blob: 39e5e75ea5728f7799c7b5abf1ecf986314877e4 [file] [log] [blame]
Marco Varlese191a5942017-10-30 18:17:21 +01001/*
2 * Copyright (c) 2017 SUSE LLC.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15#include <vnet/sctp/sctp.h>
16#include <vnet/sctp/sctp_debug.h>
17#include <vppinfra/random.h>
Marco Varlese91389ac2018-01-31 11:00:01 +010018#include <openssl/hmac.h>
Marco Varlese191a5942017-10-30 18:17:21 +010019
20vlib_node_registration_t sctp4_output_node;
21vlib_node_registration_t sctp6_output_node;
22
23typedef enum _sctp_output_next
24{
25 SCTP_OUTPUT_NEXT_DROP,
26 SCTP_OUTPUT_NEXT_IP_LOOKUP,
27 SCTP_OUTPUT_N_NEXT
28} sctp_output_next_t;
29
30#define foreach_sctp4_output_next \
31 _ (DROP, "error-drop") \
32 _ (IP_LOOKUP, "ip4-lookup")
33
34#define foreach_sctp6_output_next \
35 _ (DROP, "error-drop") \
36 _ (IP_LOOKUP, "ip6-lookup")
37
38static char *sctp_error_strings[] = {
39#define sctp_error(n,s) s,
40#include <vnet/sctp/sctp_error.def>
41#undef sctp_error
42};
43
44typedef struct
45{
46 sctp_header_t sctp_header;
47 sctp_connection_t sctp_connection;
48} sctp_tx_trace_t;
49
50/**
51 * Flush tx frame populated by retransmits and timer pops
52 */
53void
54sctp_flush_frame_to_output (vlib_main_t * vm, u8 thread_index, u8 is_ip4)
55{
56 if (sctp_main.tx_frames[!is_ip4][thread_index])
57 {
58 u32 next_index;
59 next_index = is_ip4 ? sctp4_output_node.index : sctp6_output_node.index;
60 vlib_put_frame_to_node (vm, next_index,
61 sctp_main.tx_frames[!is_ip4][thread_index]);
62 sctp_main.tx_frames[!is_ip4][thread_index] = 0;
63 }
64}
65
66/**
67 * Flush ip lookup tx frames populated by timer pops
68 */
69always_inline void
70sctp_flush_frame_to_ip_lookup (vlib_main_t * vm, u8 thread_index, u8 is_ip4)
71{
72 if (sctp_main.ip_lookup_tx_frames[!is_ip4][thread_index])
73 {
74 u32 next_index;
75 next_index = is_ip4 ? ip4_lookup_node.index : ip6_lookup_node.index;
76 vlib_put_frame_to_node (vm, next_index,
77 sctp_main.ip_lookup_tx_frames[!is_ip4]
78 [thread_index]);
79 sctp_main.ip_lookup_tx_frames[!is_ip4][thread_index] = 0;
80 }
81}
82
83/**
84 * Flush v4 and v6 sctp and ip-lookup tx frames for thread index
85 */
86void
87sctp_flush_frames_to_output (u8 thread_index)
88{
89 vlib_main_t *vm = vlib_get_main ();
90 sctp_flush_frame_to_output (vm, thread_index, 1);
91 sctp_flush_frame_to_output (vm, thread_index, 0);
92 sctp_flush_frame_to_ip_lookup (vm, thread_index, 1);
93 sctp_flush_frame_to_ip_lookup (vm, thread_index, 0);
94}
95
96u32
97ip4_sctp_compute_checksum (vlib_main_t * vm, vlib_buffer_t * p0,
98 ip4_header_t * ip0)
99{
100 ip_csum_t checksum;
101 u32 ip_header_length, payload_length_host_byte_order;
102 u32 n_this_buffer, n_bytes_left, n_ip_bytes_this_buffer;
103 void *data_this_buffer;
104
105 /* Initialize checksum with ip header. */
106 ip_header_length = ip4_header_bytes (ip0);
107 payload_length_host_byte_order =
108 clib_net_to_host_u16 (ip0->length) - ip_header_length;
109 checksum =
110 clib_host_to_net_u32 (payload_length_host_byte_order +
111 (ip0->protocol << 16));
112
113 if (BITS (uword) == 32)
114 {
115 checksum =
116 ip_csum_with_carry (checksum,
117 clib_mem_unaligned (&ip0->src_address, u32));
118 checksum =
119 ip_csum_with_carry (checksum,
120 clib_mem_unaligned (&ip0->dst_address, u32));
121 }
122 else
123 checksum =
124 ip_csum_with_carry (checksum,
125 clib_mem_unaligned (&ip0->src_address, u64));
126
127 n_bytes_left = n_this_buffer = payload_length_host_byte_order;
128 data_this_buffer = (void *) ip0 + ip_header_length;
129 n_ip_bytes_this_buffer =
130 p0->current_length - (((u8 *) ip0 - p0->data) - p0->current_data);
131 if (n_this_buffer + ip_header_length > n_ip_bytes_this_buffer)
132 {
133 n_this_buffer = n_ip_bytes_this_buffer > ip_header_length ?
134 n_ip_bytes_this_buffer - ip_header_length : 0;
135 }
136 while (1)
137 {
138 checksum =
139 ip_incremental_checksum (checksum, data_this_buffer, n_this_buffer);
140 n_bytes_left -= n_this_buffer;
141 if (n_bytes_left == 0)
142 break;
143
144 ASSERT (p0->flags & VLIB_BUFFER_NEXT_PRESENT);
145 p0 = vlib_get_buffer (vm, p0->next_buffer);
146 data_this_buffer = vlib_buffer_get_current (p0);
147 n_this_buffer = p0->current_length;
148 }
149
150 return checksum;
151}
152
153u32
154ip6_sctp_compute_checksum (vlib_main_t * vm, vlib_buffer_t * p0,
155 ip6_header_t * ip0, int *bogus_lengthp)
156{
157 ip_csum_t checksum;
158 u16 payload_length_host_byte_order;
159 u32 i, n_this_buffer, n_bytes_left;
160 u32 headers_size = sizeof (ip0[0]);
161 void *data_this_buffer;
162
163 ASSERT (bogus_lengthp);
164 *bogus_lengthp = 0;
165
166 /* Initialize checksum with ip header. */
167 checksum = ip0->payload_length + clib_host_to_net_u16 (ip0->protocol);
168 payload_length_host_byte_order = clib_net_to_host_u16 (ip0->payload_length);
169 data_this_buffer = (void *) (ip0 + 1);
170
171 for (i = 0; i < ARRAY_LEN (ip0->src_address.as_uword); i++)
172 {
173 checksum = ip_csum_with_carry (checksum,
174 clib_mem_unaligned (&ip0->
175 src_address.as_uword
176 [i], uword));
177 checksum =
178 ip_csum_with_carry (checksum,
179 clib_mem_unaligned (&ip0->dst_address.as_uword[i],
180 uword));
181 }
182
183 /* some icmp packets may come with a "router alert" hop-by-hop extension header (e.g., mldv2 packets)
184 * or UDP-Ping packets */
185 if (PREDICT_FALSE (ip0->protocol == IP_PROTOCOL_IP6_HOP_BY_HOP_OPTIONS))
186 {
187 u32 skip_bytes;
188 ip6_hop_by_hop_ext_t *ext_hdr =
189 (ip6_hop_by_hop_ext_t *) data_this_buffer;
190
191 /* validate really icmp6 next */
192 ASSERT ((ext_hdr->next_hdr == IP_PROTOCOL_SCTP));
193
194 skip_bytes = 8 * (1 + ext_hdr->n_data_u64s);
195 data_this_buffer = (void *) ((u8 *) data_this_buffer + skip_bytes);
196
197 payload_length_host_byte_order -= skip_bytes;
198 headers_size += skip_bytes;
199 }
200
201 n_bytes_left = n_this_buffer = payload_length_host_byte_order;
202 if (p0 && n_this_buffer + headers_size > p0->current_length)
203 n_this_buffer =
204 p0->current_length >
205 headers_size ? p0->current_length - headers_size : 0;
206 while (1)
207 {
208 checksum =
209 ip_incremental_checksum (checksum, data_this_buffer, n_this_buffer);
210 n_bytes_left -= n_this_buffer;
211 if (n_bytes_left == 0)
212 break;
213
214 if (!(p0->flags & VLIB_BUFFER_NEXT_PRESENT))
215 {
216 *bogus_lengthp = 1;
217 return 0xfefe;
218 }
219 p0 = vlib_get_buffer (vm, p0->next_buffer);
220 data_this_buffer = vlib_buffer_get_current (p0);
221 n_this_buffer = p0->current_length;
222 }
223
224 return checksum;
225}
226
227void
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100228sctp_push_ip_hdr (sctp_main_t * tm, sctp_sub_connection_t * sctp_sub_conn,
Marco Varlese191a5942017-10-30 18:17:21 +0100229 vlib_buffer_t * b)
230{
231 sctp_header_t *th = vlib_buffer_get_current (b);
232 vlib_main_t *vm = vlib_get_main ();
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100233 if (sctp_sub_conn->c_is_ip4)
Marco Varlese191a5942017-10-30 18:17:21 +0100234 {
235 ip4_header_t *ih;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100236 ih = vlib_buffer_push_ip4 (vm, b, &sctp_sub_conn->c_lcl_ip4,
237 &sctp_sub_conn->c_rmt_ip4, IP_PROTOCOL_SCTP,
238 1);
Marco Varlese191a5942017-10-30 18:17:21 +0100239 th->checksum = ip4_sctp_compute_checksum (vm, b, ih);
240 }
241 else
242 {
243 ip6_header_t *ih;
244 int bogus = ~0;
245
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100246 ih = vlib_buffer_push_ip6 (vm, b, &sctp_sub_conn->c_lcl_ip6,
247 &sctp_sub_conn->c_rmt_ip6, IP_PROTOCOL_SCTP);
Marco Varlese191a5942017-10-30 18:17:21 +0100248 th->checksum = ip6_sctp_compute_checksum (vm, b, ih, &bogus);
249 ASSERT (!bogus);
250 }
251}
252
253always_inline void *
254sctp_reuse_buffer (vlib_main_t * vm, vlib_buffer_t * b)
255{
256 if (b->flags & VLIB_BUFFER_NEXT_PRESENT)
257 vlib_buffer_free_one (vm, b->next_buffer);
258 /* Zero all flags but free list index and trace flag */
