diff options
author | Dmitry Torokhov <dmitry.torokhov@gmail.com> | 2012-01-09 02:38:23 -0500 |
---|---|---|
committer | Dmitry Torokhov <dmitry.torokhov@gmail.com> | 2012-01-09 02:38:23 -0500 |
commit | da733563be5a9da26fe81d9f007262d00b846e22 (patch) | |
tree | db28291df94a2043af2123911984c5c173da4e6f /net/ipv6/tcp_ipv6.c | |
parent | 6ccbcf2cb41131f8d56ef0723bf3f7c1f8486076 (diff) | |
parent | dab78d7924598ea4031663dd10db814e2e324928 (diff) |
Merge branch 'next' into for-linus
Diffstat (limited to 'net/ipv6/tcp_ipv6.c')
-rw-r--r-- | net/ipv6/tcp_ipv6.c | 119 |
1 files changed, 54 insertions, 65 deletions
diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c index d1fb63f4aeb7..36131d122a6f 100644 --- a/net/ipv6/tcp_ipv6.c +++ b/net/ipv6/tcp_ipv6.c | |||
@@ -114,7 +114,7 @@ static __inline__ __sum16 tcp_v6_check(int len, | |||
114 | return csum_ipv6_magic(saddr, daddr, len, IPPROTO_TCP, base); | 114 | return csum_ipv6_magic(saddr, daddr, len, IPPROTO_TCP, base); |
115 | } | 115 | } |
116 | 116 | ||
117 | static __u32 tcp_v6_init_sequence(struct sk_buff *skb) | 117 | static __u32 tcp_v6_init_sequence(const struct sk_buff *skb) |
118 | { | 118 | { |
119 | return secure_tcpv6_sequence_number(ipv6_hdr(skb)->daddr.s6_addr32, | 119 | return secure_tcpv6_sequence_number(ipv6_hdr(skb)->daddr.s6_addr32, |
120 | ipv6_hdr(skb)->saddr.s6_addr32, | 120 | ipv6_hdr(skb)->saddr.s6_addr32, |
@@ -513,7 +513,7 @@ static int tcp_v6_send_synack(struct sock *sk, struct request_sock *req, | |||
513 | __tcp_v6_send_check(skb, &treq->loc_addr, &treq->rmt_addr); | 513 | __tcp_v6_send_check(skb, &treq->loc_addr, &treq->rmt_addr); |
514 | 514 | ||
515 | ipv6_addr_copy(&fl6.daddr, &treq->rmt_addr); | 515 | ipv6_addr_copy(&fl6.daddr, &treq->rmt_addr); |
516 | err = ip6_xmit(sk, skb, &fl6, opt); | 516 | err = ip6_xmit(sk, skb, &fl6, opt, np->tclass); |
517 | err = net_xmit_eval(err); | 517 | err = net_xmit_eval(err); |
518 | } | 518 | } |
519 | 519 | ||
@@ -531,20 +531,6 @@ static int tcp_v6_rtx_synack(struct sock *sk, struct request_sock *req, | |||
531 | return tcp_v6_send_synack(sk, req, rvp); | 531 | return tcp_v6_send_synack(sk, req, rvp); |
532 | } | 532 | } |
533 | 533 | ||
534 | static inline void syn_flood_warning(struct sk_buff *skb) | ||
535 | { | ||
536 | #ifdef CONFIG_SYN_COOKIES | ||
537 | if (sysctl_tcp_syncookies) | ||
538 | printk(KERN_INFO | ||
539 | "TCPv6: Possible SYN flooding on port %d. " | ||
540 | "Sending cookies.\n", ntohs(tcp_hdr(skb)->dest)); | ||
541 | else | ||
542 | #endif | ||
543 | printk(KERN_INFO | ||
544 | "TCPv6: Possible SYN flooding on port %d. " | ||
545 | "Dropping request.\n", ntohs(tcp_hdr(skb)->dest)); | ||
546 | } | ||
547 | |||
