1f870fa0bSMat Martineau // SPDX-License-Identifier: GPL-2.0 2f870fa0bSMat Martineau /* Multipath TCP 3f870fa0bSMat Martineau * 4f870fa0bSMat Martineau * Copyright (c) 2017 - 2019, Intel Corporation. 5f870fa0bSMat Martineau */ 6f870fa0bSMat Martineau 7f870fa0bSMat Martineau #define pr_fmt(fmt) "MPTCP: " fmt 8f870fa0bSMat Martineau 9f870fa0bSMat Martineau #include <linux/kernel.h> 10f870fa0bSMat Martineau #include <linux/module.h> 11f870fa0bSMat Martineau #include <linux/netdevice.h> 12f870fa0bSMat Martineau #include <net/sock.h> 13f870fa0bSMat Martineau #include <net/inet_common.h> 14f870fa0bSMat Martineau #include <net/inet_hashtables.h> 15f870fa0bSMat Martineau #include <net/protocol.h> 16f870fa0bSMat Martineau #include <net/tcp.h> 17cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 18cf7da0d6SPeter Krystad #include <net/transp_v6.h> 19cf7da0d6SPeter Krystad #endif 20f870fa0bSMat Martineau #include <net/mptcp.h> 21f870fa0bSMat Martineau #include "protocol.h" 22f870fa0bSMat Martineau 232303f994SPeter Krystad #define MPTCP_SAME_STATE TCP_MAX_STATES 242303f994SPeter Krystad 252303f994SPeter Krystad /* If msk has an initial subflow socket, and the MP_CAPABLE handshake has not 262303f994SPeter Krystad * completed yet or has failed, return the subflow socket. 272303f994SPeter Krystad * Otherwise return NULL. 282303f994SPeter Krystad */ 292303f994SPeter Krystad static struct socket *__mptcp_nmpc_socket(const struct mptcp_sock *msk) 302303f994SPeter Krystad { 31cec37a6eSPeter Krystad if (!msk->subflow || mptcp_subflow_ctx(msk->subflow->sk)->fourth_ack) 322303f994SPeter Krystad return NULL; 332303f994SPeter Krystad 342303f994SPeter Krystad return msk->subflow; 352303f994SPeter Krystad } 362303f994SPeter Krystad 37cec37a6eSPeter Krystad /* if msk has a single subflow, and the mp_capable handshake is failed, 38cec37a6eSPeter Krystad * return it. 39cec37a6eSPeter Krystad * Otherwise returns NULL 40cec37a6eSPeter Krystad */ 41cec37a6eSPeter Krystad static struct socket *__mptcp_tcp_fallback(const struct mptcp_sock *msk) 42cec37a6eSPeter Krystad { 43cec37a6eSPeter Krystad struct socket *ssock = __mptcp_nmpc_socket(msk); 44cec37a6eSPeter Krystad 45cec37a6eSPeter Krystad sock_owned_by_me((const struct sock *)msk); 46cec37a6eSPeter Krystad 47cec37a6eSPeter Krystad if (!ssock || sk_is_mptcp(ssock->sk)) 48cec37a6eSPeter Krystad return NULL; 49cec37a6eSPeter Krystad 50cec37a6eSPeter Krystad return ssock; 51cec37a6eSPeter Krystad } 52cec37a6eSPeter Krystad 532303f994SPeter Krystad static bool __mptcp_can_create_subflow(const struct mptcp_sock *msk) 542303f994SPeter Krystad { 552303f994SPeter Krystad return ((struct sock *)msk)->sk_state == TCP_CLOSE; 562303f994SPeter Krystad } 572303f994SPeter Krystad 582303f994SPeter Krystad static struct socket *__mptcp_socket_create(struct mptcp_sock *msk, int state) 592303f994SPeter Krystad { 602303f994SPeter Krystad struct mptcp_subflow_context *subflow; 612303f994SPeter Krystad struct sock *sk = (struct sock *)msk; 622303f994SPeter Krystad struct socket *ssock; 632303f994SPeter Krystad int err; 642303f994SPeter Krystad 652303f994SPeter Krystad ssock = __mptcp_nmpc_socket(msk); 662303f994SPeter Krystad if (ssock) 672303f994SPeter Krystad goto set_state; 682303f994SPeter Krystad 692303f994SPeter Krystad if (!__mptcp_can_create_subflow(msk)) 702303f994SPeter Krystad return ERR_PTR(-EINVAL); 712303f994SPeter Krystad 722303f994SPeter Krystad err = mptcp_subflow_create_socket(sk, &ssock); 732303f994SPeter Krystad if (err) 742303f994SPeter Krystad return ERR_PTR(err); 752303f994SPeter Krystad 762303f994SPeter Krystad msk->subflow = ssock; 772303f994SPeter Krystad subflow = mptcp_subflow_ctx(ssock->sk); 78cec37a6eSPeter Krystad list_add(&subflow->node, &msk->conn_list); 792303f994SPeter Krystad subflow->request_mptcp = 1; 802303f994SPeter Krystad 812303f994SPeter Krystad set_state: 822303f994SPeter Krystad if (state != MPTCP_SAME_STATE) 832303f994SPeter Krystad inet_sk_state_store(sk, state); 842303f994SPeter Krystad return ssock; 852303f994SPeter Krystad } 862303f994SPeter Krystad 87cec37a6eSPeter Krystad static struct sock *mptcp_subflow_get(const struct mptcp_sock *msk) 88cec37a6eSPeter Krystad { 89cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow; 90cec37a6eSPeter Krystad 91cec37a6eSPeter Krystad sock_owned_by_me((const struct sock *)msk); 92cec37a6eSPeter Krystad 93cec37a6eSPeter Krystad mptcp_for_each_subflow(msk, subflow) { 94cec37a6eSPeter Krystad return