2020-01-22 03:56:15 +03:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/* Multipath TCP
|
|
|
|
*
|
|
|
|
* Copyright (c) 2017 - 2019, Intel Corporation.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define pr_fmt(fmt) "MPTCP: " fmt
|
|
|
|
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/netdevice.h>
|
2020-01-22 03:56:26 +03:00
|
|
|
#include <linux/sched/signal.h>
|
|
|
|
#include <linux/atomic.h>
|
2020-01-22 03:56:15 +03:00
|
|
|
#include <net/sock.h>
|
|
|
|
#include <net/inet_common.h>
|
|
|
|
#include <net/inet_hashtables.h>
|
|
|
|
#include <net/protocol.h>
|
|
|
|
#include <net/tcp.h>
|
2020-01-22 03:56:19 +03:00
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
|
|
|
#include <net/transp_v6.h>
|
|
|
|
#endif
|
2020-01-22 03:56:15 +03:00
|
|
|
#include <net/mptcp.h>
|
|
|
|
#include "protocol.h"
|
2020-03-28 00:48:50 +03:00
|
|
|
#include "mib.h"
|
2020-01-22 03:56:15 +03:00
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
#define MPTCP_SAME_STATE TCP_MAX_STATES
|
|
|
|
|
2020-02-06 02:39:37 +03:00
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
|
|
|
struct mptcp6_sock {
|
|
|
|
struct mptcp_sock msk;
|
|
|
|
struct ipv6_pinfo np;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
struct mptcp_skb_cb {
|
|
|
|
u32 offset;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define MPTCP_SKB_CB(__skb) ((struct mptcp_skb_cb *)&((__skb)->cb[0]))
|
|
|
|
|
2020-03-28 00:48:45 +03:00
|
|
|
static struct percpu_counter mptcp_sockets_allocated;
|
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
/* If msk has an initial subflow socket, and the MP_CAPABLE handshake has not
|
|
|
|
* completed yet or has failed, return the subflow socket.
|
|
|
|
* Otherwise return NULL.
|
|
|
|
*/
|
|
|
|
static struct socket *__mptcp_nmpc_socket(const struct mptcp_sock *msk)
|
|
|
|
{
|
2020-01-22 03:56:32 +03:00
|
|
|
if (!msk->subflow || READ_ONCE(msk->can_ack))
|
2020-01-22 03:56:17 +03:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return msk->subflow;
|
|
|
|
}
|
|
|
|
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
static bool __mptcp_needs_tcp_fallback(const struct mptcp_sock *msk)
|
|
|
|
{
|
|
|
|
return msk->first && !sk_is_mptcp(msk->first);
|
|
|
|
}
|
|
|
|
|
2020-04-02 14:44:51 +03:00
|
|
|
static struct socket *mptcp_is_tcpsk(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct socket *sock = sk->sk_socket;
|
|
|
|
|
|
|
|
if (sock->sk != sk)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (unlikely(sk->sk_prot == &tcp_prot)) {
|
|
|
|
/* we are being invoked after mptcp_accept() has
|
|
|
|
* accepted a non-mp-capable flow: sk is a tcp_sk,
|
|
|
|
* not an mptcp one.
|
|
|
|
*
|
|
|
|
* Hand the socket over to tcp so all further socket ops
|
|
|
|
* bypass mptcp.
|
|
|
|
*/
|
|
|
|
sock->ops = &inet_stream_ops;
|
|
|
|
return sock;
|
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
|
|
|
} else if (unlikely(sk->sk_prot == &tcpv6_prot)) {
|
|
|
|
sock->ops = &inet6_stream_ops;
|
|
|
|
return sock;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
static struct socket *__mptcp_tcp_fallback(struct mptcp_sock *msk)
|
2020-01-22 03:56:18 +03:00
|
|
|
{
|
2020-04-02 14:44:51 +03:00
|
|
|
struct socket *sock;
|
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
sock_owned_by_me((const struct sock *)msk);
|
|
|
|
|
2020-04-02 14:44:51 +03:00
|
|
|
sock = mptcp_is_tcpsk((struct sock *)msk);
|
|
|
|
if (unlikely(sock))
|
|
|
|
return sock;
|
|
|
|
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
if (likely(!__mptcp_needs_tcp_fallback(msk)))
|
2020-01-22 03:56:18 +03:00
|
|
|
return NULL;
|
|
|
|
|
2020-04-11 22:05:01 +03:00
|
|
|
return msk->subflow;
|
2020-01-22 03:56:18 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
static bool __mptcp_can_create_subflow(const struct mptcp_sock *msk)
|
|
|
|
{
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
return !msk->first;
|
2020-01-22 03:56:17 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct socket *__mptcp_socket_create(struct mptcp_sock *msk, int state)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
struct sock *sk = (struct sock *)msk;
|
|
|
|
struct socket *ssock;
|
|
|
|
int err;
|
|
|
|
|
2020-04-02 14:44:51 +03:00
|
|
|
ssock = __mptcp_tcp_fallback(msk);
|
|
|
|
if (unlikely(ssock))
|
|
|
|
return ssock;
|
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
ssock = __mptcp_nmpc_socket(msk);
|
|
|
|
if (ssock)
|
|
|
|
goto set_state;
|
|
|
|
|
|
|
|
if (!__mptcp_can_create_subflow(msk))
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
|
|
|
|
err = mptcp_subflow_create_socket(sk, &ssock);
|
|
|
|
if (err)
|
|
|
|
return ERR_PTR(err);
|
|
|
|
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
msk->first = ssock->sk;
|
2020-01-22 03:56:17 +03:00
|
|
|
msk->subflow = ssock;
|
|
|
|
subflow = mptcp_subflow_ctx(ssock->sk);
|
2020-01-22 03:56:18 +03:00
|
|
|
list_add(&subflow->node, &msk->conn_list);
|
2020-01-22 03:56:17 +03:00
|
|
|
subflow->request_mptcp = 1;
|
|
|
|
|
|
|
|
set_state:
|
|
|
|
if (state != MPTCP_SAME_STATE)
|
|
|
|
inet_sk_state_store(sk, state);
|
|
|
|
return ssock;
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
static void __mptcp_move_skb(struct mptcp_sock *msk, struct sock *ssk,
|
|
|
|
struct sk_buff *skb,
|
|
|
|
unsigned int offset, size_t copy_len)
|
|
|
|
{
|
|
|
|
struct sock *sk = (struct sock *)msk;
|
2020-05-26 00:41:13 +03:00
|
|
|
struct sk_buff *tail;
|
2020-02-26 12:14:48 +03:00
|
|
|
|
|
|
|
__skb_unlink(skb, &ssk->sk_receive_queue);
|
|
|
|
|
2020-05-26 00:41:13 +03:00
|
|
|
skb_ext_reset(skb);
|
|
|
|
skb_orphan(skb);
|
2020-02-26 12:14:48 +03:00
|
|
|
msk->ack_seq += copy_len;
|
2020-05-26 00:41:13 +03:00
|
|
|
|
|
|
|
tail = skb_peek_tail(&sk->sk_receive_queue);
|
|
|
|
if (offset == 0 && tail) {
|
|
|
|
bool fragstolen;
|
|
|
|
int delta;
|
|
|
|
|
|
|
|
if (skb_try_coalesce(tail, skb, &fragstolen, &delta)) {
|
|
|
|
kfree_skb_partial(skb, fragstolen);
|
|
|
|
atomic_add(delta, &sk->sk_rmem_alloc);
|
|
|
|
sk_mem_charge(sk, delta);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
skb_set_owner_r(skb, sk);
|
|
|
|
__skb_queue_tail(&sk->sk_receive_queue, skb);
|
2020-02-26 12:14:48 +03:00
|
|
|
MPTCP_SKB_CB(skb)->offset = offset;
|
|
|
|
}
|
|
|
|
|
2020-04-02 14:44:53 +03:00
|
|
|
/* both sockets must be locked */
|
|
|
|
static bool mptcp_subflow_dsn_valid(const struct mptcp_sock *msk,
|
|
|
|
struct sock *ssk)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
|
|
|
|
u64 dsn = mptcp_subflow_get_mapped_dsn(subflow);
|
|
|
|
|
|
|
|
/* revalidate data sequence number.
|
|
|
|
*
|
|
|
|
* mptcp_subflow_data_available() is usually called
|
|
|
|
* without msk lock. Its unlikely (but possible)
|
|
|
|
* that msk->ack_seq has been advanced since the last
|
|
|
|
* call found in-sequence data.
|
|
|
|
*/
|
|
|
|
if (likely(dsn == msk->ack_seq))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
subflow->data_avail = 0;
|
|
|
|
return mptcp_subflow_data_available(ssk);
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
static bool __mptcp_move_skbs_from_subflow(struct mptcp_sock *msk,
|
|
|
|
struct sock *ssk,
|
|
|
|
unsigned int *bytes)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
|
2020-02-26 12:14:49 +03:00
|
|
|
struct sock *sk = (struct sock *)msk;
|
2020-02-26 12:14:48 +03:00
|
|
|
unsigned int moved = 0;
|
|
|
|
bool more_data_avail;
|
|
|
|
struct tcp_sock *tp;
|
|
|
|
bool done = false;
|
2020-02-26 12:14:49 +03:00
|
|
|
|
2020-04-02 14:44:53 +03:00
|
|
|
if (!mptcp_subflow_dsn_valid(msk, ssk)) {
|
|
|
|
*bytes = 0;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-03-06 23:29:46 +03:00
|
|
|
if (!(sk->sk_userlocks & SOCK_RCVBUF_LOCK)) {
|
|
|
|
int rcvbuf = max(ssk->sk_rcvbuf, sk->sk_rcvbuf);
|
|
|
|
|
|
|
|
if (rcvbuf > sk->sk_rcvbuf)
|
|
|
|
sk->sk_rcvbuf = rcvbuf;
|
|
|
|
}
|
2020-02-26 12:14:48 +03:00
|
|
|
|
|
|
|
tp = tcp_sk(ssk);
|
|
|
|
do {
|
|
|
|
u32 map_remaining, offset;
|
|
|
|
u32 seq = tp->copied_seq;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
bool fin;
|
|
|
|
|
|
|
|
/* try to move as much data as available */
|
|
|
|
map_remaining = subflow->map_data_len -
|
|
|
|
mptcp_subflow_get_map_offset(subflow);
|
|
|
|
|
|
|
|
skb = skb_peek(&ssk->sk_receive_queue);
|
|
|
|
if (!skb)
|
|
|
|
break;
|
|
|
|
|
|
|
|
offset = seq - TCP_SKB_CB(skb)->seq;
|
|
|
|
fin = TCP_SKB_CB(skb)->tcp_flags & TCPHDR_FIN;
|
|
|
|
if (fin) {
|
|
|
|
done = true;
|
|
|
|
seq++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (offset < skb->len) {
|
|
|
|
size_t len = skb->len - offset;
|
|
|
|
|
|
|
|
if (tp->urg_data)
|
|
|
|
done = true;
|
|
|
|
|
|
|
|
__mptcp_move_skb(msk, ssk, skb, offset, len);
|
|
|
|
seq += len;
|
|
|
|
moved += len;
|
|
|
|
|
|
|
|
if (WARN_ON_ONCE(map_remaining < len))
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
WARN_ON_ONCE(!fin);
|
|
|
|
sk_eat_skb(ssk, skb);
|
|
|
|
done = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
WRITE_ONCE(tp->copied_seq, seq);
|
|
|
|
more_data_avail = mptcp_subflow_data_available(ssk);
|
2020-02-26 12:14:49 +03:00
|
|
|
|
|
|
|
if (atomic_read(&sk->sk_rmem_alloc) > READ_ONCE(sk->sk_rcvbuf)) {
|
|
|
|
done = true;
|
|
|
|
break;
|
|
|
|
}
|
2020-02-26 12:14:48 +03:00
|
|
|
} while (more_data_avail);
|
|
|
|
|
|
|
|
*bytes = moved;
|
|
|
|
|
|
|
|
return done;
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:14:51 +03:00
|
|
|
/* In most cases we will be able to lock the mptcp socket. If its already
|
|
|
|
* owned, we need to defer to the work queue to avoid ABBA deadlock.
|
|
|
|
*/
|
|
|
|
static bool move_skbs_to_msk(struct mptcp_sock *msk, struct sock *ssk)
|
|
|
|
{
|
|
|
|
struct sock *sk = (struct sock *)msk;
|
|
|
|
unsigned int moved = 0;
|
|
|
|
|
|
|
|
if (READ_ONCE(sk->sk_lock.owned))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (unlikely(!spin_trylock_bh(&sk->sk_lock.slock)))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* must re-check after taking the lock */
|
|
|
|
if (!READ_ONCE(sk->sk_lock.owned))
|
|
|
|
__mptcp_move_skbs_from_subflow(msk, ssk, &moved);
|
|
|
|
|
|
|
|
spin_unlock_bh(&sk->sk_lock.slock);
|
|
|
|
|
|
|
|
return moved > 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void mptcp_data_ready(struct sock *sk, struct sock *ssk)
|
2020-02-26 12:14:46 +03:00
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
|
|
|
|
set_bit(MPTCP_DATA_READY, &msk->flags);
|
2020-02-26 12:14:48 +03:00
|
|
|
|
2020-02-26 12:14:51 +03:00
|
|
|
if (atomic_read(&sk->sk_rmem_alloc) < READ_ONCE(sk->sk_rcvbuf) &&
|
|
|
|
move_skbs_to_msk(msk, ssk))
|
|
|
|
goto wake;
|
|
|
|
|
2020-02-26 12:14:49 +03:00
|
|
|
/* don't schedule if mptcp sk is (still) over limit */
|
|
|
|
if (atomic_read(&sk->sk_rmem_alloc) > READ_ONCE(sk->sk_rcvbuf))
|
|
|
|
goto wake;
|
|
|
|
|
2020-02-26 12:14:52 +03:00
|
|
|
/* mptcp socket is owned, release_cb should retry */
|
|
|
|
if (!test_and_set_bit(TCP_DELACK_TIMER_DEFERRED,
|
|
|
|
&sk->sk_tsq_flags)) {
|
|
|
|
sock_hold(sk);
|
2020-02-26 12:14:48 +03:00
|
|
|
|
2020-02-26 12:14:52 +03:00
|
|
|
/* need to try again, its possible release_cb() has already
|
|
|
|
* been called after the test_and_set_bit() above.
|
|
|
|
*/
|
|
|
|
move_skbs_to_msk(msk, ssk);
|
|
|
|
}
|
2020-02-26 12:14:49 +03:00
|
|
|
wake:
|
2020-02-26 12:14:46 +03:00
|
|
|
sk->sk_data_ready(sk);
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:40 +03:00
|
|
|
static void __mptcp_flush_join_list(struct mptcp_sock *msk)
|
|
|
|
{
|
|
|
|
if (likely(list_empty(&msk->join_list)))
|
|
|
|
return;
|
|
|
|
|
|
|
|
spin_lock_bh(&msk->join_list_lock);
|
|
|
|
list_splice_tail_init(&msk->join_list, &msk->conn_list);
|
|
|
|
spin_unlock_bh(&msk->join_list_lock);
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:44 +03:00
|
|
|
static void mptcp_set_timeout(const struct sock *sk, const struct sock *ssk)
|
|
|
|
{
|
|
|
|
long tout = ssk && inet_csk(ssk)->icsk_pending ?
