ipv6: add complete rcu protection around np->opt
[pandora-kernel.git] / net / dccp / ipv6.c
1 /*
2  *      DCCP over IPv6
3  *      Linux INET6 implementation
4  *
5  *      Based on net/dccp6/ipv6.c
6  *
7  *      Arnaldo Carvalho de Melo <acme@ghostprotocols.net>
8  *
9  *      This program is free software; you can redistribute it and/or
10  *      modify it under the terms of the GNU General Public License
11  *      as published by the Free Software Foundation; either version
12  *      2 of the License, or (at your option) any later version.
13  */
14
15 #include <linux/module.h>
16 #include <linux/random.h>
17 #include <linux/slab.h>
18 #include <linux/xfrm.h>
19
20 #include <net/addrconf.h>
21 #include <net/inet_common.h>
22 #include <net/inet_hashtables.h>
23 #include <net/inet_sock.h>
24 #include <net/inet6_connection_sock.h>
25 #include <net/inet6_hashtables.h>
26 #include <net/ip6_route.h>
27 #include <net/ipv6.h>
28 #include <net/protocol.h>
29 #include <net/transp_v6.h>
30 #include <net/ip6_checksum.h>
31 #include <net/xfrm.h>
32 #include <net/secure_seq.h>
33
34 #include "dccp.h"
35 #include "ipv6.h"
36 #include "feat.h"
37
38 /* The per-net dccp.v6_ctl_sk is used for sending RSTs and ACKs */
39
40 static const struct inet_connection_sock_af_ops dccp_ipv6_mapped;
41 static const struct inet_connection_sock_af_ops dccp_ipv6_af_ops;
42
43 static void dccp_v6_hash(struct sock *sk)
44 {
45         if (sk->sk_state != DCCP_CLOSED) {
46                 if (inet_csk(sk)->icsk_af_ops == &dccp_ipv6_mapped) {
47                         inet_hash(sk);
48                         return;
49                 }
50                 local_bh_disable();
51                 __inet6_hash(sk, NULL);
52                 local_bh_enable();
53         }
54 }
55
56 /* add pseudo-header to DCCP checksum stored in skb->csum */
57 static inline __sum16 dccp_v6_csum_finish(struct sk_buff *skb,
58                                       const struct in6_addr *saddr,
59                                       const struct in6_addr *daddr)
60 {
61         return csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_DCCP, skb->csum);
62 }
63
64 static inline void dccp_v6_send_check(struct sock *sk, struct sk_buff *skb)
65 {
66         struct ipv6_pinfo *np = inet6_sk(sk);
67         struct dccp_hdr *dh = dccp_hdr(skb);
68
69         dccp_csum_outgoing(skb);
70         dh->dccph_checksum = dccp_v6_csum_finish(skb, &np->saddr, &np->daddr);
71 }
72
73 static inline __u64 dccp_v6_init_sequence(struct sk_buff *skb)
74 {
75         return secure_dccpv6_sequence_number(ipv6_hdr(skb)->daddr.s6_addr32,
76                                              ipv6_hdr(skb)->saddr.s6_addr32,
77                                              dccp_hdr(skb)->dccph_dport,
78                                              dccp_hdr(skb)->dccph_sport     );
79
80 }
81
82 static void dccp_v6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
83                         u8 type, u8 code, int offset, __be32 info)
84 {
85         const struct ipv6hdr *hdr = (const struct ipv6hdr *)skb->data;
86         const struct dccp_hdr *dh = (struct dccp_hdr *)(skb->data + offset);
87         struct dccp_sock *dp;
88         struct ipv6_pinfo *np;
89         struct sock *sk;
90         int err;
91         __u64 seq;
92         struct net *net = dev_net(skb->dev);
93
94         if (skb->len < offset + sizeof(*dh) ||
95             skb->len < offset + __dccp_basic_hdr_len(dh)) {
96                 ICMP6_INC_STATS_BH(net, __in6_dev_get(skb->dev),
97                                    ICMP6_MIB_INERRORS);
98                 return;
99         }
100
101         sk = inet6_lookup(net, &dccp_hashinfo,
102                         &hdr->daddr, dh->dccph_dport,
103                         &hdr->saddr, dh->dccph_sport, inet6_iif(skb));
104
105         if (sk == NULL) {
106                 ICMP6_INC_STATS_BH(net, __in6_dev_get(skb->dev),
107                                    ICMP6_MIB_INERRORS);
108                 return;
109         }
110
111         if (sk->sk_state == DCCP_TIME_WAIT) {
112                 inet_twsk_put(inet_twsk(sk));
113                 return;
114         }
115
116         bh_lock_sock(sk);
117         if (sock_owned_by_user(sk))
118                 NET_INC_STATS_BH(net, LINUX_MIB_LOCKDROPPEDICMPS);
119
120         if (sk->sk_state == DCCP_CLOSED)
121                 goto out;
122
123         dp = dccp_sk(sk);
124         seq = dccp_hdr_seq(dh);
125         if ((1 << sk->sk_state) & ~(DCCPF_REQUESTING | DCCPF_LISTEN) &&
126             !between48(seq, dp->dccps_awl, dp->dccps_awh)) {
127                 NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
128                 goto out;
129         }
130
131         np = inet6_sk(sk);
132
133         if (type == ICMPV6_PKT_TOOBIG) {
134                 struct dst_entry *dst = NULL;
135
136                 if (sock_owned_by_user(sk))
137                         goto out;
138                 if ((1 << sk->sk_state) & (DCCPF_LISTEN | DCCPF_CLOSED))
139                         goto out;
140
141                 /* icmp should have updated the destination cache entry */
142                 dst = __sk_dst_check(sk, np->dst_cookie);
143                 if (dst == NULL) {
144                         struct inet_sock *inet = inet_sk(sk);
145                         struct flowi6 fl6;
146
147                         /* BUGGG_FUTURE: Again, it is not clear how
148                            to handle rthdr case. Ignore this complexity
149                            for now.
