Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
| 2 | /* Multipath TCP |
| 3 | * |
| 4 | * Copyright (c) 2017 - 2019, Intel Corporation. |
| 5 | */ |
| 6 | |
| 7 | #ifndef __MPTCP_PROTOCOL_H |
| 8 | #define __MPTCP_PROTOCOL_H |
| 9 | |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 10 | #include <linux/random.h> |
| 11 | #include <net/tcp.h> |
| 12 | #include <net/inet_connection_sock.h> |
| 13 | |
Christoph Paasch | cc7972e | 2020-01-21 16:56:31 -0800 | [diff] [blame] | 14 | #define MPTCP_SUPPORTED_VERSION 1 |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 15 | |
| 16 | /* MPTCP option bits */ |
| 17 | #define OPTION_MPTCP_MPC_SYN BIT(0) |
| 18 | #define OPTION_MPTCP_MPC_SYNACK BIT(1) |
| 19 | #define OPTION_MPTCP_MPC_ACK BIT(2) |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 20 | #define OPTION_MPTCP_MPJ_SYN BIT(3) |
| 21 | #define OPTION_MPTCP_MPJ_SYNACK BIT(4) |
| 22 | #define OPTION_MPTCP_MPJ_ACK BIT(5) |
Peter Krystad | 3df523a | 2020-03-27 14:48:37 -0700 | [diff] [blame] | 23 | #define OPTION_MPTCP_ADD_ADDR BIT(6) |
| 24 | #define OPTION_MPTCP_ADD_ADDR6 BIT(7) |
| 25 | #define OPTION_MPTCP_RM_ADDR BIT(8) |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 26 | |
| 27 | /* MPTCP option subtypes */ |
| 28 | #define MPTCPOPT_MP_CAPABLE 0 |
| 29 | #define MPTCPOPT_MP_JOIN 1 |
| 30 | #define MPTCPOPT_DSS 2 |
| 31 | #define MPTCPOPT_ADD_ADDR 3 |
| 32 | #define MPTCPOPT_RM_ADDR 4 |
| 33 | #define MPTCPOPT_MP_PRIO 5 |
| 34 | #define MPTCPOPT_MP_FAIL 6 |
| 35 | #define MPTCPOPT_MP_FASTCLOSE 7 |
| 36 | |
| 37 | /* MPTCP suboption lengths */ |
Christoph Paasch | cc7972e | 2020-01-21 16:56:31 -0800 | [diff] [blame] | 38 | #define TCPOLEN_MPTCP_MPC_SYN 4 |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 39 | #define TCPOLEN_MPTCP_MPC_SYNACK 12 |
| 40 | #define TCPOLEN_MPTCP_MPC_ACK 20 |
Christoph Paasch | cc7972e | 2020-01-21 16:56:31 -0800 | [diff] [blame] | 41 | #define TCPOLEN_MPTCP_MPC_ACK_DATA 22 |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 42 | #define TCPOLEN_MPTCP_MPJ_SYN 12 |
| 43 | #define TCPOLEN_MPTCP_MPJ_SYNACK 16 |
| 44 | #define TCPOLEN_MPTCP_MPJ_ACK 24 |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 45 | #define TCPOLEN_MPTCP_DSS_BASE 4 |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 46 | #define TCPOLEN_MPTCP_DSS_ACK32 4 |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 47 | #define TCPOLEN_MPTCP_DSS_ACK64 8 |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 48 | #define TCPOLEN_MPTCP_DSS_MAP32 10 |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 49 | #define TCPOLEN_MPTCP_DSS_MAP64 14 |
| 50 | #define TCPOLEN_MPTCP_DSS_CHECKSUM 2 |
Peter Krystad | 3df523a | 2020-03-27 14:48:37 -0700 | [diff] [blame] | 51 | #define TCPOLEN_MPTCP_ADD_ADDR 16 |
| 52 | #define TCPOLEN_MPTCP_ADD_ADDR_PORT 18 |
| 53 | #define TCPOLEN_MPTCP_ADD_ADDR_BASE 8 |
| 54 | #define TCPOLEN_MPTCP_ADD_ADDR_BASE_PORT 10 |
| 55 | #define TCPOLEN_MPTCP_ADD_ADDR6 28 |
| 56 | #define TCPOLEN_MPTCP_ADD_ADDR6_PORT 30 |
| 57 | #define TCPOLEN_MPTCP_ADD_ADDR6_BASE 20 |
| 58 | #define TCPOLEN_MPTCP_ADD_ADDR6_BASE_PORT 22 |
| 59 | #define TCPOLEN_MPTCP_PORT_LEN 2 |
| 60 | #define TCPOLEN_MPTCP_RM_ADDR_BASE 4 |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 61 | |
Peter Krystad | ec3edaa | 2020-03-27 14:48:40 -0700 | [diff] [blame^] | 62 | /* MPTCP MP_JOIN flags */ |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 63 | #define MPTCPOPT_BACKUP BIT(0) |