|
|
|
|
inet_csk(ssk)->icsk_timeout - jiffies : 0;
|
|
|
|
|
|
|
|
if (tout <= 0)
|
|
|
|
tout = mptcp_sk(sk)->timer_ival;
|
|
|
|
mptcp_sk(sk)->timer_ival = tout > 0 ? tout : TCP_RTO_MIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool mptcp_timer_pending(struct sock *sk)
|
|
|
|
{
|
|
|
|
return timer_pending(&inet_csk(sk)->icsk_retransmit_timer);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void mptcp_reset_timer(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct inet_connection_sock *icsk = inet_csk(sk);
|
|
|
|
unsigned long tout;
|
|
|
|
|
|
|
|
/* should never be called with mptcp level timer cleared */
|
|
|
|
tout = READ_ONCE(mptcp_sk(sk)->timer_ival);
|
|
|
|
if (WARN_ON_ONCE(!tout))
|
|
|
|
tout = TCP_RTO_MIN;
|
|
|
|
sk_reset_timer(sk, &icsk->icsk_retransmit_timer, jiffies + tout);
|
|
|
|
}
|
|
|
|
|
|
|
|
void mptcp_data_acked(struct sock *sk)
|
|
|
|
{
|
|
|
|
mptcp_reset_timer(sk);
|
2020-03-28 00:48:48 +03:00
|
|
|
|
|
|
|
if (!sk_stream_is_writeable(sk) &&
|
|
|
|
schedule_work(&mptcp_sk(sk)->work))
|
|
|
|
sock_hold(sk);
|
2020-03-28 00:48:44 +03:00
|
|
|
}
|
|
|
|
|
2020-04-02 14:44:52 +03:00
|
|
|
void mptcp_subflow_eof(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
|
|
|
|
if (!test_and_set_bit(MPTCP_WORK_EOF, &msk->flags) &&
|
|
|
|
schedule_work(&msk->work))
|
|
|
|
sock_hold(sk);
|
|
|
|
}
|
|
|
|
|
2020-06-10 11:47:41 +03:00
|
|
|
static void mptcp_check_for_eof(struct mptcp_sock *msk)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
struct sock *sk = (struct sock *)msk;
|
|
|
|
int receivers = 0;
|
|
|
|
|
|
|
|
mptcp_for_each_subflow(msk, subflow)
|
|
|
|
receivers += !subflow->rx_eof;
|
|
|
|
|
|
|
|
if (!receivers && !(sk->sk_shutdown & RCV_SHUTDOWN)) {
|
|
|
|
/* hopefully temporary hack: propagate shutdown status
|
|
|
|
* to msk, when all subflows agree on it
|
|
|
|
*/
|
|
|
|
sk->sk_shutdown |= RCV_SHUTDOWN;
|
|
|
|
|
|
|
|
smp_mb__before_atomic(); /* SHUTDOWN must be visible first */
|
|
|
|
set_bit(MPTCP_DATA_READY, &msk->flags);
|
|
|
|
sk->sk_data_ready(sk);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:44 +03:00
|
|
|
static void mptcp_stop_timer(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct inet_connection_sock *icsk = inet_csk(sk);
|
|
|
|
|
|
|
|
sk_stop_timer(sk, &icsk->icsk_retransmit_timer);
|
|
|
|
mptcp_sk(sk)->timer_ival = 0;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:23 +03:00
|
|
|
static bool mptcp_ext_cache_refill(struct mptcp_sock *msk)
|
|
|
|
{
|
2020-05-16 11:46:23 +03:00
|
|
|
const struct sock *sk = (const struct sock *)msk;
|
|
|
|
|
2020-01-22 03:56:23 +03:00
|
|
|
if (!msk->cached_ext)
|
2020-05-16 11:46:23 +03:00
|
|
|
msk->cached_ext = __skb_ext_alloc(sk->sk_allocation);
|
2020-01-22 03:56:23 +03:00
|
|
|
|
|
|
|
return !!msk->cached_ext;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:26 +03:00
|
|
|
static struct sock *mptcp_subflow_recv_lookup(const struct mptcp_sock *msk)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
struct sock *sk = (struct sock *)msk;
|
|
|
|
|
|
|
|
sock_owned_by_me(sk);
|
|
|
|
|
|
|
|
mptcp_for_each_subflow(msk, subflow) {
|
|
|
|
if (subflow->data_avail)
|
|
|
|
return mptcp_subflow_tcp_sock(subflow);
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:47 +03:00
|
|
|
static bool mptcp_skb_can_collapse_to(u64 write_seq,
|
|
|
|
const struct sk_buff *skb,
|
|
|
|
const struct mptcp_ext *mpext)
|
2020-01-22 03:56:27 +03:00
|
|
|
{
|
|
|
|
if (!tcp_skb_can_collapse_to(skb))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* can collapse only if MPTCP level sequence is in order */
|
2020-03-28 00:48:47 +03:00
|
|
|
return mpext && mpext->data_seq + mpext->data_len == write_seq;
|
2020-01-22 03:56:27 +03:00
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:43 +03:00
|
|
|
static bool mptcp_frag_can_collapse_to(const struct mptcp_sock *msk,
|
|
|
|
const struct page_frag *pfrag,
|
|
|
|
const struct mptcp_data_frag *df)
|
|
|
|
{
|
|
|
|
return df && pfrag->page == df->page &&
|
|
|
|
df->data_seq + df->data_len == msk->write_seq;
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:45 +03:00
|
|
|
static void dfrag_uncharge(struct sock *sk, int len)
|
|
|
|
{
|
|
|
|
sk_mem_uncharge(sk, len);
|
2020-03-28 00:48:46 +03:00
|
|
|
sk_wmem_queued_add(sk, -len);
|
2020-03-28 00:48:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void dfrag_clear(struct sock *sk, struct mptcp_data_frag *dfrag)
|
2020-03-28 00:48:43 +03:00
|
|
|
{
|
2020-03-28 00:48:45 +03:00
|
|
|
int len = dfrag->data_len + dfrag->overhead;
|
|
|
|
|
2020-03-28 00:48:43 +03:00
|
|
|
list_del(&dfrag->list);
|
2020-03-28 00:48:45 +03:00
|
|
|
dfrag_uncharge(sk, len);
|
2020-03-28 00:48:43 +03:00
|
|
|
put_page(dfrag->page);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void mptcp_clean_una(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
struct mptcp_data_frag *dtmp, *dfrag;
|
|
|
|
u64 snd_una = atomic64_read(&msk->snd_una);
|
2020-03-28 00:48:45 +03:00
|
|
|
bool cleaned = false;
|
2020-03-28 00:48:43 +03:00
|
|
|
|
|
|
|
list_for_each_entry_safe(dfrag, dtmp, &msk->rtx_queue, list) {
|
|
|
|
if (after64(dfrag->data_seq + dfrag->data_len, snd_una))
|
|
|
|
break;
|
|
|
|
|
2020-03-28 00:48:45 +03:00
|
|
|
dfrag_clear(sk, dfrag);
|
|
|
|
cleaned = true;
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:46 +03:00
|
|
|
dfrag = mptcp_rtx_head(sk);
|
|
|
|
if (dfrag && after64(snd_una, dfrag->data_seq)) {
|
|
|
|
u64 delta = dfrag->data_seq + dfrag->data_len - snd_una;
|
|
|
|
|
|
|
|
dfrag->data_seq += delta;
|
|
|
|
dfrag->data_len -= delta;
|
|
|
|
|
|
|
|
dfrag_uncharge(sk, delta);
|
|
|
|
cleaned = true;
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:45 +03:00
|
|
|
if (cleaned) {
|
|
|
|
sk_mem_reclaim_partial(sk);
|
2020-03-28 00:48:46 +03:00
|
|
|
|
|
|
|
/* Only wake up writers if a subflow is ready */
|
|
|
|
if (test_bit(MPTCP_SEND_SPACE, &msk->flags))
|
|
|
|
sk_stream_write_space(sk);
|
2020-03-28 00:48:43 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* ensure we get enough memory for the frag hdr, beyond some minimal amount of
|
|
|
|
* data
|
|
|
|
*/
|
|
|
|
static bool mptcp_page_frag_refill(struct sock *sk, struct page_frag *pfrag)
|
|
|
|
{
|
|
|
|
if (likely(skb_page_frag_refill(32U + sizeof(struct mptcp_data_frag),
|
|
|
|
pfrag, sk->sk_allocation)))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
sk->sk_prot->enter_memory_pressure(sk);
|
|
|
|
sk_stream_moderate_sndbuf(sk);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct mptcp_data_frag *
|
|
|
|
mptcp_carve_data_frag(const struct mptcp_sock *msk, struct page_frag *pfrag,
|
|
|
|
int orig_offset)
|
|
|
|
{
|
|
|
|
int offset = ALIGN(orig_offset, sizeof(long));
|
|
|
|
struct mptcp_data_frag *dfrag;
|
|
|
|
|
|
|
|
dfrag = (struct mptcp_data_frag *)(page_to_virt(pfrag->page) + offset);
|
|
|
|
dfrag->data_len = 0;
|
|
|
|
dfrag->data_seq = msk->write_seq;
|
|
|
|
dfrag->overhead = offset - orig_offset + sizeof(struct mptcp_data_frag);
|
|
|
|
dfrag->offset = offset + sizeof(struct mptcp_data_frag);
|
|
|
|
dfrag->page = pfrag->page;
|
|
|
|
|
|
|
|
return dfrag;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:23 +03:00
|
|
|
static int mptcp_sendmsg_frag(struct sock *sk, struct sock *ssk,
|
2020-03-28 00:48:47 +03:00
|
|
|
struct msghdr *msg, struct mptcp_data_frag *dfrag,
|
|
|
|
long *timeo, int *pmss_now,
|
2020-01-22 03:56:27 +03:00
|
|
|
int *ps_goal)
|
2020-01-22 03:56:23 +03:00
|
|
|
{
|
2020-03-28 00:48:43 +03:00
|
|
|
int mss_now, avail_size, size_goal, offset, ret, frag_truesize = 0;
|
|
|
|
bool dfrag_collapsed, can_collapse = false;
|
2020-01-22 03:56:23 +03:00
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
struct mptcp_ext *mpext = NULL;
|
2020-03-28 00:48:47 +03:00
|
|
|
bool retransmission = !!dfrag;
|
2020-01-22 03:56:27 +03:00
|
|
|
struct sk_buff *skb, *tail;
|
2020-01-22 03:56:23 +03:00
|
|
|
struct page_frag *pfrag;
|
2020-03-28 00:48:47 +03:00
|
|
|
struct page *page;
|
|
|
|
u64 *write_seq;
|
2020-01-22 03:56:23 +03:00
|
|
|
size_t psize;
|
|
|
|
|
|
|
|
/* use the mptcp page cache so that we can easily move the data
|
|
|
|
* from one substream to another, but do per subflow memory accounting
|
2020-03-28 00:48:47 +03:00
|
|
|
* Note: pfrag is used only !retransmission, but the compiler if
|
|
|
|
* fooled into a warning if we don't init here
|
2020-01-22 03:56:23 +03:00
|
|
|
*/
|
|
|
|
pfrag = sk_page_frag(sk);
|
2020-03-28 00:48:47 +03:00
|
|
|
if (!retransmission) {
|
|
|
|
write_seq = &msk->write_seq;
|
|
|
|
page = pfrag->page;
|
|
|
|
} else {
|
|
|
|
write_seq = &dfrag->data_seq;
|
|
|
|
page = dfrag->page;
|
|
|
|
}
|
2020-01-22 03:56:23 +03:00
|
|
|
|
|
|
|
/* compute copy limit */
|
|
|
|
mss_now = tcp_send_mss(ssk, &size_goal, msg->msg_flags);
|
2020-01-22 03:56:27 +03:00
|
|
|
*pmss_now = mss_now;
|
|
|
|
*ps_goal = size_goal;
|
|
|
|
avail_size = size_goal;
|
|
|
|
skb = tcp_write_queue_tail(ssk);
|
|
|
|
if (skb) {
|
|
|
|
mpext = skb_ext_find(skb, SKB_EXT_MPTCP);
|
|
|
|
|
|
|
|
/* Limit the write to the size available in the
|
|
|
|
* current skb, if any, so that we create at most a new skb.
|
|
|
|
* Explicitly tells TCP internals to avoid collapsing on later
|
|
|
|
* queue management operation, to avoid breaking the ext <->
|
|
|
|
* SSN association set here
|
|
|
|
*/
|
|
|
|
can_collapse = (size_goal - skb->len > 0) &&
|
2020-03-28 00:48:47 +03:00
|
|
|
mptcp_skb_can_collapse_to(*write_seq, skb, mpext);
|
2020-01-22 03:56:27 +03:00
|
|
|
if (!can_collapse)
|
|
|
|
TCP_SKB_CB(skb)->eor = 1;
|
|
|
|
else
|
|
|
|
avail_size = size_goal - skb->len;
|
|
|
|
}
|
2020-03-28 00:48:43 +03:00
|
|
|
|
2020-03-28 00:48:47 +03:00
|
|
|
if (!retransmission) {
|
|
|
|
/* reuse tail pfrag, if possible, or carve a new one from the
|
|
|
|
* page allocator
|
|
|
|
*/
|
|
|
|
dfrag = mptcp_rtx_tail(sk);
|
|
|
|
offset = pfrag->offset;
|
|
|
|
dfrag_collapsed = mptcp_frag_can_collapse_to(msk, pfrag, dfrag);
|
|
|
|
if (!dfrag_collapsed) {
|
|
|
|
dfrag = mptcp_carve_data_frag(msk, pfrag, offset);
|
|
|
|
offset = dfrag->offset;
|
|
|
|
frag_truesize = dfrag->overhead;
|
|
|
|
}
|
|
|
|
psize = min_t(size_t, pfrag->size - offset, avail_size);
|
|
|
|
|
|
|
|
/* Copy to page */
|
|
|
|
pr_debug("left=%zu", msg_data_left(msg));
|
|
|
|
psize = copy_page_from_iter(pfrag->page, offset,
|
|
|
|
min_t(size_t, msg_data_left(msg),
|
|
|
|
psize),
|
|
|
|
&msg->msg_iter);
|
|
|
|
pr_debug("left=%zu", msg_data_left(msg));
|
|
|
|
if (!psize)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (!sk_wmem_schedule(sk, psize + dfrag->overhead))
|
|
|
|
return -ENOMEM;
|
|
|
|
} else {
|
2020-03-28 00:48:43 +03:00
|
|
|
offset = dfrag->offset;
|
2020-03-28 00:48:47 +03:00
|
|
|
psize = min_t(size_t, dfrag->data_len, avail_size);
|
2020-03-28 00:48:43 +03:00
|
|
|
}
|
2020-03-28 00:48:45 +03:00
|
|
|
|
2020-01-22 03:56:27 +03:00
|
|
|
/* tell the TCP stack to delay the push so that we can safely
|
|
|
|
* access the skb after the sendpages call
|
2020-01-22 03:56:23 +03:00
|
|
|
*/
|
2020-03-28 00:48:47 +03:00
|
|
|
ret = do_tcp_sendpages(ssk, page, offset, psize,
|
2020-05-16 11:46:19 +03:00
|
|
|
msg->msg_flags | MSG_SENDPAGE_NOTLAST | MSG_DONTWAIT);
|
2020-01-22 03:56:23 +03:00
|
|
|
if (ret <= 0)
|
|
|
|
return ret;
|
2020-03-28 00:48:43 +03:00
|
|
|
|
|
|
|
frag_truesize += ret;
|
2020-03-28 00:48:47 +03:00
|
|
|
if (!retransmission) {
|
|
|
|
if (unlikely(ret < psize))
|
|
|
|
iov_iter_revert(&msg->msg_iter, psize - ret);
|
2020-01-22 03:56:23 +03:00
|
|
|
|
2020-03-28 00:48:47 +03:00
|
|
|
/* send successful, keep track of sent data for mptcp-level
|
|
|
|
* retransmission
|
|
|
|
*/
|
|
|
|
dfrag->data_len += ret;
|
|
|
|
if (!dfrag_collapsed) {
|
|
|
|
get_page(dfrag->page);
|
|
|
|
list_add_tail(&dfrag->list, &msk->rtx_queue);
|
|
|
|
sk_wmem_queued_add(sk, frag_truesize);
|
|
|
|
} else {
|
|
|
|
sk_wmem_queued_add(sk, ret);
|
|
|
|
}
|
2020-03-28 00:48:43 +03:00
|
|
|
|
2020-03-28 00:48:47 +03:00
|
|
|
/* charge data on mptcp rtx queue to the master socket
|
|
|
|
* Note: we charge such data both to sk and ssk
|
|
|
|
*/
|
|
|
|
sk->sk_forward_alloc -= frag_truesize;
|
|
|
|
}
|
2020-03-28 00:48:45 +03:00
|
|
|
|
2020-01-22 03:56:27 +03:00
|
|
|
/* if the tail skb extension is still the cached one, collapsing
|
|
|
|
* really happened. Note: we can't check for 'same skb' as the sk_buff
|
|
|
|
* hdr on tail can be transmitted, freed and re-allocated by the
|
|
|
|
* do_tcp_sendpages() call
|
|
|
|
*/
|
|
|
|
tail = tcp_write_queue_tail(ssk);
|
|
|
|
if (mpext && tail && mpext == skb_ext_find(tail, SKB_EXT_MPTCP)) {
|
|
|
|
WARN_ON_ONCE(!can_collapse);
|
|
|
|
mpext->data_len += ret;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:23 +03:00
|
|
|
skb = tcp_write_queue_tail(ssk);
|
|
|
|
mpext = __skb_ext_set(skb, SKB_EXT_MPTCP, msk->cached_ext);
|
|
|
|
msk->cached_ext = NULL;
|
|
|
|
|
|
|
|
memset(mpext, 0, sizeof(*mpext));
|
2020-03-28 00:48:47 +03:00
|
|
|
mpext->data_seq = *write_seq;
|
2020-01-22 03:56:23 +03:00
|
|
|
mpext->subflow_seq = mptcp_subflow_ctx(ssk)->rel_write_seq;
|
|
|
|
mpext->data_len = ret;
|
|
|
|
mpext->use_map = 1;
|
|
|
|
mpext->dsn64 = 1;
|
|
|
|
|
|
|
|
pr_debug("data_seq=%llu subflow_seq=%u data_len=%u dsn64=%d",
|
|
|
|
mpext->data_seq, mpext->subflow_seq, mpext->data_len,
|
|
|
|
mpext->dsn64);
|
|
|
|
|
2020-01-22 03:56:27 +03:00
|
|
|
out:
|
2020-03-28 00:48:47 +03:00
|
|
|
if (!retransmission)
|
|
|
|
pfrag->offset += frag_truesize;
|
|
|
|
*write_seq += ret;
|
2020-01-22 03:56:23 +03:00
|
|
|
mptcp_subflow_ctx(ssk)->rel_write_seq += ret;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-05-16 11:46:17 +03:00
|
|
|
static void mptcp_nospace(struct mptcp_sock *msk, struct socket *sock)
|
|
|
|
{
|
|
|
|
clear_bit(MPTCP_SEND_SPACE, &msk->flags);
|
|
|
|
smp_mb__after_atomic(); /* msk->flags is changed by write_space cb */
|
|
|
|
|
|
|
|
/* enables sk->write_space() callbacks */
|
|
|
|
set_bit(SOCK_NOSPACE, &sock->flags);
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:39 +03:00
|
|
|
static struct sock *mptcp_subflow_get_send(struct mptcp_sock *msk)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
struct sock *backup = NULL;
|
|
|
|
|
|
|
|
sock_owned_by_me((const struct sock *)msk);
|
|
|
|
|
2020-05-16 11:46:20 +03:00
|
|
|
if (!mptcp_ext_cache_refill(msk))
|
|
|
|
return NULL;
|
|
|
|
|
2020-03-28 00:48:39 +03:00
|
|
|
mptcp_for_each_subflow(msk, subflow) {
|
|
|
|
struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
|
|
|
|
|
|
|
|
if (!sk_stream_memory_free(ssk)) {
|
|
|
|
struct socket *sock = ssk->sk_socket;
|
|
|
|
|
2020-05-16 11:46:17 +03:00
|
|
|
if (sock)
|
|
|
|
mptcp_nospace(msk, sock);
|
2020-03-28 00:48:39 +03:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (subflow->backup) {
|
|
|
|
if (!backup)
|
|
|
|
backup = ssk;
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ssk;
|
|
|
|
}
|
|
|
|
|
|
|
|
return backup;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:25 +03:00
|
|
|
static void ssk_check_wmem(struct mptcp_sock *msk, struct sock *ssk)
|
|
|
|
{
|
|
|
|
struct socket *sock;
|
|
|
|
|
|
|
|
if (likely(sk_stream_is_writeable(ssk)))
|
|
|
|
return;
|
|
|
|
|
|
|
|
sock = READ_ONCE(ssk->sk_socket);
|
2020-05-16 11:46:17 +03:00
|
|
|
if (sock)
|
|
|
|
mptcp_nospace(msk, sock);
|
2020-01-22 03:56:25 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
static int mptcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
|
|
|
|
{
|
2020-01-22 03:56:27 +03:00
|
|
|
int mss_now = 0, size_goal = 0, ret = 0;
|
2020-01-22 03:56:15 +03:00
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
2020-05-16 11:46:21 +03:00
|
|
|
struct page_frag *pfrag;
|
2020-01-22 03:56:18 +03:00
|
|
|
struct socket *ssock;
|
2020-01-22 03:56:23 +03:00
|
|
|
size_t copied = 0;
|
2020-01-22 03:56:18 +03:00
|
|
|
struct sock *ssk;
|
2020-05-16 11:46:19 +03:00
|
|
|
bool tx_ok;
|
2020-01-22 03:56:23 +03:00
|
|
|
long timeo;
|
2020-01-22 03:56:15 +03:00
|
|
|
|
|
|
|
if (msg->msg_flags & ~(MSG_MORE | MSG_DONTWAIT | MSG_NOSIGNAL))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
lock_sock(sk);
|
2020-02-29 02:47:39 +03:00
|
|
|
|
|
|
|
timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
|
|
|
|
|
|
|
|
if ((1 << sk->sk_state) & ~(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT)) {
|
|
|
|
ret = sk_stream_wait_connect(sk, &timeo);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2020-04-11 22:05:01 +03:00
|
|
|
fallback:
|
2020-01-22 03:56:18 +03:00
|
|
|
ssock = __mptcp_tcp_fallback(msk);
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
if (unlikely(ssock)) {
|
2020-04-11 22:05:01 +03:00
|
|
|
release_sock(sk);
|
2020-01-22 03:56:18 +03:00
|
|
|
pr_debug("fallback passthrough");
|
|
|
|
ret = sock_sendmsg(ssock, msg);
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
return ret >= 0 ? ret + copied : (copied ? copied : ret);
|
2020-01-22 03:56:18 +03:00
|
|
|
}
|
|
|
|
|
2020-05-16 11:46:21 +03:00
|
|
|
pfrag = sk_page_frag(sk);
|
2020-05-16 11:46:19 +03:00
|
|
|
restart:
|
2020-03-28 00:48:43 +03:00
|
|
|
mptcp_clean_una(sk);
|
|
|
|
|
2020-05-16 11:46:18 +03:00
|
|
|
wait_for_sndbuf:
|
2020-03-28 00:48:40 +03:00
|
|
|
__mptcp_flush_join_list(msk);
|
2020-03-28 00:48:39 +03:00
|
|
|
ssk = mptcp_subflow_get_send(msk);
|
2020-05-16 11:46:21 +03:00
|
|
|
while (!sk_stream_memory_free(sk) ||
|
|
|
|
!ssk ||
|
|
|
|
!mptcp_page_frag_refill(ssk, pfrag)) {
|
2020-05-16 11:46:18 +03:00
|
|
|
if (ssk) {
|
|
|
|
/* make sure retransmit timer is
|
|
|
|
* running before we wait for memory.
|
|
|
|
*
|
|
|
|
* The retransmit timer might be needed
|
|
|
|
* to make the peer send an up-to-date
|
|
|
|
* MPTCP Ack.