150                          */
151                         memset(&fl6, 0, sizeof(fl6));
152                         fl6.flowi6_proto = IPPROTO_DCCP;
153                         ipv6_addr_copy(&fl6.daddr, &np->daddr);
154                         ipv6_addr_copy(&fl6.saddr, &np->saddr);
155                         fl6.flowi6_oif = sk->sk_bound_dev_if;
156                         fl6.fl6_dport = inet->inet_dport;
157                         fl6.fl6_sport = inet->inet_sport;
158                         security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
159
160                         dst = ip6_dst_lookup_flow(sk, &fl6, NULL, false);
161                         if (IS_ERR(dst)) {
162                                 sk->sk_err_soft = -PTR_ERR(dst);
163                                 goto out;
164                         }
165                 } else
166                         dst_hold(dst);
167
168                 if (inet_csk(sk)->icsk_pmtu_cookie > dst_mtu(dst)) {
169                         dccp_sync_mss(sk, dst_mtu(dst));
170                 } /* else let the usual retransmit timer handle it */
171                 dst_release(dst);
172                 goto out;
173         }
174
175         icmpv6_err_convert(type, code, &err);
176
177         /* Might be for an request_sock */
178         switch (sk->sk_state) {
179                 struct request_sock *req, **prev;
180         case DCCP_LISTEN:
181                 if (sock_owned_by_user(sk))
182                         goto out;
183
184                 req = inet6_csk_search_req(sk, &prev, dh->dccph_dport,
185                                            &hdr->daddr, &hdr->saddr,
186                                            inet6_iif(skb));
187                 if (req == NULL)
188                         goto out;
189
190                 /*
191                  * ICMPs are not backlogged, hence we cannot get an established
192                  * socket here.
193                  */
194                 WARN_ON(req->sk != NULL);
195
196                 if (seq != dccp_rsk(req)->dreq_iss) {
197                         NET_INC_STATS_BH(net, LINUX_MIB_OUTOFWINDOWICMPS);
198                         goto out;
199                 }
200
201                 inet_csk_reqsk_queue_drop(sk, req, prev);
202                 goto out;
203
204         case DCCP_REQUESTING:
205         case DCCP_RESPOND:  /* Cannot happen.
206                                It can, it SYNs are crossed. --ANK */
207                 if (!sock_owned_by_user(sk)) {
208                         DCCP_INC_STATS_BH(DCCP_MIB_ATTEMPTFAILS);
209                         sk->sk_err = err;
210                         /*
211                          * Wake people up to see the error
212                          * (see connect in sock.c)
213                          */
214                         sk->sk_error_report(sk);
215                         dccp_done(sk);
216                 } else
217                         sk->sk_err_soft = err;
218                 goto out;
219         }
220
221         if (!sock_owned_by_user(sk) && np->recverr) {
222                 sk->sk_err = err;
223                 sk->sk_error_report(sk);
224         } else
225                 sk->sk_err_soft = err;
226
227 out:
228         bh_unlock_sock(sk);
229         sock_put(sk);
230 }
231
232
233 static int dccp_v6_send_response(struct sock *sk, struct request_sock *req,
234                                  struct request_values *rv_unused)
235 {
236         struct inet6_request_sock *ireq6 = inet6_rsk(req);
237         struct ipv6_pinfo *np = inet6_sk(sk);
238         struct sk_buff *skb;
239         struct in6_addr *final_p, final;
240         struct flowi6 fl6;
241         int err = -1;
242         struct dst_entry *dst;
243
244         memset(&fl6, 0, sizeof(fl6));
245         fl6.flowi6_proto = IPPROTO_DCCP;
246         ipv6_addr_copy(&fl6.daddr, &ireq6->rmt_addr);
247         ipv6_addr_copy(&fl6.saddr, &ireq6->loc_addr);
248         fl6.flowlabel = 0;
249         fl6.flowi6_oif = ireq6->iif;
250         fl6.fl6_dport = inet_rsk(req)->rmt_port;
251         fl6.fl6_sport = inet_rsk(req)->loc_port;
252         security_req_classify_flow(req, flowi6_to_flowi(&fl6));
253
254
255         rcu_read_lock();
256         final_p = fl6_update_dst(&fl6, rcu_dereference(np->opt), &final);
257         rcu_read_unlock();
258
259         dst = ip6_dst_lookup_flow(sk, &fl6, final_p, false);
260         if (IS_ERR(dst)) {
261                 err = PTR_ERR(dst);
262                 dst = NULL;
263                 goto done;
264         }
265
266         skb = dccp_make_response(sk, dst, req);
267         if (skb != NULL) {
268                 struct dccp_hdr *dh = dccp_hdr(skb);
269
270                 dh->dccph_checksum = dccp_v6_csum_finish(skb,
271                                                          &ireq6->loc_addr,
272                                                          &ireq6->rmt_addr);
273                 ipv6_addr_copy(&fl6.daddr, &ireq6->rmt_addr);
274                 rcu_read_lock();
275                 err = ip6_xmit(sk, skb, &fl6, rcu_dereference(np->opt),
276                                np->tclass);
277                 rcu_read_unlock();
278                 err = net_xmit_eval(err);
279         }
280
281 done:
282         dst_release(dst);
283         return err;
284 }
285
286 static void dccp_v6_reqsk_destructor(struct request_sock *req)
287 {
288         dccp_feat_list_purge(&dccp_rsk(req)->dreq_featneg);
289         if (inet6_rsk(req)->pktopts != NULL)
290                 kfree_skb(inet6_rsk(req)->pktopts);
291 }
292
293 static void dccp_v6_ctl_send_reset(struct sock *sk, struct sk_buff *rxskb)
294 {
295         const struct ipv6hdr *rxip6h;
296         struct sk_buff *skb;
297         struct flowi6 fl6;
298         struct net *net = dev_net(skb_dst(rxskb)->dev);
