blob: df134ac912744c2e9f7b51bf063744f08da0cb69 [file] [log] [blame]
Mat Martineauf870fa02020-01-21 16:56:15 -08001/* SPDX-License-Identifier: GPL-2.0 */
2/* Multipath TCP
3 *
4 * Copyright (c) 2017 - 2019, Intel Corporation.
5 */
6
7#ifndef __MPTCP_PROTOCOL_H
8#define __MPTCP_PROTOCOL_H
9
Peter Krystad79c09492020-01-21 16:56:20 -080010#include <linux/random.h>
11#include <net/tcp.h>
12#include <net/inet_connection_sock.h>
13
Christoph Paaschcc7972e2020-01-21 16:56:31 -080014#define MPTCP_SUPPORTED_VERSION 1
Peter Krystadeda7acd2020-01-21 16:56:16 -080015
16/* MPTCP option bits */
17#define OPTION_MPTCP_MPC_SYN BIT(0)
18#define OPTION_MPTCP_MPC_SYNACK BIT(1)
19#define OPTION_MPTCP_MPC_ACK BIT(2)
Peter Krystadf2962342020-03-27 14:48:39 -070020#define OPTION_MPTCP_MPJ_SYN BIT(3)
21#define OPTION_MPTCP_MPJ_SYNACK BIT(4)
22#define OPTION_MPTCP_MPJ_ACK BIT(5)
Peter Krystad3df523a2020-03-27 14:48:37 -070023#define OPTION_MPTCP_ADD_ADDR BIT(6)
24#define OPTION_MPTCP_ADD_ADDR6 BIT(7)
25#define OPTION_MPTCP_RM_ADDR BIT(8)
Peter Krystadeda7acd2020-01-21 16:56:16 -080026
27/* MPTCP option subtypes */
28#define MPTCPOPT_MP_CAPABLE 0
29#define MPTCPOPT_MP_JOIN 1
30#define MPTCPOPT_DSS 2
31#define MPTCPOPT_ADD_ADDR 3
32#define MPTCPOPT_RM_ADDR 4
33#define MPTCPOPT_MP_PRIO 5
34#define MPTCPOPT_MP_FAIL 6
35#define MPTCPOPT_MP_FASTCLOSE 7
36
37/* MPTCP suboption lengths */
Christoph Paaschcc7972e2020-01-21 16:56:31 -080038#define TCPOLEN_MPTCP_MPC_SYN 4
Peter Krystadeda7acd2020-01-21 16:56:16 -080039#define TCPOLEN_MPTCP_MPC_SYNACK 12
40#define TCPOLEN_MPTCP_MPC_ACK 20
Christoph Paaschcc7972e2020-01-21 16:56:31 -080041#define TCPOLEN_MPTCP_MPC_ACK_DATA 22
Peter Krystadf2962342020-03-27 14:48:39 -070042#define TCPOLEN_MPTCP_MPJ_SYN 12
43#define TCPOLEN_MPTCP_MPJ_SYNACK 16
44#define TCPOLEN_MPTCP_MPJ_ACK 24
Mat Martineau6d0060f2020-01-21 16:56:23 -080045#define TCPOLEN_MPTCP_DSS_BASE 4
Mat Martineau648ef4b2020-01-21 16:56:24 -080046#define TCPOLEN_MPTCP_DSS_ACK32 4
Mat Martineau6d0060f2020-01-21 16:56:23 -080047#define TCPOLEN_MPTCP_DSS_ACK64 8
Mat Martineau648ef4b2020-01-21 16:56:24 -080048#define TCPOLEN_MPTCP_DSS_MAP32 10
Mat Martineau6d0060f2020-01-21 16:56:23 -080049#define TCPOLEN_MPTCP_DSS_MAP64 14
50#define TCPOLEN_MPTCP_DSS_CHECKSUM 2
Peter Krystad3df523a2020-03-27 14:48:37 -070051#define TCPOLEN_MPTCP_ADD_ADDR 16
52#define TCPOLEN_MPTCP_ADD_ADDR_PORT 18
53#define TCPOLEN_MPTCP_ADD_ADDR_BASE 8
54#define TCPOLEN_MPTCP_ADD_ADDR_BASE_PORT 10
55#define TCPOLEN_MPTCP_ADD_ADDR6 28
56#define TCPOLEN_MPTCP_ADD_ADDR6_PORT 30
57#define TCPOLEN_MPTCP_ADD_ADDR6_BASE 20
58#define TCPOLEN_MPTCP_ADD_ADDR6_BASE_PORT 22
59#define TCPOLEN_MPTCP_PORT_LEN 2
60#define TCPOLEN_MPTCP_RM_ADDR_BASE 4
Peter Krystadeda7acd2020-01-21 16:56:16 -080061
Peter Krystadec3edaa2020-03-27 14:48:40 -070062/* MPTCP MP_JOIN flags */
Peter Krystadf2962342020-03-27 14:48:39 -070063#define MPTCPOPT_BACKUP BIT(0)