|
|
|
|
*/
|
|
|
|
mptcp_set_timeout(sk, ssk);
|
|
|
|
if (!mptcp_timer_pending(sk))
|
|
|
|
mptcp_reset_timer(sk);
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:39 +03:00
|
|
|
ret = sk_stream_wait_memory(sk, &timeo);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
2020-03-28 00:48:43 +03:00
|
|
|
mptcp_clean_una(sk);
|
|
|
|
|
2020-03-28 00:48:39 +03:00
|
|
|
ssk = mptcp_subflow_get_send(msk);
|
|
|
|
if (list_empty(&msk->conn_list)) {
|
|
|
|
ret = -ENOTCONN;
|
|
|
|
goto out;
|
|
|
|
}
|
2020-01-22 03:56:18 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:23 +03:00
|
|
|
pr_debug("conn_list->subflow=%p", ssk);
|
2020-01-22 03:56:18 +03:00
|
|
|
|
2020-01-22 03:56:23 +03:00
|
|
|
lock_sock(ssk);
|
2020-05-16 11:46:19 +03:00
|
|
|
tx_ok = msg_data_left(msg);
|
|
|
|
while (tx_ok) {
|
2020-03-28 00:48:47 +03:00
|
|
|
ret = mptcp_sendmsg_frag(sk, ssk, msg, NULL, &timeo, &mss_now,
|
2020-01-22 03:56:27 +03:00
|
|
|
&size_goal);
|
2020-05-16 11:46:19 +03:00
|
|
|
if (ret < 0) {
|
|
|
|
if (ret == -EAGAIN && timeo > 0) {
|
|
|
|
mptcp_set_timeout(sk, ssk);
|
|
|
|
release_sock(ssk);
|
|
|
|
goto restart;
|
|
|
|
}
|
2020-01-22 03:56:23 +03:00
|
|
|
break;
|
2020-05-16 11:46:19 +03:00
|
|
|
}
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
if (ret == 0 && unlikely(__mptcp_needs_tcp_fallback(msk))) {
|
2020-04-11 22:05:01 +03:00
|
|
|
/* Can happen for passive sockets:
|
|
|
|
* 3WHS negotiated MPTCP, but first packet after is
|
|
|
|
* plain TCP (e.g. due to middlebox filtering unknown
|
|
|
|
* options).
|
|
|
|
*
|
|
|
|
* Fall back to TCP.
|
|
|
|
*/
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
release_sock(ssk);
|
|
|
|
goto fallback;
|
|
|
|
}
|
2020-01-22 03:56:23 +03:00
|
|
|
|
|
|
|
copied += ret;
|
2020-05-16 11:46:18 +03:00
|
|
|
|
2020-05-16 11:46:19 +03:00
|
|
|
tx_ok = msg_data_left(msg);
|
|
|
|
if (!tx_ok)
|
|
|
|
break;
|
|
|
|
|
2020-05-16 11:46:20 +03:00
|
|
|
if (!sk_stream_memory_free(ssk) ||
|
2020-05-16 11:46:21 +03:00
|
|
|
!mptcp_page_frag_refill(ssk, pfrag) ||
|
2020-05-16 11:46:20 +03:00
|
|
|
!mptcp_ext_cache_refill(msk)) {
|
2020-05-16 11:46:19 +03:00
|
|
|
set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
|
|
|
|
tcp_push(ssk, msg->msg_flags, mss_now,
|
|
|
|
tcp_sk(ssk)->nonagle, size_goal);
|
|
|
|
mptcp_set_timeout(sk, ssk);
|
|
|
|
release_sock(ssk);
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
|
2020-05-16 11:46:18 +03:00
|
|
|
/* memory is charged to mptcp level socket as well, i.e.
|
|
|
|
* if msg is very large, mptcp socket may run out of buffer
|
|
|
|
* space. mptcp_clean_una() will release data that has
|
|
|
|
* been acked at mptcp level in the mean time, so there is
|
|
|
|
* a good chance we can continue sending data right away.
|
2020-05-16 11:46:19 +03:00
|
|
|
*
|
|
|
|
* Normally, when the tcp subflow can accept more data, then
|
|
|
|
* so can the MPTCP socket. However, we need to cope with
|
|
|
|
* peers that might lag behind in their MPTCP-level
|
|
|
|
* acknowledgements, i.e. data might have been acked at
|
|
|
|
* tcp level only. So, we must also check the MPTCP socket
|
|
|
|
* limits before we send more data.
|
2020-05-16 11:46:18 +03:00
|
|
|
*/
|
|
|
|
if (unlikely(!sk_stream_memory_free(sk))) {
|
|
|
|
tcp_push(ssk, msg->msg_flags, mss_now,
|
|
|
|
tcp_sk(ssk)->nonagle, size_goal);
|
|
|
|
mptcp_clean_una(sk);
|
|
|
|
if (!sk_stream_memory_free(sk)) {
|
|
|
|
/* can't send more for now, need to wait for
|
|
|
|
* MPTCP-level ACKs from peer.
|
|
|
|
*
|
|
|
|
* Wakeup will happen via mptcp_clean_una().
|
|
|
|
*/
|
|
|
|
mptcp_set_timeout(sk, ssk);
|
|
|
|
release_sock(ssk);
|
|
|
|
goto wait_for_sndbuf;
|
|
|
|
}
|
|
|
|
}
|
2020-01-22 03:56:23 +03:00
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:44 +03:00
|
|
|
mptcp_set_timeout(sk, ssk);
|
2020-01-22 03:56:27 +03:00
|
|
|
if (copied) {
|
2020-01-22 03:56:23 +03:00
|
|
|
ret = copied;
|
2020-01-22 03:56:27 +03:00
|
|
|
tcp_push(ssk, msg->msg_flags, mss_now, tcp_sk(ssk)->nonagle,
|
|
|
|
size_goal);
|
2020-03-28 00:48:44 +03:00
|
|
|
|
|
|
|
/* start the timer, if it's not pending */
|
|
|
|
if (!mptcp_timer_pending(sk))
|
|
|
|
mptcp_reset_timer(sk);
|
2020-01-22 03:56:27 +03:00
|
|
|
}
|
2020-01-22 03:56:23 +03:00
|
|
|
|
2020-01-22 03:56:25 +03:00
|
|
|
ssk_check_wmem(msk, ssk);
|
2020-01-22 03:56:23 +03:00
|
|
|
release_sock(ssk);
|
2020-02-29 02:47:39 +03:00
|
|
|
out:
|
2020-01-22 03:56:18 +03:00
|
|
|
release_sock(sk);
|
|
|
|
return ret;
|
2020-01-22 03:56:15 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:26 +03:00
|
|
|
static void mptcp_wait_data(struct sock *sk, long *timeo)
|
|
|
|
{
|
|
|
|
DEFINE_WAIT_FUNC(wait, woken_wake_function);
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
|
|
|
|
add_wait_queue(sk_sleep(sk), &wait);
|
|
|
|
sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk);
|
|
|
|
|
|
|
|
sk_wait_event(sk, timeo,
|
|
|
|
test_and_clear_bit(MPTCP_DATA_READY, &msk->flags), &wait);
|
|
|
|
|
|
|
|
sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk);
|
|
|
|
remove_wait_queue(sk_sleep(sk), &wait);
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
static int __mptcp_recvmsg_mskq(struct mptcp_sock *msk,
|
|
|
|
struct msghdr *msg,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
struct sock *sk = (struct sock *)msk;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int copied = 0;
|
|
|
|
|
|
|
|
while ((skb = skb_peek(&sk->sk_receive_queue)) != NULL) {
|
|
|
|
u32 offset = MPTCP_SKB_CB(skb)->offset;
|
|
|
|
u32 data_len = skb->len - offset;
|
|
|
|
u32 count = min_t(size_t, len - copied, data_len);
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = skb_copy_datagram_msg(skb, offset, msg, count);
|
|
|
|
if (unlikely(err < 0)) {
|
|
|
|
if (!copied)
|
|
|
|
return err;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
copied += count;
|
|
|
|
|
|
|
|
if (count < data_len) {
|
|
|
|
MPTCP_SKB_CB(skb)->offset += count;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
__skb_unlink(skb, &sk->sk_receive_queue);
|
|
|
|
__kfree_skb(skb);
|
|
|
|
|
|
|
|
if (copied >= len)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return copied;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool __mptcp_move_skbs(struct mptcp_sock *msk)
|
|
|
|
{
|
|
|
|
unsigned int moved = 0;
|
|
|
|
bool done;
|
|
|
|
|
|
|
|
do {
|
|
|
|
struct sock *ssk = mptcp_subflow_recv_lookup(msk);
|
|
|
|
|
|
|
|
if (!ssk)
|
|
|
|
break;
|
|
|
|
|
|
|
|
lock_sock(ssk);
|
|
|
|
done = __mptcp_move_skbs_from_subflow(msk, ssk, &moved);
|
|
|
|
release_sock(ssk);
|
|
|
|
} while (!done);
|
|
|
|
|
|
|
|
return moved > 0;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
static int mptcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len,
|
|
|
|
int nonblock, int flags, int *addr_len)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
2020-01-22 03:56:18 +03:00
|
|
|
struct socket *ssock;
|
|
|
|
int copied = 0;
|
2020-01-22 03:56:26 +03:00
|
|
|
int target;
|
|
|
|
long timeo;
|
2020-01-22 03:56:15 +03:00
|
|
|
|
|
|
|
if (msg->msg_flags & ~(MSG_WAITALL | MSG_DONTWAIT))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
lock_sock(sk);
|
|
|
|
ssock = __mptcp_tcp_fallback(msk);
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
if (unlikely(ssock)) {
|
|
|
|
fallback:
|
2020-04-11 22:05:01 +03:00
|
|
|
release_sock(sk);
|
2020-01-22 03:56:18 +03:00
|
|
|
pr_debug("fallback-read subflow=%p",
|
|
|
|
mptcp_subflow_ctx(ssock->sk));
|
|
|
|
copied = sock_recvmsg(ssock, msg, flags);
|
|
|
|
return copied;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:26 +03:00
|
|
|
timeo = sock_rcvtimeo(sk, nonblock);
|
|
|
|
|
|
|
|
len = min_t(size_t, len, INT_MAX);
|
|
|
|
target = sock_rcvlowat(sk, flags & MSG_WAITALL, len);
|
2020-03-28 00:48:40 +03:00
|
|
|
__mptcp_flush_join_list(msk);
|
2020-01-22 03:56:26 +03:00
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
while (len > (size_t)copied) {
|
2020-01-22 03:56:26 +03:00
|
|
|
int bytes_read;
|
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
bytes_read = __mptcp_recvmsg_mskq(msk, msg, len - copied);
|
|
|
|
if (unlikely(bytes_read < 0)) {
|
|
|
|
if (!copied)
|
|
|
|
copied = bytes_read;
|
|
|
|
goto out_err;
|
|
|
|
}
|
2020-01-22 03:56:26 +03:00
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
copied += bytes_read;
|
2020-01-22 03:56:26 +03:00
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
if (skb_queue_empty(&sk->sk_receive_queue) &&
|
|
|
|
__mptcp_move_skbs(msk))
|
|
|
|
continue;
|
2020-01-22 03:56:26 +03:00
|
|
|
|
|
|
|
/* only the master socket status is relevant here. The exit
|
|
|
|
* conditions mirror closely tcp_recvmsg()
|
|
|
|
*/
|
|
|
|
if (copied >= target)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (copied) {
|
|
|
|
if (sk->sk_err ||
|
|
|
|
sk->sk_state == TCP_CLOSE ||
|
|
|
|
(sk->sk_shutdown & RCV_SHUTDOWN) ||
|
|
|
|
!timeo ||
|
|
|
|
signal_pending(current))
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
if (sk->sk_err) {
|
|
|
|
copied = sock_error(sk);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2020-06-10 11:47:41 +03:00
|
|
|
if (test_and_clear_bit(MPTCP_WORK_EOF, &msk->flags))
|
|
|
|
mptcp_check_for_eof(msk);
|
|
|
|
|
2020-01-22 03:56:26 +03:00
|
|
|
if (sk->sk_shutdown & RCV_SHUTDOWN)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (sk->sk_state == TCP_CLOSE) {
|
|
|
|
copied = -ENOTCONN;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!timeo) {
|
|
|
|
copied = -EAGAIN;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (signal_pending(current)) {
|
|
|
|
copied = sock_intr_errno(timeo);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_debug("block timeout %ld", timeo);
|
|
|
|
mptcp_wait_data(sk, &timeo);
|
2020-05-25 17:38:47 +03:00
|
|
|
ssock = __mptcp_tcp_fallback(msk);
|
|
|
|
if (unlikely(ssock))
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
goto fallback;
|
2020-01-22 03:56:18 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
if (skb_queue_empty(&sk->sk_receive_queue)) {
|
|
|
|
/* entire backlog drained, clear DATA_READY. */
|
2020-01-22 03:56:26 +03:00
|
|
|
clear_bit(MPTCP_DATA_READY, &msk->flags);
|
2020-01-22 03:56:18 +03:00
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
/* .. race-breaker: ssk might have gotten new data
|
|
|
|
* after last __mptcp_move_skbs() returned false.
|
2020-01-22 03:56:26 +03:00
|
|
|
*/
|
2020-02-26 12:14:48 +03:00
|
|
|
if (unlikely(__mptcp_move_skbs(msk)))
|
2020-01-22 03:56:26 +03:00
|
|
|
set_bit(MPTCP_DATA_READY, &msk->flags);
|
2020-02-26 12:14:48 +03:00
|
|
|
} else if (unlikely(!test_bit(MPTCP_DATA_READY, &msk->flags))) {
|
|
|
|
/* data to read but mptcp_wait_data() cleared DATA_READY */
|
|
|
|
set_bit(MPTCP_DATA_READY, &msk->flags);
|
2020-01-22 03:56:26 +03:00
|
|
|
}
|
2020-02-26 12:14:48 +03:00
|
|
|
out_err:
|
2020-01-22 03:56:26 +03:00
|
|
|
release_sock(sk);
|
2020-01-22 03:56:18 +03:00
|
|
|
return copied;
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:44 +03:00
|
|
|
static void mptcp_retransmit_handler(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
|
2020-03-28 00:48:48 +03:00
|
|
|
if (atomic64_read(&msk->snd_una) == msk->write_seq) {
|
2020-03-28 00:48:44 +03:00
|
|
|
mptcp_stop_timer(sk);
|
2020-03-28 00:48:48 +03:00
|
|
|
} else {
|
|
|
|
set_bit(MPTCP_WORK_RTX, &msk->flags);
|
|
|
|
if (schedule_work(&msk->work))
|
|
|
|
sock_hold(sk);
|
|
|
|
}
|
2020-03-28 00:48:44 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void mptcp_retransmit_timer(struct timer_list *t)
|
|
|
|
{
|
|
|
|
struct inet_connection_sock *icsk = from_timer(icsk, t,
|
|
|
|
icsk_retransmit_timer);
|
|
|
|
struct sock *sk = &icsk->icsk_inet.sk;
|
|
|
|
|
|
|
|
bh_lock_sock(sk);
|
|
|
|
if (!sock_owned_by_user(sk)) {
|
|
|
|
mptcp_retransmit_handler(sk);
|
|
|
|
} else {
|
|
|
|
/* delegate our work to tcp_release_cb() */
|
|
|
|
if (!test_and_set_bit(TCP_WRITE_TIMER_DEFERRED,
|
|
|
|
&sk->sk_tsq_flags))
|
|
|
|
sock_hold(sk);
|
|
|
|
}
|
|
|
|
bh_unlock_sock(sk);
|
|
|
|
sock_put(sk);
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:48 +03:00
|
|
|
/* Find an idle subflow. Return NULL if there is unacked data at tcp
|
|
|
|
* level.
|
|
|
|
*
|
|
|
|
* A backup subflow is returned only if that is the only kind available.
|
|
|
|
*/
|
|
|
|
static struct sock *mptcp_subflow_get_retrans(const struct mptcp_sock *msk)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
struct sock *backup = NULL;
|
|
|
|
|
|
|
|
sock_owned_by_me((const struct sock *)msk);
|
|
|
|
|
|
|
|
mptcp_for_each_subflow(msk, subflow) {
|
|
|
|
struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
|
|
|
|
|
|
|
|
/* still data outstanding at TCP level? Don't retransmit. */
|
|
|
|
if (!tcp_write_queue_empty(ssk))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (subflow->backup) {
|
|
|
|
if (!backup)
|
|
|
|
backup = ssk;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ssk;
|
|
|
|
}
|
|
|
|
|
|
|
|
return backup;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
/* subflow sockets can be either outgoing (connect) or incoming
|
|
|
|
* (accept).
|
|
|
|
*
|
|
|
|
* Outgoing subflows use in-kernel sockets.
|
|
|
|
* Incoming subflows do not have their own 'struct socket' allocated,
|
|
|
|
* so we need to use tcp_close() after detaching them from the mptcp
|
|
|
|
* parent socket.
