blob: 8df95642ce4be71f42deeeed0c0aca7517aaf4c8 [file] [log] [blame]
Marco Varlese191a5942017-10-30 18:17:21 +01001/*
2 * Copyright (c) 2017 SUSE LLC.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15#include <vppinfra/sparse_vec.h>
16#include <vnet/sctp/sctp.h>
17#include <vnet/sctp/sctp_packet.h>
18#include <vnet/sctp/sctp_debug.h>
19#include <vnet/session/session.h>
20#include <math.h>
21
22static char *sctp_error_strings[] = {
23#define sctp_error(n,s) s,
24#include <vnet/sctp/sctp_error.def>
25#undef sctp_error
26};
27
28/* All SCTP nodes have the same outgoing arcs */
29#define foreach_sctp_state_next \
30 _ (DROP, "error-drop") \
31 _ (SCTP4_OUTPUT, "sctp4-output") \
32 _ (SCTP6_OUTPUT, "sctp6-output")
33
34typedef enum _sctp_established_phase_next
35{
36#define _(s,n) SCTP_ESTABLISHED_PHASE_NEXT_##s,
37 foreach_sctp_state_next
38#undef _
39 SCTP_ESTABLISHED_PHASE_N_NEXT,
40} sctp_established_phase_next_t;
41
42typedef enum _sctp_rcv_phase_next
43{
44#define _(s,n) SCTP_RCV_PHASE_NEXT_##s,
45 foreach_sctp_state_next
46#undef _
47 SCTP_RCV_PHASE_N_NEXT,
48} sctp_rcv_phase_next_t;
49
50typedef enum _sctp_listen_phase_next
51{
52#define _(s,n) SCTP_LISTEN_PHASE_NEXT_##s,
53 foreach_sctp_state_next
54#undef _
55 SCTP_LISTEN_PHASE_N_NEXT,
56} sctp_listen_phase_next_t;
57
58typedef enum _sctp_shutdown_phase_next
59{
60#define _(s,n) SCTP_SHUTDOWN_PHASE_NEXT_##s,
61 foreach_sctp_state_next
62#undef _
63 SCTP_SHUTDOWN_PHASE_N_NEXT,
64} sctp_shutdown_phase_next_t;
65
66/* Generic, state independent indices */
67typedef enum _sctp_state_next
68{
69#define _(s,n) SCTP_NEXT_##s,
70 foreach_sctp_state_next
71#undef _
72 SCTP_STATE_N_NEXT,
73} sctp_state_next_t;
74
75typedef enum _sctp_input_next
76{
77 SCTP_INPUT_NEXT_DROP,
78 SCTP_INPUT_NEXT_LISTEN_PHASE,
79 SCTP_INPUT_NEXT_RCV_PHASE,
80 SCTP_INPUT_NEXT_ESTABLISHED_PHASE,
81 SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
82 SCTP_INPUT_NEXT_PUNT_PHASE,
83 SCTP_INPUT_N_NEXT
84} sctp_input_next_t;
85
86char *
87phase_to_string (u8 phase)
88{
89 switch (phase)
90 {
91 case SCTP_INPUT_NEXT_DROP:
92 return "SCTP_INPUT_NEXT_DROP";
93 case SCTP_INPUT_NEXT_LISTEN_PHASE:
94 return "SCTP_INPUT_NEXT_LISTEN_PHASE";
95 case SCTP_INPUT_NEXT_RCV_PHASE:
96 return "SCTP_INPUT_NEXT_RCV_PHASE";
97 case SCTP_INPUT_NEXT_ESTABLISHED_PHASE:
98 return "SCTP_INPUT_NEXT_ESTABLISHED_PHASE";
99 case SCTP_INPUT_NEXT_SHUTDOWN_PHASE:
100 return "SCTP_INPUT_NEXT_SHUTDOWN_PHASE";
101 case SCTP_INPUT_NEXT_PUNT_PHASE:
102 return "SCTP_INPUT_NEXT_PUNT_PHASE";
103 }
104 return NULL;
105}
106
107#define foreach_sctp4_input_next \
108 _ (DROP, "error-drop") \
109 _ (RCV_PHASE, "sctp4-rcv") \
110 _ (LISTEN_PHASE, "sctp4-listen") \
111 _ (ESTABLISHED_PHASE, "sctp4-established") \
112 _ (SHUTDOWN_PHASE, "sctp4-shutdown") \
113 _ (PUNT_PHASE, "ip4-punt")
114
115
116#define foreach_sctp6_input_next \
117 _ (DROP, "error-drop") \
118 _ (RCV_PHASE, "sctp6-rcv") \
119 _ (LISTEN_PHASE, "sctp6-listen") \
120 _ (ESTABLISHED_PHASE, "sctp6-established") \
121 _ (SHUTDOWN_PHASE, "sctp6-shutdown") \
122 _ (PUNT_PHASE, "ip6-punt")
123
124static u8
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100125sctp_lookup_is_valid (transport_connection_t * trans_conn,
Marco Varlese191a5942017-10-30 18:17:21 +0100126 sctp_header_t * sctp_hdr)
127{
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100128 sctp_connection_t *sctp_conn =
129 sctp_get_connection_from_transport (trans_conn);
Marco Varlese191a5942017-10-30 18:17:21 +0100130
131 if (!sctp_conn)
132 return 1;
133
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100134 u8 is_valid = (trans_conn->lcl_port == sctp_hdr->dst_port
Marco Varlese191a5942017-10-30 18:17:21 +0100135 && (sctp_conn->state == SCTP_STATE_CLOSED
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100136 || trans_conn->rmt_port == sctp_hdr->src_port));
Marco Varlese191a5942017-10-30 18:17:21 +0100137
138 return is_valid;
139}
140
141/**
142 * Lookup transport connection
143 */
144static sctp_connection_t *
145sctp_lookup_connection (u32 fib_index, vlib_buffer_t * b, u8 thread_index,
146 u8 is_ip4)
147{
148 sctp_main_t *tm = vnet_get_sctp_main ();
149 sctp_header_t *sctp_hdr;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100150 transport_connection_t *trans_conn;
Marco Varlese191a5942017-10-30 18:17:21 +0100151 sctp_connection_t *sctp_conn;
152 u8 is_filtered, i;
153 if (is_ip4)
154 {
155 ip4_header_t *ip4_hdr;
156 ip4_hdr = vlib_buffer_get_current (b);
157 sctp_hdr = ip4_next_header (ip4_hdr);
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100158 trans_conn = session_lookup_connection_wt4 (fib_index,
159 &ip4_hdr->dst_address,
160 &ip4_hdr->src_address,
161 sctp_hdr->dst_port,
162 sctp_hdr->src_port,
163 TRANSPORT_PROTO_SCTP,
164 thread_index, &is_filtered);
165 if (trans_conn == 0) /* Not primary connection */
Marco Varlese191a5942017-10-30 18:17:21 +0100166 {
167 for (i = 0; i < MAX_SCTP_CONNECTIONS; i++)
168 {
169 if ((tm->connections[thread_index]->sub_conn[i].
