Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
| 2 | /* Multipath TCP |
| 3 | * |
| 4 | * Copyright (c) 2017 - 2019, Intel Corporation. |
| 5 | */ |
| 6 | |
| 7 | #ifndef __MPTCP_PROTOCOL_H |
| 8 | #define __MPTCP_PROTOCOL_H |
| 9 | |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 10 | #include <linux/random.h> |
| 11 | #include <net/tcp.h> |
| 12 | #include <net/inet_connection_sock.h> |
| 13 | |
Christoph Paasch | cc7972e | 2020-01-21 16:56:31 -0800 | [diff] [blame] | 14 | #define MPTCP_SUPPORTED_VERSION 1 |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 15 | |
| 16 | /* MPTCP option bits */ |
| 17 | #define OPTION_MPTCP_MPC_SYN BIT(0) |
| 18 | #define OPTION_MPTCP_MPC_SYNACK BIT(1) |
| 19 | #define OPTION_MPTCP_MPC_ACK BIT(2) |
| 20 | |
| 21 | /* MPTCP option subtypes */ |
| 22 | #define MPTCPOPT_MP_CAPABLE 0 |
| 23 | #define MPTCPOPT_MP_JOIN 1 |
| 24 | #define MPTCPOPT_DSS 2 |
| 25 | #define MPTCPOPT_ADD_ADDR 3 |
| 26 | #define MPTCPOPT_RM_ADDR 4 |
| 27 | #define MPTCPOPT_MP_PRIO 5 |
| 28 | #define MPTCPOPT_MP_FAIL 6 |
| 29 | #define MPTCPOPT_MP_FASTCLOSE 7 |
| 30 | |
| 31 | /* MPTCP suboption lengths */ |
Christoph Paasch | cc7972e | 2020-01-21 16:56:31 -0800 | [diff] [blame] | 32 | #define TCPOLEN_MPTCP_MPC_SYN 4 |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 33 | #define TCPOLEN_MPTCP_MPC_SYNACK 12 |
| 34 | #define TCPOLEN_MPTCP_MPC_ACK 20 |
Christoph Paasch | cc7972e | 2020-01-21 16:56:31 -0800 | [diff] [blame] | 35 | #define TCPOLEN_MPTCP_MPC_ACK_DATA 22 |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 36 | #define TCPOLEN_MPTCP_DSS_BASE 4 |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 37 | #define TCPOLEN_MPTCP_DSS_ACK32 4 |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 38 | #define TCPOLEN_MPTCP_DSS_ACK64 8 |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 39 | #define TCPOLEN_MPTCP_DSS_MAP32 10 |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 40 | #define TCPOLEN_MPTCP_DSS_MAP64 14 |
| 41 | #define TCPOLEN_MPTCP_DSS_CHECKSUM 2 |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 42 | |
| 43 | /* MPTCP MP_CAPABLE flags */ |
| 44 | #define MPTCP_VERSION_MASK (0x0F) |
| 45 | #define MPTCP_CAP_CHECKSUM_REQD BIT(7) |
| 46 | #define MPTCP_CAP_EXTENSIBILITY BIT(6) |
Paolo Abeni | 65492c5 | 2020-01-21 16:56:30 -0800 | [diff] [blame] | 47 | #define MPTCP_CAP_HMAC_SHA256 BIT(0) |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 48 | #define MPTCP_CAP_FLAG_MASK (0x3F) |
| 49 | |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 50 | /* MPTCP DSS flags */ |
| 51 | #define MPTCP_DSS_DATA_FIN BIT(4) |
| 52 | #define MPTCP_DSS_DSN64 BIT(3) |
| 53 | #define MPTCP_DSS_HAS_MAP BIT(2) |
| 54 | #define MPTCP_DSS_ACK64 BIT(1) |
| 55 | #define MPTCP_DSS_HAS_ACK BIT(0) |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 56 | #define MPTCP_DSS_FLAG_MASK (0x1F) |
| 57 | |
| 58 | /* MPTCP socket flags */ |
| 59 | #define MPTCP_DATA_READY BIT(0) |
Florian Westphal | 1891c4a | 2020-01-21 16:56:25 -0800 | [diff] [blame] | 60 | #define MPTCP_SEND_SPACE BIT(1) |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 61 | |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 62 | /* MPTCP connection sock */ |
| 63 | struct mptcp_sock { |
| 64 | /* inet_connection_sock must be the first member */ |
| 65 | struct inet_connection_sock sk; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 66 | u64 local_key; |
| 67 | u64 remote_key; |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 68 | u64 write_seq; |
| 69 | u64 ack_seq; |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 70 | u32 token; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 71 | unsigned long flags; |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame^] | 72 | bool can_ack; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 73 | struct list_head conn_list; |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 74 | struct skb_ext *cached_ext; /* for the next sendmsg */ |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 75 | struct socket *subflow; /* outgoing connect/listener/!mp_capable */ |