|
|
|
|
*/
|
|
|
|
static void __mptcp_close_ssk(struct sock *sk, struct sock *ssk,
|
|
|
|
struct mptcp_subflow_context *subflow,
|
|
|
|
long timeout)
|
|
|
|
{
|
|
|
|
struct socket *sock = READ_ONCE(ssk->sk_socket);
|
|
|
|
|
|
|
|
list_del(&subflow->node);
|
|
|
|
|
|
|
|
if (sock && sock != sk->sk_socket) {
|
|
|
|
/* outgoing subflow */
|
|
|
|
sock_release(sock);
|
|
|
|
} else {
|
|
|
|
/* incoming subflow */
|
|
|
|
tcp_close(ssk, timeout);
|
|
|
|
}
|
2020-01-22 03:56:15 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 14:19:03 +03:00
|
|
|
static unsigned int mptcp_sync_mss(struct sock *sk, u32 pmtu)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-02-26 12:14:47 +03:00
|
|
|
static void mptcp_worker(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = container_of(work, struct mptcp_sock, work);
|
2020-03-28 00:48:48 +03:00
|
|
|
struct sock *ssk, *sk = &msk->sk.icsk_inet.sk;
|
2020-05-16 11:46:20 +03:00
|
|
|
int orig_len, orig_offset, mss_now = 0, size_goal = 0;
|
2020-03-28 00:48:48 +03:00
|
|
|
struct mptcp_data_frag *dfrag;
|
|
|
|
u64 orig_write_seq;
|
|
|
|
size_t copied = 0;
|
|
|
|
struct msghdr msg;
|
|
|
|
long timeo = 0;
|
2020-02-26 12:14:47 +03:00
|
|
|
|
|
|
|
lock_sock(sk);
|
2020-03-28 00:48:48 +03:00
|
|
|
mptcp_clean_una(sk);
|
2020-03-28 00:48:40 +03:00
|
|
|
__mptcp_flush_join_list(msk);
|
2020-02-26 12:14:48 +03:00
|
|
|
__mptcp_move_skbs(msk);
|
2020-03-28 00:48:48 +03:00
|
|
|
|
2020-04-02 14:44:52 +03:00
|
|
|
if (test_and_clear_bit(MPTCP_WORK_EOF, &msk->flags))
|
|
|
|
mptcp_check_for_eof(msk);
|
|
|
|
|
2020-03-28 00:48:48 +03:00
|
|
|
if (!test_and_clear_bit(MPTCP_WORK_RTX, &msk->flags))
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
dfrag = mptcp_rtx_head(sk);
|
|
|
|
if (!dfrag)
|
|
|
|
goto unlock;
|
|
|
|
|
2020-05-16 11:46:20 +03:00
|
|
|
if (!mptcp_ext_cache_refill(msk))
|
|
|
|
goto reset_unlock;
|
|
|
|
|
2020-03-28 00:48:48 +03:00
|
|
|
ssk = mptcp_subflow_get_retrans(msk);
|
|
|
|
if (!ssk)
|
|
|
|
goto reset_unlock;
|
|
|
|
|
|
|
|
lock_sock(ssk);
|
|
|
|
|
|
|
|
msg.msg_flags = MSG_DONTWAIT;
|
|
|
|
orig_len = dfrag->data_len;
|
|
|
|
orig_offset = dfrag->offset;
|
|
|
|
orig_write_seq = dfrag->data_seq;
|
|
|
|
while (dfrag->data_len > 0) {
|
2020-05-16 11:46:20 +03:00
|
|
|
int ret = mptcp_sendmsg_frag(sk, ssk, &msg, dfrag, &timeo,
|
|
|
|
&mss_now, &size_goal);
|
2020-03-28 00:48:48 +03:00
|
|
|
if (ret < 0)
|
|
|
|
break;
|
|
|
|
|
2020-03-28 00:48:50 +03:00
|
|
|
MPTCP_INC_STATS(sock_net(sk), MPTCP_MIB_RETRANSSEGS);
|
2020-03-28 00:48:48 +03:00
|
|
|
copied += ret;
|
|
|
|
dfrag->data_len -= ret;
|
|
|
|
dfrag->offset += ret;
|
2020-05-16 11:46:20 +03:00
|
|
|
|
|
|
|
if (!mptcp_ext_cache_refill(msk))
|
|
|
|
break;
|
2020-03-28 00:48:48 +03:00
|
|
|
}
|
|
|
|
if (copied)
|
|
|
|
tcp_push(ssk, msg.msg_flags, mss_now, tcp_sk(ssk)->nonagle,
|
|
|
|
size_goal);
|
|
|
|
|
|
|
|
dfrag->data_seq = orig_write_seq;
|
|
|
|
dfrag->offset = orig_offset;
|
|
|
|
dfrag->data_len = orig_len;
|
|
|
|
|
|
|
|
mptcp_set_timeout(sk, ssk);
|
|
|
|
release_sock(ssk);
|
|
|
|
|
|
|
|
reset_unlock:
|
|
|
|
if (!mptcp_timer_pending(sk))
|
|
|
|
mptcp_reset_timer(sk);
|
|
|
|
|
|
|
|
unlock:
|
2020-02-26 12:14:47 +03:00
|
|
|
release_sock(sk);
|
|
|
|
sock_put(sk);
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:28 +03:00
|
|
|
static int __mptcp_init_sock(struct sock *sk)
|
2020-01-22 03:56:15 +03:00
|
|
|
{
|
2020-01-22 03:56:18 +03:00
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
|
2020-03-28 00:48:40 +03:00
|
|
|
spin_lock_init(&msk->join_list_lock);
|
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
INIT_LIST_HEAD(&msk->conn_list);
|
2020-03-28 00:48:40 +03:00
|
|
|
INIT_LIST_HEAD(&msk->join_list);
|
2020-03-28 00:48:43 +03:00
|
|
|
INIT_LIST_HEAD(&msk->rtx_queue);
|
2020-01-22 03:56:25 +03:00
|
|
|
__set_bit(MPTCP_SEND_SPACE, &msk->flags);
|
2020-02-26 12:14:47 +03:00
|
|
|
INIT_WORK(&msk->work, mptcp_worker);
|
2020-01-22 03:56:18 +03:00
|
|
|
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
msk->first = NULL;
|
2020-02-26 14:19:03 +03:00
|
|
|
inet_csk(sk)->icsk_sync_mss = mptcp_sync_mss;
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
|
2020-03-28 00:48:38 +03:00
|
|
|
mptcp_pm_data_init(msk);
|
|
|
|
|
2020-03-28 00:48:44 +03:00
|
|
|
/* re-use the csk retrans timer for MPTCP-level retrans */
|
|
|
|
timer_setup(&msk->sk.icsk_retransmit_timer, mptcp_retransmit_timer, 0);
|
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:28 +03:00
|
|
|
static int mptcp_init_sock(struct sock *sk)
|
|
|
|
{
|
2020-03-28 00:48:50 +03:00
|
|
|
struct net *net = sock_net(sk);
|
|
|
|
int ret;
|
2020-03-28 00:48:43 +03:00
|
|
|
|
2020-03-28 00:48:50 +03:00
|
|
|
if (!mptcp_is_enabled(net))
|
|
|
|
return -ENOPROTOOPT;
|
|
|
|
|
|
|
|
if (unlikely(!net->mib.mptcp_statistics) && !mptcp_mib_alloc(net))
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
ret = __mptcp_init_sock(sk);
|
2020-03-28 00:48:43 +03:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2020-03-28 00:48:45 +03:00
|
|
|
sk_sockets_allocated_inc(sk);
|
2020-03-28 00:48:47 +03:00
|
|
|
sk->sk_sndbuf = sock_net(sk)->ipv4.sysctl_tcp_wmem[2];
|
2020-03-28 00:48:45 +03:00
|
|
|
|
2020-03-28 00:48:43 +03:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __mptcp_clear_xmit(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
struct mptcp_data_frag *dtmp, *dfrag;
|
|
|
|
|
2020-03-28 00:48:44 +03:00
|
|
|
sk_stop_timer(sk, &msk->sk.icsk_retransmit_timer);
|
|
|
|
|
2020-03-28 00:48:43 +03:00
|
|
|
list_for_each_entry_safe(dfrag, dtmp, &msk->rtx_queue, list)
|
2020-03-28 00:48:45 +03:00
|
|
|
dfrag_clear(sk, dfrag);
|
2020-01-22 03:56:28 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:14:47 +03:00
|
|
|
static void mptcp_cancel_work(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
|
|
|
|
if (cancel_work_sync(&msk->work))
|
|
|
|
sock_put(sk);
|
|
|
|
}
|
|
|
|
|
2020-02-29 02:47:40 +03:00
|
|
|
static void mptcp_subflow_shutdown(struct sock *ssk, int how,
|
|
|
|
bool data_fin_tx_enable, u64 data_fin_tx_seq)
|
2020-01-22 03:56:21 +03:00
|
|
|
{
|
|
|
|
lock_sock(ssk);
|
|
|
|
|
|
|
|
switch (ssk->sk_state) {
|
|
|
|
case TCP_LISTEN:
|
|
|
|
if (!(how & RCV_SHUTDOWN))
|
|
|
|
break;
|
|
|
|
/* fall through */
|
|
|
|
case TCP_SYN_SENT:
|
|
|
|
tcp_disconnect(ssk, O_NONBLOCK);
|
|
|
|
break;
|
|
|
|
default:
|
2020-02-29 02:47:40 +03:00
|
|
|
if (data_fin_tx_enable) {
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
|
|
|
|
subflow = mptcp_subflow_ctx(ssk);
|
|
|
|
subflow->data_fin_tx_seq = data_fin_tx_seq;
|
|
|
|
subflow->data_fin_tx_enable = 1;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:21 +03:00
|
|
|
ssk->sk_shutdown |= how;
|
|
|
|
tcp_shutdown(ssk, how);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Wake up anyone sleeping in poll. */
|
|
|
|
ssk->sk_state_change(ssk);
|
|
|
|
release_sock(ssk);
|
|
|
|
}
|
|
|
|
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
/* Called with msk lock held, releases such lock before returning */
|
2020-02-04 20:12:30 +03:00
|
|
|
static void mptcp_close(struct sock *sk, long timeout)
|
2020-01-22 03:56:15 +03:00
|
|
|
{
|
2020-01-22 03:56:18 +03:00
|
|
|
struct mptcp_subflow_context *subflow, *tmp;
|
2020-01-22 03:56:15 +03:00
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
mptcp: avoid a lockdep splat when mcast group was joined
syzbot triggered following lockdep splat:
ffffffff82d2cd40 (rtnl_mutex){+.+.}, at: ip_mc_drop_socket+0x52/0x180
but task is already holding lock:
ffff8881187a2310 (sk_lock-AF_INET){+.+.}, at: mptcp_close+0x18/0x30
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (sk_lock-AF_INET){+.+.}:
lock_acquire+0xee/0x230
lock_sock_nested+0x89/0xc0
do_ip_setsockopt.isra.0+0x335/0x22f0
ip_setsockopt+0x35/0x60
tcp_setsockopt+0x5d/0x90
__sys_setsockopt+0xf3/0x190
__x64_sys_setsockopt+0x61/0x70
do_syscall_64+0x72/0x300
entry_SYSCALL_64_after_hwframe+0x49/0xbe
-> #0 (rtnl_mutex){+.+.}:
check_prevs_add+0x2b7/0x1210
__lock_acquire+0x10b6/0x1400
lock_acquire+0xee/0x230
__mutex_lock+0x120/0xc70
ip_mc_drop_socket+0x52/0x180
inet_release+0x36/0xe0
__sock_release+0xfd/0x130
__mptcp_close+0xa8/0x1f0
inet_release+0x7f/0xe0
__sock_release+0x69/0x130
sock_close+0x18/0x20
__fput+0x179/0x400
task_work_run+0xd5/0x110
do_exit+0x685/0x1510
do_group_exit+0x7e/0x170
__x64_sys_exit_group+0x28/0x30
do_syscall_64+0x72/0x300
entry_SYSCALL_64_after_hwframe+0x49/0xbe
The trigger is:
socket(AF_INET, SOCK_STREAM, 0x106 /* IPPROTO_MPTCP */) = 4
setsockopt(4, SOL_IP, MCAST_JOIN_GROUP, {gr_interface=7, gr_group={sa_family=AF_INET, sin_port=htons(20003), sin_addr=inet_addr("224.0.0.2")}}, 136) = 0
exit(0)
Which results in a call to rtnl_lock while we are holding
the parent mptcp socket lock via
mptcp_close -> lock_sock(msk) -> inet_release -> ip_mc_drop_socket -> rtnl_lock().
>From lockdep point of view we thus have both
'rtnl_lock; lock_sock' and 'lock_sock; rtnl_lock'.
Fix this by stealing the msk conn_list and doing the subflow close
without holding the msk lock.
Fixes: cec37a6e41aae7bf ("mptcp: Handle MP_CAPABLE options for outgoing connections")
Reported-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-29 17:54:45 +03:00
|
|
|
LIST_HEAD(conn_list);
|
2020-02-29 02:47:40 +03:00
|
|
|
u64 data_fin_tx_seq;
|
2020-01-22 03:56:15 +03:00
|
|
|
|
2020-02-04 20:12:30 +03:00
|
|
|
lock_sock(sk);
|
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
inet_sk_state_store(sk, TCP_CLOSE);
|
|
|
|
|
2020-05-29 18:43:30 +03:00
|
|
|
/* be sure to always acquire the join list lock, to sync vs
|
|
|
|
* mptcp_finish_join().
|
|
|
|
*/
|
|
|
|
spin_lock_bh(&msk->join_list_lock);
|
|
|
|
list_splice_tail_init(&msk->join_list, &msk->conn_list);
|
|
|
|
spin_unlock_bh(&msk->join_list_lock);
|
mptcp: avoid a lockdep splat when mcast group was joined
syzbot triggered following lockdep splat:
ffffffff82d2cd40 (rtnl_mutex){+.+.}, at: ip_mc_drop_socket+0x52/0x180
but task is already holding lock:
ffff8881187a2310 (sk_lock-AF_INET){+.+.}, at: mptcp_close+0x18/0x30
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (sk_lock-AF_INET){+.+.}:
lock_acquire+0xee/0x230
lock_sock_nested+0x89/0xc0
do_ip_setsockopt.isra.0+0x335/0x22f0
ip_setsockopt+0x35/0x60
tcp_setsockopt+0x5d/0x90
__sys_setsockopt+0xf3/0x190
__x64_sys_setsockopt+0x61/0x70
do_syscall_64+0x72/0x300
entry_SYSCALL_64_after_hwframe+0x49/0xbe
-> #0 (rtnl_mutex){+.+.}:
check_prevs_add+0x2b7/0x1210
__lock_acquire+0x10b6/0x1400
lock_acquire+0xee/0x230
__mutex_lock+0x120/0xc70
ip_mc_drop_socket+0x52/0x180
inet_release+0x36/0xe0
__sock_release+0xfd/0x130
__mptcp_close+0xa8/0x1f0
inet_release+0x7f/0xe0
__sock_release+0x69/0x130
sock_close+0x18/0x20
__fput+0x179/0x400
task_work_run+0xd5/0x110
do_exit+0x685/0x1510
do_group_exit+0x7e/0x170
__x64_sys_exit_group+0x28/0x30
do_syscall_64+0x72/0x300
entry_SYSCALL_64_after_hwframe+0x49/0xbe
The trigger is:
socket(AF_INET, SOCK_STREAM, 0x106 /* IPPROTO_MPTCP */) = 4
setsockopt(4, SOL_IP, MCAST_JOIN_GROUP, {gr_interface=7, gr_group={sa_family=AF_INET, sin_port=htons(20003), sin_addr=inet_addr("224.0.0.2")}}, 136) = 0
exit(0)
Which results in a call to rtnl_lock while we are holding
the parent mptcp socket lock via
mptcp_close -> lock_sock(msk) -> inet_release -> ip_mc_drop_socket -> rtnl_lock().
>From lockdep point of view we thus have both
'rtnl_lock; lock_sock' and 'lock_sock; rtnl_lock'.
Fix this by stealing the msk conn_list and doing the subflow close
without holding the msk lock.
Fixes: cec37a6e41aae7bf ("mptcp: Handle MP_CAPABLE options for outgoing connections")
Reported-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-29 17:54:45 +03:00
|
|
|
list_splice_init(&msk->conn_list, &conn_list);
|
|
|
|
|
2020-02-29 02:47:40 +03:00
|
|
|
data_fin_tx_seq = msk->write_seq;
|
|
|
|
|
2020-03-28 00:48:43 +03:00
|
|
|
__mptcp_clear_xmit(sk);
|
|
|
|
|
mptcp: avoid a lockdep splat when mcast group was joined
syzbot triggered following lockdep splat:
ffffffff82d2cd40 (rtnl_mutex){+.+.}, at: ip_mc_drop_socket+0x52/0x180
but task is already holding lock:
ffff8881187a2310 (sk_lock-AF_INET){+.+.}, at: mptcp_close+0x18/0x30
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (sk_lock-AF_INET){+.+.}:
lock_acquire+0xee/0x230
lock_sock_nested+0x89/0xc0
do_ip_setsockopt.isra.0+0x335/0x22f0
ip_setsockopt+0x35/0x60
tcp_setsockopt+0x5d/0x90
__sys_setsockopt+0xf3/0x190
__x64_sys_setsockopt+0x61/0x70
do_syscall_64+0x72/0x300
entry_SYSCALL_64_after_hwframe+0x49/0xbe
-> #0 (rtnl_mutex){+.+.}:
check_prevs_add+0x2b7/0x1210
__lock_acquire+0x10b6/0x1400
lock_acquire+0xee/0x230
__mutex_lock+0x120/0xc70
ip_mc_drop_socket+0x52/0x180
inet_release+0x36/0xe0
__sock_release+0xfd/0x130
__mptcp_close+0xa8/0x1f0
inet_release+0x7f/0xe0
__sock_release+0x69/0x130
sock_close+0x18/0x20
__fput+0x179/0x400
task_work_run+0xd5/0x110
do_exit+0x685/0x1510
do_group_exit+0x7e/0x170
__x64_sys_exit_group+0x28/0x30
do_syscall_64+0x72/0x300
entry_SYSCALL_64_after_hwframe+0x49/0xbe
The trigger is:
socket(AF_INET, SOCK_STREAM, 0x106 /* IPPROTO_MPTCP */) = 4
setsockopt(4, SOL_IP, MCAST_JOIN_GROUP, {gr_interface=7, gr_group={sa_family=AF_INET, sin_port=htons(20003), sin_addr=inet_addr("224.0.0.2")}}, 136) = 0
exit(0)
Which results in a call to rtnl_lock while we are holding
the parent mptcp socket lock via
mptcp_close -> lock_sock(msk) -> inet_release -> ip_mc_drop_socket -> rtnl_lock().
>From lockdep point of view we thus have both
'rtnl_lock; lock_sock' and 'lock_sock; rtnl_lock'.
Fix this by stealing the msk conn_list and doing the subflow close
without holding the msk lock.
Fixes: cec37a6e41aae7bf ("mptcp: Handle MP_CAPABLE options for outgoing connections")
Reported-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-29 17:54:45 +03:00
|
|
|
release_sock(sk);
|
|
|
|
|
|
|
|
list_for_each_entry_safe(subflow, tmp, &conn_list, node) {
|
2020-01-22 03:56:18 +03:00
|
|
|
struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
|
|
|
|
|
2020-02-29 02:47:40 +03:00
|
|
|
subflow->data_fin_tx_seq = data_fin_tx_seq;
|
|
|
|
subflow->data_fin_tx_enable = 1;
|
2020-01-22 03:56:18 +03:00
|
|
|
__mptcp_close_ssk(sk, ssk, subflow, timeout);
|
2020-01-22 03:56:15 +03:00
|
|
|
}
|
|
|
|
|
2020-02-26 12:14:47 +03:00
|
|
|
mptcp_cancel_work(sk);
|
2020-03-28 00:48:41 +03:00
|
|
|
mptcp_pm_close(msk);
|
2020-02-26 12:14:47 +03:00
|
|
|
|
2020-02-26 12:14:48 +03:00
|
|
|
__skb_queue_purge(&sk->sk_receive_queue);
|
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
sk_common_release(sk);
|
2020-01-22 03:56:15 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:19 +03:00
|
|
|
static void mptcp_copy_inaddrs(struct sock *msk, const struct sock *ssk)
|
|
|
|
{
|
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
|
|
|
const struct ipv6_pinfo *ssk6 = inet6_sk(ssk);
|
|
|
|
struct ipv6_pinfo *msk6 = inet6_sk(msk);
|
|
|
|
|
|
|
|
msk->sk_v6_daddr = ssk->sk_v6_daddr;
|
|
|
|
msk->sk_v6_rcv_saddr = ssk->sk_v6_rcv_saddr;
|
|
|
|
|
|
|
|
if (msk6 && ssk6) {
|
|
|
|
msk6->saddr = ssk6->saddr;
|
|
|
|
msk6->flow_label = ssk6->flow_label;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
inet_sk(msk)->inet_num = inet_sk(ssk)->inet_num;
|
|
|
|
inet_sk(msk)->inet_dport = inet_sk(ssk)->inet_dport;
|
|
|
|
inet_sk(msk)->inet_sport = inet_sk(ssk)->inet_sport;
|
|
|
|
inet_sk(msk)->inet_daddr = inet_sk(ssk)->inet_daddr;
|
|
|
|
inet_sk(msk)->inet_saddr = inet_sk(ssk)->inet_saddr;
|
|
|
|
inet_sk(msk)->inet_rcv_saddr = inet_sk(ssk)->inet_rcv_saddr;
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:43 +03:00
|
|
|
static int mptcp_disconnect(struct sock *sk, int flags)
|
|
|
|
{
|
2020-04-29 21:43:20 +03:00
|
|
|
/* Should never be called.
|
|
|
|
* inet_stream_connect() calls ->disconnect, but that
|
|
|
|
* refers to the subflow socket, not the mptcp one.
|
|
|
|
*/
|
|
|
|
WARN_ON_ONCE(1);
|
|
|
|
return 0;
|
2020-03-28 00:48:43 +03:00
|
|
|
}
|
|
|
|
|
2020-02-06 02:39:37 +03:00
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
|
|
|
static struct ipv6_pinfo *mptcp_inet6_sk(const struct sock *sk)
|
|
|
|
{
|
|
|
|
unsigned int offset = sizeof(struct mptcp6_sock) - sizeof(struct ipv6_pinfo);
|
|
|
|
|
|
|
|
return (struct ipv6_pinfo *)(((u8 *)sk) + offset);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2020-04-20 17:25:06 +03:00
|
|
|
struct sock *mptcp_sk_clone(const struct sock *sk,
|
mptcp: move option parsing into mptcp_incoming_options()
The mptcp_options_received structure carries several per
packet flags (mp_capable, mp_join, etc.). Such fields must
be cleared on each packet, even on dropped ones or packet
not carrying any MPTCP options, but the current mptcp
code clears them only on TCP option reset.