170 connection.lcl_ip.ip4.as_u32 ==
171 ip4_hdr->dst_address.as_u32)
172 && (tm->connections[thread_index]->sub_conn[i].
173 connection.rmt_ip.ip4.as_u32 ==
174 ip4_hdr->src_address.as_u32))
175 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100176 trans_conn =
Marco Varlese191a5942017-10-30 18:17:21 +0100177 &tm->connections[thread_index]->sub_conn[i].connection;
178 break;
179 }
180 }
181 }
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100182 ASSERT (trans_conn != 0);
183 ASSERT (sctp_lookup_is_valid (trans_conn, sctp_hdr));
Marco Varlese191a5942017-10-30 18:17:21 +0100184 }
185 else
186 {
187 ip6_header_t *ip6_hdr;
188 ip6_hdr = vlib_buffer_get_current (b);
189 sctp_hdr = ip6_next_header (ip6_hdr);
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100190 trans_conn = session_lookup_connection_wt6 (fib_index,
191 &ip6_hdr->dst_address,
192 &ip6_hdr->src_address,
193 sctp_hdr->dst_port,
194 sctp_hdr->src_port,
195 TRANSPORT_PROTO_SCTP,
196 thread_index, &is_filtered);
197 if (trans_conn == 0) /* Not primary connection */
Marco Varlese191a5942017-10-30 18:17:21 +0100198 {
199 for (i = 0; i < MAX_SCTP_CONNECTIONS; i++)
200 {
201 if ((tm->connections[thread_index]->sub_conn[i].
202 connection.lcl_ip.ip6.as_u64[0] ==
203 ip6_hdr->dst_address.as_u64[0]
204 && tm->connections[thread_index]->sub_conn[i].
205 connection.lcl_ip.ip6.as_u64[1] ==
206 ip6_hdr->dst_address.as_u64[1])
207 && (tm->connections[thread_index]->sub_conn[i].
208 connection.rmt_ip.ip6.as_u64[0] ==
209 ip6_hdr->src_address.as_u64[0]
210 && tm->connections[thread_index]->
211 sub_conn[i].connection.rmt_ip.ip6.as_u64[1] ==
212 ip6_hdr->src_address.as_u64[1]))
213 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100214 trans_conn =
Marco Varlese191a5942017-10-30 18:17:21 +0100215 &tm->connections[thread_index]->sub_conn[i].connection;
216 break;
217 }
218 }
219 }
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100220 ASSERT (trans_conn != 0);
221 ASSERT (sctp_lookup_is_valid (trans_conn, sctp_hdr));
Marco Varlese191a5942017-10-30 18:17:21 +0100222 }
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100223 sctp_conn = sctp_get_connection_from_transport (trans_conn);
Marco Varlese191a5942017-10-30 18:17:21 +0100224 return sctp_conn;
225}
226
227typedef struct
228{
229 sctp_header_t sctp_header;
230 sctp_connection_t sctp_connection;
231} sctp_rx_trace_t;
232
233#define sctp_next_output(is_ip4) (is_ip4 ? SCTP_NEXT_SCTP4_OUTPUT \
234 : SCTP_NEXT_SCTP6_OUTPUT)
235
236
237void
238sctp_set_rx_trace_data (sctp_rx_trace_t * rx_trace,
239 sctp_connection_t * sctp_conn,
240 sctp_header_t * sctp_hdr, vlib_buffer_t * b0,
241 u8 is_ip4)
242{
243 if (sctp_conn)
244 {
245 clib_memcpy (&rx_trace->sctp_connection, sctp_conn,
246 sizeof (rx_trace->sctp_connection));
247 }
248 else
249 {
250 sctp_hdr = sctp_buffer_hdr (b0);
251 }
252 clib_memcpy (&rx_trace->sctp_header, sctp_hdr,
253 sizeof (rx_trace->sctp_header));
254}
255
256always_inline u16
257sctp_calculate_implied_length (ip4_header_t * ip4_hdr, ip6_header_t * ip6_hdr,
258 int is_ip4)
259{
260 u16 sctp_implied_packet_length = 0;
261
262 if (is_ip4)
263 sctp_implied_packet_length =
264 clib_net_to_host_u16 (ip4_hdr->length) - ip4_header_bytes (ip4_hdr);
265 else
266 sctp_implied_packet_length =
267 clib_net_to_host_u16 (ip6_hdr->payload_length) - sizeof (ip6_hdr);
268
269 return sctp_implied_packet_length;
270}
271
272always_inline u8
273sctp_is_bundling (u16 sctp_implied_length,
274 sctp_chunks_common_hdr_t * sctp_common_hdr)
275{
276 if (sctp_implied_length !=
277 sizeof (sctp_header_t) + vnet_sctp_get_chunk_length (sctp_common_hdr))
278 return 1;
279 return 0;
280}
281
282always_inline u16
283sctp_handle_init (sctp_header_t * sctp_hdr,
284 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
285 sctp_connection_t * sctp_conn, vlib_buffer_t * b0,
286 u16 sctp_implied_length)
287{
288 sctp_init_chunk_t *init_chunk = (sctp_init_chunk_t *) (sctp_hdr);
289 ip4_address_t *ip4_addr = 0;
290 ip6_address_t *ip6_addr = 0;
291 char hostname[FQDN_MAX_LENGTH];
292
293 /* Check the current state of the connection
294 *
295 * The logic required by the RFC4960 Section 5.2.2 is already taken care of
296 * in the code below and by the "sctp_prepare_initack_chunk" function.
297 * However, for debugging purposes it is nice to have a message printed out
298 * for these corner-case scenarios.