548 | static void tcp_v6_reqsk_destructor(struct request_sock *req) | 534 | static void tcp_v6_reqsk_destructor(struct request_sock *req) |
549 | { | 535 | { |
550 | kfree_skb(inet6_rsk(req)->pktopts); | 536 | kfree_skb(inet6_rsk(req)->pktopts); |
@@ -605,7 +591,8 @@ static int tcp_v6_md5_do_add(struct sock *sk, const struct in6_addr *peer, | |||
605 | } | 591 | } |
606 | sk_nocaps_add(sk, NETIF_F_GSO_MASK); | 592 | sk_nocaps_add(sk, NETIF_F_GSO_MASK); |
607 | } | 593 | } |
608 | if (tcp_alloc_md5sig_pool(sk) == NULL) { | 594 | if (tp->md5sig_info->entries6 == 0 && |
595 | tcp_alloc_md5sig_pool(sk) == NULL) { | ||
609 | kfree(newkey); | 596 | kfree(newkey); |
610 | return -ENOMEM; | 597 | return -ENOMEM; |
611 | } | 598 | } |
@@ -614,8 +601,9 @@ static int tcp_v6_md5_do_add(struct sock *sk, const struct in6_addr *peer, | |||
614 | (tp->md5sig_info->entries6 + 1)), GFP_ATOMIC); | 601 | (tp->md5sig_info->entries6 + 1)), GFP_ATOMIC); |
615 | 602 | ||
616 | if (!keys) { | 603 | if (!keys) { |
617 | tcp_free_md5sig_pool(); | ||
618 | kfree(newkey); | 604 | kfree(newkey); |
605 | if (tp->md5sig_info->entries6 == 0) | ||
606 | tcp_free_md5sig_pool(); | ||
619 | return -ENOMEM; | 607 | return -ENOMEM; |
620 | } | 608 | } |
621 | 609 | ||
@@ -661,6 +649,7 @@ static int tcp_v6_md5_do_del(struct sock *sk, const struct in6_addr *peer) | |||
661 | kfree(tp->md5sig_info->keys6); | 649 | kfree(tp->md5sig_info->keys6); |
662 | tp->md5sig_info->keys6 = NULL; | 650 | tp->md5sig_info->keys6 = NULL; |
663 | tp->md5sig_info->alloced6 = 0; | 651 | tp->md5sig_info->alloced6 = 0; |
652 | tcp_free_md5sig_pool(); | ||
664 | } else { | 653 | } else { |
665 | /* shrink the database */ | 654 | /* shrink the database */ |
666 | if (tp->md5sig_info->entries6 != i) | 655 | if (tp->md5sig_info->entries6 != i) |
@@ -669,7 +658,6 @@ static int tcp_v6_md5_do_del(struct sock *sk, const struct in6_addr *peer) | |||
669 | (tp->md5sig_info->entries6 - i) | 658 | (tp->md5sig_info->entries6 - i) |
670 | * sizeof (tp->md5sig_info->keys6[0])); | 659 | * sizeof (tp->md5sig_info->keys6[0])); |
671 | } | 660 | } |
672 | tcp_free_md5sig_pool(); | ||
673 | return 0; | 661 | return 0; |
674 | } | 662 | } |
675 | } | 663 | } |
@@ -773,7 +761,7 @@ static int tcp_v6_md5_hash_pseudoheader(struct tcp_md5sig_pool *hp, | |||
773 | 761 | ||
774 | static int tcp_v6_md5_hash_hdr(char *md5_hash, struct tcp_md5sig_key *key, | 762 | static int tcp_v6_md5_hash_hdr(char *md5_hash, struct tcp_md5sig_key *key, |
775 | const struct in6_addr *daddr, struct in6_addr *saddr, | 763 | const struct in6_addr *daddr, struct in6_addr *saddr, |
776 | struct tcphdr *th) | 764 | const struct tcphdr *th) |
777 | { | 765 | { |