299         struct sock *ctl_sk = net->dccp.v6_ctl_sk;
300         struct dst_entry *dst;
301
302         if (dccp_hdr(rxskb)->dccph_type == DCCP_PKT_RESET)
303                 return;
304
305         if (!ipv6_unicast_destination(rxskb))
306                 return;
307
308         skb = dccp_ctl_make_reset(ctl_sk, rxskb);
309         if (skb == NULL)
310                 return;
311
312         rxip6h = ipv6_hdr(rxskb);
313         dccp_hdr(skb)->dccph_checksum = dccp_v6_csum_finish(skb, &rxip6h->saddr,
314                                                             &rxip6h->daddr);
315
316         memset(&fl6, 0, sizeof(fl6));
317         ipv6_addr_copy(&fl6.daddr, &rxip6h->saddr);
318         ipv6_addr_copy(&fl6.saddr, &rxip6h->daddr);
319
320         fl6.flowi6_proto = IPPROTO_DCCP;
321         fl6.flowi6_oif = inet6_iif(rxskb);
322         fl6.fl6_dport = dccp_hdr(skb)->dccph_dport;
323         fl6.fl6_sport = dccp_hdr(skb)->dccph_sport;
324         security_skb_classify_flow(rxskb, flowi6_to_flowi(&fl6));
325
326         /* sk = NULL, but it is safe for now. RST socket required. */
327         dst = ip6_dst_lookup_flow(ctl_sk, &fl6, NULL, false);
328         if (!IS_ERR(dst)) {
329                 skb_dst_set(skb, dst);
330                 ip6_xmit(ctl_sk, skb, &fl6, NULL, 0);
331                 DCCP_INC_STATS_BH(DCCP_MIB_OUTSEGS);
332                 DCCP_INC_STATS_BH(DCCP_MIB_OUTRSTS);
333                 return;
334         }
335
336         kfree_skb(skb);
337 }
338
339 static struct request_sock_ops dccp6_request_sock_ops = {
340         .family         = AF_INET6,
341         .obj_size       = sizeof(struct dccp6_request_sock),
342         .rtx_syn_ack    = dccp_v6_send_response,
343         .send_ack       = dccp_reqsk_send_ack,
344         .destructor     = dccp_v6_reqsk_destructor,
345         .send_reset     = dccp_v6_ctl_send_reset,
346 };
347
348 static struct sock *dccp_v6_hnd_req(struct sock *sk,struct sk_buff *skb)
349 {
350         const struct dccp_hdr *dh = dccp_hdr(skb);
351         const struct ipv6hdr *iph = ipv6_hdr(skb);
352         struct sock *nsk;
353         struct request_sock **prev;
354         /* Find possible connection requests. */
355         struct request_sock *req = inet6_csk_search_req(sk, &prev,
356                                                         dh->dccph_sport,
357                                                         &iph->saddr,
358                                                         &iph->daddr,
359                                                         inet6_iif(skb));
360         if (req != NULL)
361                 return dccp_check_req(sk, skb, req, prev);
362
363         nsk = __inet6_lookup_established(sock_net(sk), &dccp_hashinfo,
364                                          &iph->saddr, dh->dccph_sport,
365                                          &iph->daddr, ntohs(dh->dccph_dport),
366                                          inet6_iif(skb));
367         if (nsk != NULL) {
368                 if (nsk->sk_state != DCCP_TIME_WAIT) {
369                         bh_lock_sock(nsk);
370                         return nsk;
371                 }
372                 inet_twsk_put(inet_twsk(nsk));
373                 return NULL;
374         }
375
376         return sk;
377 }
378
379 static int dccp_v6_conn_request(struct sock *sk, struct sk_buff *skb)
380 {
381         struct request_sock *req;
382         struct dccp_request_sock *dreq;
383         struct inet6_request_sock *ireq6;
384         struct ipv6_pinfo *np = inet6_sk(sk);
385         const __be32 service = dccp_hdr_request(skb)->dccph_req_service;
386         struct dccp_skb_cb *dcb = DCCP_SKB_CB(skb);
387
388         if (skb->protocol == htons(ETH_P_IP))
389                 return dccp_v4_conn_request(sk, skb);
390
391         if (!ipv6_unicast_destination(skb))
392                 return 0;       /* discard, don't send a reset here */
393
394         if (dccp_bad_service_code(sk, service)) {
395                 dcb->dccpd_reset_code = DCCP_RESET_CODE_BAD_SERVICE_CODE;
396                 goto drop;
397         }
398         /*
399          * There are no SYN attacks on IPv6, yet...
400          */
401         dcb->dccpd_reset_code = DCCP_RESET_CODE_TOO_BUSY;
402         if (inet_csk_reqsk_queue_is_full(sk))
403                 goto drop;
404
405         if (sk_acceptq_is_full(sk) && inet_csk_reqsk_queue_young(sk) > 1)
406                 goto drop;
407
408         req = inet6_reqsk_alloc(&dccp6_request_sock_ops);
409         if (req == NULL)
410                 goto drop;
411
412         if (dccp_reqsk_init(req, dccp_sk(sk), skb))
413                 goto drop_and_free;
414
415         dreq = dccp_rsk(req);
416         if (dccp_parse_options(sk, dreq, skb))
417                 goto drop_and_free;
418
419         if (security_inet_conn_request(sk, skb, req))
420                 goto drop_and_free;
421
422         ireq6 = inet6_rsk(req);
423         ipv6_addr_copy(&ireq6->rmt_addr, &ipv6_hdr(skb)->saddr);
424         ipv6_addr_copy(&ireq6->loc_addr, &ipv6_hdr(skb)->daddr);
425
426         if (ipv6_opt_accepted(sk, skb) ||
427             np->rxopt.bits.rxinfo || np->rxopt.bits.rxoinfo ||
428             np->rxopt.bits.rxhlim || np->rxopt.bits.rxohlim) {
429                 atomic_inc(&skb->users);
430                 ireq6->pktopts = skb;
431         }
432         ireq6->iif = sk->sk_bound_dev_if;
433
434         /* So that link locals have meaning */
435         if (!sk->sk_bound_dev_if &&
436             ipv6_addr_type(&ireq6->rmt_addr) & IPV6_ADDR_LINKLOCAL)
437                 ireq6->iif = inet6_iif(skb);
438
439         /*
440          * Step 3: Process LISTEN state
441          *
442          *   Set S.ISR, S.GSR, S.SWL, S.SWH from packet or Init Cookie
443          *
444          *   In fact we defer setting S.GSR, S.SWL, S.SWH to
445          *   dccp_create_openreq_child.