299 */
300 if (sctp_conn->state != SCTP_STATE_CLOSED)
301 { /* UNEXPECTED scenario */
302 switch (sctp_conn->state)
303 {
304 case SCTP_STATE_COOKIE_WAIT: /* TODO */
305 SCTP_ADV_DBG ("Received INIT chunk while in COOKIE_WAIT state");
306 break;
307 case SCTP_STATE_COOKIE_ECHOED: /* TODO */
308 SCTP_ADV_DBG ("Received INIT chunk while in COOKIE_ECHOED state");
309 break;
310 }
311 }
312
313 if (sctp_hdr->verification_tag != 0x0)
314 return SCTP_ERROR_INVALID_TAG_FOR_INIT;
315
316 /*
317 * It is not possible to bundle any other CHUNK with the INIT chunk
318 */
319 if (sctp_is_bundling (sctp_implied_length, &init_chunk->chunk_hdr))
320 return SCTP_ERROR_BUNDLING_VIOLATION;
321
322 /* Save the INITIATE_TAG of the remote peer for this connection:
323 * it MUST be used for the VERIFICATION_TAG parameter in the SCTP HEADER */
324 sctp_conn->remote_tag = init_chunk->initiate_tag;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100325 sctp_conn->remote_initial_tsn =
326 clib_net_to_host_u32 (init_chunk->initial_tsn);
327 sctp_conn->last_rcvd_tsn = sctp_conn->remote_initial_tsn;
328 sctp_conn->next_tsn_expected = sctp_conn->remote_initial_tsn + 1;
329 SCTP_CONN_TRACKING_DBG ("sctp_conn->remote_initial_tsn = %u",
330 sctp_conn->remote_initial_tsn);
331
Marco Varlese191a5942017-10-30 18:17:21 +0100332 sctp_conn->snd_opts.a_rwnd = clib_net_to_host_u32 (init_chunk->a_rwnd);
333
334 /*
335 * If the length specified in the INIT message is bigger than the size in bytes of our structure it means that
336 * optional parameters have been sent with the INIT chunk and we need to parse them.
337 */
338 u16 length = vnet_sctp_get_chunk_length (sctp_chunk_hdr);
339 if (length > sizeof (sctp_init_chunk_t))
340 {
341 /* There are optional parameters in the INIT chunk */
342 u16 pointer_offset = sizeof (sctp_init_chunk_t);
343 while (pointer_offset < length)
344 {
345 sctp_opt_params_hdr_t *opt_params_hdr =
346 (sctp_opt_params_hdr_t *) init_chunk + pointer_offset;
347
348 switch (clib_net_to_host_u16 (opt_params_hdr->type))
349 {
350 case SCTP_IPV4_ADDRESS_TYPE:
351 {
352 sctp_ipv4_addr_param_t *ipv4 =
353 (sctp_ipv4_addr_param_t *) opt_params_hdr;
354 clib_memcpy (ip4_addr, &ipv4->address,
355 sizeof (ip4_address_t));
356
357 sctp_sub_connection_add_ip4 (vlib_get_thread_index (), ipv4);
358
359 break;
360 }
361 case SCTP_IPV6_ADDRESS_TYPE:
362 {
363 sctp_ipv6_addr_param_t *ipv6 =
364 (sctp_ipv6_addr_param_t *) opt_params_hdr;
365 clib_memcpy (ip6_addr, &ipv6->address,
366 sizeof (ip6_address_t));
367
368 sctp_sub_connection_add_ip6 (vlib_get_thread_index (), ipv6);
369
370 break;
371 }
372 case SCTP_COOKIE_PRESERVATIVE_TYPE:
373 {
374 sctp_cookie_preservative_param_t *cookie_pres =
375 (sctp_cookie_preservative_param_t *) opt_params_hdr;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100376 sctp_conn->peer_cookie_life_span_increment =
377 cookie_pres->life_span_inc;
Marco Varlese191a5942017-10-30 18:17:21 +0100378 break;
379 }
380 case SCTP_HOSTNAME_ADDRESS_TYPE:
381 {
382 sctp_hostname_param_t *hostname_addr =
383 (sctp_hostname_param_t *) opt_params_hdr;
384 clib_memcpy (hostname, hostname_addr->hostname,
385 FQDN_MAX_LENGTH);
386 break;
387 }
388 case SCTP_SUPPORTED_ADDRESS_TYPES:
389 {
390 /* TODO */
391 break;
392 }
393 }
394 pointer_offset += clib_net_to_host_u16 (opt_params_hdr->length);
395 }
396 }
397
398 /* Reuse buffer to make init-ack and send */
399 sctp_prepare_initack_chunk (sctp_conn, b0, ip4_addr, ip6_addr);
400 return SCTP_ERROR_NONE;
401}
402
403always_inline u16
404sctp_is_valid_init_ack (sctp_header_t * sctp_hdr,
405 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
406 sctp_connection_t * sctp_conn, vlib_buffer_t * b0,
407 u16 sctp_implied_length)
408{
409 sctp_init_ack_chunk_t *init_ack_chunk =
410 (sctp_init_ack_chunk_t *) (sctp_hdr);
411
412 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
413 if (sctp_conn->local_tag != init_ack_chunk->sctp_hdr.verification_tag)
414 {
415 return SCTP_ERROR_INVALID_TAG;
416 }
417
418 /*
419 * It is not possible to bundle any other CHUNK with the INIT_ACK chunk
420 */
421 if (sctp_is_bundling (sctp_implied_length, &init_ack_chunk->chunk_hdr))
422 return SCTP_ERROR_BUNDLING_VIOLATION;
423
424 return SCTP_ERROR_NONE;
425}
426
427always_inline u16
428sctp_handle_init_ack (sctp_header_t * sctp_hdr,
429 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlese21c8baf2018-02-02 17:17:51 +0100430 sctp_connection_t * sctp_conn, u8 idx,
431 vlib_buffer_t * b0, u16 sctp_implied_length)
Marco Varlese191a5942017-10-30 18:17:21 +0100432{
433 sctp_init_ack_chunk_t *init_ack_chunk =
434 (sctp_init_ack_chunk_t *) (sctp_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +0100435 sctp_state_cookie_param_t state_cookie;
436
437 char hostname[FQDN_MAX_LENGTH];
438
439 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
440 if (sctp_conn->local_tag != init_ack_chunk->sctp_hdr.verification_tag)
441 {
442 return SCTP_ERROR_INVALID_TAG;
443 }
444
445 /*
446 * It is not possible to bundle any other CHUNK with the INIT chunk
447 */
448 if (sctp_is_bundling (sctp_implied_length, &init_ack_chunk->chunk_hdr))
449 return SCTP_ERROR_BUNDLING_VIOLATION;
450
Marco Varlese21c8baf2018-02-02 17:17:51 +0100451 sctp_calculate_rto (sctp_conn, idx);