778 | struct tcp_md5sig_pool *hp; | 766 | struct tcp_md5sig_pool *hp; |
779 | struct hash_desc *desc; | 767 | struct hash_desc *desc; |
@@ -805,13 +793,14 @@ clear_hash_noput: | |||
805 | } | 793 | } |
806 | 794 | ||
807 | static int tcp_v6_md5_hash_skb(char *md5_hash, struct tcp_md5sig_key *key, | 795 | static int tcp_v6_md5_hash_skb(char *md5_hash, struct tcp_md5sig_key *key, |
808 | struct sock *sk, struct request_sock *req, | 796 | const struct sock *sk, |
809 | struct sk_buff *skb) | 797 | const struct request_sock *req, |
798 | const struct sk_buff *skb) | ||
810 | { | 799 | { |
811 | const struct in6_addr *saddr, *daddr; | 800 | const struct in6_addr *saddr, *daddr; |
812 | struct tcp_md5sig_pool *hp; | 801 | struct tcp_md5sig_pool *hp; |
813 | struct hash_desc *desc; | 802 | struct hash_desc *desc; |
814 | struct tcphdr *th = tcp_hdr(skb); | 803 | const struct tcphdr *th = tcp_hdr(skb); |
815 | 804 | ||
816 | if (sk) { | 805 | if (sk) { |
817 | saddr = &inet6_sk(sk)->saddr; | 806 | saddr = &inet6_sk(sk)->saddr; |
@@ -854,12 +843,12 @@ clear_hash_noput: | |||
854 | return 1; | 843 | return 1; |
855 | } | 844 | } |
856 | 845 | ||
857 | static int tcp_v6_inbound_md5_hash (struct sock *sk, struct sk_buff *skb) | 846 | static int tcp_v6_inbound_md5_hash(struct sock *sk, const struct sk_buff *skb) |
858 | { | 847 | { |
859 | __u8 *hash_location = NULL; | 848 | const __u8 *hash_location = NULL; |
860 | struct tcp_md5sig_key *hash_expected; | 849 | struct tcp_md5sig_key *hash_expected; |
861 | const struct ipv6hdr *ip6h = ipv6_hdr(skb); | 850 | const struct ipv6hdr *ip6h = ipv6_hdr(skb); |
862 | struct tcphdr *th = tcp_hdr(skb); | 851 | const struct tcphdr *th = tcp_hdr(skb); |
863 | int genhash; | 852 | int genhash; |
864 | u8 newhash[16]; | 853 | u8 newhash[16]; |
865 | 854 | ||
@@ -990,9 +979,10 @@ static int tcp6_gro_complete(struct sk_buff *skb) | |||
990 | } | 979 | } |
991 | 980 | ||
992 | static void tcp_v6_send_response(struct sk_buff *skb, u32 seq, u32 ack, u32 win, | 981 | static void tcp_v6_send_response(struct sk_buff *skb, u32 seq, u32 ack, u32 win, |
993 | u32 ts, struct tcp_md5sig_key *key, int rst) | 982 | u32 ts, struct tcp_md5sig_key *key, int rst, u8 tclass) |
994 | { | 983 | { |
995 | struct tcphdr *th = tcp_hdr(skb), *t1; | 984 | const struct tcphdr *th = tcp_hdr(skb); |
985 | struct tcphdr *t1; | ||
996 | struct sk_buff *buff; | 986 | struct sk_buff *buff; |
997 | struct flowi6 fl6; | 987 | struct flowi6 fl6; |
998 | struct net *net = dev_net(skb_dst(skb)->dev); | 988 | struct net *net = dev_net(skb_dst(skb)->dev); |
@@ -1070,7 +1060,7 @@ static void tcp_v6_send_response(struct sk_buff *skb, u32 seq, u32 ack, u32 win, | |||