446          */
447         dreq->dreq_isr     = dcb->dccpd_seq;
448         dreq->dreq_iss     = dccp_v6_init_sequence(skb);
449         dreq->dreq_service = service;
450
451         if (dccp_v6_send_response(sk, req, NULL))
452                 goto drop_and_free;
453
454         inet6_csk_reqsk_queue_hash_add(sk, req, DCCP_TIMEOUT_INIT);
455         return 0;
456
457 drop_and_free:
458         reqsk_free(req);
459 drop:
460         DCCP_INC_STATS_BH(DCCP_MIB_ATTEMPTFAILS);
461         return -1;
462 }
463
464 static struct sock *dccp_v6_request_recv_sock(struct sock *sk,
465                                               struct sk_buff *skb,
466                                               struct request_sock *req,
467                                               struct dst_entry *dst)
468 {
469         struct inet6_request_sock *ireq6 = inet6_rsk(req);
470         struct ipv6_pinfo *newnp, *np = inet6_sk(sk);
471         struct ipv6_txoptions *opt;
472         struct inet_sock *newinet;
473         struct dccp6_sock *newdp6;
474         struct sock *newsk;
475
476         if (skb->protocol == htons(ETH_P_IP)) {
477                 /*
478                  *      v6 mapped
479                  */
480                 newsk = dccp_v4_request_recv_sock(sk, skb, req, dst);
481                 if (newsk == NULL)
482                         return NULL;
483
484                 newdp6 = (struct dccp6_sock *)newsk;
485                 newinet = inet_sk(newsk);
486                 newinet->pinet6 = &newdp6->inet6;
487                 newnp = inet6_sk(newsk);
488
489                 memcpy(newnp, np, sizeof(struct ipv6_pinfo));
490
491                 ipv6_addr_set_v4mapped(newinet->inet_daddr, &newnp->daddr);
492
493                 ipv6_addr_set_v4mapped(newinet->inet_saddr, &newnp->saddr);
494
495                 ipv6_addr_copy(&newnp->rcv_saddr, &newnp->saddr);
496
497                 inet_csk(newsk)->icsk_af_ops = &dccp_ipv6_mapped;
498                 newsk->sk_backlog_rcv = dccp_v4_do_rcv;
499                 newnp->pktoptions  = NULL;
500                 newnp->opt         = NULL;
501                 newnp->mcast_oif   = inet6_iif(skb);
502                 newnp->mcast_hops  = ipv6_hdr(skb)->hop_limit;
503
504                 /*
505                  * No need to charge this sock to the relevant IPv6 refcnt debug socks count
506                  * here, dccp_create_openreq_child now does this for us, see the comment in
507                  * that function for the gory details. -acme
508                  */
509
510                 /* It is tricky place. Until this moment IPv4 tcp
511                    worked with IPv6 icsk.icsk_af_ops.
512                    Sync it now.
513                  */
514                 dccp_sync_mss(newsk, inet_csk(newsk)->icsk_pmtu_cookie);
515
516                 return newsk;
517         }
518
519
520         if (sk_acceptq_is_full(sk))
521                 goto out_overflow;
522
523         if (dst == NULL) {
524                 struct in6_addr *final_p, final;
525                 struct flowi6 fl6;
526
527                 memset(&fl6, 0, sizeof(fl6));
528                 fl6.flowi6_proto = IPPROTO_DCCP;
529                 ipv6_addr_copy(&fl6.daddr, &ireq6->rmt_addr);
530                 final_p = fl6_update_dst(&fl6, np->opt, &final);
531                 ipv6_addr_copy(&fl6.saddr, &ireq6->loc_addr);
532                 fl6.flowi6_oif = sk->sk_bound_dev_if;
533                 fl6.fl6_dport = inet_rsk(req)->rmt_port;
534                 fl6.fl6_sport = inet_rsk(req)->loc_port;
535                 security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
536
537                 dst = ip6_dst_lookup_flow(sk, &fl6, final_p, false);
538                 if (IS_ERR(dst))
539                         goto out;
540         }
541
542         newsk = dccp_create_openreq_child(sk, req, skb);
543         if (newsk == NULL)
544                 goto out_nonewsk;
545
546         /*
547          * No need to charge this sock to the relevant IPv6 refcnt debug socks
548          * count here, dccp_create_openreq_child now does this for us, see the
549          * comment in that function for the gory details. -acme
550          */
551
552         __ip6_dst_store(newsk, dst, NULL, NULL);
553         newsk->sk_route_caps = dst->dev->features & ~(NETIF_F_IP_CSUM |
554                                                       NETIF_F_TSO);
555         newdp6 = (struct dccp6_sock *)newsk;
556         newinet = inet_sk(newsk);
557         newinet->pinet6 = &newdp6->inet6;
558         newnp = inet6_sk(newsk);
559
560         memcpy(newnp, np, sizeof(struct ipv6_pinfo));
561
562         ipv6_addr_copy(&newnp->daddr, &ireq6->rmt_addr);
563         ipv6_addr_copy(&newnp->saddr, &ireq6->loc_addr);
564         ipv6_addr_copy(&newnp->rcv_saddr, &ireq6->loc_addr);
565         newsk->sk_bound_dev_if = ireq6->iif;
566
567         /* Now IPv6 options...
568
569            First: no IPv4 options.
570          */
571         newinet->inet_opt = NULL;
572
573         /* Clone RX bits */
574         newnp->rxopt.all = np->rxopt.all;
575
576         /* Clone pktoptions received with SYN */
577         newnp->pktoptions = NULL;
578         if (ireq6->pktopts != NULL) {
579                 newnp->pktoptions = skb_clone(ireq6->pktopts, GFP_ATOMIC);
580                 kfree_skb(ireq6->pktopts);
581                 ireq6->pktopts = NULL;
582                 if (newnp->pktoptions)
583                         skb_set_owner_r(newnp->pktoptions, newsk);
584         }
585         newnp->opt        = NULL;
586         newnp->mcast_oif  = inet6_iif(skb);
587         newnp->mcast_hops = ipv6_hdr(skb)->hop_limit;
588
589         /*
590          * Clone native IPv6 options from listening socket (if any)
591          *
592          * Yes, keeping reference count would be much more clever, but we make
593          * one more one thing there: reattach optmem to newsk.