452
Marco Varlese191a5942017-10-30 18:17:21 +0100453 /* remote_tag to be placed in the VERIFICATION_TAG field of the COOKIE_ECHO chunk */
454 sctp_conn->remote_tag = init_ack_chunk->initiate_tag;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100455 sctp_conn->remote_initial_tsn =
456 clib_net_to_host_u32 (init_ack_chunk->initial_tsn);
457 sctp_conn->last_rcvd_tsn = sctp_conn->remote_initial_tsn;
458 sctp_conn->next_tsn_expected = sctp_conn->remote_initial_tsn + 1;
459 SCTP_CONN_TRACKING_DBG ("sctp_conn->remote_initial_tsn = %u",
460 sctp_conn->remote_initial_tsn);
Marco Varlese191a5942017-10-30 18:17:21 +0100461 sctp_conn->snd_opts.a_rwnd = clib_net_to_host_u32 (init_ack_chunk->a_rwnd);
462
463 u16 length = vnet_sctp_get_chunk_length (sctp_chunk_hdr);
464
465 if (length > sizeof (sctp_init_ack_chunk_t))
466 /*
467 * There are optional parameters in the INIT ACK chunk
468 */
469 {
470 u16 pointer_offset = sizeof (sctp_init_ack_chunk_t);
471
472 while (pointer_offset < length)
473 {
474 sctp_opt_params_hdr_t *opt_params_hdr =
475 (sctp_opt_params_hdr_t *) ((char *) init_ack_chunk +
476 pointer_offset);
477
478 switch (clib_net_to_host_u16 (opt_params_hdr->type))
479 {
480 case SCTP_IPV4_ADDRESS_TYPE:
481 {
482 sctp_ipv4_addr_param_t *ipv4 =
483 (sctp_ipv4_addr_param_t *) opt_params_hdr;
Marco Varlese191a5942017-10-30 18:17:21 +0100484
485 sctp_sub_connection_add_ip4 (vlib_get_thread_index (), ipv4);
486
487 break;
488 }
489 case SCTP_IPV6_ADDRESS_TYPE:
490 {
491 sctp_ipv6_addr_param_t *ipv6 =
492 (sctp_ipv6_addr_param_t *) opt_params_hdr;
Marco Varlese191a5942017-10-30 18:17:21 +0100493
494 sctp_sub_connection_add_ip6 (vlib_get_thread_index (), ipv6);
495
496 break;
497 }
498 case SCTP_STATE_COOKIE_TYPE:
499 {
500 sctp_state_cookie_param_t *state_cookie_param =
501 (sctp_state_cookie_param_t *) opt_params_hdr;
502
503 clib_memcpy (&state_cookie, state_cookie_param,
504 sizeof (sctp_state_cookie_param_t));
505 break;
506 }
507 case SCTP_HOSTNAME_ADDRESS_TYPE:
508 {
509 sctp_hostname_param_t *hostname_addr =
510 (sctp_hostname_param_t *) opt_params_hdr;
511 clib_memcpy (hostname, hostname_addr->hostname,
512 FQDN_MAX_LENGTH);
513 break;
514 }
515 case SCTP_UNRECOGNIZED_TYPE:
516 {
517 break;
518 }
519 }
520 u16 increment = clib_net_to_host_u16 (opt_params_hdr->length);
521 /* This indicates something really bad happened */
522 if (increment == 0)
523 {
524 return SCTP_ERROR_INVALID_TAG;
525 }
526 pointer_offset += increment;
527 }
528 }
529
530 sctp_prepare_cookie_echo_chunk (sctp_conn, b0, &state_cookie);
531
532 /* Start the T1_COOKIE timer */
533 sctp_timer_set (sctp_conn, sctp_pick_conn_idx_on_chunk (COOKIE_ECHO),
Marco Varlese21c8baf2018-02-02 17:17:51 +0100534 SCTP_TIMER_T1_COOKIE, sctp_conn->sub_conn[idx].RTO);
Marco Varlese191a5942017-10-30 18:17:21 +0100535
536 return SCTP_ERROR_NONE;
537}
538
Marco Varlese91389ac2018-01-31 11:00:01 +0100539/** Enqueue data out-of-order for delivery to application */
540always_inline int
541sctp_session_enqueue_data_ooo (sctp_connection_t * sctp_conn,
542 vlib_buffer_t * b, u16 data_len, u8 conn_idx)
543{
544 int written, error = SCTP_ERROR_ENQUEUED;
545
546 written =
547 session_enqueue_stream_connection (&sctp_conn->
548 sub_conn[conn_idx].connection, b, 0,
549 1 /* queue event */ ,
550 0);
551
552 /* Update next_tsn_expected */
553 if (PREDICT_TRUE (written == data_len))
554 {
555 sctp_conn->next_tsn_expected += written;
556
557 SCTP_ADV_DBG ("CONN = %u, WRITTEN [%u] == DATA_LEN [%d]",
558 sctp_conn->sub_conn[conn_idx].connection.c_index,
559 written, data_len);
560 }
561 /* If more data written than expected, account for out-of-order bytes. */
562 else if (written > data_len)
563 {
564 sctp_conn->next_tsn_expected += written;
565
566 SCTP_ADV_DBG ("CONN = %u, WRITTEN [%u] > DATA_LEN [%d]",
567 sctp_conn->sub_conn[conn_idx].connection.c_index,
568 written, data_len);
569 }
570 else if (written > 0)
571 {
572 /* We've written something but FIFO is probably full now */
573 sctp_conn->next_tsn_expected += written;
574
575 error = SCTP_ERROR_PARTIALLY_ENQUEUED;
576
577 SCTP_ADV_DBG
578 ("CONN = %u, WRITTEN [%u] > 0 (SCTP_ERROR_PARTIALLY_ENQUEUED)",
579 sctp_conn->sub_conn[conn_idx].connection.c_index, written);
580 }
581 else
582 {
583 SCTP_ADV_DBG ("CONN = %u, WRITTEN == 0 (SCTP_ERROR_FIFO_FULL)",
584 sctp_conn->sub_conn[conn_idx].connection.c_index);
585
586 return SCTP_ERROR_FIFO_FULL;
587 }
588
589 /* TODO: Update out_of_order_map & SACK list */
590
591 return error;
592}
593
Marco Varlese191a5942017-10-30 18:17:21 +0100594/** Enqueue data for delivery to application */
595always_inline int
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100596sctp_session_enqueue_data (sctp_connection_t * sctp_conn, vlib_buffer_t * b,
Marco Varlese191a5942017-10-30 18:17:21 +0100597 u16 data_len, u8 conn_idx)
598{
599 int written, error = SCTP_ERROR_ENQUEUED;
600
601 written =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100602 session_enqueue_stream_connection (&sctp_conn->
603 sub_conn[conn_idx].connection, b, 0,
604 1 /* queue event */ ,
605 1);
Marco Varlese191a5942017-10-30 18:17:21 +0100606
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100607 /* Update next_tsn_expected */