1070 | dst = ip6_dst_lookup_flow(ctl_sk, &fl6, NULL, false); | 1060 | dst = ip6_dst_lookup_flow(ctl_sk, &fl6, NULL, false); |
1071 | if (!IS_ERR(dst)) { | 1061 | if (!IS_ERR(dst)) { |
1072 | skb_dst_set(buff, dst); | 1062 | skb_dst_set(buff, dst); |
1073 | ip6_xmit(ctl_sk, buff, &fl6, NULL); | 1063 | ip6_xmit(ctl_sk, buff, &fl6, NULL, tclass); |
1074 | TCP_INC_STATS_BH(net, TCP_MIB_OUTSEGS); | 1064 | TCP_INC_STATS_BH(net, TCP_MIB_OUTSEGS); |
1075 | if (rst) | 1065 | if (rst) |
1076 | TCP_INC_STATS_BH(net, TCP_MIB_OUTRSTS); | 1066 | TCP_INC_STATS_BH(net, TCP_MIB_OUTRSTS); |
@@ -1082,7 +1072,7 @@ static void tcp_v6_send_response(struct sk_buff *skb, u32 seq, u32 ack, u32 win, | |||
1082 | 1072 | ||
1083 | static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb) | 1073 | static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb) |
1084 | { | 1074 | { |
1085 | struct tcphdr *th = tcp_hdr(skb); | 1075 | const struct tcphdr *th = tcp_hdr(skb); |
1086 | u32 seq = 0, ack_seq = 0; | 1076 | u32 seq = 0, ack_seq = 0; |
1087 | struct tcp_md5sig_key *key = NULL; | 1077 | struct tcp_md5sig_key *key = NULL; |
1088 | 1078 | ||
@@ -1103,13 +1093,13 @@ static void tcp_v6_send_reset(struct sock *sk, struct sk_buff *skb) | |||
1103 | ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len - | 1093 | ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len - |
1104 | (th->doff << 2); | 1094 | (th->doff << 2); |
1105 | 1095 | ||
1106 | tcp_v6_send_response(skb, seq, ack_seq, 0, 0, key, 1); | 1096 | tcp_v6_send_response(skb, seq, ack_seq, 0, 0, key, 1, 0); |
1107 | } | 1097 | } |
1108 | 1098 | ||
1109 | static void tcp_v6_send_ack(struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 ts, | 1099 | static void tcp_v6_send_ack(struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 ts, |
1110 | struct tcp_md5sig_key *key) | 1100 | struct tcp_md5sig_key *key, u8 tclass) |
1111 | { | 1101 | { |
1112 | tcp_v6_send_response(skb, seq, ack, win, ts, key, 0); | 1102 | tcp_v6_send_response(skb, seq, ack, win, ts, key, 0, tclass); |
1113 | } | 1103 | } |
1114 | 1104 | ||
1115 | static void tcp_v6_timewait_ack(struct sock *sk, struct sk_buff *skb) | 1105 | static void tcp_v6_timewait_ack(struct sock *sk, struct sk_buff *skb) |
@@ -1119,7 +1109,8 @@ static void tcp_v6_timewait_ack(struct sock *sk, struct sk_buff *skb) | |||
1119 | 1109 | ||
1120 | tcp_v6_send_ack(skb, tcptw->tw_snd_nxt, tcptw->tw_rcv_nxt, | 1110 | tcp_v6_send_ack(skb, tcptw->tw_snd_nxt, tcptw->tw_rcv_nxt, |
1121 | tcptw->tw_rcv_wnd >> tw->tw_rcv_wscale, | 1111 | tcptw->tw_rcv_wnd >> tw->tw_rcv_wscale, |
1122 | tcptw->tw_ts_recent, tcp_twsk_md5_key(tcptw)); | 1112 | tcptw->tw_ts_recent, tcp_twsk_md5_key(tcptw), |
1113 | tw->tw_tclass); | ||