mptcp_subflow_tcp_sock(subflow); 95cec37a6eSPeter Krystad } 96cec37a6eSPeter Krystad 97cec37a6eSPeter Krystad return NULL; 98cec37a6eSPeter Krystad } 99cec37a6eSPeter Krystad 100f870fa0bSMat Martineau static int mptcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) 101f870fa0bSMat Martineau { 102f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 103cec37a6eSPeter Krystad struct socket *ssock; 104cec37a6eSPeter Krystad struct sock *ssk; 105cec37a6eSPeter Krystad int ret; 106f870fa0bSMat Martineau 107f870fa0bSMat Martineau if (msg->msg_flags & ~(MSG_MORE | MSG_DONTWAIT | MSG_NOSIGNAL)) 108f870fa0bSMat Martineau return -EOPNOTSUPP; 109f870fa0bSMat Martineau 110cec37a6eSPeter Krystad lock_sock(sk); 111cec37a6eSPeter Krystad ssock = __mptcp_tcp_fallback(msk); 112cec37a6eSPeter Krystad if (ssock) { 113cec37a6eSPeter Krystad pr_debug("fallback passthrough"); 114cec37a6eSPeter Krystad ret = sock_sendmsg(ssock, msg); 115cec37a6eSPeter Krystad release_sock(sk); 116cec37a6eSPeter Krystad return ret; 117cec37a6eSPeter Krystad } 118cec37a6eSPeter Krystad 119cec37a6eSPeter Krystad ssk = mptcp_subflow_get(msk); 120cec37a6eSPeter Krystad if (!ssk) { 121cec37a6eSPeter Krystad release_sock(sk); 122cec37a6eSPeter Krystad return -ENOTCONN; 123cec37a6eSPeter Krystad } 124cec37a6eSPeter Krystad 125cec37a6eSPeter Krystad ret = sock_sendmsg(ssk->sk_socket, msg); 126cec37a6eSPeter Krystad 127cec37a6eSPeter Krystad release_sock(sk); 128cec37a6eSPeter Krystad return ret; 129f870fa0bSMat Martineau } 130f870fa0bSMat Martineau 131f870fa0bSMat Martineau static int mptcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len, 132f870fa0bSMat Martineau int nonblock, int flags, int *addr_len) 133f870fa0bSMat Martineau { 134f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 135cec37a6eSPeter Krystad struct socket *ssock; 136cec37a6eSPeter Krystad struct sock *ssk; 137cec37a6eSPeter Krystad int copied = 0; 138f870fa0bSMat Martineau 139f870fa0bSMat Martineau if (msg->msg_flags & ~(MSG_WAITALL | MSG_DONTWAIT)) 140f870fa0bSMat Martineau return -EOPNOTSUPP; 141f870fa0bSMat Martineau 142cec37a6eSPeter Krystad lock_sock(sk); 143cec37a6eSPeter Krystad ssock = __mptcp_tcp_fallback(msk); 144cec37a6eSPeter Krystad if (ssock) { 145cec37a6eSPeter Krystad pr_debug("fallback-read subflow=%p", 146cec37a6eSPeter Krystad mptcp_subflow_ctx(ssock->sk)); 147cec37a6eSPeter Krystad copied = sock_recvmsg(ssock, msg, flags); 148cec37a6eSPeter Krystad release_sock(sk); 149cec37a6eSPeter Krystad return copied; 150cec37a6eSPeter Krystad } 151cec37a6eSPeter Krystad 152cec37a6eSPeter Krystad ssk = mptcp_subflow_get(msk); 153cec37a6eSPeter Krystad if (!ssk) { 154cec37a6eSPeter Krystad release_sock(sk); 155cec37a6eSPeter Krystad return -ENOTCONN; 156cec37a6eSPeter Krystad } 157cec37a6eSPeter Krystad 158cec37a6eSPeter Krystad copied = sock_recvmsg(ssk->sk_socket, msg, flags); 159cec37a6eSPeter Krystad 160cec37a6eSPeter Krystad release_sock(sk); 161cec37a6eSPeter Krystad 162cec37a6eSPeter Krystad return copied; 163cec37a6eSPeter Krystad } 164cec37a6eSPeter Krystad 165cec37a6eSPeter Krystad /* subflow sockets can be either outgoing (connect) or incoming 166cec37a6eSPeter Krystad * (accept). 167cec37a6eSPeter Krystad * 168cec37a6eSPeter Krystad * Outgoing subflows use in-kernel sockets. 169cec37a6eSPeter Krystad * Incoming subflows do not have their own 'struct socket' allocated, 170cec37a6eSPeter Krystad * so we need to use tcp_close() after detaching them from the mptcp 171cec37a6eSPeter Krystad * parent socket. 172cec37a6eSPeter Krystad */ 173cec37a6eSPeter Krystad static void __mptcp_close_ssk(struct sock *sk, struct sock *ssk, 174cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow, 175cec37a6eSPeter Krystad long timeout) 176cec37a6eSPeter Krystad { 177cec37a6eSPeter Krystad struct socket *sock = READ_ONCE(ssk->sk_socket); 178cec37a6eSPeter Krystad 179cec37a6eSPeter Krystad list_del(&subflow->node); 180cec37a6eSPeter Krystad 181cec37a6eSPeter Krystad if (sock && sock != sk->sk_socket) { 182cec37a6eSPeter Krystad /* outgoing subflow */ 183cec37a6eSPeter Krystad sock_release(sock); 184cec37a6eSPeter Krystad } else { 185cec37a6eSPeter Krystad /* incoming subflow */ 186cec37a6eSPeter Krystad tcp_close(ssk, timeout); 187cec37a6eSPeter Krystad } 188f870fa0bSMat Martineau } 189f870fa0bSMat Martineau 190f870fa0bSMat Martineau static int mptcp_init_sock(struct sock *sk) 191f870fa0bSMat Martineau { 192cec37a6eSPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 193cec37a6eSPeter Krystad 194cec37a6eSPeter Krystad INIT_LIST_HEAD(&msk->conn_list); 195cec37a6eSPeter Krystad 196f870fa0bSMat Martineau return 0; 197f870fa0bSMat Martineau } 198f870fa0bSMat Martineau 19921498490SPeter Krystad static void mptcp_subflow_shutdown(struct sock *ssk, int how) 20021498490SPeter Krystad { 20121498490SPeter Krystad lock_sock(ssk); 20221498490SPeter Krystad 20321498490SPeter Krystad switch (ssk->sk_state) { 20421498490SPeter Krystad case TCP_LISTEN: 20521498490SPeter Krystad if (!