| 64 | #define MPTCPOPT_HMAC_LEN 20 |
Peter Krystad | ec3edaa | 2020-03-27 14:48:40 -0700 | [diff] [blame^] | 65 | #define MPTCPOPT_THMAC_LEN 8 |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 66 | |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 67 | /* MPTCP MP_CAPABLE flags */ |
| 68 | #define MPTCP_VERSION_MASK (0x0F) |
| 69 | #define MPTCP_CAP_CHECKSUM_REQD BIT(7) |
| 70 | #define MPTCP_CAP_EXTENSIBILITY BIT(6) |
Paolo Abeni | 65492c5 | 2020-01-21 16:56:30 -0800 | [diff] [blame] | 71 | #define MPTCP_CAP_HMAC_SHA256 BIT(0) |
Peter Krystad | eda7acd | 2020-01-21 16:56:16 -0800 | [diff] [blame] | 72 | #define MPTCP_CAP_FLAG_MASK (0x3F) |
| 73 | |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 74 | /* MPTCP DSS flags */ |
| 75 | #define MPTCP_DSS_DATA_FIN BIT(4) |
| 76 | #define MPTCP_DSS_DSN64 BIT(3) |
| 77 | #define MPTCP_DSS_HAS_MAP BIT(2) |
| 78 | #define MPTCP_DSS_ACK64 BIT(1) |
| 79 | #define MPTCP_DSS_HAS_ACK BIT(0) |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 80 | #define MPTCP_DSS_FLAG_MASK (0x1F) |
| 81 | |
Peter Krystad | 3df523a | 2020-03-27 14:48:37 -0700 | [diff] [blame] | 82 | /* MPTCP ADD_ADDR flags */ |
| 83 | #define MPTCP_ADDR_ECHO BIT(0) |
| 84 | #define MPTCP_ADDR_HMAC_LEN 20 |
| 85 | #define MPTCP_ADDR_IPVERSION_4 4 |
| 86 | #define MPTCP_ADDR_IPVERSION_6 6 |
| 87 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 88 | /* MPTCP socket flags */ |
Florian Westphal | d99bfed | 2020-02-17 16:54:38 +0100 | [diff] [blame] | 89 | #define MPTCP_DATA_READY 0 |
| 90 | #define MPTCP_SEND_SPACE 1 |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 91 | |
Peter Krystad | 3df523a | 2020-03-27 14:48:37 -0700 | [diff] [blame] | 92 | static inline __be32 mptcp_option(u8 subopt, u8 len, u8 nib, u8 field) |
| 93 | { |
| 94 | return htonl((TCPOPT_MPTCP << 24) | (len << 16) | (subopt << 12) | |
| 95 | ((nib & 0xF) << 8) | field); |
| 96 | } |
| 97 | |
Peter Krystad | 1b1c7a0 | 2020-03-27 14:48:38 -0700 | [diff] [blame] | 98 | #define MPTCP_PM_MAX_ADDR 4 |
| 99 | |
| 100 | struct mptcp_addr_info { |
| 101 | sa_family_t family; |
| 102 | __be16 port; |
| 103 | u8 id; |
| 104 | union { |
| 105 | struct in_addr addr; |
| 106 | #if IS_ENABLED(CONFIG_MPTCP_IPV6) |
| 107 | struct in6_addr addr6; |
| 108 | #endif |
| 109 | }; |
| 110 | }; |
| 111 | |
| 112 | enum mptcp_pm_status { |
| 113 | MPTCP_PM_ADD_ADDR_RECEIVED, |
| 114 | MPTCP_PM_ESTABLISHED, |
| 115 | MPTCP_PM_SUBFLOW_ESTABLISHED, |
| 116 | }; |
| 117 | |
| 118 | struct mptcp_pm_data { |
| 119 | struct mptcp_addr_info local; |
| 120 | struct mptcp_addr_info remote; |
| 121 | |
| 122 | spinlock_t lock; /*protects the whole PM data */ |
| 123 | |
| 124 | bool addr_signal; |
| 125 | bool server_side; |
| 126 | bool work_pending; |
| 127 | bool accept_addr; |
| 128 | bool accept_subflow; |
| 129 | u8 add_addr_signaled; |
| 130 | u8 add_addr_accepted; |
| 131 | u8 local_addr_used; |
| 132 | u8 subflows; |
| 133 | u8 add_addr_signal_max; |
| 134 | u8 add_addr_accept_max; |
| 135 | u8 local_addr_max; |
| 136 | u8 subflows_max; |
| 137 | u8 status; |
| 138 | |
| 139 | struct work_struct work; |
| 140 | }; |
| 141 | |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 142 | /* MPTCP connection sock */ |
| 143 | struct mptcp_sock { |
| 144 | /* inet_connection_sock must be the first member */ |