594          */
595         opt = rcu_dereference(np->opt);
596         if (opt) {
597                 opt = ipv6_dup_options(newsk, opt);
598                 RCU_INIT_POINTER(newnp->opt, opt);
599         }
600         inet_csk(newsk)->icsk_ext_hdr_len = 0;
601         if (opt)
602                 inet_csk(newsk)->icsk_ext_hdr_len = opt->opt_nflen +
603                                                     opt->opt_flen;
604
605         dccp_sync_mss(newsk, dst_mtu(dst));
606
607         newinet->inet_daddr = newinet->inet_saddr = LOOPBACK4_IPV6;
608         newinet->inet_rcv_saddr = LOOPBACK4_IPV6;
609
610         if (__inet_inherit_port(sk, newsk) < 0) {
611                 inet_csk_prepare_forced_close(newsk);
612                 dccp_done(newsk);
613                 goto out;
614         }
615         __inet6_hash(newsk, NULL);
616
617         return newsk;
618
619 out_overflow:
620         NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENOVERFLOWS);
621 out_nonewsk:
622         dst_release(dst);
623 out:
624         NET_INC_STATS_BH(sock_net(sk), LINUX_MIB_LISTENDROPS);
625         return NULL;
626 }
627
628 /* The socket must have it's spinlock held when we get
629  * here.
630  *
631  * We have a potential double-lock case here, so even when
632  * doing backlog processing we use the BH locking scheme.
633  * This is because we cannot sleep with the original spinlock
634  * held.
635  */
636 static int dccp_v6_do_rcv(struct sock *sk, struct sk_buff *skb)
637 {
638         struct ipv6_pinfo *np = inet6_sk(sk);
639         struct sk_buff *opt_skb = NULL;
640
641         /* Imagine: socket is IPv6. IPv4 packet arrives,
642            goes to IPv4 receive handler and backlogged.
643            From backlog it always goes here. Kerboom...
644            Fortunately, dccp_rcv_established and rcv_established
645            handle them correctly, but it is not case with
646            dccp_v6_hnd_req and dccp_v6_ctl_send_reset().   --ANK
647          */
648
649         if (skb->protocol == htons(ETH_P_IP))
650                 return dccp_v4_do_rcv(sk, skb);
651
652         if (sk_filter(sk, skb))
653                 goto discard;
654
655         /*
656          * socket locking is here for SMP purposes as backlog rcv is currently
657          * called with bh processing disabled.
658          */
659
660         /* Do Stevens' IPV6_PKTOPTIONS.
661
662            Yes, guys, it is the only place in our code, where we
663            may make it not affecting IPv4.
664            The rest of code is protocol independent,
665            and I do not like idea to uglify IPv4.
666
667            Actually, all the idea behind IPV6_PKTOPTIONS
668            looks not very well thought. For now we latch
669            options, received in the last packet, enqueued
670            by tcp. Feel free to propose better solution.
671                                                --ANK (980728)
672          */
673         if (np->rxopt.all)
674         /*
675          * FIXME: Add handling of IPV6_PKTOPTIONS skb. See the comments below
676          *        (wrt ipv6_pktopions) and net/ipv6/tcp_ipv6.c for an example.
677          */
678                 opt_skb = skb_clone(skb, GFP_ATOMIC);
679
680         if (sk->sk_state == DCCP_OPEN) { /* Fast path */
681                 if (dccp_rcv_established(sk, skb, dccp_hdr(skb), skb->len))
682                         goto reset;
683                 if (opt_skb) {
684                         /* XXX This is where we would goto ipv6_pktoptions. */
685                         __kfree_skb(opt_skb);
686                 }
687                 return 0;
688         }
689
690         /*
691          *  Step 3: Process LISTEN state
692          *     If S.state == LISTEN,
693          *       If P.type == Request or P contains a valid Init Cookie option,
694          *            (* Must scan the packet's options to check for Init
695          *               Cookies.  Only Init Cookies are processed here,
696          *               however; other options are processed in Step 8.  This
697          *               scan need only be performed if the endpoint uses Init
698          *               Cookies *)
699          *            (* Generate a new socket and switch to that socket *)
700          *            Set S := new socket for this port pair
701          *            S.state = RESPOND
702          *            Choose S.ISS (initial seqno) or set from Init Cookies
703          *            Initialize S.GAR := S.ISS
704          *            Set S.ISR, S.GSR, S.SWL, S.SWH from packet or Init Cookies
705          *            Continue with S.state == RESPOND
706          *            (* A Response packet will be generated in Step 11 *)
707          *       Otherwise,
708          *            Generate Reset(No Connection) unless P.type == Reset
709          *            Drop packet and return
710          *
711          * NOTE: the check for the packet types is done in
712          *       dccp_rcv_state_process
713          */
714         if (sk->sk_state == DCCP_LISTEN) {
715                 struct sock *nsk = dccp_v6_hnd_req(sk, skb);
716
717                 if (nsk == NULL)
718                         goto discard;
719                 /*
720                  * Queue it on the new socket if the new socket is active,
721                  * otherwise we just shortcircuit this and continue with
722                  * the new socket..
723                  */
724                 if (nsk != sk) {
725                         if (dccp_child_process(sk, nsk, skb))
726                                 goto reset;
727                         if (opt_skb != NULL)
728                                 __kfree_skb(opt_skb);
729                         return 0;
730                 }
731         }
732
733         if (dccp_rcv_state_process(sk, skb, dccp_hdr(skb), skb->len))
734                 goto reset;
735         if (opt_skb) {
736                 /* XXX This is where we would goto ipv6_pktoptions. */
737                 __kfree_skb(opt_skb);
738         }
739         return 0;
740
741 reset:
742         dccp_v6_ctl_send_reset(sk, skb);
743 discard:
744         if (opt_skb != NULL)
745                 __kfree_skb(opt_skb);
746         kfree_skb(skb);
747         return 0;
748 }
749
750 static int dccp_v6_rcv(struct sk_buff *skb)
751 {
752         const struct dccp_hdr *dh;
753         struct sock *sk;
754         int min_cov;
755
756         /* Step 1: Check header basics */
757
758         if (dccp_invalid_packet(skb))
759                 goto discard_it;
760
761         /* Step 1: If header checksum is incorrect, drop packet and return. */
762         if (dccp_v6_csum_finish(skb, &ipv6_hdr(skb)->saddr,
763                                      &ipv6_hdr(skb)->daddr)) {
764                 DCCP_WARN("dropped packet with invalid checksum\n");
765                 goto discard_it;
766         }
767
768         dh = dccp_hdr(skb);
769
770         DCCP_SKB_CB(skb)->dccpd_seq  = dccp_hdr_seq(dh);
771         DCCP_SKB_CB(skb)->dccpd_type = dh->dccph_type;
772
773         if (dccp_packet_without_ack(skb))
774                 DCCP_SKB_CB(skb)->dccpd_ack_seq = DCCP_PKT_WITHOUT_ACK_SEQ;
775         else
776                 DCCP_SKB_CB(skb)->dccpd_ack_seq = dccp_hdr_ack_seq(skb);
777
778         /* Step 2:
779          *      Look up flow ID in table and get corresponding socket */
780         sk = __inet6_lookup_skb(&dccp_hashinfo, skb,
781                                 dh->dccph_sport, dh->dccph_dport);
782         /*
783          * Step 2:
784          *      If no socket ...