1123 | 1114 | ||
1124 | inet_twsk_put(tw); | 1115 | inet_twsk_put(tw); |
1125 | } | 1116 | } |
@@ -1128,7 +1119,7 @@ static void tcp_v6_reqsk_send_ack(struct sock *sk, struct sk_buff *skb, | |||
1128 | struct request_sock *req) | 1119 | struct request_sock *req) |
1129 | { | 1120 | { |
1130 | tcp_v6_send_ack(skb, tcp_rsk(req)->snt_isn + 1, tcp_rsk(req)->rcv_isn + 1, req->rcv_wnd, req->ts_recent, | 1121 | tcp_v6_send_ack(skb, tcp_rsk(req)->snt_isn + 1, tcp_rsk(req)->rcv_isn + 1, req->rcv_wnd, req->ts_recent, |
1131 | tcp_v6_md5_do_lookup(sk, &ipv6_hdr(skb)->daddr)); | 1122 | tcp_v6_md5_do_lookup(sk, &ipv6_hdr(skb)->daddr), 0); |
1132 | } | 1123 | } |
1133 | 1124 | ||
1134 | 1125 | ||
@@ -1172,18 +1163,14 @@ static int tcp_v6_conn_request(struct sock *sk, struct sk_buff *skb) | |||
1172 | { | 1163 | { |
1173 | struct tcp_extend_values tmp_ext; | 1164 | struct tcp_extend_values tmp_ext; |
1174 | struct tcp_options_received tmp_opt; | 1165 | struct tcp_options_received tmp_opt; |
1175 | u8 *hash_location; | 1166 | const u8 *hash_location; |
1176 | struct request_sock *req; | 1167 | struct request_sock *req; |
1177 | struct inet6_request_sock *treq; | 1168 | struct inet6_request_sock *treq; |
1178 | struct ipv6_pinfo *np = inet6_sk(sk); | 1169 | struct ipv6_pinfo *np = inet6_sk(sk); |
1179 | struct tcp_sock *tp = tcp_sk(sk); | 1170 | struct tcp_sock *tp = tcp_sk(sk); |
1180 | __u32 isn = TCP_SKB_CB(skb)->when; | 1171 | __u32 isn = TCP_SKB_CB(skb)->when; |
1181 | struct dst_entry *dst = NULL; | 1172 | struct dst_entry *dst = NULL; |
1182 | #ifdef CONFIG_SYN_COOKIES | ||
1183 | int want_cookie = 0; | 1173 | int want_cookie = 0; |
1184 | #else | ||
1185 | #define want_cookie 0 | ||
1186 | #endif | ||
1187 | 1174 | ||
1188 | if (skb->protocol == htons(ETH_P_IP)) | 1175 | if (skb->protocol == htons(ETH_P_IP)) |
1189 | return tcp_v4_conn_request(sk, skb); | 1176 | return tcp_v4_conn_request(sk, skb); |
@@ -1192,14 +1179,9 @@ static int tcp_v6_conn_request(struct sock *sk, struct sk_buff *skb) | |||
1192 | goto drop; | 1179 | goto drop; |
1193 | 1180 | ||
1194 | if (inet_csk_reqsk_queue_is_full(sk) && !isn) { | 1181 | if (inet_csk_reqsk_queue_is_full(sk) && !isn) { |
1195 | if (net_ratelimit()) | 1182 | want_cookie = tcp_syn_flood_action(sk, skb, "TCPv6"); |
1196 | syn_flood_warning(skb); | 1183 | if (!want_cookie) |
1197 | #ifdef CONFIG_SYN_COOKIES | 1184 | goto drop; |
1198 | if (sysctl_tcp_syncookies) | ||
1199 | want_cookie = 1; | ||
1200 | else | ||
1201 | #endif | ||
1202 | goto drop; | ||
1203 | } | 1185 | } |
1204 | 1186 | ||
1205 | if (sk_acceptq_is_full(sk) && inet_csk_reqsk_queue_young(sk) > 1) | 1187 | if (sk_acceptq_is_full(sk) && inet_csk_reqsk_queue_young(sk) > 1) |