| 145 | struct inet_connection_sock sk; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 146 | u64 local_key; |
| 147 | u64 remote_key; |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 148 | u64 write_seq; |
| 149 | u64 ack_seq; |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 150 | u32 token; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 151 | unsigned long flags; |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame] | 152 | bool can_ack; |
Peter Krystad | ec3edaa | 2020-03-27 14:48:40 -0700 | [diff] [blame^] | 153 | spinlock_t join_list_lock; |
Paolo Abeni | 8099201 | 2020-02-26 10:14:47 +0100 | [diff] [blame] | 154 | struct work_struct work; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 155 | struct list_head conn_list; |
Peter Krystad | ec3edaa | 2020-03-27 14:48:40 -0700 | [diff] [blame^] | 156 | struct list_head join_list; |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 157 | struct skb_ext *cached_ext; /* for the next sendmsg */ |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 158 | struct socket *subflow; /* outgoing connect/listener/!mp_capable */ |
Paolo Abeni | 8ab183d | 2020-01-21 16:56:33 -0800 | [diff] [blame] | 159 | struct sock *first; |
Peter Krystad | 1b1c7a0 | 2020-03-27 14:48:38 -0700 | [diff] [blame] | 160 | struct mptcp_pm_data pm; |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 161 | }; |
| 162 | |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 163 | #define mptcp_for_each_subflow(__msk, __subflow) \ |
| 164 | list_for_each_entry(__subflow, &((__msk)->conn_list), node) |
| 165 | |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 166 | static inline struct mptcp_sock *mptcp_sk(const struct sock *sk) |
| 167 | { |
| 168 | return (struct mptcp_sock *)sk; |
| 169 | } |
| 170 | |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 171 | struct mptcp_subflow_request_sock { |
| 172 | struct tcp_request_sock sk; |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame] | 173 | u16 mp_capable : 1, |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 174 | mp_join : 1, |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame] | 175 | backup : 1, |
| 176 | remote_key_valid : 1; |
Peter Krystad | 1b1c7a0 | 2020-03-27 14:48:38 -0700 | [diff] [blame] | 177 | u8 local_id; |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 178 | u8 remote_id; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 179 | u64 local_key; |
| 180 | u64 remote_key; |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 181 | u64 idsn; |
| 182 | u32 token; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 183 | u32 ssn_offset; |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 184 | u64 thmac; |
| 185 | u32 local_nonce; |
| 186 | u32 remote_nonce; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 187 | }; |
| 188 | |
| 189 | static inline struct mptcp_subflow_request_sock * |
| 190 | mptcp_subflow_rsk(const struct request_sock *rsk) |
| 191 | { |
| 192 | return (struct mptcp_subflow_request_sock *)rsk; |
| 193 | } |
| 194 | |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 195 | /* MPTCP subflow context */ |
| 196 | struct mptcp_subflow_context { |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 197 | struct list_head node;/* conn_list of subflows */ |
| 198 | u64 local_key; |