On several races/corner cases we end-up with stray bits in
incoming options, leading to WARN_ON splats. e.g.:
[ 171.164906] Bad mapping: ssn=32714 map_seq=1 map_data_len=32713
[ 171.165006] WARNING: CPU: 1 PID: 5026 at net/mptcp/subflow.c:533 warn_bad_map (linux-mptcp/net/mptcp/subflow.c:533 linux-mptcp/net/mptcp/subflow.c:531)
[ 171.167632] Modules linked in: ip6_vti ip_vti ip_gre ipip sit tunnel4 ip_tunnel geneve ip6_udp_tunnel udp_tunnel macsec macvtap tap ipvlan macvlan 8021q garp mrp xfrm_interface veth netdevsim nlmon dummy team bonding vcan bridge stp llc ip6_gre gre ip6_tunnel tunnel6 tun binfmt_misc intel_rapl_msr intel_rapl_common rfkill kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel joydev virtio_balloon pcspkr i2c_piix4 sunrpc ip_tables xfs libcrc32c crc32c_intel serio_raw virtio_console ata_generic virtio_blk virtio_net net_failover failover ata_piix libata
[ 171.199464] CPU: 1 PID: 5026 Comm: repro Not tainted 5.7.0-rc1.mptcp_f227fdf5d388+ #95
[ 171.200886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-2.fc30 04/01/2014
[ 171.202546] RIP: 0010:warn_bad_map (linux-mptcp/net/mptcp/subflow.c:533 linux-mptcp/net/mptcp/subflow.c:531)
[ 171.206537] Code: c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 1d 8b 55 3c 44 89 e6 48 c7 c7 20 51 13 95 e8 37 8b 22 fe <0f> 0b 48 83 c4 08 5b 5d 41 5c c3 89 4c 24 04 e8 db d6 94 fe 8b 4c
[ 171.220473] RSP: 0018:ffffc90000150560 EFLAGS: 00010282
[ 171.221639] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 171.223108] RDX: 0000000000000000 RSI: 0000000000000008 RDI: fffff5200002a09e
[ 171.224388] RBP: ffff8880aa6e3c00 R08: 0000000000000001 R09: fffffbfff2ec9955
[ 171.225706] R10: ffffffff9764caa7 R11: fffffbfff2ec9954 R12: 0000000000007fca
[ 171.227211] R13: ffff8881066f4a7f R14: ffff8880aa6e3c00 R15: 0000000000000020
[ 171.228460] FS: 00007f8623719740(0000) GS:ffff88810be00000(0000) knlGS:0000000000000000
[ 171.230065] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 171.231303] CR2: 00007ffdab190a50 CR3: 00000001038ea006 CR4: 0000000000160ee0
[ 171.232586] Call Trace:
[ 171.233109] <IRQ>
[ 171.233531] get_mapping_status (linux-mptcp/net/mptcp/subflow.c:691)
[ 171.234371] mptcp_subflow_data_available (linux-mptcp/net/mptcp/subflow.c:736 linux-mptcp/net/mptcp/subflow.c:832)
[ 171.238181] subflow_state_change (linux-mptcp/net/mptcp/subflow.c:1085 (discriminator 1))
[ 171.239066] tcp_fin (linux-mptcp/net/ipv4/tcp_input.c:4217)
[ 171.240123] tcp_data_queue (linux-mptcp/./include/linux/compiler.h:199 linux-mptcp/net/ipv4/tcp_input.c:4822)
[ 171.245083] tcp_rcv_established (linux-mptcp/./include/linux/skbuff.h:1785 linux-mptcp/./include/net/tcp.h:1774 linux-mptcp/./include/net/tcp.h:1847 linux-mptcp/net/ipv4/tcp_input.c:5238 linux-mptcp/net/ipv4/tcp_input.c:5730)
[ 171.254089] tcp_v4_rcv (linux-mptcp/./include/linux/spinlock.h:393 linux-mptcp/net/ipv4/tcp_ipv4.c:2009)
[ 171.258969] ip_protocol_deliver_rcu (linux-mptcp/net/ipv4/ip_input.c:204 (discriminator 1))
[ 171.260214] ip_local_deliver_finish (linux-mptcp/./include/linux/rcupdate.h:651 linux-mptcp/net/ipv4/ip_input.c:232)
[ 171.261389] ip_local_deliver (linux-mptcp/./include/linux/netfilter.h:307 linux-mptcp/./include/linux/netfilter.h:301 linux-mptcp/net/ipv4/ip_input.c:252)
[ 171.265884] ip_rcv (linux-mptcp/./include/linux/netfilter.h:307 linux-mptcp/./include/linux/netfilter.h:301 linux-mptcp/net/ipv4/ip_input.c:539)
[ 171.273666] process_backlog (linux-mptcp/./include/linux/rcupdate.h:651 linux-mptcp/net/core/dev.c:6135)
[ 171.275328] net_rx_action (linux-mptcp/net/core/dev.c:6572 linux-mptcp/net/core/dev.c:6640)
[ 171.280472] __do_softirq (linux-mptcp/./arch/x86/include/asm/jump_label.h:25 linux-mptcp/./include/linux/jump_label.h:200 linux-mptcp/./include/trace/events/irq.h:142 linux-mptcp/kernel/softirq.c:293)
[ 171.281379] do_softirq_own_stack (linux-mptcp/arch/x86/entry/entry_64.S:1083)
[ 171.282358] </IRQ>
We could address the issue clearing explicitly the relevant fields
in several places - tcp_parse_option, tcp_fast_parse_options,
possibly others.
Instead we move the MPTCP option parsing into the already existing
mptcp ingress hook, so that we need to clear the fields in a single
place.
This allows us dropping an MPTCP hook from the TCP code and
removing the quite large mptcp_options_received from the tcp_sock
struct. On the flip side, the MPTCP sockets will traverse the
option space twice (in tcp_parse_option() and in
mptcp_incoming_options(). That looks acceptable: we already
do that for syn and 3rd ack packets, plain TCP socket will
benefit from it, and even MPTCP sockets will experience better
code locality, reducing the jumps between TCP and MPTCP code.
v1 -> v2:
- rebased on current '-net' tree
Fixes: 648ef4b88673 ("mptcp: Implement MPTCP receive path")
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-04-30 16:01:52 +03:00
|
|
|
const struct mptcp_options_received *mp_opt,
|
2020-04-20 17:25:06 +03:00
|
|
|
struct request_sock *req)
|
2020-02-06 02:39:37 +03:00
|
|
|
{
|
2020-03-13 18:52:41 +03:00
|
|
|
struct mptcp_subflow_request_sock *subflow_req = mptcp_subflow_rsk(req);
|
2020-02-06 02:39:37 +03:00
|
|
|
struct sock *nsk = sk_clone_lock(sk, GFP_ATOMIC);
|
2020-03-13 18:52:41 +03:00
|
|
|
struct mptcp_sock *msk;
|
|
|
|
u64 ack_seq;
|
2020-02-06 02:39:37 +03:00
|
|
|
|
|
|
|
if (!nsk)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
|
|
|
if (nsk->sk_family == AF_INET6)
|
|
|
|
inet_sk(nsk)->pinet6 = mptcp_inet6_sk(nsk);
|
|
|
|
#endif
|
|
|
|
|
2020-03-13 18:52:41 +03:00
|
|
|
__mptcp_init_sock(nsk);
|
|
|
|
|
|
|
|
msk = mptcp_sk(nsk);
|
|
|
|
msk->local_key = subflow_req->local_key;
|
|
|
|
msk->token = subflow_req->token;
|
|
|
|
msk->subflow = NULL;
|
|
|
|
|
|
|
|
if (unlikely(mptcp_token_new_accept(subflow_req->token, nsk))) {
|
2020-04-17 10:28:23 +03:00
|
|
|
nsk->sk_state = TCP_CLOSE;
|
2020-03-13 18:52:41 +03:00
|
|
|
bh_unlock_sock(nsk);
|
|
|
|
|
|
|
|
/* we can't call into mptcp_close() here - possible BH context
|
2020-04-17 10:28:23 +03:00
|
|
|
* free the sock directly.
|
|
|
|
* sk_clone_lock() sets nsk refcnt to two, hence call sk_free()
|
|
|
|
* too.
|
2020-03-13 18:52:41 +03:00
|
|
|
*/
|
2020-04-17 10:28:23 +03:00
|
|
|
sk_common_release(nsk);
|
2020-03-13 18:52:41 +03:00
|
|
|
sk_free(nsk);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
msk->write_seq = subflow_req->idsn + 1;
|
2020-03-28 00:48:42 +03:00
|
|
|
atomic64_set(&msk->snd_una, msk->write_seq);
|
mptcp: move option parsing into mptcp_incoming_options()
The mptcp_options_received structure carries several per
packet flags (mp_capable, mp_join, etc.). Such fields must
be cleared on each packet, even on dropped ones or packet
not carrying any MPTCP options, but the current mptcp
code clears them only on TCP option reset.
On several races/corner cases we end-up with stray bits in
incoming options, leading to WARN_ON splats. e.g.:
[ 171.164906] Bad mapping: ssn=32714 map_seq=1 map_data_len=32713
[ 171.165006] WARNING: CPU: 1 PID: 5026 at net/mptcp/subflow.c:533 warn_bad_map (linux-mptcp/net/mptcp/subflow.c:533 linux-mptcp/net/mptcp/subflow.c:531)
[ 171.167632] Modules linked in: ip6_vti ip_vti ip_gre ipip sit tunnel4 ip_tunnel geneve ip6_udp_tunnel udp_tunnel macsec macvtap tap ipvlan macvlan 8021q garp mrp xfrm_interface veth netdevsim nlmon dummy team bonding vcan bridge stp llc ip6_gre gre ip6_tunnel tunnel6 tun binfmt_misc intel_rapl_msr intel_rapl_common rfkill kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel joydev virtio_balloon pcspkr i2c_piix4 sunrpc ip_tables xfs libcrc32c crc32c_intel serio_raw virtio_console ata_generic virtio_blk virtio_net net_failover failover ata_piix libata
[ 171.199464] CPU: 1 PID: 5026 Comm: repro Not tainted 5.7.0-rc1.mptcp_f227fdf5d388+ #95
[ 171.200886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-2.fc30 04/01/2014
[ 171.202546] RIP: 0010:warn_bad_map (linux-mptcp/net/mptcp/subflow.c:533 linux-mptcp/net/mptcp/subflow.c:531)
[ 171.206537] Code: c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 1d 8b 55 3c 44 89 e6 48 c7 c7 20 51 13 95 e8 37 8b 22 fe <0f> 0b 48 83 c4 08 5b 5d 41 5c c3 89 4c 24 04 e8 db d6 94 fe 8b 4c
[ 171.220473] RSP: 0018:ffffc90000150560 EFLAGS: 00010282
[ 171.221639] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 171.223108] RDX: 0000000000000000 RSI: 0000000000000008 RDI: fffff5200002a09e
[ 171.224388] RBP: ffff8880aa6e3c00 R08: 0000000000000001 R09: fffffbfff2ec9955
[ 171.225706] R10: ffffffff9764caa7 R11: fffffbfff2ec9954 R12: 0000000000007fca
[ 171.227211] R13: ffff8881066f4a7f R14: ffff8880aa6e3c00 R15: 0000000000000020
[ 171.228460] FS: 00007f8623719740(0000) GS:ffff88810be00000(0000) knlGS:0000000000000000
[ 171.230065] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 171.231303] CR2: 00007ffdab190a50 CR3: 00000001038ea006 CR4: 0000000000160ee0
[ 171.232586] Call Trace:
[ 171.233109] <IRQ>
[ 171.233531] get_mapping_status (linux-mptcp/net/mptcp/subflow.c:691)
[ 171.234371] mptcp_subflow_data_available (linux-mptcp/net/mptcp/subflow.c:736 linux-mptcp/net/mptcp/subflow.c:832)
[ 171.238181] subflow_state_change (linux-mptcp/net/mptcp/subflow.c:1085 (discriminator 1))
[ 171.239066] tcp_fin (linux-mptcp/net/ipv4/tcp_input.c:4217)
[ 171.240123] tcp_data_queue (linux-mptcp/./include/linux/compiler.h:199 linux-mptcp/net/ipv4/tcp_input.c:4822)
[ 171.245083] tcp_rcv_established (linux-mptcp/./include/linux/skbuff.h:1785 linux-mptcp/./include/net/tcp.h:1774 linux-mptcp/./include/net/tcp.h:1847 linux-mptcp/net/ipv4/tcp_input.c:5238 linux-mptcp/net/ipv4/tcp_input.c:5730)
[ 171.254089] tcp_v4_rcv (linux-mptcp/./include/linux/spinlock.h:393 linux-mptcp/net/ipv4/tcp_ipv4.c:2009)
[ 171.258969] ip_protocol_deliver_rcu (linux-mptcp/net/ipv4/ip_input.c:204 (discriminator 1))
[ 171.260214] ip_local_deliver_finish (linux-mptcp/./include/linux/rcupdate.h:651 linux-mptcp/net/ipv4/ip_input.c:232)
[ 171.261389] ip_local_deliver (linux-mptcp/./include/linux/netfilter.h:307 linux-mptcp/./include/linux/netfilter.h:301 linux-mptcp/net/ipv4/ip_input.c:252)
[ 171.265884] ip_rcv (linux-mptcp/./include/linux/netfilter.h:307 linux-mptcp/./include/linux/netfilter.h:301 linux-mptcp/net/ipv4/ip_input.c:539)
[ 171.273666] process_backlog (linux-mptcp/./include/linux/rcupdate.h:651 linux-mptcp/net/core/dev.c:6135)
[ 171.275328] net_rx_action (linux-mptcp/net/core/dev.c:6572 linux-mptcp/net/core/dev.c:6640)
[ 171.280472] __do_softirq (linux-mptcp/./arch/x86/include/asm/jump_label.h:25 linux-mptcp/./include/linux/jump_label.h:200 linux-mptcp/./include/trace/events/irq.h:142 linux-mptcp/kernel/softirq.c:293)
[ 171.281379] do_softirq_own_stack (linux-mptcp/arch/x86/entry/entry_64.S:1083)
[ 171.282358] </IRQ>
We could address the issue clearing explicitly the relevant fields
in several places - tcp_parse_option, tcp_fast_parse_options,
possibly others.
Instead we move the MPTCP option parsing into the already existing
mptcp ingress hook, so that we need to clear the fields in a single
place.
This allows us dropping an MPTCP hook from the TCP code and
removing the quite large mptcp_options_received from the tcp_sock
struct. On the flip side, the MPTCP sockets will traverse the
option space twice (in tcp_parse_option() and in
mptcp_incoming_options(). That looks acceptable: we already
do that for syn and 3rd ack packets, plain TCP socket will
benefit from it, and even MPTCP sockets will experience better
code locality, reducing the jumps between TCP and MPTCP code.
v1 -> v2:
- rebased on current '-net' tree
Fixes: 648ef4b88673 ("mptcp: Implement MPTCP receive path")
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-04-30 16:01:52 +03:00
|
|
|
if (mp_opt->mp_capable) {
|
2020-03-13 18:52:41 +03:00
|
|
|
msk->can_ack = true;
|
mptcp: move option parsing into mptcp_incoming_options()
The mptcp_options_received structure carries several per
packet flags (mp_capable, mp_join, etc.). Such fields must
be cleared on each packet, even on dropped ones or packet
not carrying any MPTCP options, but the current mptcp
code clears them only on TCP option reset.
On several races/corner cases we end-up with stray bits in
incoming options, leading to WARN_ON splats. e.g.:
[ 171.164906] Bad mapping: ssn=32714 map_seq=1 map_data_len=32713
[ 171.165006] WARNING: CPU: 1 PID: 5026 at net/mptcp/subflow.c:533 warn_bad_map (linux-mptcp/net/mptcp/subflow.c:533 linux-mptcp/net/mptcp/subflow.c:531)
[ 171.167632] Modules linked in: ip6_vti ip_vti ip_gre ipip sit tunnel4 ip_tunnel geneve ip6_udp_tunnel udp_tunnel macsec macvtap tap ipvlan macvlan 8021q garp mrp xfrm_interface veth netdevsim nlmon dummy team bonding vcan bridge stp llc ip6_gre gre ip6_tunnel tunnel6 tun binfmt_misc intel_rapl_msr intel_rapl_common rfkill kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel joydev virtio_balloon pcspkr i2c_piix4 sunrpc ip_tables xfs libcrc32c crc32c_intel serio_raw virtio_console ata_generic virtio_blk virtio_net net_failover failover ata_piix libata
[ 171.199464] CPU: 1 PID: 5026 Comm: repro Not tainted 5.7.0-rc1.mptcp_f227fdf5d388+ #95
[ 171.200886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-2.fc30 04/01/2014
[ 171.202546] RIP: 0010:warn_bad_map (linux-mptcp/net/mptcp/subflow.c:533 linux-mptcp/net/mptcp/subflow.c:531)
[ 171.206537] Code: c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 1d 8b 55 3c 44 89 e6 48 c7 c7 20 51 13 95 e8 37 8b 22 fe <0f> 0b 48 83 c4 08 5b 5d 41 5c c3 89 4c 24 04 e8 db d6 94 fe 8b 4c
[ 171.220473] RSP: 0018:ffffc90000150560 EFLAGS: 00010282
[ 171.221639] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 171.223108] RDX: 0000000000000000 RSI: 0000000000000008 RDI: fffff5200002a09e
[ 171.224388] RBP: ffff8880aa6e3c00 R08: 0000000000000001 R09: fffffbfff2ec9955
[ 171.225706] R10: ffffffff9764caa7 R11: fffffbfff2ec9954 R12: 0000000000007fca
[ 171.227211] R13: ffff8881066f4a7f R14: ffff8880aa6e3c00 R15: 0000000000000020
[ 171.228460] FS: 00007f8623719740(0000) GS:ffff88810be00000(0000) knlGS:0000000000000000
[ 171.230065] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 171.231303] CR2: 00007ffdab190a50 CR3: 00000001038ea006 CR4: 0000000000160ee0
[ 171.232586] Call Trace:
[ 171.233109] <IRQ>
[ 171.233531] get_mapping_status (linux-mptcp/net/mptcp/subflow.c:691)
[ 171.234371] mptcp_subflow_data_available (linux-mptcp/net/mptcp/subflow.c:736 linux-mptcp/net/mptcp/subflow.c:832)
[ 171.238181] subflow_state_change (linux-mptcp/net/mptcp/subflow.c:1085 (discriminator 1))
[ 171.239066] tcp_fin (linux-mptcp/net/ipv4/tcp_input.c:4217)
[ 171.240123] tcp_data_queue (linux-mptcp/./include/linux/compiler.h:199 linux-mptcp/net/ipv4/tcp_input.c:4822)
[ 171.245083] tcp_rcv_established (linux-mptcp/./include/linux/skbuff.h:1785 linux-mptcp/./include/net/tcp.h:1774 linux-mptcp/./include/net/tcp.h:1847 linux-mptcp/net/ipv4/tcp_input.c:5238 linux-mptcp/net/ipv4/tcp_input.c:5730)
[ 171.254089] tcp_v4_rcv (linux-mptcp/./include/linux/spinlock.h:393 linux-mptcp/net/ipv4/tcp_ipv4.c:2009)
[ 171.258969] ip_protocol_deliver_rcu (linux-mptcp/net/ipv4/ip_input.c:204 (discriminator 1))
[ 171.260214] ip_local_deliver_finish (linux-mptcp/./include/linux/rcupdate.h:651 linux-mptcp/net/ipv4/ip_input.c:232)
[ 171.261389] ip_local_deliver (linux-mptcp/./include/linux/netfilter.h:307 linux-mptcp/./include/linux/netfilter.h:301 linux-mptcp/net/ipv4/ip_input.c:252)
[ 171.265884] ip_rcv (linux-mptcp/./include/linux/netfilter.h:307 linux-mptcp/./include/linux/netfilter.h:301 linux-mptcp/net/ipv4/ip_input.c:539)
[ 171.273666] process_backlog (linux-mptcp/./include/linux/rcupdate.h:651 linux-mptcp/net/core/dev.c:6135)
[ 171.275328] net_rx_action (linux-mptcp/net/core/dev.c:6572 linux-mptcp/net/core/dev.c:6640)
[ 171.280472] __do_softirq (linux-mptcp/./arch/x86/include/asm/jump_label.h:25 linux-mptcp/./include/linux/jump_label.h:200 linux-mptcp/./include/trace/events/irq.h:142 linux-mptcp/kernel/softirq.c:293)
[ 171.281379] do_softirq_own_stack (linux-mptcp/arch/x86/entry/entry_64.S:1083)
[ 171.282358] </IRQ>
We could address the issue clearing explicitly the relevant fields
in several places - tcp_parse_option, tcp_fast_parse_options,
possibly others.