Marco Varlese191a5942017-10-30 18:17:21 +0100608 if (PREDICT_TRUE (written == data_len))
609 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100610 sctp_conn->next_tsn_expected += written;
Marco Varlese191a5942017-10-30 18:17:21 +0100611
612 SCTP_ADV_DBG ("CONN = %u, WRITTEN [%u] == DATA_LEN [%d]",
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100613 sctp_conn->sub_conn[conn_idx].connection.c_index,
Marco Varlese191a5942017-10-30 18:17:21 +0100614 written, data_len);
615 }
616 /* If more data written than expected, account for out-of-order bytes. */
617 else if (written > data_len)
618 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100619 sctp_conn->next_tsn_expected += written;
Marco Varlese191a5942017-10-30 18:17:21 +0100620
621 SCTP_ADV_DBG ("CONN = %u, WRITTEN [%u] > DATA_LEN [%d]",
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100622 sctp_conn->sub_conn[conn_idx].connection.c_index,
Marco Varlese191a5942017-10-30 18:17:21 +0100623 written, data_len);
624 }
625 else if (written > 0)
626 {
627 /* We've written something but FIFO is probably full now */
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100628 sctp_conn->next_tsn_expected += written;
Marco Varlese191a5942017-10-30 18:17:21 +0100629
630 error = SCTP_ERROR_PARTIALLY_ENQUEUED;
631
632 SCTP_ADV_DBG
633 ("CONN = %u, WRITTEN [%u] > 0 (SCTP_ERROR_PARTIALLY_ENQUEUED)",
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100634 sctp_conn->sub_conn[conn_idx].connection.c_index, written);
Marco Varlese191a5942017-10-30 18:17:21 +0100635 }
636 else
637 {
638 SCTP_ADV_DBG ("CONN = %u, WRITTEN == 0 (SCTP_ERROR_FIFO_FULL)",
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100639 sctp_conn->sub_conn[conn_idx].connection.c_index);
Marco Varlese191a5942017-10-30 18:17:21 +0100640
641 return SCTP_ERROR_FIFO_FULL;
642 }
643
644 return error;
645}
646
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100647always_inline u8
648sctp_is_sack_delayable (sctp_connection_t * sctp_conn, u8 gapping)
649{
650 if (gapping != 0)
651 {
652 SCTP_CONN_TRACKING_DBG
653 ("gapping != 0: CONN_INDEX = %u, sctp_conn->ack_state = %u",
654 sctp_conn->sub_conn[idx].connection.c_index, sctp_conn->ack_state);
655 return 1;
656 }
657
658 if (sctp_conn->ack_state >= MAX_ENQUEABLE_SACKS)
659 {
660 SCTP_CONN_TRACKING_DBG
661 ("sctp_conn->ack_state >= MAX_ENQUEABLE_SACKS: CONN_INDEX = %u, sctp_conn->ack_state = %u",
662 sctp_conn->sub_conn[idx].connection.c_index, sctp_conn->ack_state);
663 return 1;
664 }
665
666 sctp_conn->ack_state += 1;
667
668 return 0;
669}
670
Marco Varlese91389ac2018-01-31 11:00:01 +0100671always_inline void
672sctp_is_connection_gapping (sctp_connection_t * sctp_conn, u32 tsn,
673 u8 * gapping)
674{
675 if (sctp_conn->next_tsn_expected != tsn) // It means data transmission is GAPPING
676 {
677 SCTP_CONN_TRACKING_DBG
678 ("GAPPING: CONN_INDEX = %u, sctp_conn->next_tsn_expected = %u, tsn = %u, diff = %u",
679 sctp_conn->sub_conn[idx].connection.c_index,
680 sctp_conn->next_tsn_expected, tsn,
681 sctp_conn->next_tsn_expected - tsn);
682
683 *gapping = 1;
684 }
685}
686
Marco Varlese191a5942017-10-30 18:17:21 +0100687always_inline u16
688sctp_handle_data (sctp_payload_data_chunk_t * sctp_data_chunk,
Marco Varlesebe2251b2018-02-07 12:22:41 +0100689 sctp_connection_t * sctp_conn, u8 idx, vlib_buffer_t * b,
Marco Varlese191a5942017-10-30 18:17:21 +0100690 u16 * next0)
691{
692 u32 error = 0, n_data_bytes;
Marco Varlese91389ac2018-01-31 11:00:01 +0100693 u8 is_gapping = 0;
Marco Varlese191a5942017-10-30 18:17:21 +0100694
695 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
696 if (sctp_conn->local_tag != sctp_data_chunk->sctp_hdr.verification_tag)
697 {
698 return SCTP_ERROR_INVALID_TAG;
699 }
700
701 vnet_buffer (b)->sctp.sid = sctp_data_chunk->stream_id;
702 vnet_buffer (b)->sctp.ssn = sctp_data_chunk->stream_seq;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100703
704 u32 tsn = clib_net_to_host_u32 (sctp_data_chunk->tsn);
Marco Varlese191a5942017-10-30 18:17:21 +0100705
706 vlib_buffer_advance (b, vnet_buffer (b)->sctp.data_offset);
707 n_data_bytes = vnet_buffer (b)->sctp.data_len;
708 ASSERT (n_data_bytes);
709
Marco Varlese91389ac2018-01-31 11:00:01 +0100710 sctp_is_connection_gapping (sctp_conn, tsn, &is_gapping);
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100711
712 sctp_conn->last_rcvd_tsn = tsn;
713
Marco Varlese191a5942017-10-30 18:17:21 +0100714 SCTP_ADV_DBG ("POINTER_WITH_DATA = %p", b->data);
715
Marco Varlese91389ac2018-01-31 11:00:01 +0100716 u8 bbit = vnet_sctp_get_bbit (&sctp_data_chunk->chunk_hdr);
717 u8 ebit = vnet_sctp_get_ebit (&sctp_data_chunk->chunk_hdr);
718
719 if (bbit == 1 && ebit == 1) /* Unfragmented message */
720 {
721 /* In order data, enqueue. Fifo figures out by itself if any out-of-order
722 * segments can be enqueued after fifo tail offset changes. */
723 error = sctp_session_enqueue_data (sctp_conn, b, n_data_bytes, idx);
724 }
725 else if (bbit == 1 && ebit == 0) /* First piece of a fragmented user message */
726 {
727 error = sctp_session_enqueue_data (sctp_conn, b, n_data_bytes, idx);
728 }
729 else if (bbit == 0 && ebit == 1) /* Last piece of a fragmented user message */
730 {
731 if (PREDICT_FALSE (is_gapping == 1))
732 error =