259 b->flags &= VLIB_BUFFER_NEXT_PRESENT - 1;
260 b->current_data = 0;
261 b->current_length = 0;
262 b->total_length_not_including_first_buffer = 0;
263 vnet_buffer (b)->sctp.flags = 0;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100264 vnet_buffer (b)->sctp.subconn_idx = MAX_SCTP_CONNECTIONS;
Marco Varlese191a5942017-10-30 18:17:21 +0100265
266 /* Leave enough space for headers */
267 return vlib_buffer_make_headroom (b, MAX_HDRS_LEN);
268}
269
270always_inline void *
271sctp_init_buffer (vlib_main_t * vm, vlib_buffer_t * b)
272{
273 ASSERT ((b->flags & VLIB_BUFFER_NEXT_PRESENT) == 0);
Damjan Mariondac03522018-02-01 15:30:13 +0100274 b->flags &= VLIB_BUFFER_NON_DEFAULT_FREELIST;
Marco Varlese191a5942017-10-30 18:17:21 +0100275 b->flags |= VNET_BUFFER_F_LOCALLY_ORIGINATED;
276 b->total_length_not_including_first_buffer = 0;
277 vnet_buffer (b)->sctp.flags = 0;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100278 vnet_buffer (b)->sctp.subconn_idx = MAX_SCTP_CONNECTIONS;
Marco Varlese191a5942017-10-30 18:17:21 +0100279 VLIB_BUFFER_TRACE_TRAJECTORY_INIT (b);
280 /* Leave enough space for headers */
281 return vlib_buffer_make_headroom (b, MAX_HDRS_LEN);
282}
283
284always_inline int
285sctp_alloc_tx_buffers (sctp_main_t * tm, u8 thread_index, u32 n_free_buffers)
286{
287 vlib_main_t *vm = vlib_get_main ();
288 u32 current_length = vec_len (tm->tx_buffers[thread_index]);
289 u32 n_allocated;
290
291 vec_validate (tm->tx_buffers[thread_index],
292 current_length + n_free_buffers - 1);
293 n_allocated =
294 vlib_buffer_alloc (vm, &tm->tx_buffers[thread_index][current_length],
295 n_free_buffers);
296 _vec_len (tm->tx_buffers[thread_index]) = current_length + n_allocated;
297 /* buffer shortage, report failure */
298 if (vec_len (tm->tx_buffers[thread_index]) == 0)
299 {
300 clib_warning ("out of buffers");
301 return -1;
302 }
303 return 0;
304}
305
306always_inline int
307sctp_get_free_buffer_index (sctp_main_t * tm, u32 * bidx)
308{
309 u32 *my_tx_buffers;
310 u32 thread_index = vlib_get_thread_index ();
311 if (PREDICT_FALSE (vec_len (tm->tx_buffers[thread_index]) == 0))
312 {
313 if (sctp_alloc_tx_buffers (tm, thread_index, VLIB_FRAME_SIZE))
314 return -1;
315 }
316 my_tx_buffers = tm->tx_buffers[thread_index];
317 *bidx = my_tx_buffers[vec_len (my_tx_buffers) - 1];
318 _vec_len (my_tx_buffers) -= 1;
319 return 0;
320}
321
322always_inline void
323sctp_enqueue_to_output_i (vlib_main_t * vm, vlib_buffer_t * b, u32 bi,
324 u8 is_ip4, u8 flush)
325{
326 sctp_main_t *tm = vnet_get_sctp_main ();
327 u32 thread_index = vlib_get_thread_index ();
328 u32 *to_next, next_index;
329 vlib_frame_t *f;
330
331 b->flags |= VNET_BUFFER_F_LOCALLY_ORIGINATED;
332 b->error = 0;
333
334 /* Decide where to send the packet */
335 next_index = is_ip4 ? sctp4_output_node.index : sctp6_output_node.index;
336 sctp_trajectory_add_start (b, 2);
337
338 /* Get frame to v4/6 output node */
339 f = tm->tx_frames[!is_ip4][thread_index];
340 if (!f)
341 {
342 f = vlib_get_frame_to_node (vm, next_index);
343 ASSERT (f);
344 tm->tx_frames[!is_ip4][thread_index] = f;
345 }
346 to_next = vlib_frame_vector_args (f);
347 to_next[f->n_vectors] = bi;
348 f->n_vectors += 1;
349 if (flush || f->n_vectors == VLIB_FRAME_SIZE)
350 {
351 vlib_put_frame_to_node (vm, next_index, f);
352 tm->tx_frames[!is_ip4][thread_index] = 0;
353 }
354}
355
356always_inline void
357sctp_enqueue_to_output_now (vlib_main_t * vm, vlib_buffer_t * b, u32 bi,
358 u8 is_ip4)
359{
360 sctp_enqueue_to_output_i (vm, b, bi, is_ip4, 1);
361}
362
363always_inline void
364sctp_enqueue_to_ip_lookup_i (vlib_main_t * vm, vlib_buffer_t * b, u32 bi,
365 u8 is_ip4, u8 flush)
366{
367 sctp_main_t *tm = vnet_get_sctp_main ();
368 u32 thread_index = vlib_get_thread_index ();
369 u32 *to_next, next_index;
370 vlib_frame_t *f;
371
372 b->flags |= VNET_BUFFER_F_LOCALLY_ORIGINATED;
373 b->error = 0;
374
375 /* Default FIB for now */
376 vnet_buffer (b)->sw_if_index[VLIB_TX] = 0;
377
378 /* Send to IP lookup */
379 next_index = is_ip4 ? ip4_lookup_node.index : ip6_lookup_node.index;
380 if (VLIB_BUFFER_TRACE_TRAJECTORY > 0)
381 {
382 b->pre_data[0] = 2;
383 b->pre_data[1] = next_index;
384 }
385
386 f = tm->ip_lookup_tx_frames[!is_ip4][thread_index];
387 if (!f)
388 {
389 f = vlib_get_frame_to_node (vm, next_index);
390 ASSERT (f);
391 tm->ip_lookup_tx_frames[!is_ip4][thread_index] = f;
392 }
393
394 to_next = vlib_frame_vector_args (f);
395 to_next[f->n_vectors] = bi;
396 f->n_vectors += 1;
397 if (flush || f->n_vectors == VLIB_FRAME_SIZE)
398 {
399 vlib_put_frame_to_node (vm, next_index, f);
400 tm->ip_lookup_tx_frames[!is_ip4][thread_index] = 0;
401 }
402}
403
404always_inline void
405sctp_enqueue_to_ip_lookup (vlib_main_t * vm, vlib_buffer_t * b, u32 bi,
406 u8 is_ip4)
407{
408 sctp_enqueue_to_ip_lookup_i (vm, b, bi, is_ip4, 0);
409}
410
Marco Varlese191a5942017-10-30 18:17:21 +0100411/**
412 * Convert buffer to INIT
413 */
414void
Marco Varlese54432f82018-02-15 17:01:56 +0100415sctp_prepare_init_chunk (sctp_connection_t * sctp_conn, u8 idx,
416 vlib_buffer_t * b)
Marco Varlese191a5942017-10-30 18:17:21 +0100417{
418 u32 random_seed = random_default_seed ();
419 u16 alloc_bytes = sizeof (sctp_init_chunk_t);
Marco Varlese54432f82018-02-15 17:01:56 +0100420 sctp_sub_connection_t *sub_conn = &sctp_conn->sub_conn[idx];
Marco Varlese191a5942017-10-30 18:17:21 +0100421
422 sctp_ipv4_addr_param_t *ip4_param = 0;
423 sctp_ipv6_addr_param_t *ip6_param = 0;
424
425 if (sub_conn->c_is_ip4)
426 alloc_bytes += sizeof (sctp_ipv4_addr_param_t);
427 else
428 alloc_bytes += sizeof (sctp_ipv6_addr_param_t);
429
430 /* As per RFC 4960 the chunk_length value does NOT contemplate
431 * the size of the first header (see sctp_header_t) and any padding
432 */
433 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
434
435 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
436
437 sctp_init_chunk_t *init_chunk = vlib_buffer_push_uninit (b, alloc_bytes);
438
439 u16 pointer_offset = sizeof (init_chunk);
440 if (sub_conn->c_is_ip4)
441 {
442 ip4_param = (sctp_ipv4_addr_param_t *) init_chunk + pointer_offset;
443 ip4_param->address.as_u32 = sub_conn->c_lcl_ip.ip4.as_u32;
444
445 pointer_offset += sizeof (sctp_ipv4_addr_param_t);
446 }
447 else
448 {
449 ip6_param = (sctp_ipv6_addr_param_t *) init_chunk + pointer_offset;
450 ip6_param->address.as_u64[0] = sub_conn->c_lcl_ip.ip6.as_u64[0];
451 ip6_param->address.as_u64[1] = sub_conn->c_lcl_ip.ip6.as_u64[1];
452
453 pointer_offset += sizeof (sctp_ipv6_addr_param_t);
454 }
455
456 init_chunk->sctp_hdr.src_port = sub_conn->c_lcl_port; /* No need of host_to_net conversion, already in net-byte order */
457 init_chunk->sctp_hdr.dst_port = sub_conn->c_rmt_port; /* No need of host_to_net conversion, already in net-byte order */
458 init_chunk->sctp_hdr.checksum = 0;
459 /* The sender of an INIT must set the VERIFICATION_TAG to 0 as per RFC 4960 Section 8.5.1 */
460 init_chunk->sctp_hdr.verification_tag = 0x0;
461
462 vnet_sctp_set_chunk_type (&init_chunk->chunk_hdr, INIT);
463 vnet_sctp_set_chunk_length (&init_chunk->chunk_hdr, chunk_len);
464 vnet_sctp_common_hdr_params_host_to_net (&init_chunk->chunk_hdr);
465
Marco Varlesef3ab4892018-02-19 15:23:13 +0100466 init_chunk->a_rwnd = clib_host_to_net_u32 (sctp_conn->sub_conn[idx].cwnd);
Marco Varlese191a5942017-10-30 18:17:21 +0100467 init_chunk->initiate_tag = clib_host_to_net_u32 (random_u32 (&random_seed));
468 init_chunk->inboud_streams_count =
469 clib_host_to_net_u16 (INBOUND_STREAMS_COUNT);
470 init_chunk->outbound_streams_count =
471 clib_host_to_net_u16 (OUTBOUND_STREAMS_COUNT);
472
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100473 init_chunk->initial_tsn =
474 clib_host_to_net_u32 (sctp_conn->local_initial_tsn);
475 SCTP_CONN_TRACKING_DBG ("sctp_conn->local_initial_tsn = %u",