Instead we move the MPTCP option parsing into the already existing
mptcp ingress hook, so that we need to clear the fields in a single
place.
This allows us dropping an MPTCP hook from the TCP code and
removing the quite large mptcp_options_received from the tcp_sock
struct. On the flip side, the MPTCP sockets will traverse the
option space twice (in tcp_parse_option() and in
mptcp_incoming_options(). That looks acceptable: we already
do that for syn and 3rd ack packets, plain TCP socket will
benefit from it, and even MPTCP sockets will experience better
code locality, reducing the jumps between TCP and MPTCP code.
v1 -> v2:
- rebased on current '-net' tree
Fixes: 648ef4b88673 ("mptcp: Implement MPTCP receive path")
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-04-30 16:01:52 +03:00
|
|
|
msk->remote_key = mp_opt->sndr_key;
|
2020-03-13 18:52:41 +03:00
|
|
|
mptcp_crypto_key_sha(msk->remote_key, NULL, &ack_seq);
|
|
|
|
ack_seq++;
|
|
|
|
msk->ack_seq = ack_seq;
|
|
|
|
}
|
2020-03-17 17:53:34 +03:00
|
|
|
|
2020-04-20 17:25:04 +03:00
|
|
|
sock_reset_flag(nsk, SOCK_RCU_FREE);
|
2020-03-17 17:53:34 +03:00
|
|
|
/* will be fully established after successful MPC subflow creation */
|
|
|
|
inet_sk_state_store(nsk, TCP_SYN_RECV);
|
2020-03-13 18:52:41 +03:00
|
|
|
bh_unlock_sock(nsk);
|
|
|
|
|
|
|
|
/* keep a single reference */
|
|
|
|
__sock_put(nsk);
|
2020-02-06 02:39:37 +03:00
|
|
|
return nsk;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:19 +03:00
|
|
|
static struct sock *mptcp_accept(struct sock *sk, int flags, int *err,
|
|
|
|
bool kern)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
struct socket *listener;
|
|
|
|
struct sock *newsk;
|
|
|
|
|
|
|
|
listener = __mptcp_nmpc_socket(msk);
|
|
|
|
if (WARN_ON_ONCE(!listener)) {
|
|
|
|
*err = -EINVAL;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_debug("msk=%p, listener=%p", msk, mptcp_subflow_ctx(listener->sk));
|
|
|
|
newsk = inet_csk_accept(listener->sk, flags, err, kern);
|
|
|
|
if (!newsk)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
pr_debug("msk=%p, subflow is mptcp=%d", msk, sk_is_mptcp(newsk));
|
|
|
|
|
|
|
|
if (sk_is_mptcp(newsk)) {
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
struct sock *new_mptcp_sock;
|
|
|
|
struct sock *ssk = newsk;
|
|
|
|
|
|
|
|
subflow = mptcp_subflow_ctx(newsk);
|
2020-03-13 18:52:41 +03:00
|
|
|
new_mptcp_sock = subflow->conn;
|
2020-01-22 03:56:19 +03:00
|
|
|
|
2020-03-13 18:52:41 +03:00
|
|
|
/* is_mptcp should be false if subflow->conn is missing, see
|
|
|
|
* subflow_syn_recv_sock()
|
|
|
|
*/
|
|
|
|
if (WARN_ON_ONCE(!new_mptcp_sock)) {
|
|
|
|
tcp_sk(newsk)->is_mptcp = 0;
|
|
|
|
return newsk;
|
2020-01-22 03:56:19 +03:00
|
|
|
}
|
|
|
|
|
2020-03-13 18:52:41 +03:00
|
|
|
/* acquire the 2nd reference for the owning socket */
|
|
|
|
sock_hold(new_mptcp_sock);
|
2020-01-22 03:56:19 +03:00
|
|
|
|
2020-03-13 18:52:41 +03:00
|
|
|
local_bh_disable();
|
|
|
|
bh_lock_sock(new_mptcp_sock);
|
2020-01-22 03:56:19 +03:00
|
|
|
msk = mptcp_sk(new_mptcp_sock);
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
msk->first = newsk;
|
2020-01-22 03:56:19 +03:00
|
|
|
|
|
|
|
newsk = new_mptcp_sock;
|
|
|
|
mptcp_copy_inaddrs(newsk, ssk);
|
|
|
|
list_add(&subflow->node, &msk->conn_list);
|
mptcp: fix splat when incoming connection is never accepted before exit/close
Following snippet (replicated from syzkaller reproducer) generates
warning: "IPv4: Attempt to release TCP socket in state 1".
int main(void) {
struct sockaddr_in sin1 = { .sin_family = 2, .sin_port = 0x4e20,
.sin_addr.s_addr = 0x010000e0, };
struct sockaddr_in sin2 = { .sin_family = 2,
.sin_addr.s_addr = 0x0100007f, };
struct sockaddr_in sin3 = { .sin_family = 2, .sin_port = 0x4e20,
.sin_addr.s_addr = 0x0100007f, };
int r0 = socket(0x2, 0x1, 0x106);
int r1 = socket(0x2, 0x1, 0x106);
bind(r1, (void *)&sin1, sizeof(sin1));
connect(r1, (void *)&sin2, sizeof(sin2));
listen(r1, 3);
return connect(r0, (void *)&sin3, 0x4d);
}
Reason is that the newly generated mptcp socket is closed via the ulp
release of the tcp listener socket when its accept backlog gets purged.
To fix this, delay setting the ESTABLISHED state until after userspace
calls accept and via mptcp specific destructor.
Fixes: 58b09919626bf ("mptcp: create msk early")
Closes: https://github.com/multipath-tcp/mptcp_net-next/issues/9
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-04-17 10:28:22 +03:00
|
|
|
inet_sk_state_store(newsk, TCP_ESTABLISHED);
|
2020-01-22 03:56:19 +03:00
|
|
|
|
|
|
|
bh_unlock_sock(new_mptcp_sock);
|
2020-03-28 00:48:50 +03:00
|
|
|
|
|
|
|
__MPTCP_INC_STATS(sock_net(sk), MPTCP_MIB_MPCAPABLEPASSIVEACK);
|
2020-01-22 03:56:19 +03:00
|
|
|
local_bh_enable();
|
2020-03-28 00:48:50 +03:00
|
|
|
} else {
|
|
|
|
MPTCP_INC_STATS(sock_net(sk),
|
|
|
|
MPTCP_MIB_MPCAPABLEPASSIVEFALLBACK);
|
2020-01-22 03:56:19 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return newsk;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:20 +03:00
|
|
|
static void mptcp_destroy(struct sock *sk)
|
|
|
|
{
|
2020-01-29 17:54:43 +03:00
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
|
2020-05-29 18:43:31 +03:00
|
|
|
mptcp_token_destroy(msk->token);
|
2020-01-29 17:54:43 +03:00
|
|
|
if (msk->cached_ext)
|
|
|
|
__skb_ext_put(msk->cached_ext);
|
2020-03-28 00:48:45 +03:00
|
|
|
|
|
|
|
sk_sockets_allocated_dec(sk);
|
2020-01-22 03:56:20 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:22 +03:00
|
|
|
static int mptcp_setsockopt(struct sock *sk, int level, int optname,
|
mptcp: fix panic on user pointer access
Its not possible to call the kernel_(s|g)etsockopt functions here,
the address points to user memory:
General protection fault in user access. Non-canonical address?
WARNING: CPU: 1 PID: 5352 at arch/x86/mm/extable.c:77 ex_handler_uaccess+0xba/0xe0 arch/x86/mm/extable.c:77
Kernel panic - not syncing: panic_on_warn set ...
[..]
Call Trace:
fixup_exception+0x9d/0xcd arch/x86/mm/extable.c:178
general_protection+0x2d/0x40 arch/x86/entry/entry_64.S:1202
do_ip_getsockopt+0x1f6/0x1860 net/ipv4/ip_sockglue.c:1323
ip_getsockopt+0x87/0x1c0 net/ipv4/ip_sockglue.c:1561
tcp_getsockopt net/ipv4/tcp.c:3691 [inline]
tcp_getsockopt+0x8c/0xd0 net/ipv4/tcp.c:3685
kernel_getsockopt+0x121/0x1f0 net/socket.c:3736
mptcp_getsockopt+0x69/0x90 net/mptcp/protocol.c:830
__sys_getsockopt+0x13a/0x220 net/socket.c:2175
We can call tcp_get/setsockopt functions instead. Doing so fixes
crashing, but still leaves rtnl related lockdep splat:
WARNING: possible circular locking dependency detected
5.5.0-rc6 #2 Not tainted
------------------------------------------------------
syz-executor.0/16334 is trying to acquire lock:
ffffffff84f7a080 (rtnl_mutex){+.+.}, at: do_ip_setsockopt.isra.0+0x277/0x3820 net/ipv4/ip_sockglue.c:644
but task is already holding lock:
ffff888116503b90 (sk_lock-AF_INET){+.+.}, at: lock_sock include/net/sock.h:1516 [inline]
ffff888116503b90 (sk_lock-AF_INET){+.+.}, at: mptcp_setsockopt+0x28/0x90 net/mptcp/protocol.c:1284
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (sk_lock-AF_INET){+.+.}:
lock_sock_nested+0xca/0x120 net/core/sock.c:2944
lock_sock include/net/sock.h:1516 [inline]
do_ip_setsockopt.isra.0+0x281/0x3820 net/ipv4/ip_sockglue.c:645
ip_setsockopt+0x44/0xf0 net/ipv4/ip_sockglue.c:1248
udp_setsockopt+0x5d/0xa0 net/ipv4/udp.c:2639
__sys_setsockopt+0x152/0x240 net/socket.c:2130
__do_sys_setsockopt net/socket.c:2146 [inline]
__se_sys_setsockopt net/socket.c:2143 [inline]
__x64_sys_setsockopt+0xba/0x150 net/socket.c:2143
do_syscall_64+0xbd/0x5b0 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
-> #0 (rtnl_mutex){+.+.}:
check_prev_add kernel/locking/lockdep.c:2475 [inline]
check_prevs_add kernel/locking/lockdep.c:2580 [inline]
validate_chain kernel/locking/lockdep.c:2970 [inline]
__lock_acquire+0x1fb2/0x4680 kernel/locking/lockdep.c:3954
lock_acquire+0x127/0x330 kernel/locking/lockdep.c:4484
__mutex_lock_common kernel/locking/mutex.c:956 [inline]
__mutex_lock+0x158/0x1340 kernel/locking/mutex.c:1103
do_ip_setsockopt.isra.0+0x277/0x3820 net/ipv4/ip_sockglue.c:644
ip_setsockopt+0x44/0xf0 net/ipv4/ip_sockglue.c:1248
tcp_setsockopt net/ipv4/tcp.c:3159 [inline]
tcp_setsockopt+0x8c/0xd0 net/ipv4/tcp.c:3153
kernel_setsockopt+0x121/0x1f0 net/socket.c:3767
mptcp_setsockopt+0x69/0x90 net/mptcp/protocol.c:1288
__sys_setsockopt+0x152/0x240 net/socket.c:2130
__do_sys_setsockopt net/socket.c:2146 [inline]
__se_sys_setsockopt net/socket.c:2143 [inline]
__x64_sys_setsockopt+0xba/0x150 net/socket.c:2143
do_syscall_64+0xbd/0x5b0 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(sk_lock-AF_INET);
lock(rtnl_mutex);
lock(sk_lock-AF_INET);
lock(rtnl_mutex);
The lockdep complaint is because we hold mptcp socket lock when calling
the sk_prot get/setsockopt handler, and those might need to acquire the
rtnl mutex. Normally, order is:
rtnl_lock(sk) -> lock_sock
Whereas for mptcp the order is
lock_sock(mptcp_sk) rtnl_lock -> lock_sock(subflow_sk)
We can avoid this by releasing the mptcp socket lock early, but, as Paolo
points out, we need to get/put the subflow socket refcount before doing so
to avoid race with concurrent close().
Fixes: 717e79c867ca5 ("mptcp: Add setsockopt()/getsockopt() socket operations")
Reported-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-29 17:54:44 +03:00
|
|
|
char __user *optval, unsigned int optlen)
|
2020-01-22 03:56:22 +03:00
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
struct socket *ssock;
|
|
|
|
|
|
|
|
pr_debug("msk=%p", msk);
|
|
|
|
|
|
|
|
/* @@ the meaning of setsockopt() when the socket is connected and
|
2020-02-15 01:14:29 +03:00
|
|
|
* there are multiple subflows is not yet defined. It is up to the
|
|
|
|
* MPTCP-level socket to configure the subflows until the subflow
|
|
|
|
* is in TCP fallback, when TCP socket options are passed through
|
|
|
|
* to the one remaining subflow.
|
2020-01-22 03:56:22 +03:00
|
|
|
*/
|
|
|
|
lock_sock(sk);
|
2020-02-15 01:14:29 +03:00
|
|
|
ssock = __mptcp_tcp_fallback(msk);
|
2020-04-11 22:05:01 +03:00
|
|
|
release_sock(sk);
|
2020-02-15 01:14:29 +03:00
|
|
|
if (ssock)
|
|
|
|
return tcp_setsockopt(ssock->sk, level, optname, optval,
|
|
|
|
optlen);
|
mptcp: fix panic on user pointer access
Its not possible to call the kernel_(s|g)etsockopt functions here,
the address points to user memory:
General protection fault in user access. Non-canonical address?
WARNING: CPU: 1 PID: 5352 at arch/x86/mm/extable.c:77 ex_handler_uaccess+0xba/0xe0 arch/x86/mm/extable.c:77
Kernel panic - not syncing: panic_on_warn set ...
[..]
Call Trace:
fixup_exception+0x9d/0xcd arch/x86/mm/extable.c:178
general_protection+0x2d/0x40 arch/x86/entry/entry_64.S:1202
do_ip_getsockopt+0x1f6/0x1860 net/ipv4/ip_sockglue.c:1323
ip_getsockopt+0x87/0x1c0 net/ipv4/ip_sockglue.c:1561
tcp_getsockopt net/ipv4/tcp.c:3691 [inline]
tcp_getsockopt+0x8c/0xd0 net/ipv4/tcp.c:3685
kernel_getsockopt+0x121/0x1f0 net/socket.c:3736
mptcp_getsockopt+0x69/0x90 net/mptcp/protocol.c:830
__sys_getsockopt+0x13a/0x220 net/socket.c:2175
We can call tcp_get/setsockopt functions instead. Doing so fixes
crashing, but still leaves rtnl related lockdep splat:
WARNING: possible circular locking dependency detected
5.5.0-rc6 #2 Not tainted
------------------------------------------------------
syz-executor.0/16334 is trying to acquire lock:
ffffffff84f7a080 (rtnl_mutex){+.+.}, at: do_ip_setsockopt.isra.0+0x277/0x3820 net/ipv4/ip_sockglue.c:644
but task is already holding lock:
ffff888116503b90 (sk_lock-AF_INET){+.+.}, at: lock_sock include/net/sock.h:1516 [inline]
ffff888116503b90 (sk_lock-AF_INET){+.+.}, at: mptcp_setsockopt+0x28/0x90 net/mptcp/protocol.c:1284
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (sk_lock-AF_INET){+.+.}:
lock_sock_nested+0xca/0x120 net/core/sock.c:2944
lock_sock include/net/sock.h:1516 [inline]
do_ip_setsockopt.isra.0+0x281/0x3820 net/ipv4/ip_sockglue.c:645
ip_setsockopt+0x44/0xf0 net/ipv4/ip_sockglue.c:1248
udp_setsockopt+0x5d/0xa0 net/ipv4/udp.c:2639
__sys_setsockopt+0x152/0x240 net/socket.c:2130
__do_sys_setsockopt net/socket.c:2146 [inline]
__se_sys_setsockopt net/socket.c:2143 [inline]
__x64_sys_setsockopt+0xba/0x150 net/socket.c:2143
do_syscall_64+0xbd/0x5b0 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
-> #0 (rtnl_mutex){+.+.}:
check_prev_add kernel/locking/lockdep.c:2475 [inline]
check_prevs_add kernel/locking/lockdep.c:2580 [inline]
validate_chain kernel/locking/lockdep.c:2970 [inline]
__lock_acquire+0x1fb2/0x4680 kernel/locking/lockdep.c:3954
lock_acquire+0x127/0x330 kernel/locking/lockdep.c:4484
__mutex_lock_common kernel/locking/mutex.c:956 [inline]
__mutex_lock+0x158/0x1340 kernel/locking/mutex.c:1103
do_ip_setsockopt.isra.0+0x277/0x3820 net/ipv4/ip_sockglue.c:644
ip_setsockopt+0x44/0xf0 net/ipv4/ip_sockglue.c:1248
tcp_setsockopt net/ipv4/tcp.c:3159 [inline]
tcp_setsockopt+0x8c/0xd0 net/ipv4/tcp.c:3153
kernel_setsockopt+0x121/0x1f0 net/socket.c:3767
mptcp_setsockopt+0x69/0x90 net/mptcp/protocol.c:1288
__sys_setsockopt+0x152/0x240 net/socket.c:2130
__do_sys_setsockopt net/socket.c:2146 [inline]
__se_sys_setsockopt net/socket.c:2143 [inline]
__x64_sys_setsockopt+0xba/0x150 net/socket.c:2143
do_syscall_64+0xbd/0x5b0 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(sk_lock-AF_INET);
lock(rtnl_mutex);
lock(sk_lock-AF_INET);
lock(rtnl_mutex);
The lockdep complaint is because we hold mptcp socket lock when calling
the sk_prot get/setsockopt handler, and those might need to acquire the
rtnl mutex. Normally, order is:
rtnl_lock(sk) -> lock_sock
Whereas for mptcp the order is
lock_sock(mptcp_sk) rtnl_lock -> lock_sock(subflow_sk)
We can avoid this by releasing the mptcp socket lock early, but, as Paolo
points out, we need to get/put the subflow socket refcount before doing so
to avoid race with concurrent close().
Fixes: 717e79c867ca5 ("mptcp: Add setsockopt()/getsockopt() socket operations")
Reported-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-29 17:54:44 +03:00
|
|
|
|
2020-02-15 01:14:29 +03:00
|
|
|
return -EOPNOTSUPP;
|
2020-01-22 03:56:22 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int mptcp_getsockopt(struct sock *sk, int level, int optname,
|
mptcp: fix panic on user pointer access
Its not possible to call the kernel_(s|g)etsockopt functions here,
the address points to user memory:
General protection fault in user access. Non-canonical address?
WARNING: CPU: 1 PID: 5352 at arch/x86/mm/extable.c:77 ex_handler_uaccess+0xba/0xe0 arch/x86/mm/extable.c:77
Kernel panic - not syncing: panic_on_warn set ...
[..]