785          */
786         if (sk == NULL) {
787                 dccp_pr_debug("failed to look up flow ID in table and "
788                               "get corresponding socket\n");
789                 goto no_dccp_socket;
790         }
791
792         /*
793          * Step 2:
794          *      ... or S.state == TIMEWAIT,
795          *              Generate Reset(No Connection) unless P.type == Reset
796          *              Drop packet and return
797          */
798         if (sk->sk_state == DCCP_TIME_WAIT) {
799                 dccp_pr_debug("sk->sk_state == DCCP_TIME_WAIT: do_time_wait\n");
800                 inet_twsk_put(inet_twsk(sk));
801                 goto no_dccp_socket;
802         }
803
804         /*
805          * RFC 4340, sec. 9.2.1: Minimum Checksum Coverage
806          *      o if MinCsCov = 0, only packets with CsCov = 0 are accepted
807          *      o if MinCsCov > 0, also accept packets with CsCov >= MinCsCov
808          */
809         min_cov = dccp_sk(sk)->dccps_pcrlen;
810         if (dh->dccph_cscov  &&  (min_cov == 0 || dh->dccph_cscov < min_cov))  {
811                 dccp_pr_debug("Packet CsCov %d does not satisfy MinCsCov %d\n",
812                               dh->dccph_cscov, min_cov);
813                 /* FIXME: send Data Dropped option (see also dccp_v4_rcv) */
814                 goto discard_and_relse;
815         }
816
817         if (!xfrm6_policy_check(sk, XFRM_POLICY_IN, skb))
818                 goto discard_and_relse;
819
820         return sk_receive_skb(sk, skb, 1) ? -1 : 0;
821
822 no_dccp_socket:
823         if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb))
824                 goto discard_it;
825         /*
826          * Step 2:
827          *      If no socket ...
828          *              Generate Reset(No Connection) unless P.type == Reset
829          *              Drop packet and return
830          */
831         if (dh->dccph_type != DCCP_PKT_RESET) {
832                 DCCP_SKB_CB(skb)->dccpd_reset_code =
833                                         DCCP_RESET_CODE_NO_CONNECTION;
834                 dccp_v6_ctl_send_reset(sk, skb);
835         }
836
837 discard_it:
838         kfree_skb(skb);
839         return 0;
840
841 discard_and_relse:
842         sock_put(sk);
843         goto discard_it;
844 }
845
846 static int dccp_v6_connect(struct sock *sk, struct sockaddr *uaddr,
847                            int addr_len)
848 {
849         struct sockaddr_in6 *usin = (struct sockaddr_in6 *)uaddr;
850         struct inet_connection_sock *icsk = inet_csk(sk);
851         struct inet_sock *inet = inet_sk(sk);
852         struct ipv6_pinfo *np = inet6_sk(sk);
853         struct dccp_sock *dp = dccp_sk(sk);
854         struct in6_addr *saddr = NULL, *final_p, final;
855         struct ipv6_txoptions *opt;
856         struct flowi6 fl6;
857         struct dst_entry *dst;
858         int addr_type;
859         int err;
860
861         dp->dccps_role = DCCP_ROLE_CLIENT;
862
863         if (addr_len < SIN6_LEN_RFC2133)
864                 return -EINVAL;
865
866         if (usin->sin6_family != AF_INET6)
867                 return -EAFNOSUPPORT;
868
869         memset(&fl6, 0, sizeof(fl6));
870
871         if (np->sndflow) {
872                 fl6.flowlabel = usin->sin6_flowinfo & IPV6_FLOWINFO_MASK;
873                 IP6_ECN_flow_init(fl6.flowlabel);
874                 if (fl6.flowlabel & IPV6_FLOWLABEL_MASK) {
875                         struct ip6_flowlabel *flowlabel;
876                         flowlabel = fl6_sock_lookup(sk, fl6.flowlabel);
877                         if (flowlabel == NULL)
878                                 return -EINVAL;
879                         ipv6_addr_copy(&usin->sin6_addr, &flowlabel->dst);
880                         fl6_sock_release(flowlabel);
881                 }
882         }
883         /*
884          * connect() to INADDR_ANY means loopback (BSD'ism).
885          */
886         if (ipv6_addr_any(&usin->sin6_addr))
887                 usin->sin6_addr.s6_addr[15] = 1;
888
889         addr_type = ipv6_addr_type(&usin->sin6_addr);
890
891         if (addr_type & IPV6_ADDR_MULTICAST)
892                 return -ENETUNREACH;
893
894         if (addr_type & IPV6_ADDR_LINKLOCAL) {
895                 if (addr_len >= sizeof(struct sockaddr_in6) &&
896                     usin->sin6_scope_id) {
897                         /* If interface is set while binding, indices
898                          * must coincide.