476 sctp_conn->local_initial_tsn);
477
Marco Varlese191a5942017-10-30 18:17:21 +0100478 sctp_conn->local_tag = init_chunk->initiate_tag;
479
480 vnet_buffer (b)->sctp.connection_index = sub_conn->c_c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100481 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese191a5942017-10-30 18:17:21 +0100482
483 SCTP_DBG_STATE_MACHINE ("CONN_INDEX = %u, CURR_CONN_STATE = %u (%s), "
484 "CHUNK_TYPE = %s, "
485 "SRC_PORT = %u, DST_PORT = %u",
486 sub_conn->connection.c_index,
487 sctp_conn->state,
488 sctp_state_to_string (sctp_conn->state),
489 sctp_chunk_to_string (INIT),
490 init_chunk->sctp_hdr.src_port,
491 init_chunk->sctp_hdr.dst_port);
492}
493
Marco Varlese91389ac2018-01-31 11:00:01 +0100494void
495sctp_compute_mac (sctp_connection_t * sctp_conn,
496 sctp_state_cookie_param_t * state_cookie)
Marco Varlese191a5942017-10-30 18:17:21 +0100497{
Marco Varlese91389ac2018-01-31 11:00:01 +0100498#if OPENSSL_VERSION_NUMBER >= 0x10100000L
499 HMAC_CTX *ctx;
500#else
501 HMAC_CTX ctx;
Marco Varlese91389ac2018-01-31 11:00:01 +0100502#endif
503 unsigned int len = 0;
Marco Varlese18b63152018-02-12 09:08:21 +0100504 const EVP_MD *md = EVP_sha1 ();
Marco Varlese91389ac2018-01-31 11:00:01 +0100505#if OPENSSL_VERSION_NUMBER >= 0x10100000L
506 ctx = HMAC_CTX_new ();
Marco Varlese18b63152018-02-12 09:08:21 +0100507 HMAC_Init_ex (ctx, &state_cookie->creation_time,
Marco Varlese91389ac2018-01-31 11:00:01 +0100508 sizeof (state_cookie->creation_time), md, NULL);
509 HMAC_Update (ctx, (const unsigned char *) &sctp_conn, sizeof (sctp_conn));
510 HMAC_Final (ctx, state_cookie->mac, &len);
511#else
512 HMAC_CTX_init (&ctx);
513 HMAC_Init_ex (&ctx, &state_cookie->creation_time,
514 sizeof (state_cookie->creation_time), md, NULL);
Marco Varlese91389ac2018-01-31 11:00:01 +0100515 HMAC_Update (&ctx, (const unsigned char *) &sctp_conn, sizeof (sctp_conn));
516 HMAC_Final (&ctx, state_cookie->mac, &len);
517 HMAC_CTX_cleanup (&ctx);
518#endif
519
520 ENDIANESS_SWAP (state_cookie->mac);
Marco Varlese191a5942017-10-30 18:17:21 +0100521}
522
523void
Marco Varlese54432f82018-02-15 17:01:56 +0100524sctp_prepare_cookie_ack_chunk (sctp_connection_t * sctp_conn, u8 idx,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100525 vlib_buffer_t * b)
Marco Varlese191a5942017-10-30 18:17:21 +0100526{
527 vlib_main_t *vm = vlib_get_main ();
Marco Varlese191a5942017-10-30 18:17:21 +0100528
529 sctp_reuse_buffer (vm, b);
530
531 u16 alloc_bytes = sizeof (sctp_cookie_ack_chunk_t);
532
533 /* As per RFC 4960 the chunk_length value does NOT contemplate
534 * the size of the first header (see sctp_header_t) and any padding
535 */
536 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
537
538 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
539
540 sctp_cookie_ack_chunk_t *cookie_ack_chunk =
541 vlib_buffer_push_uninit (b, alloc_bytes);
542
543 cookie_ack_chunk->sctp_hdr.checksum = 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100544 cookie_ack_chunk->sctp_hdr.src_port =
545 sctp_conn->sub_conn[idx].connection.lcl_port;
546 cookie_ack_chunk->sctp_hdr.dst_port =
547 sctp_conn->sub_conn[idx].connection.rmt_port;
548 cookie_ack_chunk->sctp_hdr.verification_tag = sctp_conn->remote_tag;
Marco Varlese191a5942017-10-30 18:17:21 +0100549 vnet_sctp_set_chunk_type (&cookie_ack_chunk->chunk_hdr, COOKIE_ACK);
550 vnet_sctp_set_chunk_length (&cookie_ack_chunk->chunk_hdr, chunk_len);
551
552 vnet_buffer (b)->sctp.connection_index =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100553 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100554 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese191a5942017-10-30 18:17:21 +0100555}
556
557void
Marco Varlese54432f82018-02-15 17:01:56 +0100558sctp_prepare_cookie_echo_chunk (sctp_connection_t * sctp_conn, u8 idx,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100559 vlib_buffer_t * b,
Marco Varlese191a5942017-10-30 18:17:21 +0100560 sctp_state_cookie_param_t * sc)
561{
562 vlib_main_t *vm = vlib_get_main ();
Marco Varlese191a5942017-10-30 18:17:21 +0100563
564 sctp_reuse_buffer (vm, b);
565
566 /* The minimum size of the message is given by the sctp_init_ack_chunk_t */
567 u16 alloc_bytes = sizeof (sctp_cookie_echo_chunk_t);
568 /* As per RFC 4960 the chunk_length value does NOT contemplate
569 * the size of the first header (see sctp_header_t) and any padding
570 */
571 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
572 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
573 sctp_cookie_echo_chunk_t *cookie_echo_chunk =
574 vlib_buffer_push_uninit (b, alloc_bytes);
575 cookie_echo_chunk->sctp_hdr.checksum = 0;
576 cookie_echo_chunk->sctp_hdr.src_port =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100577 sctp_conn->sub_conn[idx].connection.lcl_port;
Marco Varlese191a5942017-10-30 18:17:21 +0100578 cookie_echo_chunk->sctp_hdr.dst_port =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100579 sctp_conn->sub_conn[idx].connection.rmt_port;
580 cookie_echo_chunk->sctp_hdr.verification_tag = sctp_conn->remote_tag;
Marco Varlese191a5942017-10-30 18:17:21 +0100581 vnet_sctp_set_chunk_type (&cookie_echo_chunk->chunk_hdr, COOKIE_ECHO);
582 vnet_sctp_set_chunk_length (&cookie_echo_chunk->chunk_hdr, chunk_len);
583 clib_memcpy (&(cookie_echo_chunk->cookie), sc,
584 sizeof (sctp_state_cookie_param_t));
Marco Varlese21c8baf2018-02-02 17:17:51 +0100585
Marco Varlese191a5942017-10-30 18:17:21 +0100586 vnet_buffer (b)->sctp.connection_index =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100587 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100588 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese191a5942017-10-30 18:17:21 +0100589}
590
591/**
592 * Convert buffer to INIT-ACK
593 */
594void
Marco Varlese54432f82018-02-15 17:01:56 +0100595sctp_prepare_initack_chunk (sctp_connection_t * sctp_conn, u8 idx,
596 vlib_buffer_t * b, ip4_address_t * ip4_addr,
Marco Varlese191a5942017-10-30 18:17:21 +0100597 ip6_address_t * ip6_addr)
598{
599 vlib_main_t *vm = vlib_get_main ();
600 sctp_ipv4_addr_param_t *ip4_param = 0;
601 sctp_ipv6_addr_param_t *ip6_param = 0;
Marco Varlese191a5942017-10-30 18:17:21 +0100602 u32 random_seed = random_default_seed ();
603
604 sctp_reuse_buffer (vm, b);
605
606 /* The minimum size of the message is given by the sctp_init_ack_chunk_t */
607 u16 alloc_bytes =
608 sizeof (sctp_init_ack_chunk_t) + sizeof (sctp_state_cookie_param_t);
609
610 if (PREDICT_TRUE (ip4_addr != NULL))
611 {
612 /* Create room for variable-length fields in the INIT_ACK chunk */
613 alloc_bytes += SCTP_IPV4_ADDRESS_TYPE_LENGTH;
614 }
615 if (PREDICT_TRUE (ip6_addr != NULL))
616 {
617 /* Create room for variable-length fields in the INIT_ACK chunk */
618 alloc_bytes += SCTP_IPV6_ADDRESS_TYPE_LENGTH;
619 }
620
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100621 if (sctp_conn->sub_conn[idx].connection.is_ip4)
Marco Varlese191a5942017-10-30 18:17:21 +0100622 alloc_bytes += sizeof (sctp_ipv4_addr_param_t);
623 else
624 alloc_bytes += sizeof (sctp_ipv6_addr_param_t);
625
626 /* As per RFC 4960 the chunk_length value does NOT contemplate
627 * the size of the first header (see sctp_header_t) and any padding
628 */
629 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
630
631 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
632
633 sctp_init_ack_chunk_t *init_ack_chunk =
634 vlib_buffer_push_uninit (b, alloc_bytes);
635
636 u16 pointer_offset = sizeof (sctp_init_ack_chunk_t);
637
638 /* Create State Cookie parameter */
639 sctp_state_cookie_param_t *state_cookie_param =
640 (sctp_state_cookie_param_t *) ((char *) init_ack_chunk + pointer_offset);
641
642 state_cookie_param->param_hdr.type =
643 clib_host_to_net_u16 (SCTP_STATE_COOKIE_TYPE);
644 state_cookie_param->param_hdr.length =
645 clib_host_to_net_u16 (sizeof (sctp_state_cookie_param_t));