64#define MPTCPOPT_HMAC_LEN 20
Peter Krystadec3edaa2020-03-27 14:48:40 -070065#define MPTCPOPT_THMAC_LEN 8
Peter Krystadf2962342020-03-27 14:48:39 -070066
Peter Krystadeda7acd2020-01-21 16:56:16 -080067/* MPTCP MP_CAPABLE flags */
68#define MPTCP_VERSION_MASK (0x0F)
69#define MPTCP_CAP_CHECKSUM_REQD BIT(7)
70#define MPTCP_CAP_EXTENSIBILITY BIT(6)
Paolo Abeni65492c52020-01-21 16:56:30 -080071#define MPTCP_CAP_HMAC_SHA256 BIT(0)
Peter Krystadeda7acd2020-01-21 16:56:16 -080072#define MPTCP_CAP_FLAG_MASK (0x3F)
73
Mat Martineau6d0060f2020-01-21 16:56:23 -080074/* MPTCP DSS flags */
75#define MPTCP_DSS_DATA_FIN BIT(4)
76#define MPTCP_DSS_DSN64 BIT(3)
77#define MPTCP_DSS_HAS_MAP BIT(2)
78#define MPTCP_DSS_ACK64 BIT(1)
79#define MPTCP_DSS_HAS_ACK BIT(0)
Mat Martineau648ef4b2020-01-21 16:56:24 -080080#define MPTCP_DSS_FLAG_MASK (0x1F)
81
Peter Krystad3df523a2020-03-27 14:48:37 -070082/* MPTCP ADD_ADDR flags */
83#define MPTCP_ADDR_ECHO BIT(0)
84#define MPTCP_ADDR_HMAC_LEN 20
85#define MPTCP_ADDR_IPVERSION_4 4
86#define MPTCP_ADDR_IPVERSION_6 6
87
Mat Martineau648ef4b2020-01-21 16:56:24 -080088/* MPTCP socket flags */
Florian Westphald99bfed2020-02-17 16:54:38 +010089#define MPTCP_DATA_READY 0
90#define MPTCP_SEND_SPACE 1
Mat Martineau6d0060f2020-01-21 16:56:23 -080091
Peter Krystad3df523a2020-03-27 14:48:37 -070092static inline __be32 mptcp_option(u8 subopt, u8 len, u8 nib, u8 field)
93{
94 return htonl((TCPOPT_MPTCP << 24) | (len << 16) | (subopt << 12) |
95 ((nib & 0xF) << 8) | field);
96}
97
Peter Krystad1b1c7a02020-03-27 14:48:38 -070098#define MPTCP_PM_MAX_ADDR 4
99
100struct mptcp_addr_info {
101 sa_family_t family;
102 __be16 port;
103 u8 id;
104 union {
105 struct in_addr addr;
106#if IS_ENABLED(CONFIG_MPTCP_IPV6)
107 struct in6_addr addr6;
108#endif
109 };
110};
111
112enum mptcp_pm_status {
113 MPTCP_PM_ADD_ADDR_RECEIVED,
114 MPTCP_PM_ESTABLISHED,
115 MPTCP_PM_SUBFLOW_ESTABLISHED,
116};
117
118struct mptcp_pm_data {
119 struct mptcp_addr_info local;
120 struct mptcp_addr_info remote;
121
122 spinlock_t lock; /*protects the whole PM data */
123
124 bool addr_signal;
125 bool server_side;
126 bool work_pending;
127 bool accept_addr;
128 bool accept_subflow;
129 u8 add_addr_signaled;
130 u8 add_addr_accepted;
131 u8 local_addr_used;
132 u8 subflows;
133 u8 add_addr_signal_max;
134 u8 add_addr_accept_max;
135 u8 local_addr_max;
136 u8 subflows_max;
137 u8 status;
138
139 struct work_struct work;
140};
141
Mat Martineauf870fa02020-01-21 16:56:15 -0800142/* MPTCP connection sock */
143struct mptcp_sock {
144 /* inet_connection_sock must be the first member */
145 struct inet_connection_sock sk;
Peter Krystadcec37a62020-01-21 16:56:18 -0800146 u64 local_key;
147 u64 remote_key;
Mat Martineau6d0060f2020-01-21 16:56:23 -0800148 u64 write_seq;
149 u64 ack_seq;
Peter Krystad79c09492020-01-21 16:56:20 -0800150 u32 token;