(how & RCV_SHUTDOWN)) 20621498490SPeter Krystad break; 20721498490SPeter Krystad /* fall through */ 20821498490SPeter Krystad case TCP_SYN_SENT: 20921498490SPeter Krystad tcp_disconnect(ssk, O_NONBLOCK); 21021498490SPeter Krystad break; 21121498490SPeter Krystad default: 21221498490SPeter Krystad ssk->sk_shutdown |= how; 21321498490SPeter Krystad tcp_shutdown(ssk, how); 21421498490SPeter Krystad break; 21521498490SPeter Krystad } 21621498490SPeter Krystad 21721498490SPeter Krystad /* Wake up anyone sleeping in poll. */ 21821498490SPeter Krystad ssk->sk_state_change(ssk); 21921498490SPeter Krystad release_sock(ssk); 22021498490SPeter Krystad } 22121498490SPeter Krystad 222f870fa0bSMat Martineau static void mptcp_close(struct sock *sk, long timeout) 223f870fa0bSMat Martineau { 224cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow, *tmp; 225f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 226f870fa0bSMat Martineau 22779c0949eSPeter Krystad mptcp_token_destroy(msk->token); 228f870fa0bSMat Martineau inet_sk_state_store(sk, TCP_CLOSE); 229f870fa0bSMat Martineau 230cec37a6eSPeter Krystad lock_sock(sk); 231cec37a6eSPeter Krystad 232cec37a6eSPeter Krystad list_for_each_entry_safe(subflow, tmp, &msk->conn_list, node) { 233cec37a6eSPeter Krystad struct sock *ssk = mptcp_subflow_tcp_sock(subflow); 234cec37a6eSPeter Krystad 235cec37a6eSPeter Krystad __mptcp_close_ssk(sk, ssk, subflow, timeout); 236f870fa0bSMat Martineau } 237f870fa0bSMat Martineau 238cec37a6eSPeter Krystad release_sock(sk); 239cec37a6eSPeter Krystad sk_common_release(sk); 240f870fa0bSMat Martineau } 241f870fa0bSMat Martineau 242cf7da0d6SPeter Krystad static void mptcp_copy_inaddrs(struct sock *msk, const struct sock *ssk) 243cf7da0d6SPeter Krystad { 244cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 245cf7da0d6SPeter Krystad const struct ipv6_pinfo *ssk6 = inet6_sk(ssk); 246cf7da0d6SPeter Krystad struct ipv6_pinfo *msk6 = inet6_sk(msk); 247cf7da0d6SPeter Krystad 248cf7da0d6SPeter Krystad msk->sk_v6_daddr = ssk->sk_v6_daddr; 249cf7da0d6SPeter Krystad msk->sk_v6_rcv_saddr = ssk->sk_v6_rcv_saddr; 250cf7da0d6SPeter Krystad 251cf7da0d6SPeter Krystad if (msk6 && ssk6) { 252cf7da0d6SPeter Krystad msk6->saddr = ssk6->saddr; 253cf7da0d6SPeter Krystad msk6->flow_label = ssk6->flow_label; 254cf7da0d6SPeter Krystad } 255cf7da0d6SPeter Krystad #endif 256cf7da0d6SPeter Krystad 257cf7da0d6SPeter Krystad inet_sk(msk)->inet_num = inet_sk(ssk)->inet_num; 258cf7da0d6SPeter Krystad inet_sk(msk)->inet_dport = inet_sk(ssk)->inet_dport; 259cf7da0d6SPeter Krystad inet_sk(msk)->inet_sport = inet_sk(ssk)->inet_sport; 260cf7da0d6SPeter Krystad inet_sk(msk)->inet_daddr = inet_sk(ssk)->inet_daddr; 261cf7da0d6SPeter Krystad inet_sk(msk)->inet_saddr = inet_sk(ssk)->inet_saddr; 262cf7da0d6SPeter Krystad inet_sk(msk)->inet_rcv_saddr = inet_sk(ssk)->inet_rcv_saddr; 263cf7da0d6SPeter Krystad } 264cf7da0d6SPeter Krystad 265cf7da0d6SPeter Krystad static struct sock *mptcp_accept(struct sock *sk, int flags, int *err, 266cf7da0d6SPeter Krystad bool kern) 267cf7da0d6SPeter Krystad { 268cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 269cf7da0d6SPeter Krystad struct socket *listener; 270cf7da0d6SPeter Krystad struct sock *newsk; 271cf7da0d6SPeter Krystad 272cf7da0d6SPeter Krystad listener = __mptcp_nmpc_socket(msk); 273cf7da0d6SPeter Krystad if (WARN_ON_ONCE(!listener)) { 274cf7da0d6SPeter Krystad *err = -EINVAL; 275cf7da0d6SPeter Krystad return NULL; 276cf7da0d6SPeter Krystad } 277cf7da0d6SPeter Krystad 278cf7da0d6SPeter Krystad pr_debug("msk=%p, listener=%p", msk, mptcp_subflow_ctx(listener->sk)); 279cf7da0d6SPeter Krystad newsk = inet_csk_accept(listener->sk, flags, err, kern); 280cf7da0d6SPeter Krystad if (!newsk) 281cf7da0d6SPeter Krystad return NULL; 282cf7da0d6SPeter Krystad 283cf7da0d6SPeter Krystad pr_debug("msk=%p, subflow is mptcp=%d", msk, sk_is_mptcp(newsk)); 284cf7da0d6SPeter Krystad 285cf7da0d6SPeter Krystad if (sk_is_mptcp(newsk)) { 286cf7da0d6SPeter