646 state_cookie_param->creation_time = clib_host_to_net_u32 (sctp_time_now ());
647 state_cookie_param->cookie_lifespan =
648 clib_host_to_net_u32 (SCTP_VALID_COOKIE_LIFE);
Marco Varlese91389ac2018-01-31 11:00:01 +0100649
650 sctp_compute_mac (sctp_conn, state_cookie_param);
Marco Varlese191a5942017-10-30 18:17:21 +0100651
652 pointer_offset += sizeof (sctp_state_cookie_param_t);
653
654 if (PREDICT_TRUE (ip4_addr != NULL))
655 {
656 sctp_ipv4_addr_param_t *ipv4_addr =
657 (sctp_ipv4_addr_param_t *) init_ack_chunk + pointer_offset;
658
659 ipv4_addr->param_hdr.type =
660 clib_host_to_net_u16 (SCTP_IPV4_ADDRESS_TYPE);
661 ipv4_addr->param_hdr.length =
662 clib_host_to_net_u16 (SCTP_IPV4_ADDRESS_TYPE_LENGTH);
663 ipv4_addr->address.as_u32 = ip4_addr->as_u32;
664
665 pointer_offset += SCTP_IPV4_ADDRESS_TYPE_LENGTH;
666 }
667 if (PREDICT_TRUE (ip6_addr != NULL))
668 {
669 sctp_ipv6_addr_param_t *ipv6_addr =
Marco Varlesef429a932018-02-06 17:31:06 +0100670 (sctp_ipv6_addr_param_t *) init_ack_chunk + pointer_offset;
Marco Varlese191a5942017-10-30 18:17:21 +0100671
672 ipv6_addr->param_hdr.type =
673 clib_host_to_net_u16 (SCTP_IPV6_ADDRESS_TYPE);
674 ipv6_addr->param_hdr.length =
675 clib_host_to_net_u16 (SCTP_IPV6_ADDRESS_TYPE_LENGTH);
676 ipv6_addr->address.as_u64[0] = ip6_addr->as_u64[0];
677 ipv6_addr->address.as_u64[1] = ip6_addr->as_u64[1];
678
679 pointer_offset += SCTP_IPV6_ADDRESS_TYPE_LENGTH;
680 }
681
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100682 if (sctp_conn->sub_conn[idx].connection.is_ip4)
Marco Varlese191a5942017-10-30 18:17:21 +0100683 {
684 ip4_param = (sctp_ipv4_addr_param_t *) init_ack_chunk + pointer_offset;
685 ip4_param->address.as_u32 =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100686 sctp_conn->sub_conn[idx].connection.lcl_ip.ip4.as_u32;
Marco Varlese191a5942017-10-30 18:17:21 +0100687
688 pointer_offset += sizeof (sctp_ipv4_addr_param_t);
689 }
690 else
691 {
692 ip6_param = (sctp_ipv6_addr_param_t *) init_ack_chunk + pointer_offset;
693 ip6_param->address.as_u64[0] =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100694 sctp_conn->sub_conn[idx].connection.lcl_ip.ip6.as_u64[0];
Marco Varlese191a5942017-10-30 18:17:21 +0100695 ip6_param->address.as_u64[1] =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100696 sctp_conn->sub_conn[idx].connection.lcl_ip.ip6.as_u64[1];
Marco Varlese191a5942017-10-30 18:17:21 +0100697
698 pointer_offset += sizeof (sctp_ipv6_addr_param_t);
699 }
700
701 /* src_port & dst_port are already in network byte-order */
702 init_ack_chunk->sctp_hdr.checksum = 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100703 init_ack_chunk->sctp_hdr.src_port =
704 sctp_conn->sub_conn[idx].connection.lcl_port;
705 init_ack_chunk->sctp_hdr.dst_port =
706 sctp_conn->sub_conn[idx].connection.rmt_port;
707 /* the sctp_conn->verification_tag is already in network byte-order (being a copy of the init_tag coming with the INIT chunk) */
708 init_ack_chunk->sctp_hdr.verification_tag = sctp_conn->remote_tag;
709 init_ack_chunk->initial_tsn =
710 clib_host_to_net_u32 (sctp_conn->local_initial_tsn);
711 SCTP_CONN_TRACKING_DBG ("init_ack_chunk->initial_tsn = %u",
712 init_ack_chunk->initial_tsn);
Marco Varlese191a5942017-10-30 18:17:21 +0100713
714 vnet_sctp_set_chunk_type (&init_ack_chunk->chunk_hdr, INIT_ACK);
715 vnet_sctp_set_chunk_length (&init_ack_chunk->chunk_hdr, chunk_len);
716
717 init_ack_chunk->initiate_tag =
718 clib_host_to_net_u32 (random_u32 (&random_seed));
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100719
Marco Varlesef3ab4892018-02-19 15:23:13 +0100720 init_ack_chunk->a_rwnd =
721 clib_host_to_net_u32 (sctp_conn->sub_conn[idx].cwnd);
Marco Varlese191a5942017-10-30 18:17:21 +0100722 init_ack_chunk->inboud_streams_count =
723 clib_host_to_net_u16 (INBOUND_STREAMS_COUNT);
724 init_ack_chunk->outbound_streams_count =
725 clib_host_to_net_u16 (OUTBOUND_STREAMS_COUNT);
726
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100727 sctp_conn->local_tag = init_ack_chunk->initiate_tag;
Marco Varlese191a5942017-10-30 18:17:21 +0100728
729 vnet_buffer (b)->sctp.connection_index =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100730 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100731 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese191a5942017-10-30 18:17:21 +0100732}
733
734/**
735 * Convert buffer to SHUTDOWN
736 */
737void
Marco Varlese54432f82018-02-15 17:01:56 +0100738sctp_prepare_shutdown_chunk (sctp_connection_t * sctp_conn, u8 idx,
739 vlib_buffer_t * b)
Marco Varlese191a5942017-10-30 18:17:21 +0100740{
Marco Varlese191a5942017-10-30 18:17:21 +0100741 u16 alloc_bytes = sizeof (sctp_shutdown_association_chunk_t);
742
Marco Varlese191a5942017-10-30 18:17:21 +0100743 /* As per RFC 4960 the chunk_length value does NOT contemplate
744 * the size of the first header (see sctp_header_t) and any padding
745 */
746 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
747
748 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
749
750 sctp_shutdown_association_chunk_t *shutdown_chunk =
751 vlib_buffer_push_uninit (b, alloc_bytes);
752
753 shutdown_chunk->sctp_hdr.checksum = 0;
754 /* No need of host_to_net conversion, already in net-byte order */
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100755 shutdown_chunk->sctp_hdr.src_port =
756 sctp_conn->sub_conn[idx].connection.lcl_port;
757 shutdown_chunk->sctp_hdr.dst_port =
758 sctp_conn->sub_conn[idx].connection.rmt_port;
759 shutdown_chunk->sctp_hdr.verification_tag = sctp_conn->remote_tag;
Marco Varlese191a5942017-10-30 18:17:21 +0100760 vnet_sctp_set_chunk_type (&shutdown_chunk->chunk_hdr, SHUTDOWN);
761 vnet_sctp_set_chunk_length (&shutdown_chunk->chunk_hdr, chunk_len);
762
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100763 shutdown_chunk->cumulative_tsn_ack = sctp_conn->last_rcvd_tsn;
Marco Varlese191a5942017-10-30 18:17:21 +0100764
765 vnet_buffer (b)->sctp.connection_index =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100766 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100767 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese191a5942017-10-30 18:17:21 +0100768}
769
770/*
771 * Send SHUTDOWN
772 */
773void
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100774sctp_send_shutdown (sctp_connection_t * sctp_conn)
Marco Varlese191a5942017-10-30 18:17:21 +0100775{
776 vlib_buffer_t *b;
777 u32 bi;
778 sctp_main_t *tm = vnet_get_sctp_main ();
779 vlib_main_t *vm = vlib_get_main ();
780
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100781 if (sctp_check_outstanding_data_chunks (sctp_conn) > 0)
Marco Varlese191a5942017-10-30 18:17:21 +0100782 return;
783
784 if (PREDICT_FALSE (sctp_get_free_buffer_index (tm, &bi)))
785 return;
786
Marco Varlese54432f82018-02-15 17:01:56 +0100787 u8 idx = MAIN_SCTP_SUB_CONN_IDX;
788
Marco Varlese191a5942017-10-30 18:17:21 +0100789 b = vlib_get_buffer (vm, bi);
790 sctp_init_buffer (vm, b);
Marco Varlese54432f82018-02-15 17:01:56 +0100791 sctp_prepare_shutdown_chunk (sctp_conn, idx, b);
Marco Varlese191a5942017-10-30 18:17:21 +0100792
Marco Varlesebe2251b2018-02-07 12:22:41 +0100793 sctp_enqueue_to_output_now (vm, b, bi,
794 sctp_conn->sub_conn[idx].connection.is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100795}
796
797/**
798 * Convert buffer to SHUTDOWN_ACK
799 */
800void
Marco Varlese54432f82018-02-15 17:01:56 +0100801sctp_prepare_shutdown_ack_chunk (sctp_connection_t * sctp_conn, u8 idx,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100802 vlib_buffer_t * b)
Marco Varlese191a5942017-10-30 18:17:21 +0100803{
Marco Varlese191a5942017-10-30 18:17:21 +0100804 u16 alloc_bytes = sizeof (sctp_shutdown_association_chunk_t);
805 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
806
807 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
808
809 sctp_shutdown_ack_chunk_t *shutdown_ack_chunk =
