182303f994SPeter Krystad { 4192303f994SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 4202303f994SPeter Krystad struct socket *ssock; 4212303f994SPeter Krystad int err; 4222303f994SPeter Krystad 4232303f994SPeter Krystad lock_sock(sock->sk); 4242303f994SPeter Krystad ssock = __mptcp_socket_create(msk, TCP_SYN_SENT); 4252303f994SPeter Krystad if (IS_ERR(ssock)) { 4262303f994SPeter Krystad err = PTR_ERR(ssock); 4272303f994SPeter Krystad goto unlock; 4282303f994SPeter Krystad } 4292303f994SPeter Krystad 430cf7da0d6SPeter Krystad #ifdef CONFIG_TCP_MD5SIG 431cf7da0d6SPeter Krystad /* no MPTCP if MD5SIG is enabled on this socket or we may run out of 432cf7da0d6SPeter Krystad * TCP option space. 433cf7da0d6SPeter Krystad */ 434cf7da0d6SPeter Krystad if (rcu_access_pointer(tcp_sk(ssock->sk)->md5sig_info)) 435cf7da0d6SPeter Krystad mptcp_subflow_ctx(ssock->sk)->request_mptcp = 0; 436cf7da0d6SPeter Krystad #endif 437cf7da0d6SPeter Krystad 4382303f994SPeter Krystad err = ssock->ops->connect(ssock, uaddr, addr_len, flags); 4392303f994SPeter Krystad inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk)); 440cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 4412303f994SPeter Krystad 4422303f994SPeter Krystad unlock: 4432303f994SPeter Krystad release_sock(sock->sk); 4442303f994SPeter Krystad return err; 4452303f994SPeter Krystad } 4462303f994SPeter Krystad 447cf7da0d6SPeter Krystad static int mptcp_v4_getname(struct socket *sock, struct sockaddr *uaddr, 448cf7da0d6SPeter Krystad int peer) 449cf7da0d6SPeter Krystad { 450cf7da0d6SPeter Krystad if (sock->sk->sk_prot == &tcp_prot) { 451cf7da0d6SPeter Krystad /* we are being invoked from __sys_accept4, after 452cf7da0d6SPeter Krystad * mptcp_accept() has just accepted a non-mp-capable 453cf7da0d6SPeter Krystad * flow: sk is a tcp_sk, not an mptcp one. 454cf7da0d6SPeter Krystad * 455cf7da0d6SPeter Krystad * Hand the socket over to tcp so all further socket ops 456cf7da0d6SPeter Krystad * bypass mptcp. 457cf7da0d6SPeter Krystad */ 458cf7da0d6SPeter Krystad sock->ops = &inet_stream_ops; 459cf7da0d6SPeter Krystad } 460cf7da0d6SPeter Krystad 461cf7da0d6SPeter Krystad return inet_getname(sock, uaddr, peer); 462cf7da0d6SPeter Krystad } 463cf7da0d6SPeter Krystad 464cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 465cf7da0d6SPeter Krystad static int mptcp_v6_getname(struct socket *sock, struct sockaddr *uaddr, 466cf7da0d6SPeter Krystad int peer) 467cf7da0d6SPeter Krystad { 468cf7da0d6SPeter Krystad if (sock->sk->sk_prot == &tcpv6_prot) { 469cf7da0d6SPeter Krystad /* we are being invoked from __sys_accept4 after 470cf7da0d6SPeter Krystad * mptcp_accept() has accepted a non-mp-capable 471cf7da0d6SPeter Krystad * subflow: sk is a tcp_sk, not mptcp. 472cf7da0d6SPeter Krystad * 473cf7da0d6SPeter Krystad * Hand the socket over to tcp so all further 474cf7da0d6SPeter Krystad * socket ops bypass mptcp. 