@@ -1249,9 +1231,7 @@ static int tcp_v6_conn_request(struct sock *sk, struct sk_buff *skb) | |||
1249 | while (l-- > 0) | 1231 | while (l-- > 0) |
1250 | *c++ ^= *hash_location++; | 1232 | *c++ ^= *hash_location++; |
1251 | 1233 | ||
1252 | #ifdef CONFIG_SYN_COOKIES | ||
1253 | want_cookie = 0; /* not our kind of cookie */ | 1234 | want_cookie = 0; /* not our kind of cookie */ |
1254 | #endif | ||
1255 | tmp_ext.cookie_out_never = 0; /* false */ | 1235 | tmp_ext.cookie_out_never = 0; /* false */ |
1256 | tmp_ext.cookie_plus = tmp_opt.cookie_plus; | 1236 | tmp_ext.cookie_plus = tmp_opt.cookie_plus; |
1257 | } else if (!tp->rx_opt.cookie_in_always) { | 1237 | } else if (!tp->rx_opt.cookie_in_always) { |
@@ -1408,6 +1388,8 @@ static struct sock * tcp_v6_syn_recv_sock(struct sock *sk, struct sk_buff *skb, | |||
1408 | newtp->af_specific = &tcp_sock_ipv6_mapped_specific; | 1388 | newtp->af_specific = &tcp_sock_ipv6_mapped_specific; |
1409 | #endif | 1389 | #endif |
1410 | 1390 | ||
1391 | newnp->ipv6_ac_list = NULL; | ||
1392 | newnp->ipv6_fl_list = NULL; | ||
1411 | newnp->pktoptions = NULL; | 1393 | newnp->pktoptions = NULL; |
1412 | newnp->opt = NULL; | 1394 | newnp->opt = NULL; |
1413 | newnp->mcast_oif = inet6_iif(skb); | 1395 | newnp->mcast_oif = inet6_iif(skb); |
@@ -1472,6 +1454,7 @@ static struct sock * tcp_v6_syn_recv_sock(struct sock *sk, struct sk_buff *skb, | |||
1472 | First: no IPv4 options. | 1454 | First: no IPv4 options. |
1473 | */ | 1455 | */ |
1474 | newinet->inet_opt = NULL; | 1456 | newinet->inet_opt = NULL; |
1457 | newnp->ipv6_ac_list = NULL; | ||
1475 | newnp->ipv6_fl_list = NULL; | 1458 | newnp->ipv6_fl_list = NULL; |
1476 | 1459 | ||
1477 | /* Clone RX bits */ | 1460 | /* Clone RX bits */ |
@@ -1628,7 +1611,7 @@ static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb) | |||
1628 | opt_skb = skb_clone(skb, GFP_ATOMIC); | 1611 | opt_skb = skb_clone(skb, GFP_ATOMIC); |
1629 | 1612 | ||
1630 | if (sk->sk_state == TCP_ESTABLISHED) { /* Fast path */ | 1613 | if (sk->sk_state == TCP_ESTABLISHED) { /* Fast path */ |
1631 | sock_rps_save_rxhash(sk, skb->rxhash); | 1614 | sock_rps_save_rxhash(sk, skb); |
1632 | if (tcp_rcv_established(sk, skb, tcp_hdr(skb), skb->len)) | 1615 | if (tcp_rcv_established(sk, skb, tcp_hdr(skb), skb->len)) |
1633 | goto reset; | 1616 | goto reset; |
1634 | if (opt_skb) | 1617 | if (opt_skb) |
@@ -1650,7 +1633,7 @@ static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb) | |||
1650 | * the new socket.. | 1633 | * the new socket.. |
1651 | */ | 1634 | */ |
1652 | if(nsk != sk) { | 1635 | if(nsk != sk) { |
1653 | sock_rps_save_rxhash(nsk, skb->rxhash); | 1636 | sock_rps_save_rxhash(nsk, skb); |