Krystad struct mptcp_subflow_context *subflow; 287cf7da0d6SPeter Krystad struct sock *new_mptcp_sock; 288cf7da0d6SPeter Krystad struct sock *ssk = newsk; 289cf7da0d6SPeter Krystad 290cf7da0d6SPeter Krystad subflow = mptcp_subflow_ctx(newsk); 291cf7da0d6SPeter Krystad lock_sock(sk); 292cf7da0d6SPeter Krystad 293cf7da0d6SPeter Krystad local_bh_disable(); 294cf7da0d6SPeter Krystad new_mptcp_sock = sk_clone_lock(sk, GFP_ATOMIC); 295cf7da0d6SPeter Krystad if (!new_mptcp_sock) { 296cf7da0d6SPeter Krystad *err = -ENOBUFS; 297cf7da0d6SPeter Krystad local_bh_enable(); 298cf7da0d6SPeter Krystad release_sock(sk); 29921498490SPeter Krystad mptcp_subflow_shutdown(newsk, SHUT_RDWR + 1); 300cf7da0d6SPeter Krystad tcp_close(newsk, 0); 301cf7da0d6SPeter Krystad return NULL; 302cf7da0d6SPeter Krystad } 303cf7da0d6SPeter Krystad 304cf7da0d6SPeter Krystad mptcp_init_sock(new_mptcp_sock); 305cf7da0d6SPeter Krystad 306cf7da0d6SPeter Krystad msk = mptcp_sk(new_mptcp_sock); 307cf7da0d6SPeter Krystad msk->remote_key = subflow->remote_key; 308cf7da0d6SPeter Krystad msk->local_key = subflow->local_key; 30979c0949eSPeter Krystad msk->token = subflow->token; 310cf7da0d6SPeter Krystad msk->subflow = NULL; 311cf7da0d6SPeter Krystad 31279c0949eSPeter Krystad mptcp_token_update_accept(newsk, new_mptcp_sock); 313cf7da0d6SPeter Krystad newsk = new_mptcp_sock; 314cf7da0d6SPeter Krystad mptcp_copy_inaddrs(newsk, ssk); 315cf7da0d6SPeter Krystad list_add(&subflow->node, &msk->conn_list); 316cf7da0d6SPeter Krystad 317cf7da0d6SPeter Krystad /* will be fully established at mptcp_stream_accept() 318cf7da0d6SPeter Krystad * completion. 319cf7da0d6SPeter Krystad */ 320cf7da0d6SPeter Krystad inet_sk_state_store(new_mptcp_sock, TCP_SYN_RECV); 321cf7da0d6SPeter Krystad bh_unlock_sock(new_mptcp_sock); 322cf7da0d6SPeter Krystad local_bh_enable(); 323cf7da0d6SPeter Krystad release_sock(sk); 324cf7da0d6SPeter Krystad } 325cf7da0d6SPeter Krystad 326cf7da0d6SPeter Krystad return newsk; 327cf7da0d6SPeter Krystad } 328cf7da0d6SPeter Krystad 32979c0949eSPeter Krystad static void mptcp_destroy(struct sock *sk) 33079c0949eSPeter Krystad { 33179c0949eSPeter Krystad } 33279c0949eSPeter Krystad 333*717e79c8SPeter Krystad static int mptcp_setsockopt(struct sock *sk, int level, int optname, 334*717e79c8SPeter Krystad char __user *uoptval, unsigned int optlen) 335*717e79c8SPeter Krystad { 336*717e79c8SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 337*717e79c8SPeter Krystad char __kernel *optval; 338*717e79c8SPeter Krystad int ret = -EOPNOTSUPP; 339*717e79c8SPeter Krystad struct socket *ssock; 340*717e79c8SPeter Krystad 341*717e79c8SPeter Krystad /* will be treated as __user in tcp_setsockopt */ 342*717e79c8SPeter Krystad optval = (char __kernel __force *)uoptval; 343*717e79c8SPeter Krystad 344*717e79c8SPeter Krystad pr_debug("msk=%p", msk); 345*717e79c8SPeter Krystad 346*717e79c8SPeter Krystad /* @@ the meaning of setsockopt() when the socket is connected and 347*717e79c8SPeter Krystad * there are multiple subflows is not defined. 348*717e79c8SPeter Krystad */ 349*717e79c8SPeter Krystad lock_sock(sk); 350*717e79c8SPeter Krystad ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE); 351*717e79c8SPeter Krystad if (!IS_ERR(ssock)) { 352*717e79c8SPeter Krystad pr_debug("subflow=%p", ssock->sk); 353*717e79c8SPeter Krystad ret = kernel_setsockopt(ssock, level, optname, optval, optlen); 354*717e79c8SPeter Krystad } 355*717e79c8SPeter Krystad release_sock(sk); 356*717e79c8SPeter Krystad 357*717e79c8SPeter Krystad return ret; 358*717e79c8SPeter Krystad } 359*717e79c8SPeter Krystad 360*717e79c8SPeter Krystad static int mptcp_getsockopt(struct sock *sk, int level, int optname, 361*717e79c8SPeter Krystad char __user *uoptval, int __user *uoption) 362*717e79c8SPeter Krystad { 363*717e79c8SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sk); 364*717e79c8SPeter Krystad char __kernel *optval; 365*717e79c8SPeter Krystad int ret = -EOPNOTSUPP; 366*717e79c8SPeter Krystad int __kernel *option; 367*717e79c8SPeter Krystad struct socket *ssock; 368*717e79c8SPeter Krystad 369*717e79c8SPeter Krystad /* will be treated as __user in tcp_getsockopt */ 370*717e79c8SPeter Krystad optval = (char __kernel __force *)uoptval; 371*717e79c8SPeter Krystad option = (int __kernel __force *)uoption; 372*717e79c8SPeter Krystad 373*717e79c8SPeter Krystad pr_debug("msk=%p", msk); 374*717e79c8SPeter Krystad 375*717e79c8SPeter Krystad /* @@ the meaning of getsockopt() when the socket is connected and 376*717e79c8SPeter Krystad * there are multiple subflows is not defined. 