Mat Martineau648ef4b2020-01-21 16:56:24 -0800151 unsigned long flags;
Christoph Paaschd22f4982020-01-21 16:56:32 -0800152 bool can_ack;
Peter Krystadec3edaa2020-03-27 14:48:40 -0700153 spinlock_t join_list_lock;
Paolo Abeni80992012020-02-26 10:14:47 +0100154 struct work_struct work;
Peter Krystadcec37a62020-01-21 16:56:18 -0800155 struct list_head conn_list;
Peter Krystadec3edaa2020-03-27 14:48:40 -0700156 struct list_head join_list;
Mat Martineau6d0060f2020-01-21 16:56:23 -0800157 struct skb_ext *cached_ext; /* for the next sendmsg */
Mat Martineauf870fa02020-01-21 16:56:15 -0800158 struct socket *subflow; /* outgoing connect/listener/!mp_capable */
Paolo Abeni8ab183d2020-01-21 16:56:33 -0800159 struct sock *first;
Peter Krystad1b1c7a02020-03-27 14:48:38 -0700160 struct mptcp_pm_data pm;
Mat Martineauf870fa02020-01-21 16:56:15 -0800161};
162
Peter Krystadcec37a62020-01-21 16:56:18 -0800163#define mptcp_for_each_subflow(__msk, __subflow) \
164 list_for_each_entry(__subflow, &((__msk)->conn_list), node)
165
Mat Martineauf870fa02020-01-21 16:56:15 -0800166static inline struct mptcp_sock *mptcp_sk(const struct sock *sk)
167{
168 return (struct mptcp_sock *)sk;
169}
170
Peter Krystadcec37a62020-01-21 16:56:18 -0800171struct mptcp_subflow_request_sock {
172 struct tcp_request_sock sk;
Christoph Paaschd22f4982020-01-21 16:56:32 -0800173 u16 mp_capable : 1,
Peter Krystadcec37a62020-01-21 16:56:18 -0800174 mp_join : 1,
Christoph Paaschd22f4982020-01-21 16:56:32 -0800175 backup : 1,
176 remote_key_valid : 1;
Peter Krystad1b1c7a02020-03-27 14:48:38 -0700177 u8 local_id;
Peter Krystadf2962342020-03-27 14:48:39 -0700178 u8 remote_id;
Peter Krystadcec37a62020-01-21 16:56:18 -0800179 u64 local_key;
180 u64 remote_key;
Peter Krystad79c09492020-01-21 16:56:20 -0800181 u64 idsn;
182 u32 token;
Mat Martineau648ef4b2020-01-21 16:56:24 -0800183 u32 ssn_offset;
Peter Krystadf2962342020-03-27 14:48:39 -0700184 u64 thmac;
185 u32 local_nonce;
186 u32 remote_nonce;
Peter Krystadcec37a62020-01-21 16:56:18 -0800187};
188
189static inline struct mptcp_subflow_request_sock *
190mptcp_subflow_rsk(const struct request_sock *rsk)
191{
192 return (struct mptcp_subflow_request_sock *)rsk;
193}
194
Peter Krystad2303f992020-01-21 16:56:17 -0800195/* MPTCP subflow context */
196struct mptcp_subflow_context {
Peter Krystadcec37a62020-01-21 16:56:18 -0800197 struct list_head node;/* conn_list of subflows */
198 u64 local_key;
199 u64 remote_key;
Peter Krystad79c09492020-01-21 16:56:20 -0800200 u64 idsn;
Mat Martineau648ef4b2020-01-21 16:56:24 -0800201 u64 map_seq;
Christoph Paaschcc7972e2020-01-21 16:56:31 -0800202 u32 snd_isn;
Peter Krystad79c09492020-01-21 16:56:20 -0800203 u32 token;
Mat Martineau6d0060f2020-01-21 16:56:23 -0800204 u32 rel_write_seq;
Mat Martineau648ef4b2020-01-21 16:56:24 -0800205 u32 map_subflow_seq;
206 u32 ssn_offset;
207 u32 map_data_len;