810 vlib_buffer_push_uninit (b, alloc_bytes);
811
812 shutdown_ack_chunk->sctp_hdr.checksum = 0;
813 /* No need of host_to_net conversion, already in net-byte order */
814 shutdown_ack_chunk->sctp_hdr.src_port =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100815 sctp_conn->sub_conn[idx].connection.lcl_port;
Marco Varlese191a5942017-10-30 18:17:21 +0100816 shutdown_ack_chunk->sctp_hdr.dst_port =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100817 sctp_conn->sub_conn[idx].connection.rmt_port;
818 shutdown_ack_chunk->sctp_hdr.verification_tag = sctp_conn->remote_tag;
Marco Varlese191a5942017-10-30 18:17:21 +0100819
820 vnet_sctp_set_chunk_type (&shutdown_ack_chunk->chunk_hdr, SHUTDOWN_ACK);
821 vnet_sctp_set_chunk_length (&shutdown_ack_chunk->chunk_hdr, chunk_len);
822
823 vnet_buffer (b)->sctp.connection_index =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100824 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100825 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese191a5942017-10-30 18:17:21 +0100826}
827
828/*
829 * Send SHUTDOWN_ACK
830 */
831void
Marco Varlese54432f82018-02-15 17:01:56 +0100832sctp_send_shutdown_ack (sctp_connection_t * sctp_conn, u8 idx,
833 vlib_buffer_t * b)
Marco Varlese191a5942017-10-30 18:17:21 +0100834{
Marco Varlese191a5942017-10-30 18:17:21 +0100835 vlib_main_t *vm = vlib_get_main ();
836
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100837 if (sctp_check_outstanding_data_chunks (sctp_conn) > 0)
Marco Varlese191a5942017-10-30 18:17:21 +0100838 return;
839
Marco Varlesebe2251b2018-02-07 12:22:41 +0100840 sctp_reuse_buffer (vm, b);
Marco Varlese191a5942017-10-30 18:17:21 +0100841
Marco Varlese54432f82018-02-15 17:01:56 +0100842 sctp_prepare_shutdown_ack_chunk (sctp_conn, idx, b);
Marco Varlese191a5942017-10-30 18:17:21 +0100843}
844
845/**
846 * Convert buffer to SACK
847 */
848void
Marco Varlese54432f82018-02-15 17:01:56 +0100849sctp_prepare_sack_chunk (sctp_connection_t * sctp_conn, u8 idx,
850 vlib_buffer_t * b)
Marco Varlese191a5942017-10-30 18:17:21 +0100851{
852 vlib_main_t *vm = vlib_get_main ();
Marco Varlese191a5942017-10-30 18:17:21 +0100853
854 sctp_reuse_buffer (vm, b);
855
856 u16 alloc_bytes = sizeof (sctp_selective_ack_chunk_t);
857
858 /* As per RFC 4960 the chunk_length value does NOT contemplate
859 * the size of the first header (see sctp_header_t) and any padding
860 */
861 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
862
863 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
864
865 sctp_selective_ack_chunk_t *sack = vlib_buffer_push_uninit (b, alloc_bytes);
866
867 sack->sctp_hdr.checksum = 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100868 sack->sctp_hdr.src_port = sctp_conn->sub_conn[idx].connection.lcl_port;
869 sack->sctp_hdr.dst_port = sctp_conn->sub_conn[idx].connection.rmt_port;
870 sack->sctp_hdr.verification_tag = sctp_conn->remote_tag;
Marco Varlese191a5942017-10-30 18:17:21 +0100871 vnet_sctp_set_chunk_type (&sack->chunk_hdr, SACK);
872 vnet_sctp_set_chunk_length (&sack->chunk_hdr, chunk_len);
873
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100874 sack->cumulative_tsn_ack = sctp_conn->next_tsn_expected;
875
876 sctp_conn->ack_state = 0;
877
Marco Varlese191a5942017-10-30 18:17:21 +0100878 vnet_buffer (b)->sctp.connection_index =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100879 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100880 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100881}
882
883/**
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100884 * Convert buffer to HEARTBEAT_ACK
885 */
886void
Marco Varlese54432f82018-02-15 17:01:56 +0100887sctp_prepare_heartbeat_ack_chunk (sctp_connection_t * sctp_conn, u8 idx,
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100888 vlib_buffer_t * b)
889{
890 vlib_main_t *vm = vlib_get_main ();
891
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100892 u16 alloc_bytes = sizeof (sctp_hb_ack_chunk_t);
893
894 sctp_reuse_buffer (vm, b);
895
896 /* As per RFC 4960 the chunk_length value does NOT contemplate
897 * the size of the first header (see sctp_header_t) and any padding
898 */
899 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
900
901 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
902
903 sctp_hb_ack_chunk_t *hb_ack = vlib_buffer_push_uninit (b, alloc_bytes);
904
905 hb_ack->sctp_hdr.checksum = 0;
906 /* No need of host_to_net conversion, already in net-byte order */
907 hb_ack->sctp_hdr.src_port = sctp_conn->sub_conn[idx].connection.lcl_port;
908 hb_ack->sctp_hdr.dst_port = sctp_conn->sub_conn[idx].connection.rmt_port;
909 hb_ack->sctp_hdr.verification_tag = sctp_conn->remote_tag;
910 hb_ack->hb_info.param_hdr.type = clib_host_to_net_u16 (1);
911 hb_ack->hb_info.param_hdr.length =
912 clib_host_to_net_u16 (sizeof (hb_ack->hb_info.hb_info));
913
914 vnet_sctp_set_chunk_type (&hb_ack->chunk_hdr, HEARTBEAT_ACK);
915 vnet_sctp_set_chunk_length (&hb_ack->chunk_hdr, chunk_len);
916
917 vnet_buffer (b)->sctp.connection_index =
918 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100919 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100920}
921
922/**
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100923 * Convert buffer to HEARTBEAT
924 */
925void
Marco Varlese54432f82018-02-15 17:01:56 +0100926sctp_prepare_heartbeat_chunk (sctp_connection_t * sctp_conn, u8 idx,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100927 vlib_buffer_t * b)
928{
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100929 u16 alloc_bytes = sizeof (sctp_hb_req_chunk_t);
930
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100931 /* As per RFC 4960 the chunk_length value does NOT contemplate
932 * the size of the first header (see sctp_header_t) and any padding
933 */
934 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
935
936 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
937
938 sctp_hb_req_chunk_t *hb_req = vlib_buffer_push_uninit (b, alloc_bytes);
939
940 hb_req->sctp_hdr.checksum = 0;
941 /* No need of host_to_net conversion, already in net-byte order */
942 hb_req->sctp_hdr.src_port = sctp_conn->sub_conn[idx].connection.lcl_port;
943 hb_req->sctp_hdr.dst_port = sctp_conn->sub_conn[idx].connection.rmt_port;
944 hb_req->sctp_hdr.verification_tag = sctp_conn->remote_tag;
945 hb_req->hb_info.param_hdr.type = clib_host_to_net_u16 (1);
946 hb_req->hb_info.param_hdr.length =
947 clib_host_to_net_u16 (sizeof (hb_req->hb_info.hb_info));
948
949 vnet_sctp_set_chunk_type (&hb_req->chunk_hdr, HEARTBEAT);
950 vnet_sctp_set_chunk_length (&hb_req->chunk_hdr, chunk_len);
951
952 vnet_buffer (b)->sctp.connection_index =
953 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +0100954 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100955}
956
957void
958sctp_send_heartbeat (sctp_connection_t * sctp_conn)
959{
960 vlib_buffer_t *b;
961 u32 bi;
962 sctp_main_t *tm = vnet_get_sctp_main ();
963 vlib_main_t *vm = vlib_get_main ();
964
Marco Varlese54432f82018-02-15 17:01:56 +0100965 u8 i;
966 u32 now = sctp_time_now ();
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100967
Marco Varlese54432f82018-02-15 17:01:56 +0100968 for (i = 0; i < MAX_SCTP_CONNECTIONS; i++)
969 {
970 if (sctp_conn->sub_conn[i].state == SCTP_SUBCONN_STATE_DOWN)
971 continue;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100972
Marco Varlese54432f82018-02-15 17:01:56 +0100973 if (now > (sctp_conn->sub_conn[i].last_seen + SCTP_HB_INTERVAL))
974 {
975 if (PREDICT_FALSE (sctp_get_free_buffer_index (tm, &bi)))
976 return;
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100977
Marco Varlese54432f82018-02-15 17:01:56 +0100978 b = vlib_get_buffer (vm, bi);
979 sctp_init_buffer (vm, b);
980 sctp_prepare_heartbeat_chunk (sctp_conn, i, b);
981
982 sctp_enqueue_to_output_now (vm, b, bi,
983 sctp_conn->sub_conn[i].