899                          */
900                         if (sk->sk_bound_dev_if &&
901                             sk->sk_bound_dev_if != usin->sin6_scope_id)
902                                 return -EINVAL;
903
904                         sk->sk_bound_dev_if = usin->sin6_scope_id;
905                 }
906
907                 /* Connect to link-local address requires an interface */
908                 if (!sk->sk_bound_dev_if)
909                         return -EINVAL;
910         }
911
912         ipv6_addr_copy(&np->daddr, &usin->sin6_addr);
913         np->flow_label = fl6.flowlabel;
914
915         /*
916          * DCCP over IPv4
917          */
918         if (addr_type == IPV6_ADDR_MAPPED) {
919                 u32 exthdrlen = icsk->icsk_ext_hdr_len;
920                 struct sockaddr_in sin;
921
922                 SOCK_DEBUG(sk, "connect: ipv4 mapped\n");
923
924                 if (__ipv6_only_sock(sk))
925                         return -ENETUNREACH;
926
927                 sin.sin_family = AF_INET;
928                 sin.sin_port = usin->sin6_port;
929                 sin.sin_addr.s_addr = usin->sin6_addr.s6_addr32[3];
930
931                 icsk->icsk_af_ops = &dccp_ipv6_mapped;
932                 sk->sk_backlog_rcv = dccp_v4_do_rcv;
933
934                 err = dccp_v4_connect(sk, (struct sockaddr *)&sin, sizeof(sin));
935                 if (err) {
936                         icsk->icsk_ext_hdr_len = exthdrlen;
937                         icsk->icsk_af_ops = &dccp_ipv6_af_ops;
938                         sk->sk_backlog_rcv = dccp_v6_do_rcv;
939                         goto failure;
940                 }
941                 ipv6_addr_set_v4mapped(inet->inet_saddr, &np->saddr);
942                 ipv6_addr_set_v4mapped(inet->inet_rcv_saddr, &np->rcv_saddr);
943
944                 return err;
945         }
946
947         if (!ipv6_addr_any(&np->rcv_saddr))
948                 saddr = &np->rcv_saddr;
949
950         fl6.flowi6_proto = IPPROTO_DCCP;
951         ipv6_addr_copy(&fl6.daddr, &np->daddr);
952         ipv6_addr_copy(&fl6.saddr, saddr ? saddr : &np->saddr);
953         fl6.flowi6_oif = sk->sk_bound_dev_if;
954         fl6.fl6_dport = usin->sin6_port;
955         fl6.fl6_sport = inet->inet_sport;
956         security_sk_classify_flow(sk, flowi6_to_flowi(&fl6));
957
958         opt = rcu_dereference_protected(np->opt, sock_owned_by_user(sk));
959         final_p = fl6_update_dst(&fl6, opt, &final);
960
961         dst = ip6_dst_lookup_flow(sk, &fl6, final_p, true);
962         if (IS_ERR(dst)) {
963                 err = PTR_ERR(dst);
964                 goto failure;
965         }
966
967         if (saddr == NULL) {
968                 saddr = &fl6.saddr;
969                 ipv6_addr_copy(&np->rcv_saddr, saddr);
970         }
971
972         /* set the source address */
973         ipv6_addr_copy(&np->saddr, saddr);
974         inet->inet_rcv_saddr = LOOPBACK4_IPV6;
975
976         __ip6_dst_store(sk, dst, NULL, NULL);
977
978         icsk->icsk_ext_hdr_len = 0;
979         if (opt)
980                 icsk->icsk_ext_hdr_len = opt->opt_flen + opt->opt_nflen;
981
982         inet->inet_dport = usin->sin6_port;
983
984         dccp_set_state(sk, DCCP_REQUESTING);
985         err = inet6_hash_connect(&dccp_death_row, sk);
986         if (err)
987                 goto late_failure;
988
989         dp->dccps_iss = secure_dccpv6_sequence_number(np->saddr.s6_addr32,
990                                                       np->daddr.s6_addr32,
991                                                       inet->inet_sport,
992                                                       inet->inet_dport);
993         err = dccp_connect(sk);
994         if (err)
995                 goto late_failure;
996
997         return 0;
998
999 late_failure:
1000         dccp_set_state(sk, DCCP_CLOSED);
1001         __sk_dst_reset(sk);
1002 failure:
1003         inet->inet_dport = 0;
1004         sk->sk_route_caps = 0;
1005         return err;
1006 }
1007
1008 static const struct inet_connection_sock_af_ops dccp_ipv6_af_ops = {
1009         .queue_xmit        = inet6_csk_xmit,
1010         .send_check        = dccp_v6_send_check,
1011         .rebuild_header    = inet6_sk_rebuild_header,
1012         .conn_request      = dccp_v6_conn_request,
1013         .syn_recv_sock     = dccp_v6_request_recv_sock,
1014         .net_header_len    = sizeof(struct ipv6hdr),
1015         .setsockopt        = ipv6_setsockopt,
1016         .getsockopt        = ipv6_getsockopt,
1017         .addr2sockaddr     = inet6_csk_addr2sockaddr,
1018         .sockaddr_len      = sizeof(struct sockaddr_in6),
1019         .bind_conflict     = inet6_csk_bind_conflict,
1020 #ifdef CONFIG_COMPAT
1021         .compat_setsockopt = compat_ipv6_setsockopt,
1022         .compat_getsockopt = compat_ipv6_getsockopt,
1023 #endif
1024 };
1025
1026 /*
1027  *      DCCP over IPv4 via INET6 API
1028  */
1029 static const struct inet_connection_sock_af_ops dccp_ipv6_mapped = {
1030         .queue_xmit        = ip_queue_xmit,
1031         .send_check        = dccp_v4_send_check,
1032         .rebuild_header    = inet_sk_rebuild_header,
1033         .conn_request      = dccp_v6_conn_request,
1034         .syn_recv_sock     = dccp_v6_request_recv_sock,
1035         .net_header_len    = sizeof(struct iphdr),
1036         .setsockopt        = ipv6_setsockopt,
1037         .getsockopt        = ipv6_getsockopt,
1038         .addr2sockaddr     = inet6_csk_addr2sockaddr,
1039         .sockaddr_len      = sizeof(struct sockaddr_in6),
1040 #ifdef CONFIG_COMPAT
1041         .compat_setsockopt = compat_ipv6_setsockopt,
1042         .compat_getsockopt = compat_ipv6_getsockopt,
1043 #endif
1044 };
1045
1046 /* NOTE: A lot of things set to zero explicitly by call to
1047  *       sk_alloc() so need not be done here.