377*717e79c8SPeter Krystad */ 378*717e79c8SPeter Krystad lock_sock(sk); 379*717e79c8SPeter Krystad ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE); 380*717e79c8SPeter Krystad if (!IS_ERR(ssock)) { 381*717e79c8SPeter Krystad pr_debug("subflow=%p", ssock->sk); 382*717e79c8SPeter Krystad ret = kernel_getsockopt(ssock, level, optname, optval, option); 383*717e79c8SPeter Krystad } 384*717e79c8SPeter Krystad release_sock(sk); 385*717e79c8SPeter Krystad 386*717e79c8SPeter Krystad return ret; 387*717e79c8SPeter Krystad } 388*717e79c8SPeter Krystad 389cec37a6eSPeter Krystad static int mptcp_get_port(struct sock *sk, unsigned short snum) 390f870fa0bSMat Martineau { 391f870fa0bSMat Martineau struct mptcp_sock *msk = mptcp_sk(sk); 392cec37a6eSPeter Krystad struct socket *ssock; 393f870fa0bSMat Martineau 394cec37a6eSPeter Krystad ssock = __mptcp_nmpc_socket(msk); 395cec37a6eSPeter Krystad pr_debug("msk=%p, subflow=%p", msk, ssock); 396cec37a6eSPeter Krystad if (WARN_ON_ONCE(!ssock)) 397cec37a6eSPeter Krystad return -EINVAL; 398f870fa0bSMat Martineau 399cec37a6eSPeter Krystad return inet_csk_get_port(ssock->sk, snum); 400cec37a6eSPeter Krystad } 401f870fa0bSMat Martineau 402cec37a6eSPeter Krystad void mptcp_finish_connect(struct sock *ssk) 403cec37a6eSPeter Krystad { 404cec37a6eSPeter Krystad struct mptcp_subflow_context *subflow; 405cec37a6eSPeter Krystad struct mptcp_sock *msk; 406cec37a6eSPeter Krystad struct sock *sk; 407f870fa0bSMat Martineau 408cec37a6eSPeter Krystad subflow = mptcp_subflow_ctx(ssk); 409f870fa0bSMat Martineau 410cec37a6eSPeter Krystad if (!subflow->mp_capable) 411cec37a6eSPeter Krystad return; 412cec37a6eSPeter Krystad 413cec37a6eSPeter Krystad sk = subflow->conn; 414cec37a6eSPeter Krystad msk = mptcp_sk(sk); 415cec37a6eSPeter Krystad 416cec37a6eSPeter Krystad /* the socket is not connected yet, no msk/subflow ops can access/race 417cec37a6eSPeter Krystad * accessing the field below 418cec37a6eSPeter Krystad */ 419cec37a6eSPeter Krystad WRITE_ONCE(msk->remote_key, subflow->remote_key); 420cec37a6eSPeter Krystad WRITE_ONCE(msk->local_key, subflow->local_key); 42179c0949eSPeter Krystad WRITE_ONCE(msk->token, subflow->token); 422f870fa0bSMat Martineau } 423f870fa0bSMat Martineau 424cf7da0d6SPeter Krystad static void mptcp_sock_graft(struct sock *sk, struct socket *parent) 425cf7da0d6SPeter Krystad { 426cf7da0d6SPeter Krystad write_lock_bh(&sk->sk_callback_lock); 427cf7da0d6SPeter Krystad rcu_assign_pointer(sk->sk_wq, &parent->wq); 428cf7da0d6SPeter Krystad sk_set_socket(sk, parent); 429cf7da0d6SPeter Krystad sk->sk_uid = SOCK_INODE(parent)->i_uid; 430cf7da0d6SPeter Krystad write_unlock_bh(&sk->sk_callback_lock); 431cf7da0d6SPeter Krystad } 432cf7da0d6SPeter Krystad 433f870fa0bSMat Martineau static struct proto mptcp_prot = { 434f870fa0bSMat Martineau .name = "MPTCP", 435f870fa0bSMat Martineau .owner = THIS_MODULE, 436f870fa0bSMat Martineau .init = mptcp_init_sock, 437f870fa0bSMat Martineau .close = mptcp_close, 438cf7da0d6SPeter Krystad .accept = mptcp_accept, 439*717e79c8SPeter Krystad .setsockopt = mptcp_setsockopt, 440*717e79c8SPeter Krystad .getsockopt = mptcp_getsockopt, 441f870fa0bSMat Martineau .shutdown = tcp_shutdown, 44279c0949eSPeter Krystad .destroy = mptcp_destroy, 443f870fa0bSMat Martineau .sendmsg = mptcp_sendmsg, 444f870fa0bSMat Martineau .recvmsg = mptcp_recvmsg, 445f870fa0bSMat Martineau .hash = inet_hash, 446f870fa0bSMat Martineau .unhash = inet_unhash, 447cec37a6eSPeter Krystad .get_port = mptcp_get_port, 448f870fa0bSMat Martineau .obj_size = sizeof(struct mptcp_sock), 449f870fa0bSMat Martineau .no_autobind = true, 450f870fa0bSMat Martineau }; 451f870fa0bSMat Martineau 4522303f994SPeter Krystad static int mptcp_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) 4532303f994SPeter Krystad { 4542303f994SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 4552303f994SPeter Krystad struct socket *ssock; 456cf7da0d6SPeter Krystad int err; 4572303f994SPeter Krystad 4582303f994SPeter Krystad lock_sock(sock->sk); 4592303f994SPeter Krystad ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE); 4602303f994SPeter Krystad if (IS_ERR(ssock)) { 4612303f994SPeter Krystad err = PTR_ERR(ssock); 4622303f994SPeter Krystad goto unlock; 4632303f994SPeter Krystad } 4642303f994SPeter Krystad 4652303f994SPeter Krystad err = ssock->ops->bind(ssock, uaddr, addr_len); 466cf7da0d6SPeter Krystad if (!err) 467cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 4682303f994SPeter Krystad 4692303f994SPeter Krystad unlock: 4702303f994SPeter Krystad release_sock(sock->sk); 4712303f994SPeter Krystad return err; 4722303f994SPeter Krystad } 4732303f994SPeter Krystad 4742303f994SPeter Krystad static int mptcp_stream_connect(struct socket *sock, struct sockaddr *uaddr, 4752303f994SPeter Krystad int addr_len, int flags) 4762303f994SPeter Krystad { 4772303f994SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 4782303f994SPeter Krystad struct socket *ssock; 4792303f994SPeter Krystad int err; 4802303f994SPeter Krystad 4812303f994SPeter Krystad lock_sock(sock->sk); 4822303f994SPeter Krystad ssock = __mptcp_socket_create(msk, TCP_SYN_SENT); 4832303f994SPeter Krystad if (IS_ERR(ssock)) { 4842303f994SPeter Krystad err = PTR_ERR(ssock); 4852303f994SPeter Krystad goto unlock; 4862303f994SPeter Krystad } 4872303f994SPeter Krystad 488cf7da0d6SPeter Krystad #ifdef CONFIG_TCP_MD5SIG 489cf7da0d6SPeter Krystad /* no MPTCP if MD5SIG is enabled on this socket or we may run out of 490cf7da0d6SPeter Krystad * TCP option space. 491cf7da0d6SPeter Krystad */ 492cf7da0d6SPeter Krystad if (rcu_access_pointer(tcp_sk(ssock->sk)->md5sig_info)) 493cf7da0d6SPeter Krystad mptcp_subflow_ctx(ssock->sk)->request_mptcp = 0; 494cf7da0d6SPeter Krystad #endif 495cf7da0d6SPeter Krystad 4962303f994SPeter Krystad err = ssock->ops->connect(ssock, uaddr, addr_len, flags); 4972303f994SPeter Krystad inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk)); 498cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 4992303f994SPeter Krystad 5002303f994SPeter Krystad unlock: 5012303f994SPeter Krystad release_sock(sock->sk); 5022303f994SPeter Krystad return err; 5032303f994SPeter Krystad } 5042303f994SPeter Krystad 505cf7da0d6SPeter Krystad static int mptcp_v4_getname(struct socket *sock, struct sockaddr *uaddr, 506cf7da0d6SPeter Krystad int peer) 507cf7da0d6SPeter Krystad { 508cf7da0d6SPeter Krystad if (sock->sk->sk_prot == &tcp_prot) { 509cf7da0d6SPeter Krystad /* we are being invoked from __sys_accept4, after 510cf7da0d6SPeter Krystad * mptcp_accept() has just accepted a non-mp-capable 511cf7da0d6SPeter Krystad * flow: sk is a tcp_sk, not an mptcp one. 512cf7da0d6SPeter Krystad * 513cf7da0d6SPeter Krystad * Hand the socket over to tcp so all further socket ops 514cf7da0d6SPeter Krystad * bypass mptcp. 515cf7da0d6SPeter Krystad */ 516cf7da0d6SPeter Krystad sock->ops = &inet_stream_ops; 517cf7da0d6SPeter Krystad } 518cf7da0d6SPeter Krystad 519cf7da0d6SPeter Krystad return inet_getname(sock, uaddr, peer); 520cf7da0d6SPeter Krystad } 521cf7da0d6SPeter Krystad 522cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 523cf7da0d6SPeter Krystad static int mptcp_v6_getname(struct socket *sock, struct sockaddr *uaddr, 524cf7da0d6SPeter Krystad int peer) 525cf7da0d6SPeter Krystad { 526cf7da0d6SPeter Krystad if (sock->sk->sk_prot == &tcpv6_prot) { 527cf7da0d6SPeter Krystad /* we are being invoked from __sys_accept4 after 528cf7da0d6SPeter Krystad * mptcp_accept() has accepted a non-mp-capable 529cf7da0d6SPeter Krystad * subflow: sk is a tcp_sk, not mptcp. 530cf7da0d6SPeter Krystad * 531cf7da0d6SPeter Krystad * Hand the socket over to tcp so all further 532cf7da0d6SPeter Krystad * socket ops bypass mptcp. 533cf7da0d6SPeter Krystad */ 534cf7da0d6SPeter Krystad sock->ops = &inet6_stream_ops; 535cf7da0d6SPeter Krystad } 536cf7da0d6SPeter Krystad 537cf7da0d6SPeter Krystad return inet6_getname(sock, uaddr, peer); 538cf7da0d6SPeter Krystad } 539cf7da0d6SPeter Krystad #endif 540cf7da0d6SPeter Krystad 541cf7da0d6SPeter Krystad static int mptcp_listen(struct socket *sock, int backlog) 542cf7da0d6SPeter Krystad { 543cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 544cf7da0d6SPeter Krystad struct socket *ssock; 545cf7da0d6SPeter Krystad int err; 546cf7da0d6SPeter Krystad 547cf7da0d6SPeter Krystad pr_debug("msk=%p", msk); 548cf7da0d6SPeter Krystad 549cf7da0d6SPeter Krystad lock_sock(sock->sk); 550cf7da0d6SPeter Krystad ssock = __mptcp_socket_create(msk, TCP_LISTEN); 551cf7da0d6SPeter Krystad if (IS_ERR(ssock)) { 552cf7da0d6SPeter Krystad err = PTR_ERR(ssock); 553cf7da0d6SPeter Krystad goto unlock; 554cf7da0d6SPeter Krystad } 555cf7da0d6SPeter Krystad 556cf7da0d6SPeter Krystad err = ssock->ops->listen(ssock, backlog); 557cf7da0d6SPeter Krystad inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk)); 558cf7da0d6SPeter Krystad if (!err) 559cf7da0d6SPeter