| 199 | u64 remote_key; |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 200 | u64 idsn; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 201 | u64 map_seq; |
Christoph Paasch | cc7972e | 2020-01-21 16:56:31 -0800 | [diff] [blame] | 202 | u32 snd_isn; |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 203 | u32 token; |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 204 | u32 rel_write_seq; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 205 | u32 map_subflow_seq; |
| 206 | u32 ssn_offset; |
| 207 | u32 map_data_len; |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 208 | u32 request_mptcp : 1, /* send MP_CAPABLE */ |
Peter Krystad | ec3edaa | 2020-03-27 14:48:40 -0700 | [diff] [blame^] | 209 | request_join : 1, /* send MP_JOIN */ |
| 210 | request_bkup : 1, |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 211 | mp_capable : 1, /* remote is MPTCP capable */ |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 212 | mp_join : 1, /* remote is JOINing */ |
Paolo Abeni | 0be534f | 2020-03-19 11:06:30 +0100 | [diff] [blame] | 213 | fully_established : 1, /* path validated */ |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 214 | pm_notified : 1, /* PM hook called for established status */ |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 215 | conn_finished : 1, |
| 216 | map_valid : 1, |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame] | 217 | mpc_map : 1, |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 218 | backup : 1, |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 219 | data_avail : 1, |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame] | 220 | rx_eof : 1, |
Mat Martineau | 76c42a2 | 2020-02-28 15:47:40 -0800 | [diff] [blame] | 221 | data_fin_tx_enable : 1, |
Christoph Paasch | d22f498 | 2020-01-21 16:56:32 -0800 | [diff] [blame] | 222 | can_ack : 1; /* only after processing the remote a key */ |
Mat Martineau | 76c42a2 | 2020-02-28 15:47:40 -0800 | [diff] [blame] | 223 | u64 data_fin_tx_seq; |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 224 | u32 remote_nonce; |
| 225 | u64 thmac; |
| 226 | u32 local_nonce; |
Peter Krystad | ec3edaa | 2020-03-27 14:48:40 -0700 | [diff] [blame^] | 227 | u32 remote_token; |
| 228 | u8 hmac[MPTCPOPT_HMAC_LEN]; |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 229 | u8 local_id; |
| 230 | u8 remote_id; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 231 | |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 232 | struct sock *tcp_sock; /* tcp sk backpointer */ |
| 233 | struct sock *conn; /* parent mptcp_sock */ |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 234 | const struct inet_connection_sock_af_ops *icsk_af_ops; |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 235 | void (*tcp_data_ready)(struct sock *sk); |
| 236 | void (*tcp_state_change)(struct sock *sk); |
| 237 | void (*tcp_write_space)(struct sock *sk); |
| 238 | |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 239 | struct rcu_head rcu; |
| 240 | }; |
| 241 | |
| 242 | static inline struct mptcp_subflow_context * |
| 243 | mptcp_subflow_ctx(const struct sock *sk) |
| 244 | { |
| 245 | struct inet_connection_sock *icsk = inet_csk(sk); |
| 246 | |
| 247 | /* Use RCU on icsk_ulp_data only for sock diag code */ |
| 248 | return (__force struct mptcp_subflow_context *)icsk->icsk_ulp_data; |
| 249 | } |
| 250 | |
| 251 | static inline struct sock * |