1654 | if (tcp_child_process(sk, nsk, skb)) | 1637 | if (tcp_child_process(sk, nsk, skb)) |
1655 | goto reset; | 1638 | goto reset; |
1656 | if (opt_skb) | 1639 | if (opt_skb) |
@@ -1658,7 +1641,7 @@ static int tcp_v6_do_rcv(struct sock *sk, struct sk_buff *skb) | |||
1658 | return 0; | 1641 | return 0; |
1659 | } | 1642 | } |
1660 | } else | 1643 | } else |
1661 | sock_rps_save_rxhash(sk, skb->rxhash); | 1644 | sock_rps_save_rxhash(sk, skb); |
1662 | 1645 | ||
1663 | if (tcp_rcv_state_process(sk, skb, tcp_hdr(skb), skb->len)) | 1646 | if (tcp_rcv_state_process(sk, skb, tcp_hdr(skb), skb->len)) |
1664 | goto reset; | 1647 | goto reset; |
@@ -1708,7 +1691,7 @@ ipv6_pktoptions: | |||
1708 | 1691 | ||
1709 | static int tcp_v6_rcv(struct sk_buff *skb) | 1692 | static int tcp_v6_rcv(struct sk_buff *skb) |
1710 | { | 1693 | { |
1711 | struct tcphdr *th; | 1694 | const struct tcphdr *th; |
1712 | const struct ipv6hdr *hdr; | 1695 | const struct ipv6hdr *hdr; |
1713 | struct sock *sk; | 1696 | struct sock *sk; |
1714 | int ret; | 1697 | int ret; |
@@ -1742,7 +1725,7 @@ static int tcp_v6_rcv(struct sk_buff *skb) | |||
1742 | skb->len - th->doff*4); | 1725 | skb->len - th->doff*4); |
1743 | TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq); | 1726 | TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq); |
1744 | TCP_SKB_CB(skb)->when = 0; | 1727 | TCP_SKB_CB(skb)->when = 0; |
1745 | TCP_SKB_CB(skb)->flags = ipv6_get_dsfield(hdr); | 1728 | TCP_SKB_CB(skb)->ip_dsfield = ipv6_get_dsfield(hdr); |
1746 | TCP_SKB_CB(skb)->sacked = 0; | 1729 | TCP_SKB_CB(skb)->sacked = 0; |
1747 | 1730 | ||
1748 | sk = __inet6_lookup_skb(&tcp_hashinfo, skb, th->source, th->dest); | 1731 | sk = __inet6_lookup_skb(&tcp_hashinfo, skb, th->source, th->dest); |
@@ -1876,8 +1859,8 @@ static struct inet_peer *tcp_v6_get_peer(struct sock *sk, bool *release_it) | |||
1876 | 1859 | ||
1877 | static void *tcp_v6_tw_get_peer(struct sock *sk) | 1860 | static void *tcp_v6_tw_get_peer(struct sock *sk) |
1878 | { | 1861 | { |
1879 | struct inet6_timewait_sock *tw6 = inet6_twsk(sk); | 1862 | const struct inet6_timewait_sock *tw6 = inet6_twsk(sk); |
1880 | struct inet_timewait_sock *tw = inet_twsk(sk); | 1863 | const struct inet_timewait_sock *tw = inet_twsk(sk); |
1881 | 1864 | ||
1882 | if (tw->tw_family == AF_INET) | 1865 | if (tw->tw_family == AF_INET) |
1883 | return tcp_v4_tw_get_peer(sk); | 1866 | return tcp_v4_tw_get_peer(sk); |
@@ -2032,7 +2015,7 @@ static void tcp_v6_destroy_sock(struct sock *sk) | |||
2032 | #ifdef CONFIG_PROC_FS | 2015 | #ifdef CONFIG_PROC_FS |
2033 | /* Proc filesystem TCPv6 sock list dumping. */ | 2016 | /* Proc filesystem TCPv6 sock list dumping. */ |