475cf7da0d6SPeter Krystad */ 476cf7da0d6SPeter Krystad sock->ops = &inet6_stream_ops; 477cf7da0d6SPeter Krystad } 478cf7da0d6SPeter Krystad 479cf7da0d6SPeter Krystad return inet6_getname(sock, uaddr, peer); 480cf7da0d6SPeter Krystad } 481cf7da0d6SPeter Krystad #endif 482cf7da0d6SPeter Krystad 483cf7da0d6SPeter Krystad static int mptcp_listen(struct socket *sock, int backlog) 484cf7da0d6SPeter Krystad { 485cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 486cf7da0d6SPeter Krystad struct socket *ssock; 487cf7da0d6SPeter Krystad int err; 488cf7da0d6SPeter Krystad 489cf7da0d6SPeter Krystad pr_debug("msk=%p", msk); 490cf7da0d6SPeter Krystad 491cf7da0d6SPeter Krystad lock_sock(sock->sk); 492cf7da0d6SPeter Krystad ssock = __mptcp_socket_create(msk, TCP_LISTEN); 493cf7da0d6SPeter Krystad if (IS_ERR(ssock)) { 494cf7da0d6SPeter Krystad err = PTR_ERR(ssock); 495cf7da0d6SPeter Krystad goto unlock; 496cf7da0d6SPeter Krystad } 497cf7da0d6SPeter Krystad 498cf7da0d6SPeter Krystad err = ssock->ops->listen(ssock, backlog); 499cf7da0d6SPeter Krystad inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk)); 500cf7da0d6SPeter Krystad if (!err) 501cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 502cf7da0d6SPeter Krystad 503cf7da0d6SPeter Krystad unlock: 504cf7da0d6SPeter Krystad release_sock(sock->sk); 505cf7da0d6SPeter Krystad return err; 506cf7da0d6SPeter Krystad } 507cf7da0d6SPeter Krystad 508cf7da0d6SPeter Krystad static bool is_tcp_proto(const struct proto *p) 509cf7da0d6SPeter Krystad { 510cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 511cf7da0d6SPeter Krystad return p == &tcp_prot || p == &tcpv6_prot; 512cf7da0d6SPeter Krystad #else 513cf7da0d6SPeter Krystad return p == &tcp_prot; 514cf7da0d6SPeter Krystad #endif 515cf7da0d6SPeter Krystad } 516cf7da0d6SPeter Krystad 517cf7da0d6SPeter Krystad static int mptcp_stream_accept(struct socket *sock, struct socket *newsock, 518cf7da0d6SPeter Krystad int flags, bool kern) 519cf7da0d6SPeter Krystad { 520cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 521cf7da0d6SPeter Krystad struct socket *ssock; 522cf7da0d6SPeter Krystad int err; 523cf7da0d6SPeter Krystad 524cf7da0d6SPeter Krystad pr_debug("msk=%p", msk); 525cf7da0d6SPeter Krystad 526cf7da0d6SPeter Krystad lock_sock(sock->sk); 527cf7da0d6SPeter Krystad if (sock->sk->sk_state != TCP_LISTEN) 528cf7da0d6SPeter Krystad goto unlock_fail; 529cf7da0d6SPeter Krystad 530cf7da0d6SPeter Krystad ssock = __mptcp_nmpc_socket(msk); 531cf7da0d6SPeter Krystad if (!ssock) 532cf7da0d6SPeter Krystad goto unlock_fail; 533cf7da0d6SPeter Krystad 534cf7da0d6SPeter Krystad sock_hold(ssock->sk); 535cf7da0d6SPeter Krystad release_sock(sock->sk); 536cf7da0d6SPeter Krystad 537cf7da0d6SPeter Krystad err = ssock->ops->accept(sock, newsock, flags, kern); 538cf7da0d6SPeter Krystad if (err == 0 && !is_tcp_proto(newsock->sk->sk_prot)) { 539cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(newsock->sk); 540cf7da0d6SPeter Krystad struct mptcp_subflow_context *subflow; 541cf7da0d6SPeter Krystad 542cf7da0d6SPeter Krystad /* set ssk->sk_socket of accept()ed flows to mptcp socket. 543cf7da0d6SPeter Krystad * This is needed so NOSPACE flag can be set from tcp stack. 