Call Trace:
fixup_exception+0x9d/0xcd arch/x86/mm/extable.c:178
general_protection+0x2d/0x40 arch/x86/entry/entry_64.S:1202
do_ip_getsockopt+0x1f6/0x1860 net/ipv4/ip_sockglue.c:1323
ip_getsockopt+0x87/0x1c0 net/ipv4/ip_sockglue.c:1561
tcp_getsockopt net/ipv4/tcp.c:3691 [inline]
tcp_getsockopt+0x8c/0xd0 net/ipv4/tcp.c:3685
kernel_getsockopt+0x121/0x1f0 net/socket.c:3736
mptcp_getsockopt+0x69/0x90 net/mptcp/protocol.c:830
__sys_getsockopt+0x13a/0x220 net/socket.c:2175
We can call tcp_get/setsockopt functions instead. Doing so fixes
crashing, but still leaves rtnl related lockdep splat:
WARNING: possible circular locking dependency detected
5.5.0-rc6 #2 Not tainted
------------------------------------------------------
syz-executor.0/16334 is trying to acquire lock:
ffffffff84f7a080 (rtnl_mutex){+.+.}, at: do_ip_setsockopt.isra.0+0x277/0x3820 net/ipv4/ip_sockglue.c:644
but task is already holding lock:
ffff888116503b90 (sk_lock-AF_INET){+.+.}, at: lock_sock include/net/sock.h:1516 [inline]
ffff888116503b90 (sk_lock-AF_INET){+.+.}, at: mptcp_setsockopt+0x28/0x90 net/mptcp/protocol.c:1284
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (sk_lock-AF_INET){+.+.}:
lock_sock_nested+0xca/0x120 net/core/sock.c:2944
lock_sock include/net/sock.h:1516 [inline]
do_ip_setsockopt.isra.0+0x281/0x3820 net/ipv4/ip_sockglue.c:645
ip_setsockopt+0x44/0xf0 net/ipv4/ip_sockglue.c:1248
udp_setsockopt+0x5d/0xa0 net/ipv4/udp.c:2639
__sys_setsockopt+0x152/0x240 net/socket.c:2130
__do_sys_setsockopt net/socket.c:2146 [inline]
__se_sys_setsockopt net/socket.c:2143 [inline]
__x64_sys_setsockopt+0xba/0x150 net/socket.c:2143
do_syscall_64+0xbd/0x5b0 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
-> #0 (rtnl_mutex){+.+.}:
check_prev_add kernel/locking/lockdep.c:2475 [inline]
check_prevs_add kernel/locking/lockdep.c:2580 [inline]
validate_chain kernel/locking/lockdep.c:2970 [inline]
__lock_acquire+0x1fb2/0x4680 kernel/locking/lockdep.c:3954
lock_acquire+0x127/0x330 kernel/locking/lockdep.c:4484
__mutex_lock_common kernel/locking/mutex.c:956 [inline]
__mutex_lock+0x158/0x1340 kernel/locking/mutex.c:1103
do_ip_setsockopt.isra.0+0x277/0x3820 net/ipv4/ip_sockglue.c:644
ip_setsockopt+0x44/0xf0 net/ipv4/ip_sockglue.c:1248
tcp_setsockopt net/ipv4/tcp.c:3159 [inline]
tcp_setsockopt+0x8c/0xd0 net/ipv4/tcp.c:3153
kernel_setsockopt+0x121/0x1f0 net/socket.c:3767
mptcp_setsockopt+0x69/0x90 net/mptcp/protocol.c:1288
__sys_setsockopt+0x152/0x240 net/socket.c:2130
__do_sys_setsockopt net/socket.c:2146 [inline]
__se_sys_setsockopt net/socket.c:2143 [inline]
__x64_sys_setsockopt+0xba/0x150 net/socket.c:2143
do_syscall_64+0xbd/0x5b0 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(sk_lock-AF_INET);
lock(rtnl_mutex);
lock(sk_lock-AF_INET);
lock(rtnl_mutex);
The lockdep complaint is because we hold mptcp socket lock when calling
the sk_prot get/setsockopt handler, and those might need to acquire the
rtnl mutex. Normally, order is:
rtnl_lock(sk) -> lock_sock
Whereas for mptcp the order is
lock_sock(mptcp_sk) rtnl_lock -> lock_sock(subflow_sk)
We can avoid this by releasing the mptcp socket lock early, but, as Paolo
points out, we need to get/put the subflow socket refcount before doing so
to avoid race with concurrent close().
Fixes: 717e79c867ca5 ("mptcp: Add setsockopt()/getsockopt() socket operations")
Reported-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-29 17:54:44 +03:00
|
|
|
char __user *optval, int __user *option)
|
2020-01-22 03:56:22 +03:00
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
struct socket *ssock;
|
|
|
|
|
|
|
|
pr_debug("msk=%p", msk);
|
|
|
|
|
2020-02-15 01:14:29 +03:00
|
|
|
/* @@ the meaning of setsockopt() when the socket is connected and
|
|
|
|
* there are multiple subflows is not yet defined. It is up to the
|
|
|
|
* MPTCP-level socket to configure the subflows until the subflow
|
|
|
|
* is in TCP fallback, when socket options are passed through
|
|
|
|
* to the one remaining subflow.
|
2020-01-22 03:56:22 +03:00
|
|
|
*/
|
|
|
|
lock_sock(sk);
|
2020-02-15 01:14:29 +03:00
|
|
|
ssock = __mptcp_tcp_fallback(msk);
|
2020-04-11 22:05:01 +03:00
|
|
|
release_sock(sk);
|
2020-02-15 01:14:29 +03:00
|
|
|
if (ssock)
|
|
|
|
return tcp_getsockopt(ssock->sk, level, optname, optval,
|
|
|
|
option);
|
mptcp: fix panic on user pointer access
Its not possible to call the kernel_(s|g)etsockopt functions here,
the address points to user memory:
General protection fault in user access. Non-canonical address?
WARNING: CPU: 1 PID: 5352 at arch/x86/mm/extable.c:77 ex_handler_uaccess+0xba/0xe0 arch/x86/mm/extable.c:77
Kernel panic - not syncing: panic_on_warn set ...
[..]
Call Trace:
fixup_exception+0x9d/0xcd arch/x86/mm/extable.c:178
general_protection+0x2d/0x40 arch/x86/entry/entry_64.S:1202
do_ip_getsockopt+0x1f6/0x1860 net/ipv4/ip_sockglue.c:1323
ip_getsockopt+0x87/0x1c0 net/ipv4/ip_sockglue.c:1561
tcp_getsockopt net/ipv4/tcp.c:3691 [inline]
tcp_getsockopt+0x8c/0xd0 net/ipv4/tcp.c:3685
kernel_getsockopt+0x121/0x1f0 net/socket.c:3736
mptcp_getsockopt+0x69/0x90 net/mptcp/protocol.c:830
__sys_getsockopt+0x13a/0x220 net/socket.c:2175
We can call tcp_get/setsockopt functions instead. Doing so fixes
crashing, but still leaves rtnl related lockdep splat:
WARNING: possible circular locking dependency detected
5.5.0-rc6 #2 Not tainted
------------------------------------------------------
syz-executor.0/16334 is trying to acquire lock:
ffffffff84f7a080 (rtnl_mutex){+.+.}, at: do_ip_setsockopt.isra.0+0x277/0x3820 net/ipv4/ip_sockglue.c:644
but task is already holding lock:
ffff888116503b90 (sk_lock-AF_INET){+.+.}, at: lock_sock include/net/sock.h:1516 [inline]
ffff888116503b90 (sk_lock-AF_INET){+.+.}, at: mptcp_setsockopt+0x28/0x90 net/mptcp/protocol.c:1284
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #1 (sk_lock-AF_INET){+.+.}:
lock_sock_nested+0xca/0x120 net/core/sock.c:2944
lock_sock include/net/sock.h:1516 [inline]
do_ip_setsockopt.isra.0+0x281/0x3820 net/ipv4/ip_sockglue.c:645
ip_setsockopt+0x44/0xf0 net/ipv4/ip_sockglue.c:1248
udp_setsockopt+0x5d/0xa0 net/ipv4/udp.c:2639
__sys_setsockopt+0x152/0x240 net/socket.c:2130
__do_sys_setsockopt net/socket.c:2146 [inline]
__se_sys_setsockopt net/socket.c:2143 [inline]
__x64_sys_setsockopt+0xba/0x150 net/socket.c:2143
do_syscall_64+0xbd/0x5b0 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
-> #0 (rtnl_mutex){+.+.}:
check_prev_add kernel/locking/lockdep.c:2475 [inline]
check_prevs_add kernel/locking/lockdep.c:2580 [inline]
validate_chain kernel/locking/lockdep.c:2970 [inline]
__lock_acquire+0x1fb2/0x4680 kernel/locking/lockdep.c:3954
lock_acquire+0x127/0x330 kernel/locking/lockdep.c:4484
__mutex_lock_common kernel/locking/mutex.c:956 [inline]
__mutex_lock+0x158/0x1340 kernel/locking/mutex.c:1103
do_ip_setsockopt.isra.0+0x277/0x3820 net/ipv4/ip_sockglue.c:644
ip_setsockopt+0x44/0xf0 net/ipv4/ip_sockglue.c:1248
tcp_setsockopt net/ipv4/tcp.c:3159 [inline]
tcp_setsockopt+0x8c/0xd0 net/ipv4/tcp.c:3153
kernel_setsockopt+0x121/0x1f0 net/socket.c:3767
mptcp_setsockopt+0x69/0x90 net/mptcp/protocol.c:1288
__sys_setsockopt+0x152/0x240 net/socket.c:2130
__do_sys_setsockopt net/socket.c:2146 [inline]
__se_sys_setsockopt net/socket.c:2143 [inline]
__x64_sys_setsockopt+0xba/0x150 net/socket.c:2143
do_syscall_64+0xbd/0x5b0 arch/x86/entry/common.c:294
entry_SYSCALL_64_after_hwframe+0x49/0xbe
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(sk_lock-AF_INET);
lock(rtnl_mutex);
lock(sk_lock-AF_INET);
lock(rtnl_mutex);
The lockdep complaint is because we hold mptcp socket lock when calling
the sk_prot get/setsockopt handler, and those might need to acquire the
rtnl mutex. Normally, order is:
rtnl_lock(sk) -> lock_sock
Whereas for mptcp the order is
lock_sock(mptcp_sk) rtnl_lock -> lock_sock(subflow_sk)
We can avoid this by releasing the mptcp socket lock early, but, as Paolo
points out, we need to get/put the subflow socket refcount before doing so
to avoid race with concurrent close().
Fixes: 717e79c867ca5 ("mptcp: Add setsockopt()/getsockopt() socket operations")
Reported-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-29 17:54:44 +03:00
|
|
|
|
2020-02-15 01:14:29 +03:00
|
|
|
return -EOPNOTSUPP;
|
2020-01-22 03:56:22 +03:00
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:44 +03:00
|
|
|
#define MPTCP_DEFERRED_ALL (TCPF_DELACK_TIMER_DEFERRED | \
|
|
|
|
TCPF_WRITE_TIMER_DEFERRED)
|
2020-02-26 12:14:52 +03:00
|
|
|
|
|
|
|
/* this is very alike tcp_release_cb() but we must handle differently a
|
|
|
|
* different set of events
|
|
|
|
*/
|
|
|
|
static void mptcp_release_cb(struct sock *sk)
|
|
|
|
{
|
|
|
|
unsigned long flags, nflags;
|
|
|
|
|
|
|
|
do {
|
|
|
|
flags = sk->sk_tsq_flags;
|
|
|
|
if (!(flags & MPTCP_DEFERRED_ALL))
|
|
|
|
return;
|
|
|
|
nflags = flags & ~MPTCP_DEFERRED_ALL;
|
|
|
|
} while (cmpxchg(&sk->sk_tsq_flags, flags, nflags) != flags);
|
|
|
|
|
2020-03-28 00:48:44 +03:00
|
|
|
sock_release_ownership(sk);
|
|
|
|
|
2020-02-26 12:14:52 +03:00
|
|
|
if (flags & TCPF_DELACK_TIMER_DEFERRED) {
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
struct sock *ssk;
|
|
|
|
|
|
|
|
ssk = mptcp_subflow_recv_lookup(msk);
|
|
|
|
if (!ssk || !schedule_work(&msk->work))
|
|
|
|
__sock_put(sk);
|
|
|
|
}
|
2020-03-28 00:48:44 +03:00
|
|
|
|
|
|
|
if (flags & TCPF_WRITE_TIMER_DEFERRED) {
|
|
|
|
mptcp_retransmit_handler(sk);
|
|
|
|
__sock_put(sk);
|
|
|
|
}
|
2020-02-26 12:14:52 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
static int mptcp_get_port(struct sock *sk, unsigned short snum)
|
2020-01-22 03:56:15 +03:00
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
2020-01-22 03:56:18 +03:00
|
|
|
struct socket *ssock;
|
2020-01-22 03:56:15 +03:00
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
ssock = __mptcp_nmpc_socket(msk);
|
|
|
|
pr_debug("msk=%p, subflow=%p", msk, ssock);
|
|
|
|
if (WARN_ON_ONCE(!ssock))
|
|
|
|
return -EINVAL;
|
2020-01-22 03:56:15 +03:00
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
return inet_csk_get_port(ssock->sk, snum);
|
|
|
|
}
|
2020-01-22 03:56:15 +03:00
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
void mptcp_finish_connect(struct sock *ssk)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
struct mptcp_sock *msk;
|
|
|
|
struct sock *sk;
|
2020-01-22 03:56:23 +03:00
|
|
|
u64 ack_seq;
|
2020-01-22 03:56:15 +03:00
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
subflow = mptcp_subflow_ctx(ssk);
|
|
|
|
sk = subflow->conn;
|
|
|
|
msk = mptcp_sk(sk);
|
|
|
|
|
2020-03-28 00:48:50 +03:00
|
|
|
if (!subflow->mp_capable) {
|
|
|
|
MPTCP_INC_STATS(sock_net(sk),
|
|
|
|
MPTCP_MIB_MPCAPABLEACTIVEFALLBACK);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:24 +03:00
|
|
|
pr_debug("msk=%p, token=%u", sk, subflow->token);
|
|
|
|
|
2020-01-22 03:56:23 +03:00
|
|
|
mptcp_crypto_key_sha(subflow->remote_key, NULL, &ack_seq);
|
|
|
|
ack_seq++;
|
2020-01-22 03:56:24 +03:00
|
|
|
subflow->map_seq = ack_seq;
|
|
|
|
subflow->map_subflow_seq = 1;
|
2020-01-22 03:56:23 +03:00
|
|
|
subflow->rel_write_seq = 1;
|
|
|
|
|
2020-01-22 03:56:18 +03:00
|
|
|
/* the socket is not connected yet, no msk/subflow ops can access/race
|
|
|
|
* accessing the field below
|
|
|
|
*/
|
|
|
|
WRITE_ONCE(msk->remote_key, subflow->remote_key);
|
|
|
|
WRITE_ONCE(msk->local_key, subflow->local_key);
|
2020-01-22 03:56:20 +03:00
|
|
|
WRITE_ONCE(msk->token, subflow->token);
|
2020-01-22 03:56:23 +03:00
|
|
|
WRITE_ONCE(msk->write_seq, subflow->idsn + 1);
|
|
|
|
WRITE_ONCE(msk->ack_seq, ack_seq);
|
2020-01-22 03:56:32 +03:00
|
|
|
WRITE_ONCE(msk->can_ack, 1);
|
2020-03-28 00:48:42 +03:00
|
|
|
atomic64_set(&msk->snd_una, msk->write_seq);
|
2020-03-28 00:48:38 +03:00
|
|
|
|
|
|
|
mptcp_pm_new_connection(msk, 0);
|
2020-01-22 03:56:15 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:19 +03:00
|
|
|
static void mptcp_sock_graft(struct sock *sk, struct socket *parent)
|
|
|
|
{
|
|
|
|
write_lock_bh(&sk->sk_callback_lock);
|
|
|
|
rcu_assign_pointer(sk->sk_wq, &parent->wq);
|
|
|
|
sk_set_socket(sk, parent);
|
|
|
|
sk->sk_uid = SOCK_INODE(parent)->i_uid;
|
|
|
|
write_unlock_bh(&sk->sk_callback_lock);
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:39 +03:00
|
|
|
bool mptcp_finish_join(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk);
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(subflow->conn);
|
|
|
|
struct sock *parent = (void *)msk;
|
|
|
|
struct socket *parent_sock;
|
2020-03-28 00:48:40 +03:00
|
|
|
bool ret;
|
2020-03-28 00:48:39 +03:00
|
|
|
|
|
|
|
pr_debug("msk=%p, subflow=%p", msk, subflow);
|
|
|
|
|
|
|
|
/* mptcp socket already closing? */
|
|
|
|
if (inet_sk_state_load(parent) != TCP_ESTABLISHED)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (!msk->pm.server_side)
|
|
|
|
return true;
|
|
|
|
|
2020-05-29 18:43:30 +03:00
|
|
|
if (!mptcp_pm_allow_new_subflow(msk))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* active connections are already on conn_list, and we can't acquire
|
|
|
|
* msk lock here.
|
|
|
|
* use the join list lock as synchronization point and double-check
|
|
|
|
* msk status to avoid racing with mptcp_close()
|
|
|
|
*/
|
|
|
|
spin_lock_bh(&msk->join_list_lock);
|
|
|
|
ret = inet_sk_state_load(parent) == TCP_ESTABLISHED;
|
|
|
|
if (ret && !WARN_ON_ONCE(!list_empty(&subflow->node)))
|
|
|
|
list_add_tail(&subflow->node, &msk->join_list);
|
|
|
|
spin_unlock_bh(&msk->join_list_lock);
|
|
|
|
if (!ret)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* attach to msk socket only after we are sure he will deal with us
|
|
|
|
* at close time
|
|
|
|
*/
|
2020-03-28 00:48:39 +03:00
|
|
|
parent_sock = READ_ONCE(parent->sk_socket);
|
|
|
|
if (parent_sock && !sk->sk_socket)
|
|
|
|
mptcp_sock_graft(sk, parent_sock);
|
2020-05-29 18:43:30 +03:00
|
|
|
subflow->map_seq = msk->ack_seq;
|
|
|
|
return true;
|
2020-03-28 00:48:39 +03:00
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:25 +03:00
|
|
|
static bool mptcp_memory_free(const struct sock *sk, int wake)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sk);
|
|
|
|
|
|
|
|
return wake ? test_bit(MPTCP_SEND_SPACE, &msk->flags) : true;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
static struct proto mptcp_prot = {
|
|
|
|
.name = "MPTCP",
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.init = mptcp_init_sock,
|
2020-03-28 00:48:43 +03:00
|
|
|
.disconnect = mptcp_disconnect,
|
2020-01-22 03:56:15 +03:00
|
|
|
.close = mptcp_close,
|
2020-01-22 03:56:19 +03:00
|
|
|
.accept = mptcp_accept,
|
2020-01-22 03:56:22 +03:00
|
|
|
.setsockopt = mptcp_setsockopt,
|
|
|
|
.getsockopt = mptcp_getsockopt,
|
2020-01-22 03:56:15 +03:00
|
|
|
.shutdown = tcp_shutdown,
|
2020-01-22 03:56:20 +03:00
|
|
|
.destroy = mptcp_destroy,
|
2020-01-22 03:56:15 +03:00
|
|
|
.sendmsg = mptcp_sendmsg,
|
|
|
|
.recvmsg = mptcp_recvmsg,
|
2020-02-26 12:14:52 +03:00
|
|
|
.release_cb = mptcp_release_cb,
|
2020-01-22 03:56:15 +03:00
|
|
|
.hash = inet_hash,
|
|
|
|
.unhash = inet_unhash,
|
2020-01-22 03:56:18 +03:00
|
|
|
.get_port = mptcp_get_port,
|
2020-03-28 00:48:45 +03:00
|
|
|
.sockets_allocated = &mptcp_sockets_allocated,
|
|
|
|
.memory_allocated = &tcp_memory_allocated,
|
|
|
|
.memory_pressure = &tcp_memory_pressure,
|
2020-01-22 03:56:25 +03:00
|
|
|
.stream_memory_free = mptcp_memory_free,
|
2020-03-28 00:48:45 +03:00
|
|
|
.sysctl_wmem_offset = offsetof(struct net, ipv4.sysctl_tcp_wmem),
|
|
|
|
.sysctl_mem = sysctl_tcp_mem,
|
2020-01-22 03:56:15 +03:00
|
|
|
.obj_size = sizeof(struct mptcp_sock),
|
|
|
|
.no_autobind = true,
|
|
|
|
};
|
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
static int mptcp_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sock->sk);
|
|
|
|
struct socket *ssock;
|
2020-01-22 03:56:19 +03:00
|
|
|
int err;
|
2020-01-22 03:56:17 +03:00
|
|
|
|
|
|
|
lock_sock(sock->sk);
|
|
|
|
ssock = __mptcp_socket_create(msk, MPTCP_SAME_STATE);
|
|
|
|
if (IS_ERR(ssock)) {
|
|
|
|
err = PTR_ERR(ssock);
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ssock->ops->bind(ssock, uaddr, addr_len);
|
2020-01-22 03:56:19 +03:00
|
|
|
if (!err)
|
|
|
|
mptcp_copy_inaddrs(sock->sk, ssock->sk);
|
2020-01-22 03:56:17 +03:00
|
|
|
|
|
|
|
unlock:
|
|
|
|
release_sock(sock->sk);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int mptcp_stream_connect(struct socket *sock, struct sockaddr *uaddr,
|
|
|
|
int addr_len, int flags)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sock->sk);
|
|
|
|
struct socket *ssock;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
lock_sock(sock->sk);
|
2020-05-29 18:43:29 +03:00
|
|
|
if (sock->state != SS_UNCONNECTED && msk->subflow) {
|
|
|
|
/* pending connection or invalid state, let existing subflow
|
|
|
|
* cope with that
|
|
|
|
*/
|
|
|
|
ssock = msk->subflow;
|
|
|
|
goto do_connect;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
ssock = __mptcp_socket_create(msk, TCP_SYN_SENT);
|
|
|
|
if (IS_ERR(ssock)) {
|
|
|
|
err = PTR_ERR(ssock);
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:19 +03:00
|
|
|
#ifdef CONFIG_TCP_MD5SIG
|
|
|
|
/* no MPTCP if MD5SIG is enabled on this socket or we may run out of
|
|
|
|
* TCP option space.