Peter Krystadcec37a62020-01-21 16:56:18 -0800208 u32 request_mptcp : 1, /* send MP_CAPABLE */
Peter Krystadec3edaa2020-03-27 14:48:40 -0700209 request_join : 1, /* send MP_JOIN */
210 request_bkup : 1,
Peter Krystadcec37a62020-01-21 16:56:18 -0800211 mp_capable : 1, /* remote is MPTCP capable */
Peter Krystadf2962342020-03-27 14:48:39 -0700212 mp_join : 1, /* remote is JOINing */
Paolo Abeni0be534f2020-03-19 11:06:30 +0100213 fully_established : 1, /* path validated */
Peter Krystadf2962342020-03-27 14:48:39 -0700214 pm_notified : 1, /* PM hook called for established status */
Mat Martineau648ef4b2020-01-21 16:56:24 -0800215 conn_finished : 1,
216 map_valid : 1,
Christoph Paaschd22f4982020-01-21 16:56:32 -0800217 mpc_map : 1,
Peter Krystadf2962342020-03-27 14:48:39 -0700218 backup : 1,
Mat Martineau648ef4b2020-01-21 16:56:24 -0800219 data_avail : 1,
Christoph Paaschd22f4982020-01-21 16:56:32 -0800220 rx_eof : 1,
Mat Martineau76c42a22020-02-28 15:47:40 -0800221 data_fin_tx_enable : 1,
Christoph Paaschd22f4982020-01-21 16:56:32 -0800222 can_ack : 1; /* only after processing the remote a key */
Mat Martineau76c42a22020-02-28 15:47:40 -0800223 u64 data_fin_tx_seq;
Peter Krystadf2962342020-03-27 14:48:39 -0700224 u32 remote_nonce;
225 u64 thmac;
226 u32 local_nonce;
Peter Krystadec3edaa2020-03-27 14:48:40 -0700227 u32 remote_token;
228 u8 hmac[MPTCPOPT_HMAC_LEN];
Peter Krystadf2962342020-03-27 14:48:39 -0700229 u8 local_id;
230 u8 remote_id;
Mat Martineau648ef4b2020-01-21 16:56:24 -0800231
Peter Krystad2303f992020-01-21 16:56:17 -0800232 struct sock *tcp_sock; /* tcp sk backpointer */
233 struct sock *conn; /* parent mptcp_sock */
Peter Krystadcec37a62020-01-21 16:56:18 -0800234 const struct inet_connection_sock_af_ops *icsk_af_ops;
Mat Martineau648ef4b2020-01-21 16:56:24 -0800235 void (*tcp_data_ready)(struct sock *sk);
236 void (*tcp_state_change)(struct sock *sk);
237 void (*tcp_write_space)(struct sock *sk);
238
Peter Krystad2303f992020-01-21 16:56:17 -0800239 struct rcu_head rcu;
240};
241
242static inline struct mptcp_subflow_context *
243mptcp_subflow_ctx(const struct sock *sk)
244{
245 struct inet_connection_sock *icsk = inet_csk(sk);
246
247 /* Use RCU on icsk_ulp_data only for sock diag code */
248 return (__force struct mptcp_subflow_context *)icsk->icsk_ulp_data;
249}
250
251static inline struct sock *
252mptcp_subflow_tcp_sock(const struct mptcp_subflow_context *subflow)
253{
254 return subflow->tcp_sock;
255}
256
Mat Martineau648ef4b2020-01-21 16:56:24 -0800257static inline u64
258mptcp_subflow_get_map_offset(const struct mptcp_subflow_context *subflow)
259{
260 return tcp_sk(mptcp_subflow_tcp_sock(subflow))->copied_seq -
261 subflow->ssn_offset -
262 subflow->map_subflow_seq;
263}
264
265static inline u64
266mptcp_subflow_get_mapped_dsn(const struct mptcp_subflow_context *subflow)
267{
268 return subflow->map_seq + mptcp_subflow_get_map_offset(subflow);