2034 | static void get_openreq6(struct seq_file *seq, | 2017 | static void get_openreq6(struct seq_file *seq, |
2035 | struct sock *sk, struct request_sock *req, int i, int uid) | 2018 | const struct sock *sk, struct request_sock *req, int i, int uid) |
2036 | { | 2019 | { |
2037 | int ttd = req->expires - jiffies; | 2020 | int ttd = req->expires - jiffies; |
2038 | const struct in6_addr *src = &inet6_rsk(req)->loc_addr; | 2021 | const struct in6_addr *src = &inet6_rsk(req)->loc_addr; |
@@ -2068,10 +2051,10 @@ static void get_tcp6_sock(struct seq_file *seq, struct sock *sp, int i) | |||
2068 | __u16 destp, srcp; | 2051 | __u16 destp, srcp; |
2069 | int timer_active; | 2052 | int timer_active; |
2070 | unsigned long timer_expires; | 2053 | unsigned long timer_expires; |
2071 | struct inet_sock *inet = inet_sk(sp); | 2054 | const struct inet_sock *inet = inet_sk(sp); |
2072 | struct tcp_sock *tp = tcp_sk(sp); | 2055 | const struct tcp_sock *tp = tcp_sk(sp); |
2073 | const struct inet_connection_sock *icsk = inet_csk(sp); | 2056 | const struct inet_connection_sock *icsk = inet_csk(sp); |
2074 | struct ipv6_pinfo *np = inet6_sk(sp); | 2057 | const struct ipv6_pinfo *np = inet6_sk(sp); |
2075 | 2058 | ||
2076 | dest = &np->daddr; | 2059 | dest = &np->daddr; |
2077 | src = &np->rcv_saddr; | 2060 | src = &np->rcv_saddr; |
@@ -2123,7 +2106,7 @@ static void get_timewait6_sock(struct seq_file *seq, | |||
2123 | { | 2106 | { |
2124 | const struct in6_addr *dest, *src; | 2107 | const struct in6_addr *dest, *src; |
2125 | __u16 destp, srcp; | 2108 | __u16 destp, srcp; |
2126 | struct inet6_timewait_sock *tw6 = inet6_twsk((struct sock *)tw); | 2109 | const struct inet6_timewait_sock *tw6 = inet6_twsk((struct sock *)tw); |
2127 | int ttd = tw->tw_ttd - jiffies; | 2110 | int ttd = tw->tw_ttd - jiffies; |
2128 | 2111 | ||
2129 | if (ttd < 0) | 2112 | if (ttd < 0) |
@@ -2178,12 +2161,18 @@ out: | |||
2178 | return 0; | 2161 | return 0; |
2179 | } | 2162 | } |
2180 | 2163 | ||
2164 | static const struct file_operations tcp6_afinfo_seq_fops = { | ||
2165 | .owner = THIS_MODULE, | ||
2166 | .open = tcp_seq_open, | ||
2167 | .read = seq_read, | ||
2168 | .llseek = seq_lseek, | ||
2169 | .release = seq_release_net | ||
2170 | }; | ||
2171 | |||
2181 | static struct tcp_seq_afinfo tcp6_seq_afinfo = { | 2172 | static struct tcp_seq_afinfo tcp6_seq_afinfo = { |
2182 | .name = "tcp6", | 2173 | .name = "tcp6", |
2183 | .family = AF_INET6, | 2174 | .family = AF_INET6, |
2184 | .seq_fops = { | 2175 | .seq_fops = &tcp6_afinfo_seq_fops, |
2185 | .owner = THIS_MODULE, | ||
2186 | }, | ||
2187 | .seq_ops = { | 2176 | .seq_ops = { |
2188 | .show = tcp6_seq_show, | 2177 | .show = tcp6_seq_show, |
2189 | }, | 2178 | }, |