| 76 | }; |
| 77 | |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 78 | #define mptcp_for_each_subflow(__msk, __subflow) \ |
| 79 | list_for_each_entry(__subflow, &((__msk)->conn_list), node) |
| 80 | |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 81 | static inline struct mptcp_sock *mptcp_sk(const struct sock *sk) |
| 82 | { |
| 83 | return (struct mptcp_sock *)sk; |
| 84 | } |
| 85 | |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 86 | struct mptcp_subflow_request_sock { |
| 87 | struct tcp_request_sock sk; |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame^] | 88 | u16 mp_capable : 1, |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 89 | mp_join : 1, |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame^] | 90 | backup : 1, |
| 91 | remote_key_valid : 1; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 92 | u64 local_key; |
| 93 | u64 remote_key; |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 94 | u64 idsn; |
| 95 | u32 token; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 96 | u32 ssn_offset; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 97 | }; |
| 98 | |
| 99 | static inline struct mptcp_subflow_request_sock * |
| 100 | mptcp_subflow_rsk(const struct request_sock *rsk) |
| 101 | { |
| 102 | return (struct mptcp_subflow_request_sock *)rsk; |
| 103 | } |
| 104 | |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 105 | /* MPTCP subflow context */ |
| 106 | struct mptcp_subflow_context { |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 107 | struct list_head node;/* conn_list of subflows */ |
| 108 | u64 local_key; |
| 109 | u64 remote_key; |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 110 | u64 idsn; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 111 | u64 map_seq; |
Christoph Paasch | cc7972e | 2020-01-21 16:56:31 -0800 | [diff] [blame] | 112 | u32 snd_isn; |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 113 | u32 token; |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 114 | u32 rel_write_seq; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 115 | u32 map_subflow_seq; |
| 116 | u32 ssn_offset; |
| 117 | u32 map_data_len; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 118 | u32 request_mptcp : 1, /* send MP_CAPABLE */ |
| 119 | mp_capable : 1, /* remote is MPTCP capable */ |
| 120 | fourth_ack : 1, /* send initial DSS */ |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 121 | conn_finished : 1, |
| 122 | map_valid : 1, |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame^] | 123 | mpc_map : 1, |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 124 | data_avail : 1, |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame^] | 125 | rx_eof : 1, |
| 126 | can_ack : 1; /* only after processing the remote a key */ |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 127 | |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 128 | struct sock *tcp_sock; /* tcp sk backpointer */ |
| 129 | struct sock *conn; /* parent mptcp_sock */ |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 130 | const struct inet_connection_sock_af_ops *icsk_af_ops; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 131 | void (*tcp_data_ready)(struct sock *sk); |
| 132 | void (*tcp_state_change)(struct sock *sk); |
| 133 | void (*tcp_write_space)(struct sock *sk); |
| 134 | |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 135 | struct rcu_head rcu; |
| 136 | }; |
| 137 | |
| 138 | static inline struct mptcp_subflow_context * |
| 139 | mptcp_subflow_ctx(const struct sock *sk) |
| 140 | { |
| 141 | struct inet_connection_sock *icsk = inet_csk(sk); |
| 142 | |
| 143 | /* Use RCU on icsk_ulp_data only for sock diag code */ |
| 144 | return (__force struct mptcp_subflow_context *)icsk->icsk_ulp_data; |
| 145 | } |
| 146 | |
| 147 | static inline struct sock * |
| 148 | mptcp_subflow_tcp_sock(const struct mptcp_subflow_context *subflow) |
| 149 | { |
| 150 | return subflow->tcp_sock; |
| 151 | } |
| 152 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 153 | static inline u64 |