269}
270
271int mptcp_is_enabled(struct net *net);
272bool mptcp_subflow_data_available(struct sock *sk);
Peter Krystad2303f992020-01-21 16:56:17 -0800273void mptcp_subflow_init(void);
Peter Krystadec3edaa2020-03-27 14:48:40 -0700274
275/* called with sk socket lock held */
276int __mptcp_subflow_connect(struct sock *sk, int ifindex,
277 const struct mptcp_addr_info *loc,
278 const struct mptcp_addr_info *remote);
Peter Krystad2303f992020-01-21 16:56:17 -0800279int mptcp_subflow_create_socket(struct sock *sk, struct socket **new_sock);
280
Mat Martineau648ef4b2020-01-21 16:56:24 -0800281static inline void mptcp_subflow_tcp_fallback(struct sock *sk,
282 struct mptcp_subflow_context *ctx)
283{
284 sk->sk_data_ready = ctx->tcp_data_ready;
285 sk->sk_state_change = ctx->tcp_state_change;
286 sk->sk_write_space = ctx->tcp_write_space;
287
288 inet_csk(sk)->icsk_af_ops = ctx->icsk_af_ops;
289}
290
Peter Krystadcec37a62020-01-21 16:56:18 -0800291extern const struct inet_connection_sock_af_ops ipv4_specific;
292#if IS_ENABLED(CONFIG_MPTCP_IPV6)
293extern const struct inet_connection_sock_af_ops ipv6_specific;
294#endif
295
Mat Martineau648ef4b2020-01-21 16:56:24 -0800296void mptcp_proto_init(void);
Matthieu Baerts784325e2020-01-21 16:56:28 -0800297#if IS_ENABLED(CONFIG_MPTCP_IPV6)
298int mptcp_proto_v6_init(void);
299#endif
Mat Martineau648ef4b2020-01-21 16:56:24 -0800300
Paolo Abeni58b09912020-03-13 16:52:41 +0100301struct sock *mptcp_sk_clone(const struct sock *sk, struct request_sock *req);
Peter Krystadcec37a62020-01-21 16:56:18 -0800302void mptcp_get_options(const struct sk_buff *skb,
303 struct tcp_options_received *opt_rx);
304
305void mptcp_finish_connect(struct sock *sk);
Florian Westphal2e522132020-02-26 10:14:51 +0100306void mptcp_data_ready(struct sock *sk, struct sock *ssk);
Peter Krystadf2962342020-03-27 14:48:39 -0700307bool mptcp_finish_join(struct sock *sk);
Peter Krystadcec37a62020-01-21 16:56:18 -0800308
Peter Krystad79c09492020-01-21 16:56:20 -0800309int mptcp_token_new_request(struct request_sock *req);
310void mptcp_token_destroy_request(u32 token);
311int mptcp_token_new_connect(struct sock *sk);
Paolo Abeni58b09912020-03-13 16:52:41 +0100312int mptcp_token_new_accept(u32 token, struct sock *conn);
Peter Krystadf2962342020-03-27 14:48:39 -0700313struct mptcp_sock *mptcp_token_get_sock(u32 token);
Peter Krystad79c09492020-01-21 16:56:20 -0800314void mptcp_token_destroy(u32 token);
315
316void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn);
317static inline void mptcp_crypto_key_gen_sha(u64 *key, u32 *token, u64 *idsn)
318{
319 /* we might consider a faster version that computes the key as a
320 * hash of some information available in the MPTCP socket. Use
321 * random data at the moment, as it's probably the safest option
322 * in case multiple sockets are opened in different namespaces at
323 * the same time.