984 connection.is_ip4);
985
986 sctp_conn->sub_conn[i].unacknowledged_hb += 1;
987 }
988 }
Marco Varlese191a5942017-10-30 18:17:21 +0100989}
990
991/**
992 * Convert buffer to SHUTDOWN_COMPLETE
993 */
994void
Marco Varlese54432f82018-02-15 17:01:56 +0100995sctp_prepare_shutdown_complete_chunk (sctp_connection_t * sctp_conn, u8 idx,
Marco Varlese191a5942017-10-30 18:17:21 +0100996 vlib_buffer_t * b)
997{
Marco Varlese191a5942017-10-30 18:17:21 +0100998 u16 alloc_bytes = sizeof (sctp_shutdown_association_chunk_t);
999 alloc_bytes += vnet_sctp_calculate_padding (alloc_bytes);
1000
1001 u16 chunk_len = alloc_bytes - sizeof (sctp_header_t);
1002
1003 sctp_shutdown_complete_chunk_t *shutdown_complete =
1004 vlib_buffer_push_uninit (b, alloc_bytes);
1005
1006 shutdown_complete->sctp_hdr.checksum = 0;
1007 /* No need of host_to_net conversion, already in net-byte order */
1008 shutdown_complete->sctp_hdr.src_port =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001009 sctp_conn->sub_conn[idx].connection.lcl_port;
Marco Varlese191a5942017-10-30 18:17:21 +01001010 shutdown_complete->sctp_hdr.dst_port =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001011 sctp_conn->sub_conn[idx].connection.rmt_port;
1012 shutdown_complete->sctp_hdr.verification_tag = sctp_conn->remote_tag;
Marco Varlese191a5942017-10-30 18:17:21 +01001013
1014 vnet_sctp_set_chunk_type (&shutdown_complete->chunk_hdr, SHUTDOWN_COMPLETE);
1015 vnet_sctp_set_chunk_length (&shutdown_complete->chunk_hdr, chunk_len);
1016
1017 vnet_buffer (b)->sctp.connection_index =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001018 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese15cc6a82018-02-21 12:39:52 +01001019 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese191a5942017-10-30 18:17:21 +01001020}
1021
1022void
Marco Varlese54432f82018-02-15 17:01:56 +01001023sctp_send_shutdown_complete (sctp_connection_t * sctp_conn, u8 idx,
Marco Varlesefae40392018-02-14 15:38:35 +01001024 vlib_buffer_t * b0)
Marco Varlese191a5942017-10-30 18:17:21 +01001025{
Marco Varlese191a5942017-10-30 18:17:21 +01001026 vlib_main_t *vm = vlib_get_main ();
1027
Marco Varlesefae40392018-02-14 15:38:35 +01001028 if (sctp_check_outstanding_data_chunks (sctp_conn) > 0)
Marco Varlese191a5942017-10-30 18:17:21 +01001029 return;
1030
Marco Varlesefae40392018-02-14 15:38:35 +01001031 sctp_reuse_buffer (vm, b0);
Marco Varlese191a5942017-10-30 18:17:21 +01001032
Marco Varlese54432f82018-02-15 17:01:56 +01001033 sctp_prepare_shutdown_complete_chunk (sctp_conn, idx, b0);
Marco Varlese191a5942017-10-30 18:17:21 +01001034}
1035
Marco Varlese191a5942017-10-30 18:17:21 +01001036/*
1037 * Send INIT
1038 */
1039void
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001040sctp_send_init (sctp_connection_t * sctp_conn)
Marco Varlese191a5942017-10-30 18:17:21 +01001041{
1042 vlib_buffer_t *b;
1043 u32 bi;
1044 sctp_main_t *tm = vnet_get_sctp_main ();
1045 vlib_main_t *vm = vlib_get_main ();
1046
1047 if (PREDICT_FALSE (sctp_get_free_buffer_index (tm, &bi)))
1048 return;
1049
1050 b = vlib_get_buffer (vm, bi);
Marco Varlese54432f82018-02-15 17:01:56 +01001051 u8 idx = MAIN_SCTP_SUB_CONN_IDX;
Marco Varlese191a5942017-10-30 18:17:21 +01001052
1053 sctp_init_buffer (vm, b);
Marco Varlese54432f82018-02-15 17:01:56 +01001054 sctp_prepare_init_chunk (sctp_conn, idx, b);
Marco Varlese191a5942017-10-30 18:17:21 +01001055
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001056 sctp_push_ip_hdr (tm, &sctp_conn->sub_conn[idx], b);
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001057 sctp_enqueue_to_ip_lookup (vm, b, bi, sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +01001058
1059 /* Start the T1_INIT timer */
Marco Varlese21c8baf2018-02-02 17:17:51 +01001060 sctp_timer_set (sctp_conn, idx, SCTP_TIMER_T1_INIT,
1061 sctp_conn->sub_conn[idx].RTO);
1062
Marco Varlese191a5942017-10-30 18:17:21 +01001063 /* Change state to COOKIE_WAIT */
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001064 sctp_conn->state = SCTP_STATE_COOKIE_WAIT;
Marco Varlesea38783e2018-02-13 12:38:52 +01001065
1066 /* Measure RTT with this */
1067 sctp_conn->sub_conn[idx].rtt_ts = sctp_time_now ();
Marco Varlese191a5942017-10-30 18:17:21 +01001068}
1069
Marco Varlese191a5942017-10-30 18:17:21 +01001070/**
1071 * Push SCTP header and update connection variables
1072 */
1073static void
Marco Varlesef3ab4892018-02-19 15:23:13 +01001074sctp_push_hdr_i (sctp_connection_t * sctp_conn, vlib_buffer_t * b,
Marco Varlese191a5942017-10-30 18:17:21 +01001075 sctp_state_t next_state)
1076{
Marco Varlese191a5942017-10-30 18:17:21 +01001077 u16 data_len =
1078 b->current_length + b->total_length_not_including_first_buffer;
1079 ASSERT (!b->total_length_not_including_first_buffer
1080 || (b->flags & VLIB_BUFFER_NEXT_PRESENT));
1081
1082 SCTP_ADV_DBG_OUTPUT ("b->current_length = %u, "
1083 "b->current_data = %p "
1084 "data_len = %u",
1085 b->current_length, b->current_data, data_len);
1086
1087 u16 bytes_to_add = sizeof (sctp_payload_data_chunk_t);
1088 u16 chunk_length = data_len + bytes_to_add - sizeof (sctp_header_t);
1089
1090 bytes_to_add += vnet_sctp_calculate_padding (bytes_to_add + data_len);
1091
1092 sctp_payload_data_chunk_t *data_chunk =
1093 vlib_buffer_push_uninit (b, bytes_to_add);
1094
Marco Varlesef3ab4892018-02-19 15:23:13 +01001095 u8 idx = sctp_data_subconn_select (sctp_conn);
Marco Varlese15cc6a82018-02-21 12:39:52 +01001096 SCTP_DBG_OUTPUT
1097 ("SCTP_CONN = %p, IDX = %u, S_INDEX = %u, C_INDEX = %u, LCL_PORT = %u, RMT_PORT = %u",
1098 sctp_conn, idx, sctp_conn->sub_conn[idx].connection.s_index,
1099 sctp_conn->sub_conn[idx].connection.c_index,
1100 sctp_conn->sub_conn[idx].connection.lcl_port,
1101 sctp_conn->sub_conn[idx].connection.rmt_port);
Marco Varlese191a5942017-10-30 18:17:21 +01001102 data_chunk->sctp_hdr.checksum = 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001103 data_chunk->sctp_hdr.src_port =
1104 sctp_conn->sub_conn[idx].connection.lcl_port;
1105 data_chunk->sctp_hdr.dst_port =
1106 sctp_conn->sub_conn[idx].connection.rmt_port;
1107 data_chunk->sctp_hdr.verification_tag = sctp_conn->remote_tag;
Marco Varlese191a5942017-10-30 18:17:21 +01001108
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001109 data_chunk->tsn = clib_host_to_net_u32 (sctp_conn->next_tsn);
Marco Varlese191a5942017-10-30 18:17:21 +01001110 data_chunk->stream_id = clib_host_to_net_u16 (0);
1111 data_chunk->stream_seq = clib_host_to_net_u16 (0);
1112
1113 vnet_sctp_set_chunk_type (&data_chunk->chunk_hdr, DATA);
1114 vnet_sctp_set_chunk_length (&data_chunk->chunk_hdr, chunk_length);
1115
Marco Varlese91389ac2018-01-31 11:00:01 +01001116 vnet_sctp_set_bbit (&data_chunk->chunk_hdr);
1117 vnet_sctp_set_ebit (&data_chunk->chunk_hdr);
1118
Marco Varlese191a5942017-10-30 18:17:21 +01001119 SCTP_ADV_DBG_OUTPUT ("POINTER_WITH_DATA = %p, DATA_OFFSET = %u",
1120 b->data, b->current_data);
1121
Marco Varlesef3ab4892018-02-19 15:23:13 +01001122 sctp_conn->last_unacked_tsn = sctp_conn->next_tsn;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001123 sctp_conn->next_tsn += data_len;
1124
Marco Varlesef3ab4892018-02-19 15:23:13 +01001125 u32 inflight = sctp_conn->next_tsn - sctp_conn->last_unacked_tsn;
1126 /* Section 7.2.2; point (3) */
1127 if (sctp_conn->sub_conn[idx].partially_acked_bytes >=
1128 sctp_conn->sub_conn[idx].cwnd
1129 && inflight >= sctp_conn->sub_conn[idx].cwnd)
1130 {
1131 sctp_conn->sub_conn[idx].cwnd += sctp_conn->sub_conn[idx].PMTU;
1132 sctp_conn->sub_conn[idx].partially_acked_bytes -=
1133 sctp_conn->sub_conn[idx].cwnd;
1134 }
1135
1136 sctp_conn->sub_conn[idx].last_data_ts = sctp_time_now ();
1137
Marco Varlese191a5942017-10-30 18:17:21 +01001138 vnet_buffer (b)->sctp.connection_index =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001139 sctp_conn->sub_conn[idx].connection.c_index;
Marco Varlese54432f82018-02-15 17:01:56 +01001140
Marco Varlese15cc6a82018-02-21 12:39:52 +01001141 vnet_buffer (b)->sctp.subconn_idx = idx;
Marco Varlese191a5942017-10-30 18:17:21 +01001142}
1143
1144u32
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001145sctp_push_header (transport_connection_t * trans_conn, vlib_buffer_t * b)