Krystad mptcp_copy_inaddrs(sock->sk, ssock->sk); 560cf7da0d6SPeter Krystad 561cf7da0d6SPeter Krystad unlock: 562cf7da0d6SPeter Krystad release_sock(sock->sk); 563cf7da0d6SPeter Krystad return err; 564cf7da0d6SPeter Krystad } 565cf7da0d6SPeter Krystad 566cf7da0d6SPeter Krystad static bool is_tcp_proto(const struct proto *p) 567cf7da0d6SPeter Krystad { 568cf7da0d6SPeter Krystad #if IS_ENABLED(CONFIG_MPTCP_IPV6) 569cf7da0d6SPeter Krystad return p == &tcp_prot || p == &tcpv6_prot; 570cf7da0d6SPeter Krystad #else 571cf7da0d6SPeter Krystad return p == &tcp_prot; 572cf7da0d6SPeter Krystad #endif 573cf7da0d6SPeter Krystad } 574cf7da0d6SPeter Krystad 575cf7da0d6SPeter Krystad static int mptcp_stream_accept(struct socket *sock, struct socket *newsock, 576cf7da0d6SPeter Krystad int flags, bool kern) 577cf7da0d6SPeter Krystad { 578cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 579cf7da0d6SPeter Krystad struct socket *ssock; 580cf7da0d6SPeter Krystad int err; 581cf7da0d6SPeter Krystad 582cf7da0d6SPeter Krystad pr_debug("msk=%p", msk); 583cf7da0d6SPeter Krystad 584cf7da0d6SPeter Krystad lock_sock(sock->sk); 585cf7da0d6SPeter Krystad if (sock->sk->sk_state != TCP_LISTEN) 586cf7da0d6SPeter Krystad goto unlock_fail; 587cf7da0d6SPeter Krystad 588cf7da0d6SPeter Krystad ssock = __mptcp_nmpc_socket(msk); 589cf7da0d6SPeter Krystad if (!ssock) 590cf7da0d6SPeter Krystad goto unlock_fail; 591cf7da0d6SPeter Krystad 592cf7da0d6SPeter Krystad sock_hold(ssock->sk); 593cf7da0d6SPeter Krystad release_sock(sock->sk); 594cf7da0d6SPeter Krystad 595cf7da0d6SPeter Krystad err = ssock->ops->accept(sock, newsock, flags, kern); 596cf7da0d6SPeter Krystad if (err == 0 && !is_tcp_proto(newsock->sk->sk_prot)) { 597cf7da0d6SPeter Krystad struct mptcp_sock *msk = mptcp_sk(newsock->sk); 598cf7da0d6SPeter Krystad struct mptcp_subflow_context *subflow; 599cf7da0d6SPeter Krystad 600cf7da0d6SPeter Krystad /* set ssk->sk_socket of accept()ed flows to mptcp socket. 601cf7da0d6SPeter Krystad * This is needed so NOSPACE flag can be set from tcp stack. 602cf7da0d6SPeter Krystad */ 603cf7da0d6SPeter Krystad list_for_each_entry(subflow, &msk->conn_list, node) { 604cf7da0d6SPeter Krystad struct sock *ssk = mptcp_subflow_tcp_sock(subflow); 605cf7da0d6SPeter Krystad 606cf7da0d6SPeter Krystad if (!ssk->sk_socket) 607cf7da0d6SPeter Krystad mptcp_sock_graft(ssk, newsock); 608cf7da0d6SPeter Krystad } 609cf7da0d6SPeter Krystad 610cf7da0d6SPeter Krystad inet_sk_state_store(newsock->sk, TCP_ESTABLISHED); 611cf7da0d6SPeter Krystad } 612cf7da0d6SPeter Krystad 613cf7da0d6SPeter Krystad sock_put(ssock->sk); 614cf7da0d6SPeter Krystad return err; 615cf7da0d6SPeter Krystad 616cf7da0d6SPeter Krystad unlock_fail: 617cf7da0d6SPeter Krystad release_sock(sock->sk); 618cf7da0d6SPeter Krystad return -EINVAL; 619cf7da0d6SPeter Krystad } 620cf7da0d6SPeter Krystad 6212303f994SPeter Krystad static __poll_t mptcp_poll(struct file *file, struct socket *sock, 6222303f994SPeter Krystad struct poll_table_struct *wait) 6232303f994SPeter Krystad { 6242303f994SPeter Krystad __poll_t mask = 0; 6252303f994SPeter Krystad 6262303f994SPeter Krystad return mask; 6272303f994SPeter Krystad } 6282303f994SPeter Krystad 62921498490SPeter Krystad static int mptcp_shutdown(struct socket *sock, int how) 63021498490SPeter Krystad { 63121498490SPeter Krystad struct mptcp_sock *msk = mptcp_sk(sock->sk); 63221498490SPeter Krystad struct mptcp_subflow_context *subflow; 63321498490SPeter Krystad int ret = 0; 63421498490SPeter Krystad 63521498490SPeter Krystad pr_debug("sk=%p, how=%d", msk, how); 63621498490SPeter Krystad 63721498490SPeter Krystad lock_sock(sock->sk); 63821498490SPeter Krystad 63921498490SPeter Krystad if (how == SHUT_WR || how == SHUT_RDWR) 64021498490SPeter Krystad inet_sk_state_store(sock->sk, TCP_FIN_WAIT1); 64121498490SPeter Krystad 64221498490SPeter Krystad how++; 64321498490SPeter Krystad 64421498490SPeter Krystad if ((how & ~SHUTDOWN_MASK) || !how) { 64521498490SPeter Krystad ret = -EINVAL; 64621498490SPeter Krystad goto out_unlock; 64721498490SPeter Krystad } 64821498490SPeter Krystad 64921498490SPeter Krystad if (sock->state == SS_CONNECTING) { 65021498490SPeter Krystad if ((1 << sock->sk->sk_state) & 65121498490SPeter Krystad (TCPF_SYN_SENT | TCPF_SYN_RECV | TCPF_CLOSE)) 65221498490SPeter Krystad sock->state = SS_DISCONNECTING; 65321498490SPeter Krystad else 65421498490SPeter Krystad sock->state = SS_CONNECTED; 65521498490SPeter Krystad } 65621498490SPeter Krystad 65721498490SPeter