733 sctp_session_enqueue_data_ooo (sctp_conn, b, n_data_bytes, idx);
734 else
735 error = sctp_session_enqueue_data (sctp_conn, b, n_data_bytes, idx);
736 }
737 else /* Middle piece of a fragmented user message */
738 {
739 if (PREDICT_FALSE (is_gapping == 1))
740 error =
741 sctp_session_enqueue_data_ooo (sctp_conn, b, n_data_bytes, idx);
742 else
743 error = sctp_session_enqueue_data (sctp_conn, b, n_data_bytes, idx);
744 }
745 sctp_conn->last_rcvd_tsn = tsn;
Marco Varlese191a5942017-10-30 18:17:21 +0100746
Marco Varlese191a5942017-10-30 18:17:21 +0100747 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100748
Marco Varlese91389ac2018-01-31 11:00:01 +0100749 SCTP_ADV_DBG ("POINTER_WITH_DATA = %p", b->data);
750
751 if (sctp_is_sack_delayable (sctp_conn, is_gapping) != 0)
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100752 sctp_prepare_sack_chunk (sctp_conn, b);
Marco Varlese191a5942017-10-30 18:17:21 +0100753
754 return error;
755}
756
757always_inline u16
758sctp_handle_cookie_echo (sctp_header_t * sctp_hdr,
759 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +0100760 sctp_connection_t * sctp_conn, u8 idx,
761 vlib_buffer_t * b0, u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +0100762{
Marco Varlese21c8baf2018-02-02 17:17:51 +0100763 u32 now = sctp_time_now ();
Marco Varlese191a5942017-10-30 18:17:21 +0100764
Marco Varlese91389ac2018-01-31 11:00:01 +0100765 sctp_cookie_echo_chunk_t *cookie_echo =
766 (sctp_cookie_echo_chunk_t *) sctp_hdr;
767
Marco Varlese191a5942017-10-30 18:17:21 +0100768 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
769 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
770 {
771 return SCTP_ERROR_INVALID_TAG;
772 }
773
Marco Varlese21c8baf2018-02-02 17:17:51 +0100774 sctp_calculate_rto (sctp_conn, idx);
775
Marco Varlese91389ac2018-01-31 11:00:01 +0100776 u32 creation_time =
777 clib_net_to_host_u32 (cookie_echo->cookie.creation_time);
778 u32 cookie_lifespan =
779 clib_net_to_host_u32 (cookie_echo->cookie.cookie_lifespan);
780 if (now > creation_time + cookie_lifespan)
781 {
782 SCTP_DBG ("now (%u) > creation_time (%u) + cookie_lifespan (%u)",
783 now, creation_time, cookie_lifespan);
784 return SCTP_ERROR_COOKIE_ECHO_VIOLATION;
785 }
786
Marco Varlese191a5942017-10-30 18:17:21 +0100787 sctp_prepare_cookie_ack_chunk (sctp_conn, b0);
788
789 /* Change state */
790 sctp_conn->state = SCTP_STATE_ESTABLISHED;
Marco Varlesebe2251b2018-02-07 12:22:41 +0100791 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100792
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100793 sctp_timer_set (sctp_conn, idx, SCTP_TIMER_T4_HEARTBEAT,
794 sctp_conn->sub_conn[idx].RTO);
795
Marco Varlese191a5942017-10-30 18:17:21 +0100796 stream_session_accept_notify (&sctp_conn->sub_conn[idx].connection);
797
798 return SCTP_ERROR_NONE;
799
800}
801
802always_inline u16
803sctp_handle_cookie_ack (sctp_header_t * sctp_hdr,
804 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +0100805 sctp_connection_t * sctp_conn, u8 idx,
806 vlib_buffer_t * b0, u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +0100807{
Marco Varlese191a5942017-10-30 18:17:21 +0100808 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
809 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
810 {
811 return SCTP_ERROR_INVALID_TAG;
812 }
813
Marco Varlese21c8baf2018-02-02 17:17:51 +0100814 sctp_calculate_rto (sctp_conn, idx);
815
Marco Varlese191a5942017-10-30 18:17:21 +0100816 sctp_timer_reset (sctp_conn, idx, SCTP_TIMER_T1_COOKIE);
817 /* Change state */
818 sctp_conn->state = SCTP_STATE_ESTABLISHED;
Marco Varlesebe2251b2018-02-07 12:22:41 +0100819 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100820
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100821 sctp_timer_set (sctp_conn, idx, SCTP_TIMER_T4_HEARTBEAT,
822 sctp_conn->sub_conn[idx].RTO);
823
Marco Varlese191a5942017-10-30 18:17:21 +0100824 stream_session_accept_notify (&sctp_conn->sub_conn[idx].connection);
825
Marco Varlese191a5942017-10-30 18:17:21 +0100826 return SCTP_ERROR_NONE;
827
828}
829
830always_inline uword
831sctp46_rcv_phase_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
832 vlib_frame_t * from_frame, int is_ip4)
833{
834 sctp_main_t *tm = vnet_get_sctp_main ();
835
836 u32 n_left_from, next_index, *from, *to_next;
837 u32 my_thread_index = vm->thread_index;
838
839 from = vlib_frame_vector_args (from_frame);
840 n_left_from = from_frame->n_vectors;
841
842 next_index = node->cached_next_index;
843
844 while (n_left_from > 0)
845 {
846 u32 n_left_to_next;
847
848 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
849
850 while (n_left_from > 0 && n_left_to_next > 0)
851 {
852 u32 bi0;
853 vlib_buffer_t *b0;
854 sctp_header_t *sctp_hdr = 0;
855 sctp_chunks_common_hdr_t *sctp_chunk_hdr = 0;
856 ip4_header_t *ip4_hdr = 0;
857 ip6_header_t *ip6_hdr = 0;
858 sctp_connection_t *sctp_conn, *new_sctp_conn;
859 u16 sctp_implied_length = 0;
860 u16 error0 = SCTP_ERROR_NONE, next0 = SCTP_RCV_PHASE_N_NEXT;
861 u8 idx;
862
863 bi0 = from[0];
864 to_next[0] = bi0;
865 from += 1;
866 to_next += 1;
867 n_left_from -= 1;
868 n_left_to_next -= 1;
869
870 b0 = vlib_get_buffer (vm, bi0);
871
872 /* If we are in SCTP_COOKIE_WAIT_STATE then the connection
873 * will come from the half-open connections pool.