544cf7da0d6SPeter Krystad */ 545cf7da0d6SPeter Krystad list_for_each_entry(subflow, &msk->conn_list, node) { 546cf7da0d6SPeter Krystad struct sock *ssk = mptcp_subflow_tcp_sock(subflow); 547cf7da0d6SPeter Krystad 548cf7da0d6SPeter Krystad if (!ssk->sk_socket) 549cf7da0d6SPeter Krystad mptcp_sock_graft(ssk, newsock); 550cf7da0d6SPeter Krystad } 551cf7da0d6SPeter Krystad 552cf7da0d6SPeter Krystad inet_sk_state_store(newsock->sk, TCP_ESTABLISHED); 553cf7da0d6SPeter Krystad } 554cf7da0d6SPeter Krystad 555cf7da0d6SPeter Krystad sock_put(ssock->sk); 556cf7da0d6SPeter Krystad return err; 557cf7da0d6SPeter Krystad 558cf7da0d6SPeter Krystad unlock_fail: 559cf7da0d6SPeter Krystad release_sock(sock->sk); 560cf7da0d6SPeter Krystad return -EINVAL; 561cf7da0d6SPeter Krystad } 562cf7da0d6SPeter Krystad 5632303f994SPeter Krystad static __poll_t mptcp_poll(struct file *file, struct socket *sock, 5642303f994SPeter Krystad struct poll_table_struct *wait) 5652303f994SPeter Krystad { 5662303f994SPeter Krystad __poll_t mask = 0; 5672303f994SPeter Krystad 5682303f994SPeter Krystad return mask; 5692303f994SPeter Krystad } 5702303f994SPeter Krystad 571*21498490SPeter Krystad static int mptcp_shutdown(struct socket *sock, int how) 572*21498490SPeter Krystad { 573*21498490SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 574*21498490SPeter Krystad struct mptcp_subflow_context *subflow; 575*21498490SPeter Krystad int ret = 0; 576*21498490SPeter Krystad 577*21498490SPeter Krystad pr_debug("sk=%p, how=%d", msk, how); 578*21498490SPeter Krystad 579*21498490SPeter Krystad lock_sock(sock->sk); 580*21498490SPeter Krystad 581*21498490SPeter Krystad if (how == SHUT_WR || how == SHUT_RDWR) 582*21498490SPeter Krystad inet_sk_state_store(sock->sk, TCP_FIN_WAIT1); 583*21498490SPeter Krystad 584*21498490SPeter Krystad how++; 585*21498490SPeter Krystad 586*21498490SPeter Krystad if ((how & ~SHUTDOWN_MASK) || !how) { 587*21498490SPeter Krystad ret = -EINVAL; 588*21498490SPeter Krystad goto out_unlock; 589*21498490SPeter Krystad } 590*21498490SPeter Krystad 591*21498490SPeter Krystad if (sock->state == SS_CONNECTING) { 592*21498490SPeter Krystad if ((1 << sock->sk->sk_state) & 593*21498490SPeter Krystad (TCPF_SYN_SENT | TCPF_SYN_RECV | TCPF_CLOSE)) 594*21498490SPeter Krystad sock->state = SS_DISCONNECTING; 595*21498490SPeter Krystad else 596*21498490SPeter Krystad sock->state = SS_CONNECTED; 597*21498490SPeter Krystad } 598*21498490SPeter Krystad 599*21498490SPeter Krystad mptcp_for_each_subflow(msk, subflow) { 600*21498490SPeter Krystad struct sock *tcp_sk = mptcp_subflow_tcp_sock(subflow); 601*21498490SPeter Krystad 602*21498490SPeter Krystad mptcp_subflow_shutdown(tcp_sk, how); 603*21498490SPeter Krystad } 604*21498490SPeter Krystad 605*21498490SPeter Krystad out_unlock: 606*21498490SPeter Krystad release_sock(sock->sk); 607*21498490SPeter Krystad 608*21498490SPeter Krystad return ret; 609*21498490SPeter Krystad } 610*21498490SPeter Krystad 6112303f994SPeter Krystad static struct proto_ops mptcp_stream_ops; 6122303f994SPeter Krystad 613f870fa0bSMat Martineau static struct inet_protosw mptcp_protosw = { 614f870fa0bSMat Martineau .type = SOCK_STREAM, 615f870fa0bSMat Martineau .protocol = IPPROTO_MPTCP, 616f870fa0bSMat Martineau .prot = &mptcp_prot, 6172303f994SPeter Krystad .ops = &mptcp_stream_ops, 6182303f994SPeter Krystad .flags = INET_PROTOSW_ICSK, 619f870fa0bSMat Martineau }; 620f870fa0bSMat Martineau 621f870fa0bSMat Martineau void __init mptcp_init(void) 622f870fa0bSMat Martineau { 6232303f994SPeter Krystad mptcp_prot.h.hashinfo = tcp_prot.h.hashinfo; 6242303f994SPeter Krystad mptcp_stream_ops = inet_stream_ops; 6252303f994SPeter Krystad mptcp_stream_ops.bind = mptcp_bind; 6262303f994SPeter Krystad mptcp_stream_ops.connect = mptcp_stream_connect; 6272303f994SPeter Krystad mptcp_stream_ops.poll = mptcp_poll; 628cf7da0d6SPeter Krystad mptcp_stream_ops.accept = mptcp_stream_accept; 629cf7da0d6SPeter Krystad mptcp_stream_ops.getname = mptcp_v4_getname; 630cf7da0d6SPeter Krystad mptcp_stream_ops.listen = mptcp_listen; 631*21498490SPeter Krystad mptcp_stream_ops.shutdown = mptcp_shutdown; 6322303f994SPeter Krystad 6332303f994SPeter Krystad mptcp_subflow_init(); 6342303f994SPeter Krystad 635f870fa0bSMat Martineau if (proto_register(&mptcp_prot, 1) != 0) 636f870fa0bSMat Martineau panic("Failed to register MPTCP proto.\n"); 637f870fa0bSMat Martineau 638f870fa0bSMat Martineau inet_register_protosw(&mptcp_protosw); 639f870fa0bSMat Martineau } 640f870fa0bSMat Martineau 641f870fa0bSMat Martineau #if IS_ENABLED(CONFIG_MPTCP_IPV6) 6422303f994SPeter Krystad static struct proto_ops mptcp_v6_stream_ops; 643f870fa0bSMat Martineau static struct proto mptcp_v6_prot; 644f870fa0bSMat Martineau 64579c0949eSPeter Krystad static void mptcp_v6_destroy(struct sock *sk) 64679c0949eSPeter Krystad { 64779c0949eSPeter Krystad mptcp_destroy(sk); 64879c0949eSPeter Krystad inet6_destroy_sock(sk); 64979c0949eSPeter Krystad } 65079c0949eSPeter Krystad 651f870fa0bSMat Martineau static struct inet_protosw mptcp_v6_protosw = { 652f870fa0bSMat Martineau .type = SOCK_STREAM, 653f870fa0bSMat Martineau .protocol = IPPROTO_MPTCP, 654f870fa0bSMat Martineau .prot = &mptcp_v6_prot, 6552303f994SPeter Krystad .ops = &mptcp_v6_stream_ops, 656f870fa0bSMat Martineau .flags = INET_PROTOSW_ICSK, 657f870fa0bSMat Martineau }; 658f870fa0bSMat Martineau 659f870fa0bSMat Martineau int mptcpv6_init(void) 660f870fa0bSMat Martineau { 661f870fa0bSMat Martineau int err; 662f870fa0bSMat Martineau 663f870fa0bSMat Martineau mptcp_v6_prot = mptcp_prot; 664f870fa0bSMat Martineau strcpy(mptcp_v6_prot.name, "MPTCPv6"); 665f870fa0bSMat Martineau mptcp_v6_prot.slab = NULL; 66679c0949eSPeter Krystad mptcp_v6_prot.destroy = mptcp_v6_destroy; 667f870fa0bSMat Martineau mptcp_v6_prot.obj_size = sizeof(struct mptcp_sock) + 668f870fa0bSMat Martineau sizeof(struct ipv6_pinfo); 669f870fa0bSMat Martineau 670f870fa0bSMat Martineau err = proto_register(&mptcp_v6_prot, 1); 671f870fa0bSMat Martineau if (err) 672f870fa0bSMat Martineau return err; 673f870fa0bSMat Martineau 6742303f994SPeter Krystad mptcp_v6_stream_ops = inet6_stream_ops; 6752303f994SPeter Krystad mptcp_v6_stream_ops.bind = mptcp_bind; 6762303f994SPeter Krystad mptcp_v6_stream_ops.connect = mptcp_stream_connect; 6772303f994SPeter Krystad mptcp_v6_stream_ops.poll = mptcp_poll; 678cf7da0d6SPeter Krystad mptcp_v6_stream_ops.accept = mptcp_stream_accept; 679cf7da0d6SPeter Krystad mptcp_v6_stream_ops.getname = mptcp_v6_getname; 680cf7da0d6SPeter Krystad mptcp_v6_stream_ops.listen = mptcp_listen; 681*21498490SPeter Krystad mptcp_v6_stream_ops.shutdown = mptcp_shutdown; 6822303f994SPeter Krystad 683f870fa0bSMat Martineau err = inet6_register_protosw(&mptcp_v6_protosw); 684f870fa0bSMat Martineau if (err) 685f870fa0bSMat Martineau proto_unregister(&mptcp_v6_prot); 686f870fa0bSMat Martineau 687f870fa0bSMat Martineau return err; 688f870fa0bSMat Martineau } 689f870fa0bSMat Martineau #endif 690