| 252 | mptcp_subflow_tcp_sock(const struct mptcp_subflow_context *subflow) |
| 253 | { |
| 254 | return subflow->tcp_sock; |
| 255 | } |
| 256 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 257 | static inline u64 |
| 258 | mptcp_subflow_get_map_offset(const struct mptcp_subflow_context *subflow) |
| 259 | { |
| 260 | return tcp_sk(mptcp_subflow_tcp_sock(subflow))->copied_seq - |
| 261 | subflow->ssn_offset - |
| 262 | subflow->map_subflow_seq; |
| 263 | } |
| 264 | |
| 265 | static inline u64 |
| 266 | mptcp_subflow_get_mapped_dsn(const struct mptcp_subflow_context *subflow) |
| 267 | { |
| 268 | return subflow->map_seq + mptcp_subflow_get_map_offset(subflow); |
| 269 | } |
| 270 | |
| 271 | int mptcp_is_enabled(struct net *net); |
| 272 | bool mptcp_subflow_data_available(struct sock *sk); |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 273 | void mptcp_subflow_init(void); |
Peter Krystad | ec3edaa | 2020-03-27 14:48:40 -0700 | [diff] [blame^] | 274 | |
| 275 | /* called with sk socket lock held */ |
| 276 | int __mptcp_subflow_connect(struct sock *sk, int ifindex, |
| 277 | const struct mptcp_addr_info *loc, |
| 278 | const struct mptcp_addr_info *remote); |
Peter Krystad | 2303f99 | 2020-01-21 16:56:17 -0800 | [diff] [blame] | 279 | int mptcp_subflow_create_socket(struct sock *sk, struct socket **new_sock); |
| 280 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 281 | static inline void mptcp_subflow_tcp_fallback(struct sock *sk, |
| 282 | struct mptcp_subflow_context *ctx) |
| 283 | { |
| 284 | sk->sk_data_ready = ctx->tcp_data_ready; |
| 285 | sk->sk_state_change = ctx->tcp_state_change; |
| 286 | sk->sk_write_space = ctx->tcp_write_space; |
| 287 | |
| 288 | inet_csk(sk)->icsk_af_ops = ctx->icsk_af_ops; |
| 289 | } |
| 290 | |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 291 | extern const struct inet_connection_sock_af_ops ipv4_specific; |
| 292 | #if IS_ENABLED(CONFIG_MPTCP_IPV6) |
| 293 | extern const struct inet_connection_sock_af_ops ipv6_specific; |
| 294 | #endif |
| 295 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 296 | void mptcp_proto_init(void); |
Matthieu Baerts | 784325e | 2020-01-21 16:56:28 -0800 | [diff] [blame] | 297 | #if IS_ENABLED(CONFIG_MPTCP_IPV6) |
| 298 | int mptcp_proto_v6_init(void); |
| 299 | #endif |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 300 | |
Paolo Abeni | 58b0991 | 2020-03-13 16:52:41 +0100 | [diff] [blame] | 301 | struct sock *mptcp_sk_clone(const struct sock *sk, struct request_sock *req); |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 302 | void mptcp_get_options(const struct sk_buff *skb, |
| 303 | struct tcp_options_received *opt_rx); |
| 304 | |
| 305 | void mptcp_finish_connect(struct sock *sk); |
Florian Westphal | 2e52213 | 2020-02-26 10:14:51 +0100 | [diff] [blame] | 306 | void mptcp_data_ready(struct sock *sk, struct sock *ssk); |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 307 | bool mptcp_finish_join(struct sock *sk); |
Peter Krystad | cec37a6 | 2020-01-21 16:56:18 -0800 | [diff] [blame] | 308 | |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 309 | int mptcp_token_new_request(struct request_sock *req); |
| 310 | void mptcp_token_destroy_request(u32 token); |
| 311 | int mptcp_token_new_connect(struct sock *sk); |
Paolo Abeni | 58b0991 | 2020-03-13 16:52:41 +0100 | [diff] [blame] | 312 | int mptcp_token_new_accept(u32 token, struct sock *conn); |