Krystad mptcp_for_each_subflow(msk, subflow) { 65821498490SPeter Krystad struct sock *tcp_sk = mptcp_subflow_tcp_sock(subflow); 65921498490SPeter Krystad 66021498490SPeter Krystad mptcp_subflow_shutdown(tcp_sk, how); 66121498490SPeter Krystad } 66221498490SPeter Krystad 66321498490SPeter Krystad out_unlock: 66421498490SPeter Krystad release_sock(sock->sk); 66521498490SPeter Krystad 66621498490SPeter Krystad return ret; 66721498490SPeter Krystad } 66821498490SPeter Krystad 6692303f994SPeter Krystad static struct proto_ops mptcp_stream_ops; 6702303f994SPeter Krystad 671f870fa0bSMat Martineau static struct inet_protosw mptcp_protosw = { 672f870fa0bSMat Martineau .type = SOCK_STREAM, 673f870fa0bSMat Martineau .protocol = IPPROTO_MPTCP, 674f870fa0bSMat Martineau .prot = &mptcp_prot, 6752303f994SPeter Krystad .ops = &mptcp_stream_ops, 6762303f994SPeter Krystad .flags = INET_PROTOSW_ICSK, 677f870fa0bSMat Martineau }; 678f870fa0bSMat Martineau 679f870fa0bSMat Martineau void __init mptcp_init(void) 680f870fa0bSMat Martineau { 6812303f994SPeter Krystad mptcp_prot.h.hashinfo = tcp_prot.h.hashinfo; 6822303f994SPeter Krystad mptcp_stream_ops = inet_stream_ops; 6832303f994SPeter Krystad mptcp_stream_ops.bind = mptcp_bind; 6842303f994SPeter Krystad mptcp_stream_ops.connect = mptcp_stream_connect; 6852303f994SPeter Krystad mptcp_stream_ops.poll = mptcp_poll; 686cf7da0d6SPeter Krystad mptcp_stream_ops.accept = mptcp_stream_accept; 687cf7da0d6SPeter Krystad mptcp_stream_ops.getname = mptcp_v4_getname; 688cf7da0d6SPeter Krystad mptcp_stream_ops.listen = mptcp_listen; 68921498490SPeter Krystad mptcp_stream_ops.shutdown = mptcp_shutdown; 6902303f994SPeter Krystad 6912303f994SPeter Krystad mptcp_subflow_init(); 6922303f994SPeter Krystad 693f870fa0bSMat Martineau if (proto_register(&mptcp_prot, 1) != 0) 694f870fa0bSMat Martineau panic("Failed to register MPTCP proto.\n"); 695f870fa0bSMat Martineau 696f870fa0bSMat Martineau inet_register_protosw(&mptcp_protosw); 697f870fa0bSMat Martineau } 698f870fa0bSMat Martineau 699f870fa0bSMat Martineau #if IS_ENABLED(CONFIG_MPTCP_IPV6) 7002303f994SPeter Krystad static struct proto_ops mptcp_v6_stream_ops; 701f870fa0bSMat Martineau static struct proto mptcp_v6_prot; 702f870fa0bSMat Martineau 70379c0949eSPeter Krystad static void mptcp_v6_destroy(struct sock *sk) 70479c0949eSPeter Krystad { 70579c0949eSPeter Krystad mptcp_destroy(sk); 70679c0949eSPeter Krystad inet6_destroy_sock(sk); 70779c0949eSPeter Krystad } 70879c0949eSPeter Krystad 709f870fa0bSMat Martineau static struct inet_protosw mptcp_v6_protosw = { 710f870fa0bSMat Martineau .type = SOCK_STREAM, 711f870fa0bSMat Martineau .protocol = IPPROTO_MPTCP, 712f870fa0bSMat Martineau .prot = &mptcp_v6_prot, 7132303f994SPeter Krystad .ops = &mptcp_v6_stream_ops, 714f870fa0bSMat Martineau .flags = INET_PROTOSW_ICSK, 715f870fa0bSMat Martineau }; 716f870fa0bSMat Martineau 717f870fa0bSMat Martineau int mptcpv6_init(void) 718f870fa0bSMat Martineau { 719f870fa0bSMat Martineau int err; 720f870fa0bSMat Martineau 721f870fa0bSMat Martineau mptcp_v6_prot = mptcp_prot; 722f870fa0bSMat Martineau strcpy(mptcp_v6_prot.name, "MPTCPv6"); 723f870fa0bSMat Martineau mptcp_v6_prot.slab = NULL; 72479c0949eSPeter Krystad mptcp_v6_prot.destroy = mptcp_v6_destroy; 725f870fa0bSMat Martineau mptcp_v6_prot.obj_size = sizeof(struct mptcp_sock) + 726f870fa0bSMat Martineau sizeof(struct ipv6_pinfo); 727f870fa0bSMat Martineau 728f870fa0bSMat Martineau err = proto_register(&mptcp_v6_prot, 1); 729f870fa0bSMat Martineau if (err) 730f870fa0bSMat Martineau return err; 731f870fa0bSMat Martineau 7322303f994SPeter Krystad mptcp_v6_stream_ops = inet6_stream_ops; 7332303f994SPeter Krystad mptcp_v6_stream_ops.bind = mptcp_bind; 7342303f994SPeter Krystad mptcp_v6_stream_ops.connect = mptcp_stream_connect; 7352303f994SPeter Krystad mptcp_v6_stream_ops.poll = mptcp_poll; 736cf7da0d6SPeter Krystad mptcp_v6_stream_ops.accept = mptcp_stream_accept; 737cf7da0d6SPeter Krystad mptcp_v6_stream_ops.getname = mptcp_v6_getname; 738cf7da0d6SPeter Krystad mptcp_v6_stream_ops.listen = mptcp_listen; 73921498490SPeter Krystad mptcp_v6_stream_ops.shutdown = mptcp_shutdown; 7402303f994SPeter Krystad 741f870fa0bSMat Martineau err = inet6_register_protosw(&mptcp_v6_protosw); 742f870fa0bSMat Martineau if (err) 743f870fa0bSMat Martineau proto_unregister(&mptcp_v6_prot); 744f870fa0bSMat Martineau 745f870fa0bSMat Martineau return err; 746f870fa0bSMat Martineau } 747f870fa0bSMat Martineau #endif 748