| 154 | mptcp_subflow_get_map_offset(const struct mptcp_subflow_context *subflow) |
| 155 | { |
| 156 | return tcp_sk(mptcp_subflow_tcp_sock(subflow))->copied_seq - |
| 157 | subflow->ssn_offset - |
| 158 | subflow->map_subflow_seq; |
| 159 | } |
| 160 | |
| 161 | static inline u64 |
| 162 | mptcp_subflow_get_mapped_dsn(const struct mptcp_subflow_context *subflow) |
| 163 | { |
| 164 | return subflow->map_seq + mptcp_subflow_get_map_offset(subflow); |
| 165 | } |
| 166 | |
| 167 | int mptcp_is_enabled(struct net *net); |
| 168 | bool mptcp_subflow_data_available(struct sock *sk); |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 169 | void mptcp_subflow_init(void); |
| 170 | int mptcp_subflow_create_socket(struct sock *sk, struct socket **new_sock); |
| 171 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 172 | static inline void mptcp_subflow_tcp_fallback(struct sock *sk, |
| 173 | struct mptcp_subflow_context *ctx) |
| 174 | { |
| 175 | sk->sk_data_ready = ctx->tcp_data_ready; |
| 176 | sk->sk_state_change = ctx->tcp_state_change; |
| 177 | sk->sk_write_space = ctx->tcp_write_space; |
| 178 | |
| 179 | inet_csk(sk)->icsk_af_ops = ctx->icsk_af_ops; |
| 180 | } |
| 181 | |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 182 | extern const struct inet_connection_sock_af_ops ipv4_specific; |
| 183 | #if IS_ENABLED(CONFIG_MPTCP_IPV6) |
| 184 | extern const struct inet_connection_sock_af_ops ipv6_specific; |
| 185 | #endif |
| 186 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 187 | void mptcp_proto_init(void); |
Matthieu Baerts | 784325e | 2020-01-21 16:56:28 -0800 | [diff] [blame] | 188 | #if IS_ENABLED(CONFIG_MPTCP_IPV6) |
| 189 | int mptcp_proto_v6_init(void); |
| 190 | #endif |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 191 | |
| 192 | struct mptcp_read_arg { |
| 193 | struct msghdr *msg; |
| 194 | }; |
| 195 | |
| 196 | int mptcp_read_actor(read_descriptor_t *desc, struct sk_buff *skb, |
| 197 | unsigned int offset, size_t len); |
| 198 | |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 199 | void mptcp_get_options(const struct sk_buff *skb, |
| 200 | struct tcp_options_received *opt_rx); |
| 201 | |
| 202 | void mptcp_finish_connect(struct sock *sk); |
| 203 | |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 204 | int mptcp_token_new_request(struct request_sock *req); |
| 205 | void mptcp_token_destroy_request(u32 token); |
| 206 | int mptcp_token_new_connect(struct sock *sk); |
| 207 | int mptcp_token_new_accept(u32 token); |
| 208 | void mptcp_token_update_accept(struct sock *sk, struct sock *conn); |
| 209 | void mptcp_token_destroy(u32 token); |
| 210 | |
| 211 | void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn); |
| 212 | static inline void mptcp_crypto_key_gen_sha(u64 *key, u32 *token, u64 *idsn) |
| 213 | { |
| 214 | /* we might consider a faster version that computes the key as a |
| 215 | * hash of some information available in the MPTCP socket. Use |
| 216 | * random data at the moment, as it's probably the safest option |
| 217 | * in case multiple sockets are opened in different namespaces at |
| 218 | * the same time. |
| 219 | */ |
| 220 | get_random_bytes(key, sizeof(u64)); |
| 221 | mptcp_crypto_key_sha(*key, token, idsn); |
| 222 | } |
| 223 | |
| 224 | void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u32 nonce1, u32 nonce2, |
Paolo Abeni | 65492c5 | 2020-01-21 16:56:30 -0800 | [diff] [blame] | 225 | void *hash_out); |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 226 | |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 227 | static inline struct mptcp_ext *mptcp_get_ext(struct sk_buff *skb) |
| 228 | { |
| 229 | return (struct mptcp_ext *)skb_ext_find(skb, SKB_EXT_MPTCP); |
| 230 | } |
| 231 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 232 | static inline bool before64(__u64 seq1, __u64 seq2) |
| 233 | { |
| 234 | return (__s64)(seq1 - seq2) < 0; |
| 235 | } |
| 236 | |
| 237 | #define after64(seq2, seq1) before64(seq1, seq2) |
| 238 | |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 239 | #endif /* __MPTCP_PROTOCOL_H */ |