Marco Varlese191a5942017-10-30 18:17:21 +01001146{
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001147 sctp_connection_t *sctp_conn =
1148 sctp_get_connection_from_transport (trans_conn);
Marco Varlese191a5942017-10-30 18:17:21 +01001149
Marco Varlese15cc6a82018-02-21 12:39:52 +01001150 SCTP_DBG_OUTPUT ("TRANS_CONN = %p, SCTP_CONN = %p, "
1151 "S_INDEX = %u, C_INDEX = %u,"
1152 "LCL_PORT = %u, RMT_PORT = %u",
1153 trans_conn,
1154 sctp_conn,
1155 trans_conn->s_index,
1156 trans_conn->c_index,
1157 trans_conn->lcl_port, trans_conn->rmt_port);
1158
Marco Varlesef3ab4892018-02-19 15:23:13 +01001159 sctp_push_hdr_i (sctp_conn, b, SCTP_STATE_ESTABLISHED);
Marco Varlese21c8baf2018-02-02 17:17:51 +01001160
Marco Varlese191a5942017-10-30 18:17:21 +01001161 sctp_trajectory_add_start (b0, 3);
1162
1163 return 0;
Marco Varlese191a5942017-10-30 18:17:21 +01001164}
1165
Marco Varlesefae40392018-02-14 15:38:35 +01001166#if SCTP_DEBUG_STATE_MACHINE
Marco Varlesea38783e2018-02-13 12:38:52 +01001167always_inline u8
1168sctp_validate_output_state_machine (sctp_connection_t * sctp_conn,
1169 u8 chunk_type)
1170{
1171 u8 result = 0;
1172 switch (sctp_conn->state)
1173 {
1174 case SCTP_STATE_CLOSED:
1175 if (chunk_type != INIT && chunk_type != INIT_ACK)
1176 result = 1;
1177 break;
1178 case SCTP_STATE_ESTABLISHED:
1179 if (chunk_type != DATA && chunk_type != HEARTBEAT &&
1180 chunk_type != HEARTBEAT_ACK && chunk_type != SACK &&
1181 chunk_type != COOKIE_ACK && chunk_type != SHUTDOWN)
1182 result = 1;
1183 break;
1184 case SCTP_STATE_COOKIE_WAIT:
1185 if (chunk_type != COOKIE_ECHO)
1186 result = 1;
1187 break;
1188 case SCTP_STATE_SHUTDOWN_SENT:
1189 if (chunk_type != SHUTDOWN_COMPLETE)
1190 result = 1;
1191 break;
1192 case SCTP_STATE_SHUTDOWN_RECEIVED:
1193 if (chunk_type != SHUTDOWN_ACK)
1194 result = 1;
1195 break;
1196 }
1197 return result;
1198}
Marco Varlesefae40392018-02-14 15:38:35 +01001199#endif
Marco Varlesea38783e2018-02-13 12:38:52 +01001200
1201always_inline u8
1202sctp_is_retransmitting (sctp_connection_t * sctp_conn, u8 idx)
1203{
1204 return sctp_conn->sub_conn[idx].is_retransmitting;
1205}
1206
Marco Varlese191a5942017-10-30 18:17:21 +01001207always_inline uword
1208sctp46_output_inline (vlib_main_t * vm,
1209 vlib_node_runtime_t * node,
1210 vlib_frame_t * from_frame, int is_ip4)
1211{
1212 u32 n_left_from, next_index, *from, *to_next;
1213 u32 my_thread_index = vm->thread_index;
1214
1215 from = vlib_frame_vector_args (from_frame);
1216 n_left_from = from_frame->n_vectors;
1217 next_index = node->cached_next_index;
1218 sctp_set_time_now (my_thread_index);
1219
1220 while (n_left_from > 0)
1221 {
1222 u32 n_left_to_next;
1223
1224 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1225
1226 while (n_left_from > 0 && n_left_to_next > 0)
1227 {
1228 u32 bi0;
1229 vlib_buffer_t *b0;
1230 sctp_header_t *sctp_hdr = 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001231 sctp_connection_t *sctp_conn;
Marco Varlese191a5942017-10-30 18:17:21 +01001232 sctp_tx_trace_t *t0;
1233 sctp_header_t *th0 = 0;
1234 u32 error0 = SCTP_ERROR_PKTS_SENT, next0 =
1235 SCTP_OUTPUT_NEXT_IP_LOOKUP;
1236
1237#if SCTP_DEBUG_STATE_MACHINE
1238 u16 packet_length = 0;
1239#endif
1240
1241 bi0 = from[0];
1242 to_next[0] = bi0;
1243 from += 1;
1244 to_next += 1;
1245 n_left_from -= 1;
1246 n_left_to_next -= 1;
1247
1248 b0 = vlib_get_buffer (vm, bi0);
Marco Varlesebe2251b2018-02-07 12:22:41 +01001249
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001250 sctp_conn =
1251 sctp_connection_get (vnet_buffer (b0)->sctp.connection_index,
1252 my_thread_index);
Marco Varlese191a5942017-10-30 18:17:21 +01001253
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001254 if (PREDICT_FALSE (sctp_conn == 0))
Marco Varlese191a5942017-10-30 18:17:21 +01001255 {
1256 error0 = SCTP_ERROR_INVALID_CONNECTION;
1257 next0 = SCTP_OUTPUT_NEXT_DROP;
1258 goto done;
1259 }
1260
Marco Varlese15cc6a82018-02-21 12:39:52 +01001261 u8 idx = vnet_buffer (b0)->sctp.subconn_idx;
Marco Varlese191a5942017-10-30 18:17:21 +01001262
1263 th0 = vlib_buffer_get_current (b0);
1264
1265 if (is_ip4)
1266 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001267 ip4_header_t *iph4 = vlib_buffer_push_ip4 (vm,
1268 b0,
1269 &sctp_conn->sub_conn
1270 [idx].connection.
1271 lcl_ip.ip4,
1272 &sctp_conn->
1273 sub_conn
1274 [idx].connection.
1275 rmt_ip.ip4,
1276 IP_PROTOCOL_SCTP, 1);
Marco Varlese191a5942017-10-30 18:17:21 +01001277
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001278 u32 checksum = ip4_sctp_compute_checksum (vm, b0, iph4);
Marco Varlese191a5942017-10-30 18:17:21 +01001279
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001280 sctp_hdr = ip4_next_header (iph4);
Marco Varlese191a5942017-10-30 18:17:21 +01001281 sctp_hdr->checksum = checksum;
1282
1283 vnet_buffer (b0)->l4_hdr_offset = (u8 *) th0 - b0->data;
Marco Varlese191a5942017-10-30 18:17:21 +01001284
1285#if SCTP_DEBUG_STATE_MACHINE
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001286 packet_length = clib_net_to_host_u16 (iph4->length);
Marco Varlese191a5942017-10-30 18:17:21 +01001287#endif
1288 }
1289 else
1290 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001291 ip6_header_t *iph6 = vlib_buffer_push_ip6 (vm,
1292 b0,
1293 &sctp_conn->sub_conn
1294 [idx].
1295 connection.lcl_ip.
1296 ip6,
1297 &sctp_conn->sub_conn
1298 [idx].
1299 connection.rmt_ip.
1300 ip6,
1301 IP_PROTOCOL_SCTP);
Marco Varlese191a5942017-10-30 18:17:21 +01001302
1303 int bogus = ~0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001304 u32 checksum = ip6_sctp_compute_checksum (vm, b0, iph6, &bogus);
Marco Varlese191a5942017-10-30 18:17:21 +01001305 ASSERT (!bogus);
1306
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001307 sctp_hdr = ip6_next_header (iph6);
Marco Varlese191a5942017-10-30 18:17:21 +01001308 sctp_hdr->checksum = checksum;
1309
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001310 vnet_buffer (b0)->l3_hdr_offset = (u8 *) iph6 - b0->data;
Marco Varlese191a5942017-10-30 18:17:21 +01001311 vnet_buffer (b0)->l4_hdr_offset = (u8 *) th0 - b0->data;
Marco Varlese191a5942017-10-30 18:17:21 +01001312
1313#if SCTP_DEBUG_STATE_MACHINE
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001314 packet_length = clib_net_to_host_u16 (iph6->payload_length);
Marco Varlese191a5942017-10-30 18:17:21 +01001315#endif
1316 }
1317
Marco Varlesefae40392018-02-14 15:38:35 +01001318 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
1319 u8 chunk_type = vnet_sctp_get_chunk_type (&full_hdr->common_hdr);
1320 if (chunk_type >= UNKNOWN)
1321 {
1322 clib_warning
1323 ("Trying to send an unrecognized chunk... something is really bad.");
1324 error0 = SCTP_ERROR_UNKOWN_CHUNK;
1325 next0 = SCTP_OUTPUT_NEXT_DROP;
1326 goto done;
1327 }
1328
1329#if SCTP_DEBUG_STATE_MACHINE
Marco Varlese191a5942017-10-30 18:17:21 +01001330 u8 is_valid =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001331 (sctp_conn->sub_conn[idx].connection.lcl_port ==
Marco Varlese191a5942017-10-30 18:17:21 +01001332 sctp_hdr->src_port
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001333 || sctp_conn->sub_conn[idx].connection.lcl_port ==
Marco Varlese191a5942017-10-30 18:17:21 +01001334 sctp_hdr->dst_port)
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001335 && (sctp_conn->sub_conn[idx].connection.rmt_port ==
Marco Varlese191a5942017-10-30 18:17:21 +01001336 sctp_hdr->dst_port
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001337 || sctp_conn->sub_conn[idx].connection.rmt_port ==
Marco Varlese191a5942017-10-30 18:17:21 +01001338 sctp_hdr->src_port);
1339
Marco Varlese191a5942017-10-30 18:17:21 +01001340 if (!is_valid)
1341 {
1342 SCTP_DBG_STATE_MACHINE ("BUFFER IS INCORRECT: conn_index = %u, "
1343 "packet_length = %u, "
1344 "chunk_type = %u [%s], "
1345 "connection.lcl_port = %u, sctp_hdr->src_port = %u, "
1346 "connection.rmt_port = %u, sctp_hdr->dst_port = %u",
Marco Varlesefae40392018-02-14 15:38:35 +01001347 sctp_conn->sub_conn[idx].
1348 connection.c_index, packet_length,
Marco Varlese191a5942017-10-30 18:17:21 +01001349 chunk_type,
1350 sctp_chunk_to_string (chunk_type),
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001351 sctp_conn->sub_conn[idx].