|
|
|
|
*/
|
|
|
|
if (rcu_access_pointer(tcp_sk(ssock->sk)->md5sig_info))
|
|
|
|
mptcp_subflow_ctx(ssock->sk)->request_mptcp = 0;
|
|
|
|
#endif
|
|
|
|
|
2020-05-29 18:43:29 +03:00
|
|
|
do_connect:
|
2020-01-22 03:56:17 +03:00
|
|
|
err = ssock->ops->connect(ssock, uaddr, addr_len, flags);
|
2020-05-29 18:43:29 +03:00
|
|
|
sock->state = ssock->state;
|
|
|
|
|
|
|
|
/* on successful connect, the msk state will be moved to established by
|
|
|
|
* subflow_finish_connect()
|
|
|
|
*/
|
|
|
|
if (!err || err == EINPROGRESS)
|
|
|
|
mptcp_copy_inaddrs(sock->sk, ssock->sk);
|
|
|
|
else
|
|
|
|
inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk));
|
2020-01-22 03:56:17 +03:00
|
|
|
|
|
|
|
unlock:
|
|
|
|
release_sock(sock->sk);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:19 +03:00
|
|
|
static int mptcp_v4_getname(struct socket *sock, struct sockaddr *uaddr,
|
|
|
|
int peer)
|
|
|
|
{
|
|
|
|
if (sock->sk->sk_prot == &tcp_prot) {
|
|
|
|
/* we are being invoked from __sys_accept4, after
|
|
|
|
* mptcp_accept() has just accepted a non-mp-capable
|
|
|
|
* flow: sk is a tcp_sk, not an mptcp one.
|
|
|
|
*
|
|
|
|
* Hand the socket over to tcp so all further socket ops
|
|
|
|
* bypass mptcp.
|
|
|
|
*/
|
|
|
|
sock->ops = &inet_stream_ops;
|
|
|
|
}
|
|
|
|
|
|
|
|
return inet_getname(sock, uaddr, peer);
|
|
|
|
}
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
|
|
|
static int mptcp_v6_getname(struct socket *sock, struct sockaddr *uaddr,
|
|
|
|
int peer)
|
|
|
|
{
|
|
|
|
if (sock->sk->sk_prot == &tcpv6_prot) {
|
|
|
|
/* we are being invoked from __sys_accept4 after
|
|
|
|
* mptcp_accept() has accepted a non-mp-capable
|
|
|
|
* subflow: sk is a tcp_sk, not mptcp.
|
|
|
|
*
|
|
|
|
* Hand the socket over to tcp so all further
|
|
|
|
* socket ops bypass mptcp.
|
|
|
|
*/
|
|
|
|
sock->ops = &inet6_stream_ops;
|
|
|
|
}
|
|
|
|
|
|
|
|
return inet6_getname(sock, uaddr, peer);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static int mptcp_listen(struct socket *sock, int backlog)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sock->sk);
|
|
|
|
struct socket *ssock;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
pr_debug("msk=%p", msk);
|
|
|
|
|
|
|
|
lock_sock(sock->sk);
|
|
|
|
ssock = __mptcp_socket_create(msk, TCP_LISTEN);
|
|
|
|
if (IS_ERR(ssock)) {
|
|
|
|
err = PTR_ERR(ssock);
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2020-04-20 17:25:04 +03:00
|
|
|
sock_set_flag(sock->sk, SOCK_RCU_FREE);
|
|
|
|
|
2020-01-22 03:56:19 +03:00
|
|
|
err = ssock->ops->listen(ssock, backlog);
|
|
|
|
inet_sk_state_store(sock->sk, inet_sk_state_load(ssock->sk));
|
|
|
|
if (!err)
|
|
|
|
mptcp_copy_inaddrs(sock->sk, ssock->sk);
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
release_sock(sock->sk);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool is_tcp_proto(const struct proto *p)
|
|
|
|
{
|
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
|
|
|
return p == &tcp_prot || p == &tcpv6_prot;
|
|
|
|
#else
|
|
|
|
return p == &tcp_prot;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static int mptcp_stream_accept(struct socket *sock, struct socket *newsock,
|
|
|
|
int flags, bool kern)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sock->sk);
|
|
|
|
struct socket *ssock;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
pr_debug("msk=%p", msk);
|
|
|
|
|
|
|
|
lock_sock(sock->sk);
|
|
|
|
if (sock->sk->sk_state != TCP_LISTEN)
|
|
|
|
goto unlock_fail;
|
|
|
|
|
|
|
|
ssock = __mptcp_nmpc_socket(msk);
|
|
|
|
if (!ssock)
|
|
|
|
goto unlock_fail;
|
|
|
|
|
|
|
|
sock_hold(ssock->sk);
|
|
|
|
release_sock(sock->sk);
|
|
|
|
|
|
|
|
err = ssock->ops->accept(sock, newsock, flags, kern);
|
|
|
|
if (err == 0 && !is_tcp_proto(newsock->sk->sk_prot)) {
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(newsock->sk);
|
|
|
|
struct mptcp_subflow_context *subflow;
|
|
|
|
|
|
|
|
/* set ssk->sk_socket of accept()ed flows to mptcp socket.
|
|
|
|
* This is needed so NOSPACE flag can be set from tcp stack.
|
|
|
|
*/
|
2020-03-28 00:48:40 +03:00
|
|
|
__mptcp_flush_join_list(msk);
|
2020-01-22 03:56:19 +03:00
|
|
|
list_for_each_entry(subflow, &msk->conn_list, node) {
|
|
|
|
struct sock *ssk = mptcp_subflow_tcp_sock(subflow);
|
|
|
|
|
|
|
|
if (!ssk->sk_socket)
|
|
|
|
mptcp_sock_graft(ssk, newsock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sock_put(ssock->sk);
|
|
|
|
return err;
|
|
|
|
|
|
|
|
unlock_fail:
|
|
|
|
release_sock(sock->sk);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
static __poll_t mptcp_poll(struct file *file, struct socket *sock,
|
|
|
|
struct poll_table_struct *wait)
|
|
|
|
{
|
2020-01-22 03:56:25 +03:00
|
|
|
struct sock *sk = sock->sk;
|
mptcp: cope with later TCP fallback
With MPTCP v1, passive connections can fallback to TCP after the
subflow becomes established:
syn + MP_CAPABLE ->
<- syn, ack + MP_CAPABLE
ack, seq = 3 ->
// OoO packet is accepted because in-sequence
// passive socket is created, is in ESTABLISHED
// status and tentatively as MP_CAPABLE
ack, seq = 2 ->
// no MP_CAPABLE opt, subflow should fallback to TCP
We can't use the 'subflow' socket fallback, as we don't have
it available for passive connection.
Instead, when the fallback is detected, replace the mptcp
socket with the underlying TCP subflow. Beyond covering
the above scenario, it makes a TCP fallback socket as efficient
as plain TCP ones.
Co-developed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Christoph Paasch <cpaasch@apple.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-22 03:56:33 +03:00
|
|
|
struct mptcp_sock *msk;
|
2020-01-22 03:56:25 +03:00
|
|
|
struct socket *ssock;
|
2020-01-22 03:56:17 +03:00
|
|
|
__poll_t mask = 0;
|
|
|
|
|
2020-01-22 03:56:25 +03:00
|
|
|
msk = mptcp_sk(sk);
|
|
|
|
lock_sock(sk);
|
2020-04-02 14:44:51 +03:00
|
|
|
ssock = __mptcp_tcp_fallback(msk);
|
|
|
|
if (!ssock)
|
|
|
|
ssock = __mptcp_nmpc_socket(msk);
|
2020-01-22 03:56:25 +03:00
|
|
|
if (ssock) {
|
|
|
|
mask = ssock->ops->poll(file, ssock, wait);
|
|
|
|
release_sock(sk);
|
|
|
|
return mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
release_sock(sk);
|
|
|
|
sock_poll_wait(file, sock, wait);
|
|
|
|
lock_sock(sk);
|
|
|
|
|
|
|
|
if (test_bit(MPTCP_DATA_READY, &msk->flags))
|
|
|
|
mask = EPOLLIN | EPOLLRDNORM;
|
|
|
|
if (sk_stream_is_writeable(sk) &&
|
|
|
|
test_bit(MPTCP_SEND_SPACE, &msk->flags))
|
|
|
|
mask |= EPOLLOUT | EPOLLWRNORM;
|
|
|
|
if (sk->sk_shutdown & RCV_SHUTDOWN)
|
|
|
|
mask |= EPOLLIN | EPOLLRDNORM | EPOLLRDHUP;
|
|
|
|
|
|
|
|
release_sock(sk);
|
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
return mask;
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:21 +03:00
|
|
|
static int mptcp_shutdown(struct socket *sock, int how)
|
|
|
|
{
|
|
|
|
struct mptcp_sock *msk = mptcp_sk(sock->sk);
|
|
|
|
struct mptcp_subflow_context *subflow;
|
2020-04-02 14:44:51 +03:00
|
|
|
struct socket *ssock;
|
2020-01-22 03:56:21 +03:00
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
pr_debug("sk=%p, how=%d", msk, how);
|
|
|
|
|
|
|
|
lock_sock(sock->sk);
|
2020-04-02 14:44:51 +03:00
|
|
|
ssock = __mptcp_tcp_fallback(msk);
|
|
|
|
if (ssock) {
|
|
|
|
release_sock(sock->sk);
|
|
|
|
return inet_shutdown(ssock, how);
|
|
|
|
}
|
2020-01-22 03:56:21 +03:00
|
|
|
|
|
|
|
if (how == SHUT_WR || how == SHUT_RDWR)
|
|
|
|
inet_sk_state_store(sock->sk, TCP_FIN_WAIT1);
|
|
|
|
|
|
|
|
how++;
|
|
|
|
|
|
|
|
if ((how & ~SHUTDOWN_MASK) || !how) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sock->state == SS_CONNECTING) {
|
|
|
|
if ((1 << sock->sk->sk_state) &
|
|
|
|
(TCPF_SYN_SENT | TCPF_SYN_RECV | TCPF_CLOSE))
|
|
|
|
sock->state = SS_DISCONNECTING;
|
|
|
|
else
|
|
|
|
sock->state = SS_CONNECTED;
|
|
|
|
}
|
|
|
|
|
2020-03-28 00:48:40 +03:00
|
|
|
__mptcp_flush_join_list(msk);
|
2020-01-22 03:56:21 +03:00
|
|
|
mptcp_for_each_subflow(msk, subflow) {
|
|
|
|
struct sock *tcp_sk = mptcp_subflow_tcp_sock(subflow);
|
|
|
|
|
2020-02-29 02:47:40 +03:00
|
|
|
mptcp_subflow_shutdown(tcp_sk, how, 1, msk->write_seq);
|
2020-01-22 03:56:21 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
release_sock(sock->sk);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-01-25 03:04:02 +03:00
|
|
|
static const struct proto_ops mptcp_stream_ops = {
|
|
|
|
.family = PF_INET,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.release = inet_release,
|
|
|
|
.bind = mptcp_bind,
|
|
|
|
.connect = mptcp_stream_connect,
|
|
|
|
.socketpair = sock_no_socketpair,
|
|
|
|
.accept = mptcp_stream_accept,
|
|
|
|
.getname = mptcp_v4_getname,
|
|
|
|
.poll = mptcp_poll,
|
|
|
|
.ioctl = inet_ioctl,
|
|
|
|
.gettstamp = sock_gettstamp,
|
|
|
|
.listen = mptcp_listen,
|
|
|
|
.shutdown = mptcp_shutdown,
|
|
|
|
.setsockopt = sock_common_setsockopt,
|
|
|
|
.getsockopt = sock_common_getsockopt,
|
|
|
|
.sendmsg = inet_sendmsg,
|
|
|
|
.recvmsg = inet_recvmsg,
|
|
|
|
.mmap = sock_no_mmap,
|
|
|
|
.sendpage = inet_sendpage,
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
|
|
.compat_setsockopt = compat_sock_common_setsockopt,
|
|
|
|
.compat_getsockopt = compat_sock_common_getsockopt,
|
|
|
|
#endif
|
|
|
|
};
|
2020-01-22 03:56:17 +03:00
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
static struct inet_protosw mptcp_protosw = {
|
|
|
|
.type = SOCK_STREAM,
|
|
|
|
.protocol = IPPROTO_MPTCP,
|
|
|
|
.prot = &mptcp_prot,
|
2020-01-22 03:56:17 +03:00
|
|
|
.ops = &mptcp_stream_ops,
|
|
|
|
.flags = INET_PROTOSW_ICSK,
|
2020-01-22 03:56:15 +03:00
|
|
|
};
|
|
|
|
|
2020-01-22 03:56:28 +03:00
|
|
|
void mptcp_proto_init(void)
|
2020-01-22 03:56:15 +03:00
|
|
|
{
|
2020-01-22 03:56:17 +03:00
|
|
|
mptcp_prot.h.hashinfo = tcp_prot.h.hashinfo;
|
|
|
|
|
2020-03-28 00:48:45 +03:00
|
|
|
if (percpu_counter_init(&mptcp_sockets_allocated, 0, GFP_KERNEL))
|
|
|
|
panic("Failed to allocate MPTCP pcpu counter\n");
|
|
|
|
|
2020-01-22 03:56:17 +03:00
|
|
|
mptcp_subflow_init();
|
2020-03-28 00:48:38 +03:00
|
|
|
mptcp_pm_init();
|
2020-01-22 03:56:17 +03:00
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
if (proto_register(&mptcp_prot, 1) != 0)
|
|
|
|
panic("Failed to register MPTCP proto.\n");
|
|
|
|
|
|
|
|
inet_register_protosw(&mptcp_protosw);
|
2020-02-26 12:14:48 +03:00
|
|
|
|
|
|
|
BUILD_BUG_ON(sizeof(struct mptcp_skb_cb) > sizeof_field(struct sk_buff, cb));
|
2020-01-22 03:56:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_MPTCP_IPV6)
|
2020-01-25 03:04:02 +03:00
|
|
|
static const struct proto_ops mptcp_v6_stream_ops = {
|
|
|
|
.family = PF_INET6,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.release = inet6_release,
|
|
|
|
.bind = mptcp_bind,
|
|
|
|
.connect = mptcp_stream_connect,
|
|
|
|
.socketpair = sock_no_socketpair,
|
|
|
|
.accept = mptcp_stream_accept,
|
|
|
|
.getname = mptcp_v6_getname,
|
|
|
|
.poll = mptcp_poll,
|
|
|
|
.ioctl = inet6_ioctl,
|
|
|
|
.gettstamp = sock_gettstamp,
|
|
|
|
.listen = mptcp_listen,
|
|
|
|
.shutdown = mptcp_shutdown,
|
|
|
|
.setsockopt = sock_common_setsockopt,
|
|
|
|
.getsockopt = sock_common_getsockopt,
|
|
|
|
.sendmsg = inet6_sendmsg,
|
|
|
|
.recvmsg = inet6_recvmsg,
|
|
|
|
.mmap = sock_no_mmap,
|
|
|
|
.sendpage = inet_sendpage,
|
|
|
|
#ifdef CONFIG_COMPAT
|
2020-05-18 09:28:06 +03:00
|
|
|
.compat_ioctl = inet6_compat_ioctl,
|
2020-01-25 03:04:02 +03:00
|
|
|
.compat_setsockopt = compat_sock_common_setsockopt,
|
|
|
|
.compat_getsockopt = compat_sock_common_getsockopt,
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
static struct proto mptcp_v6_prot;
|
|
|
|
|
2020-01-22 03:56:20 +03:00
|
|
|
static void mptcp_v6_destroy(struct sock *sk)
|
|
|
|
{
|
|
|
|
mptcp_destroy(sk);
|
|
|
|
inet6_destroy_sock(sk);
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:56:15 +03:00
|
|
|
static struct inet_protosw mptcp_v6_protosw = {
|
|
|
|
.type = SOCK_STREAM,
|
|
|
|
.protocol = IPPROTO_MPTCP,
|
|
|
|
.prot = &mptcp_v6_prot,
|
2020-01-22 03:56:17 +03:00
|
|
|
.ops = &mptcp_v6_stream_ops,
|
2020-01-22 03:56:15 +03:00
|
|
|
.flags = INET_PROTOSW_ICSK,
|
|
|
|
};
|
|
|
|
|
2020-01-22 03:56:28 +03:00
|
|
|
int mptcp_proto_v6_init(void)
|
2020-01-22 03:56:15 +03:00
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
mptcp_v6_prot = mptcp_prot;
|
|
|
|
strcpy(mptcp_v6_prot.name, "MPTCPv6");
|
|
|
|
mptcp_v6_prot.slab = NULL;
|
2020-01-22 03:56:20 +03:00
|
|
|
mptcp_v6_prot.destroy = mptcp_v6_destroy;
|
2020-02-06 02:39:37 +03:00
|
|
|
mptcp_v6_prot.obj_size = sizeof(struct mptcp6_sock);
|
2020-01-22 03:56:15 +03:00
|
|
|
|
|
|
|
err = proto_register(&mptcp_v6_prot, 1);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
err = inet6_register_protosw(&mptcp_v6_protosw);
|
|
|
|
if (err)
|
|
|
|
proto_unregister(&mptcp_v6_prot);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
#endif
|