324 */
325 get_random_bytes(key, sizeof(u64));
326 mptcp_crypto_key_sha(*key, token, idsn);
327}
328
Peter Krystad3df523a2020-03-27 14:48:37 -0700329void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
Peter Krystad79c09492020-01-21 16:56:20 -0800330
Peter Krystad1b1c7a02020-03-27 14:48:38 -0700331void mptcp_pm_init(void);
332void mptcp_pm_data_init(struct mptcp_sock *msk);
333void mptcp_pm_new_connection(struct mptcp_sock *msk, int server_side);
334void mptcp_pm_fully_established(struct mptcp_sock *msk);
335bool mptcp_pm_allow_new_subflow(struct mptcp_sock *msk);
336void mptcp_pm_connection_closed(struct mptcp_sock *msk);
337void mptcp_pm_subflow_established(struct mptcp_sock *msk,
338 struct mptcp_subflow_context *subflow);
339void mptcp_pm_subflow_closed(struct mptcp_sock *msk, u8 id);
340void mptcp_pm_add_addr_received(struct mptcp_sock *msk,
341 const struct mptcp_addr_info *addr);
342
343int mptcp_pm_announce_addr(struct mptcp_sock *msk,
344 const struct mptcp_addr_info *addr);
345int mptcp_pm_remove_addr(struct mptcp_sock *msk, u8 local_id);
346int mptcp_pm_remove_subflow(struct mptcp_sock *msk, u8 remote_id);
347
348static inline bool mptcp_pm_should_signal(struct mptcp_sock *msk)
349{
350 return READ_ONCE(msk->pm.addr_signal);
351}
352
353static inline unsigned int mptcp_add_addr_len(int family)
354{
355 if (family == AF_INET)
356 return TCPOLEN_MPTCP_ADD_ADDR;
357 return TCPOLEN_MPTCP_ADD_ADDR6;
358}
359
360bool mptcp_pm_addr_signal(struct mptcp_sock *msk, unsigned int remaining,
361 struct mptcp_addr_info *saddr);
362int mptcp_pm_get_local_id(struct mptcp_sock *msk, struct sock_common *skc);
363
Mat Martineau6d0060f2020-01-21 16:56:23 -0800364static inline struct mptcp_ext *mptcp_get_ext(struct sk_buff *skb)
365{
366 return (struct mptcp_ext *)skb_ext_find(skb, SKB_EXT_MPTCP);
367}
368
Mat Martineau648ef4b2020-01-21 16:56:24 -0800369static inline bool before64(__u64 seq1, __u64 seq2)
370{
371 return (__s64)(seq1 - seq2) < 0;
372}
373
374#define after64(seq2, seq1) before64(seq1, seq2)
375
Mat Martineauf870fa02020-01-21 16:56:15 -0800376#endif /* __MPTCP_PROTOCOL_H */