1352 connection.lcl_port, sctp_hdr->src_port,
1353 sctp_conn->sub_conn[idx].
1354 connection.rmt_port,
Marco Varlese191a5942017-10-30 18:17:21 +01001355 sctp_hdr->dst_port);
1356
1357 error0 = SCTP_ERROR_UNKOWN_CHUNK;
1358 next0 = SCTP_OUTPUT_NEXT_DROP;
1359 goto done;
1360 }
Marco Varlesefae40392018-02-14 15:38:35 +01001361#endif
Marco Varlese191a5942017-10-30 18:17:21 +01001362 SCTP_DBG_STATE_MACHINE
Marco Varlesef3ab4892018-02-19 15:23:13 +01001363 ("SESSION_INDEX = %u, CONN_INDEX = %u, CURR_CONN_STATE = %u (%s), "
Marco Varlese191a5942017-10-30 18:17:21 +01001364 "CHUNK_TYPE = %s, " "SRC_PORT = %u, DST_PORT = %u",
Marco Varlesef3ab4892018-02-19 15:23:13 +01001365 sctp_conn->sub_conn[idx].connection.s_index,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001366 sctp_conn->sub_conn[idx].connection.c_index,
1367 sctp_conn->state, sctp_state_to_string (sctp_conn->state),
Marco Varlese191a5942017-10-30 18:17:21 +01001368 sctp_chunk_to_string (chunk_type), full_hdr->hdr.src_port,
1369 full_hdr->hdr.dst_port);
1370
Marco Varlese191a5942017-10-30 18:17:21 +01001371 /* Let's make sure the state-machine does not send anything crazy */
Marco Varlesea38783e2018-02-13 12:38:52 +01001372#if SCTP_DEBUG_STATE_MACHINE
1373 if (sctp_validate_output_state_machine (sctp_conn, chunk_type) != 0)
Marco Varlese191a5942017-10-30 18:17:21 +01001374 {
Marco Varlese191a5942017-10-30 18:17:21 +01001375 SCTP_DBG_STATE_MACHINE
Marco Varlesea38783e2018-02-13 12:38:52 +01001376 ("Sending the wrong chunk (%s) based on state-machine status (%s)",
Marco Varlese191a5942017-10-30 18:17:21 +01001377 sctp_chunk_to_string (chunk_type),
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001378 sctp_state_to_string (sctp_conn->state));
Marco Varlesea38783e2018-02-13 12:38:52 +01001379
1380 error0 = SCTP_ERROR_UNKOWN_CHUNK;
1381 next0 = SCTP_OUTPUT_NEXT_DROP;
1382 goto done;
Marco Varlesef3ab4892018-02-19 15:23:13 +01001383
Marco Varlesea38783e2018-02-13 12:38:52 +01001384 }
1385#endif
1386
1387 /* Karn's algorithm: RTT measurements MUST NOT be made using
1388 * packets that were retransmitted
1389 */
1390 if (!sctp_is_retransmitting (sctp_conn, idx))
1391 {
1392 /* Measure RTT with this */
1393 if (chunk_type == DATA
1394 && sctp_conn->sub_conn[idx].RTO_pending == 0)
1395 {
1396 sctp_conn->sub_conn[idx].RTO_pending = 1;
1397 sctp_conn->sub_conn[idx].rtt_ts = sctp_time_now ();
1398 }
1399 else
1400 sctp_conn->sub_conn[idx].rtt_ts = sctp_time_now ();
Marco Varlese191a5942017-10-30 18:17:21 +01001401 }
1402
Marco Varlesea38783e2018-02-13 12:38:52 +01001403 /* Let's take care of TIMERS */
Marco Varlesebe2251b2018-02-07 12:22:41 +01001404 switch (chunk_type)
Marco Varlese191a5942017-10-30 18:17:21 +01001405 {
Marco Varlesea38783e2018-02-13 12:38:52 +01001406 case COOKIE_ECHO:
1407 {
1408 sctp_conn->state = SCTP_STATE_COOKIE_ECHOED;
1409 break;
1410 }
Marco Varlesebe2251b2018-02-07 12:22:41 +01001411 case DATA:
1412 {
Marco Varlesea38783e2018-02-13 12:38:52 +01001413 SCTP_ADV_DBG_OUTPUT ("PACKET_LENGTH = %u", packet_length);
1414
Marco Varlesebe2251b2018-02-07 12:22:41 +01001415 sctp_timer_update (sctp_conn, idx, SCTP_TIMER_T3_RXTX,
1416 sctp_conn->sub_conn[idx].RTO);
1417 break;
1418 }
1419 case SHUTDOWN:
1420 {
1421 /* Start the SCTP_TIMER_T2_SHUTDOWN timer */
1422 sctp_timer_set (sctp_conn, idx, SCTP_TIMER_T2_SHUTDOWN,
1423 sctp_conn->sub_conn[idx].RTO);
1424 sctp_conn->state = SCTP_STATE_SHUTDOWN_SENT;
1425 break;
1426 }
1427 case SHUTDOWN_ACK:
1428 {
1429 /* Start the SCTP_TIMER_T2_SHUTDOWN timer */
1430 sctp_timer_set (sctp_conn, idx, SCTP_TIMER_T2_SHUTDOWN,
1431 sctp_conn->sub_conn[idx].RTO);
1432 sctp_conn->state = SCTP_STATE_SHUTDOWN_ACK_SENT;
1433 break;
1434 }
Marco Varlesea38783e2018-02-13 12:38:52 +01001435 case SHUTDOWN_COMPLETE:
1436 {
1437 sctp_conn->state = SCTP_STATE_CLOSED;
1438 break;
1439 }
Marco Varlese191a5942017-10-30 18:17:21 +01001440 }
1441
1442 vnet_buffer (b0)->sw_if_index[VLIB_RX] = 0;
1443 vnet_buffer (b0)->sw_if_index[VLIB_TX] = ~0;
1444
1445 b0->flags |= VNET_BUFFER_F_LOCALLY_ORIGINATED;
1446
Marco Varlesef3ab4892018-02-19 15:23:13 +01001447 SCTP_DBG_STATE_MACHINE
1448 ("SESSION_INDEX = %u, CONNECTION_INDEX = %u, " "NEW_STATE = %s, "
1449 "CHUNK_SENT = %s", sctp_conn->sub_conn[idx].connection.s_index,
1450 sctp_conn->sub_conn[idx].connection.c_index,
1451 sctp_state_to_string (sctp_conn->state),
1452 sctp_chunk_to_string (chunk_type));
Marco Varlese191a5942017-10-30 18:17:21 +01001453
1454 vnet_sctp_common_hdr_params_host_to_net (&full_hdr->common_hdr);
1455
1456 done:
1457 b0->error = node->errors[error0];
1458 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
1459 {
1460 t0 = vlib_add_trace (vm, node, b0, sizeof (*t0));
1461 if (th0)
1462 {
1463 clib_memcpy (&t0->sctp_header, th0,
1464 sizeof (t0->sctp_header));
1465 }
1466 else
1467 {
1468 memset (&t0->sctp_header, 0, sizeof (t0->sctp_header));
1469 }
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001470 clib_memcpy (&t0->sctp_connection, sctp_conn,
Marco Varlese191a5942017-10-30 18:17:21 +01001471 sizeof (t0->sctp_connection));
1472 }
1473
1474 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1475 n_left_to_next, bi0, next0);
1476 }
1477
1478 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1479 }
1480
1481 return from_frame->n_vectors;
1482}
1483
1484static uword
1485sctp4_output (vlib_main_t * vm, vlib_node_runtime_t * node,
1486 vlib_frame_t * from_frame)
1487{
1488 return sctp46_output_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1489}
1490
1491static uword
1492sctp6_output (vlib_main_t * vm, vlib_node_runtime_t * node,
1493 vlib_frame_t * from_frame)
1494{
1495 return sctp46_output_inline (vm, node, from_frame, 0 /* is_ip4 */ );
1496}
1497
1498/* *INDENT-OFF* */
1499VLIB_REGISTER_NODE (sctp4_output_node) =
1500{
1501 .function = sctp4_output,.name = "sctp4-output",
1502 /* Takes a vector of packets. */
1503 .vector_size = sizeof (u32),
1504 .n_errors = SCTP_N_ERROR,
1505 .error_strings = sctp_error_strings,
1506 .n_next_nodes = SCTP_OUTPUT_N_NEXT,
1507 .next_nodes = {
1508#define _(s,n) [SCTP_OUTPUT_NEXT_##s] = n,
1509 foreach_sctp4_output_next
1510#undef _
1511 },
1512 .format_buffer = format_sctp_header,
1513 .format_trace = format_sctp_tx_trace,
1514};
1515/* *INDENT-ON* */
1516
1517VLIB_NODE_FUNCTION_MULTIARCH (sctp4_output_node, sctp4_output);
1518
1519/* *INDENT-OFF* */
1520VLIB_REGISTER_NODE (sctp6_output_node) =
1521{
1522 .function = sctp6_output,
1523 .name = "sctp6-output",
1524 /* Takes a vector of packets. */
1525 .vector_size = sizeof (u32),
1526 .n_errors = SCTP_N_ERROR,
1527 .error_strings = sctp_error_strings,
1528 .n_next_nodes = SCTP_OUTPUT_N_NEXT,
1529 .next_nodes = {
1530#define _(s,n) [SCTP_OUTPUT_NEXT_##s] = n,
1531 foreach_sctp6_output_next
1532#undef _
1533 },
1534 .format_buffer = format_sctp_header,
1535 .format_trace = format_sctp_tx_trace,
1536};
1537/* *INDENT-ON* */
1538
1539VLIB_NODE_FUNCTION_MULTIARCH (sctp6_output_node, sctp6_output);
1540
1541/*
1542 * fd.io coding-style-patch-verification: ON
1543 *
1544 * Local Variables:
1545 * eval: (c-set-style "gnu")
1546 * End:
1547 */