1048  */
1049 static int dccp_v6_init_sock(struct sock *sk)
1050 {
1051         static __u8 dccp_v6_ctl_sock_initialized;
1052         int err = dccp_init_sock(sk, dccp_v6_ctl_sock_initialized);
1053
1054         if (err == 0) {
1055                 if (unlikely(!dccp_v6_ctl_sock_initialized))
1056                         dccp_v6_ctl_sock_initialized = 1;
1057                 inet_csk(sk)->icsk_af_ops = &dccp_ipv6_af_ops;
1058         }
1059
1060         return err;
1061 }
1062
1063 static void dccp_v6_destroy_sock(struct sock *sk)
1064 {
1065         dccp_destroy_sock(sk);
1066         inet6_destroy_sock(sk);
1067 }
1068
1069 static struct timewait_sock_ops dccp6_timewait_sock_ops = {
1070         .twsk_obj_size  = sizeof(struct dccp6_timewait_sock),
1071 };
1072
1073 static struct proto dccp_v6_prot = {
1074         .name              = "DCCPv6",
1075         .owner             = THIS_MODULE,
1076         .close             = dccp_close,
1077         .connect           = dccp_v6_connect,
1078         .disconnect        = dccp_disconnect,
1079         .ioctl             = dccp_ioctl,
1080         .init              = dccp_v6_init_sock,
1081         .setsockopt        = dccp_setsockopt,
1082         .getsockopt        = dccp_getsockopt,
1083         .sendmsg           = dccp_sendmsg,
1084         .recvmsg           = dccp_recvmsg,
1085         .backlog_rcv       = dccp_v6_do_rcv,
1086         .hash              = dccp_v6_hash,
1087         .unhash            = inet_unhash,
1088         .accept            = inet_csk_accept,
1089         .get_port          = inet_csk_get_port,
1090         .shutdown          = dccp_shutdown,
1091         .destroy           = dccp_v6_destroy_sock,
1092         .orphan_count      = &dccp_orphan_count,
1093         .max_header        = MAX_DCCP_HEADER,
1094         .obj_size          = sizeof(struct dccp6_sock),
1095         .slab_flags        = SLAB_DESTROY_BY_RCU,
1096         .rsk_prot          = &dccp6_request_sock_ops,
1097         .twsk_prot         = &dccp6_timewait_sock_ops,
1098         .h.hashinfo        = &dccp_hashinfo,
1099 #ifdef CONFIG_COMPAT
1100         .compat_setsockopt = compat_dccp_setsockopt,
1101         .compat_getsockopt = compat_dccp_getsockopt,
1102 #endif
1103 };
1104
1105 static const struct inet6_protocol dccp_v6_protocol = {
1106         .handler        = dccp_v6_rcv,
1107         .err_handler    = dccp_v6_err,
1108         .flags          = INET6_PROTO_NOPOLICY | INET6_PROTO_FINAL,
1109 };
1110
1111 static const struct proto_ops inet6_dccp_ops = {
1112         .family            = PF_INET6,
1113         .owner             = THIS_MODULE,
1114         .release           = inet6_release,
1115         .bind              = inet6_bind,
1116         .connect           = inet_stream_connect,
1117         .socketpair        = sock_no_socketpair,
1118         .accept            = inet_accept,
1119         .getname           = inet6_getname,
1120         .poll              = dccp_poll,
1121         .ioctl             = inet6_ioctl,
1122         .listen            = inet_dccp_listen,
1123         .shutdown          = inet_shutdown,
1124         .setsockopt        = sock_common_setsockopt,
1125         .getsockopt        = sock_common_getsockopt,
1126         .sendmsg           = inet_sendmsg,
1127         .recvmsg           = sock_common_recvmsg,
1128         .mmap              = sock_no_mmap,
1129         .sendpage          = sock_no_sendpage,
1130 #ifdef CONFIG_COMPAT
1131         .compat_setsockopt = compat_sock_common_setsockopt,
1132         .compat_getsockopt = compat_sock_common_getsockopt,
1133 #endif
1134 };
1135
1136 static struct inet_protosw dccp_v6_protosw = {
1137         .type           = SOCK_DCCP,
1138         .protocol       = IPPROTO_DCCP,
1139         .prot           = &dccp_v6_prot,
1140         .ops            = &inet6_dccp_ops,
1141         .flags          = INET_PROTOSW_ICSK,
1142 };
1143
1144 static int __net_init dccp_v6_init_net(struct net *net)
1145 {
1146         if (dccp_hashinfo.bhash == NULL)
1147                 return -ESOCKTNOSUPPORT;
1148
1149         return inet_ctl_sock_create(&net->dccp.v6_ctl_sk, PF_INET6,
1150                                     SOCK_DCCP, IPPROTO_DCCP, net);
1151 }
1152
1153 static void __net_exit dccp_v6_exit_net(struct net *net)
1154 {
1155         inet_ctl_sock_destroy(net->dccp.v6_ctl_sk);
1156 }
1157
1158 static struct pernet_operations dccp_v6_ops = {
1159         .init   = dccp_v6_init_net,
1160         .exit   = dccp_v6_exit_net,
1161 };
1162
1163 static int __init dccp_v6_init(void)
1164 {
1165         int err = proto_register(&dccp_v6_prot, 1);
1166
1167         if (err != 0)
1168                 goto out;
1169
1170         err = inet6_add_protocol(&dccp_v6_protocol, IPPROTO_DCCP);
1171         if (err != 0)
1172                 goto out_unregister_proto;
1173
1174         inet6_register_protosw(&dccp_v6_protosw);
1175
1176         err = register_pernet_subsys(&dccp_v6_ops);
1177         if (err != 0)
1178                 goto out_destroy_ctl_sock;
1179 out:
1180         return err;
1181
1182 out_destroy_ctl_sock:
1183         inet6_del_protocol(&dccp_v6_protocol, IPPROTO_DCCP);
1184         inet6_unregister_protosw(&dccp_v6_protosw);
1185 out_unregister_proto:
1186         proto_unregister(&dccp_v6_prot);
1187         goto out;
1188 }
1189
1190 static void __exit dccp_v6_exit(void)
1191 {
1192         unregister_pernet_subsys(&dccp_v6_ops);
1193         inet6_del_protocol(&dccp_v6_protocol, IPPROTO_DCCP);
1194         inet6_unregister_protosw(&dccp_v6_protosw);
1195         proto_unregister(&dccp_v6_prot);
1196 }
1197
1198 module_init(dccp_v6_init);
1199 module_exit(dccp_v6_exit);
1200
1201 /*
1202  * __stringify doesn't likes enums, so use SOCK_DCCP (6) and IPPROTO_DCCP (33)
1203  * values directly, Also cover the case where the protocol is not specified,
1204  * i.e. net-pf-PF_INET6-proto-0-type-SOCK_DCCP
1205  */
1206 MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_INET6, 33, 6);
1207 MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_INET6, 0, 6);
1208 MODULE_LICENSE("GPL");
1209 MODULE_AUTHOR("Arnaldo Carvalho de Melo <acme@mandriva.com>");
1210 MODULE_DESCRIPTION("DCCPv6 - Datagram Congestion Controlled Protocol");