Peter Krystad | f296234 | 2020-03-27 14:48:39 -0700 | [diff] [blame] | 313 | struct mptcp_sock *mptcp_token_get_sock(u32 token); |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 314 | void mptcp_token_destroy(u32 token); |
| 315 | |
| 316 | void mptcp_crypto_key_sha(u64 key, u32 *token, u64 *idsn); |
| 317 | static inline void mptcp_crypto_key_gen_sha(u64 *key, u32 *token, u64 *idsn) |
| 318 | { |
| 319 | /* we might consider a faster version that computes the key as a |
| 320 | * hash of some information available in the MPTCP socket. Use |
| 321 | * random data at the moment, as it's probably the safest option |
| 322 | * in case multiple sockets are opened in different namespaces at |
| 323 | * the same time. |
| 324 | */ |
| 325 | get_random_bytes(key, sizeof(u64)); |
| 326 | mptcp_crypto_key_sha(*key, token, idsn); |
| 327 | } |
| 328 | |
Peter Krystad | 3df523a | 2020-03-27 14:48:37 -0700 | [diff] [blame] | 329 | void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac); |
Peter Krystad | 79c0949 | 2020-01-21 16:56:20 -0800 | [diff] [blame] | 330 | |
Peter Krystad | 1b1c7a0 | 2020-03-27 14:48:38 -0700 | [diff] [blame] | 331 | void mptcp_pm_init(void); |
| 332 | void mptcp_pm_data_init(struct mptcp_sock *msk); |
| 333 | void mptcp_pm_new_connection(struct mptcp_sock *msk, int server_side); |
| 334 | void mptcp_pm_fully_established(struct mptcp_sock *msk); |
| 335 | bool mptcp_pm_allow_new_subflow(struct mptcp_sock *msk); |
| 336 | void mptcp_pm_connection_closed(struct mptcp_sock *msk); |
| 337 | void mptcp_pm_subflow_established(struct mptcp_sock *msk, |
| 338 | struct mptcp_subflow_context *subflow); |
| 339 | void mptcp_pm_subflow_closed(struct mptcp_sock *msk, u8 id); |
| 340 | void mptcp_pm_add_addr_received(struct mptcp_sock *msk, |
| 341 | const struct mptcp_addr_info *addr); |
| 342 | |
| 343 | int mptcp_pm_announce_addr(struct mptcp_sock *msk, |
| 344 | const struct mptcp_addr_info *addr); |
| 345 | int mptcp_pm_remove_addr(struct mptcp_sock *msk, u8 local_id); |
| 346 | int mptcp_pm_remove_subflow(struct mptcp_sock *msk, u8 remote_id); |
| 347 | |
| 348 | static inline bool mptcp_pm_should_signal(struct mptcp_sock *msk) |
| 349 | { |
| 350 | return READ_ONCE(msk->pm.addr_signal); |
| 351 | } |
| 352 | |
| 353 | static inline unsigned int mptcp_add_addr_len(int family) |
| 354 | { |
| 355 | if (family == AF_INET) |
| 356 | return TCPOLEN_MPTCP_ADD_ADDR; |
| 357 | return TCPOLEN_MPTCP_ADD_ADDR6; |
| 358 | } |
| 359 | |
| 360 | bool mptcp_pm_addr_signal(struct mptcp_sock *msk, unsigned int remaining, |
| 361 | struct mptcp_addr_info *saddr); |
| 362 | int mptcp_pm_get_local_id(struct mptcp_sock *msk, struct sock_common *skc); |
| 363 | |
Mat Martineau | 6d0060f | 2020-01-21 16:56:23 -0800 | [diff] [blame] | 364 | static inline struct mptcp_ext *mptcp_get_ext(struct sk_buff *skb) |
| 365 | { |
| 366 | return (struct mptcp_ext *)skb_ext_find(skb, SKB_EXT_MPTCP); |
| 367 | } |
| 368 | |
Mat Martineau | 648ef4b | 2020-01-21 16:56:24 -0800 | [diff] [blame] | 369 | static inline bool before64(__u64 seq1, __u64 seq2) |
| 370 | { |
| 371 | return (__s64)(seq1 - seq2) < 0; |
| 372 | } |
| 373 | |
| 374 | #define after64(seq2, seq1) before64(seq1, seq2) |
| 375 | |
Mat Martineau | f870fa0 | 2020-01-21 16:56:15 -0800 | [diff] [blame] | 376 | #endif /* __MPTCP_PROTOCOL_H */ |