874 */
875 sctp_conn =
876 sctp_half_open_connection_get (vnet_buffer (b0)->
877 sctp.connection_index);
878
879 if (PREDICT_FALSE (sctp_conn == 0))
880 {
Marco Varlese191a5942017-10-30 18:17:21 +0100881 SCTP_ADV_DBG
882 ("sctp_conn == NULL; return SCTP_ERROR_INVALID_CONNECTION");
883 error0 = SCTP_ERROR_INVALID_CONNECTION;
884 goto drop;
885 }
886 if (is_ip4)
887 {
888 ip4_hdr = vlib_buffer_get_current (b0);
889 sctp_hdr = ip4_next_header (ip4_hdr);
890 }
891 else
892 {
893 ip6_hdr = vlib_buffer_get_current (b0);
894 sctp_hdr = ip6_next_header (ip6_hdr);
895 }
896 idx = sctp_pick_conn_idx_on_state (sctp_conn->state);
897
898 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
899
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100900 transport_connection_t *trans_conn =
Marco Varlese191a5942017-10-30 18:17:21 +0100901 &sctp_conn->sub_conn[idx].connection;
902
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100903 trans_conn->lcl_port = sctp_hdr->dst_port;
904 trans_conn->rmt_port = sctp_hdr->src_port;
905 trans_conn->is_ip4 = is_ip4;
Marco Varlese191a5942017-10-30 18:17:21 +0100906
907 if (is_ip4)
908 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100909 trans_conn->lcl_ip.ip4.as_u32 = ip4_hdr->dst_address.as_u32;
910 trans_conn->rmt_ip.ip4.as_u32 = ip4_hdr->src_address.as_u32;
Marco Varlese191a5942017-10-30 18:17:21 +0100911 }
912 else
913 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100914 clib_memcpy (&trans_conn->lcl_ip.ip6, &ip6_hdr->dst_address,
Marco Varlese191a5942017-10-30 18:17:21 +0100915 sizeof (ip6_address_t));
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100916 clib_memcpy (&trans_conn->rmt_ip.ip6, &ip6_hdr->src_address,
Marco Varlese191a5942017-10-30 18:17:21 +0100917 sizeof (ip6_address_t));
918 }
919
920 sctp_chunk_hdr =
921 (sctp_chunks_common_hdr_t *) (&full_hdr->common_hdr);
922
923 sctp_implied_length =
924 sctp_calculate_implied_length (ip4_hdr, ip6_hdr, is_ip4);
925
926 u8 chunk_type = vnet_sctp_get_chunk_type (&full_hdr->common_hdr);
927
928 switch (chunk_type)
929 {
930 case INIT_ACK:
931 error0 =
932 sctp_is_valid_init_ack (sctp_hdr, sctp_chunk_hdr, sctp_conn,
933 b0, sctp_implied_length);
934
935 if (error0 == SCTP_ERROR_NONE)
936 {
937 pool_get (tm->connections[my_thread_index], new_sctp_conn);
938 clib_memcpy (new_sctp_conn, sctp_conn,
939 sizeof (*new_sctp_conn));
940 new_sctp_conn->sub_conn[idx].c_c_index =
941 new_sctp_conn - tm->connections[my_thread_index];
942 new_sctp_conn->sub_conn[idx].c_thread_index =
943 my_thread_index;
944 new_sctp_conn->sub_conn[idx].parent = new_sctp_conn;
945
946 if (sctp_half_open_connection_cleanup (sctp_conn))
947 {
948 SCTP_DBG
949 ("Cannot cleanup half-open connection; not the owning thread");
950 }
951
952 sctp_connection_timers_init (new_sctp_conn);
953
954 error0 =
955 sctp_handle_init_ack (sctp_hdr, sctp_chunk_hdr,
Marco Varlese21c8baf2018-02-02 17:17:51 +0100956 new_sctp_conn, idx, b0,
Marco Varlese191a5942017-10-30 18:17:21 +0100957 sctp_implied_length);
958
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100959 sctp_init_mss (new_sctp_conn);
Marco Varlese191a5942017-10-30 18:17:21 +0100960
961 if (session_stream_connect_notify
962 (&new_sctp_conn->sub_conn[idx].connection, 0))
963 {
964 SCTP_DBG
965 ("conn_index = %u: session_stream_connect_notify error; cleaning up connection",
966 new_sctp_conn->sub_conn[idx].connection.c_index);
967 sctp_connection_cleanup (new_sctp_conn);
968 goto drop;
969 }
970 }
971 next0 = sctp_next_output (is_ip4);
972 break;
973
974 /* All UNEXPECTED scenarios (wrong chunk received per state-machine)
975 * are handled by the input-dispatcher function using the table-lookup
976 * hence we should never get to the "default" case below.
977 */
978 default:
979 error0 = SCTP_ERROR_UNKOWN_CHUNK;
980 next0 = SCTP_NEXT_DROP;
981 goto drop;
982 }
983
984 if (error0 != SCTP_ERROR_NONE)
985 {
986 clib_warning ("error while parsing chunk");
987 sctp_connection_cleanup (sctp_conn);
988 next0 = SCTP_NEXT_DROP;
989 goto drop;
990 }
991
992 drop:
993 b0->error = node->errors[error0];
994 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
995 {
996 sctp_rx_trace_t *t0 =
997 vlib_add_trace (vm, node, b0, sizeof (*t0));
998 sctp_set_rx_trace_data (t0, sctp_conn, sctp_hdr, b0, is_ip4);
999 }
1000
1001 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1002 n_left_to_next, bi0, next0);
1003 }
1004
1005 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1006 }
1007 return from_frame->n_vectors;
1008}
1009
1010static uword
1011sctp4_rcv_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1012 vlib_frame_t * from_frame)
1013{
1014 return sctp46_rcv_phase_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1015}
1016
1017static uword
1018sctp6_rcv_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1019 vlib_frame_t * from_frame)
1020{
1021 return sctp46_rcv_phase_inline (vm, node, from_frame, 0 /* is_ip4 */ );
1022}
1023
1024u8 *
1025format_sctp_rx_trace_short (u8 * s, va_list * args)
1026{
1027 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
1028 CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
1029 sctp_rx_trace_t *t = va_arg (*args, sctp_rx_trace_t *);
1030
1031 s = format (s, "%d -> %d (%U)",
1032 clib_net_to_host_u16 (t->sctp_header.src_port),
1033 clib_net_to_host_u16 (t->sctp_header.dst_port),
1034 format_sctp_state, t->sctp_connection.state);
1035
1036 return s;
1037}
1038
1039/* *INDENT-OFF* */
1040VLIB_REGISTER_NODE (sctp4_rcv_phase_node) =
1041{
1042 .function = sctp4_rcv_phase,
1043 .name = "sctp4-rcv",
1044 /* Takes a vector of packets. */
1045 .vector_size = sizeof (u32),
1046 .n_errors = SCTP_N_ERROR,
1047 .error_strings = sctp_error_strings,
1048 .n_next_nodes = SCTP_RCV_PHASE_N_NEXT,
1049 .next_nodes =
1050 {
1051#define _(s,n) [SCTP_RCV_PHASE_NEXT_##s] = n,
1052 foreach_sctp_state_next
1053#undef _
1054 },
1055 .format_trace = format_sctp_rx_trace_short,
1056};
1057/* *INDENT-ON* */
1058
1059VLIB_NODE_FUNCTION_MULTIARCH (sctp4_rcv_phase_node, sctp4_rcv_phase);
1060
1061/* *INDENT-OFF* */
1062VLIB_REGISTER_NODE (sctp6_init_phase_node) =
1063{
1064 .function = sctp6_rcv_phase,
1065 .name = "sctp6-rcv",
1066 /* Takes a vector of packets. */
1067 .vector_size = sizeof (u32),
1068 .n_errors = SCTP_N_ERROR,
1069 .error_strings = sctp_error_strings,
1070 .n_next_nodes = SCTP_RCV_PHASE_N_NEXT,
1071 .next_nodes =
1072 {
1073#define _(s,n) [SCTP_RCV_PHASE_NEXT_##s] = n,
1074 foreach_sctp_state_next
1075#undef _
1076 },
1077 .format_trace = format_sctp_rx_trace_short,
1078};
1079/* *INDENT-ON* */
1080
1081VLIB_NODE_FUNCTION_MULTIARCH (sctp6_init_phase_node, sctp6_rcv_phase);
1082
1083vlib_node_registration_t sctp4_shutdown_phase_node;
1084vlib_node_registration_t sctp6_shutdown_phase_node;
1085
1086always_inline u16
1087sctp_handle_shutdown (sctp_header_t * sctp_hdr,
1088 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001089 sctp_connection_t * sctp_conn, u8 idx,
1090 vlib_buffer_t * b0, u16 sctp_implied_length,
1091 u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001092{
1093 sctp_shutdown_association_chunk_t *shutdown_chunk =
1094 (sctp_shutdown_association_chunk_t *) (sctp_hdr);
1095
1096 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1097 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
1098 {
1099 return SCTP_ERROR_INVALID_TAG;
1100 }
1101
1102 /*
1103 * It is not possible to bundle any other CHUNK with the SHUTDOWN chunk
1104 */
1105 if (sctp_is_bundling (sctp_implied_length, &shutdown_chunk->chunk_hdr))
1106 return SCTP_ERROR_BUNDLING_VIOLATION;
1107
1108 switch (sctp_conn->state)
1109 {
1110 case SCTP_STATE_ESTABLISHED:
1111 if (sctp_check_outstanding_data_chunks (sctp_conn) == 0)
1112 sctp_conn->state = SCTP_STATE_SHUTDOWN_RECEIVED;
Marco Varlesebe2251b2018-02-07 12:22:41 +01001113 sctp_send_shutdown_ack (sctp_conn, b0);
Marco Varlese191a5942017-10-30 18:17:21 +01001114 break;
1115
1116 case SCTP_STATE_SHUTDOWN_SENT:
Marco Varlesebe2251b2018-02-07 12:22:41 +01001117 sctp_send_shutdown_ack (sctp_conn, b0);
Marco Varlese191a5942017-10-30 18:17:21 +01001118 break;
1119 }
1120
Marco Varlesebe2251b2018-02-07 12:22:41 +01001121 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
1122
Marco Varlese191a5942017-10-30 18:17:21 +01001123 return SCTP_ERROR_NONE;
1124}
1125
1126always_inline u16
1127sctp_handle_shutdown_ack (sctp_header_t * sctp_hdr,
1128 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001129 sctp_connection_t * sctp_conn, u8 idx,
1130 vlib_buffer_t * b0, u16 sctp_implied_length,
1131 u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001132{
1133 sctp_shutdown_ack_chunk_t *shutdown_ack_chunk =
1134 (sctp_shutdown_ack_chunk_t *) (sctp_hdr);
1135
1136 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1137 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
1138 {
1139 return SCTP_ERROR_INVALID_TAG;
1140 }
1141
1142 /*
1143 * It is not possible to bundle any other CHUNK with the SHUTDOWN chunk
1144 */
1145 if (sctp_is_bundling (sctp_implied_length, &shutdown_ack_chunk->chunk_hdr))
1146 return SCTP_ERROR_BUNDLING_VIOLATION;
1147
1148 /* Whether we are in SCTP_STATE_SHUTDOWN_SENT or SCTP_STATE_SHUTDOWN_ACK_SENT
1149 * the reception of a SHUTDOWN_ACK chunk leads to the same actions:
1150 * - STOP T2_SHUTDOWN timer
1151 * - SEND SHUTDOWN_COMPLETE chunk
1152 */
1153 sctp_timer_reset (sctp_conn, MAIN_SCTP_SUB_CONN_IDX,
1154 SCTP_TIMER_T2_SHUTDOWN);
1155 sctp_send_shutdown_complete (sctp_conn);
1156
Marco Varlesebe2251b2018-02-07 12:22:41 +01001157 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
1158
Marco Varlese191a5942017-10-30 18:17:21 +01001159 return SCTP_ERROR_NONE;
1160}
1161
1162always_inline u16
1163sctp_handle_shutdown_complete (sctp_header_t * sctp_hdr,
1164 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001165 sctp_connection_t * sctp_conn, u8 idx,
1166 vlib_buffer_t * b0, u16 sctp_implied_length,
1167 u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001168{
1169 sctp_shutdown_complete_chunk_t *shutdown_complete =
1170 (sctp_shutdown_complete_chunk_t *) (sctp_hdr);
1171
1172 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1173 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
1174 {
1175 return SCTP_ERROR_INVALID_TAG;
1176 }
1177
1178 /*
1179 * It is not possible to bundle any other CHUNK with the SHUTDOWN chunk
1180 */
1181 if (sctp_is_bundling (sctp_implied_length, &shutdown_complete->chunk_hdr))
1182 return SCTP_ERROR_BUNDLING_VIOLATION;
1183
1184 sctp_timer_reset (sctp_conn, MAIN_SCTP_SUB_CONN_IDX,
1185 SCTP_TIMER_T2_SHUTDOWN);
1186
1187 sctp_conn->state = SCTP_STATE_CLOSED;
1188
1189 stream_session_disconnect_notify (&sctp_conn->sub_conn
1190 [MAIN_SCTP_SUB_CONN_IDX].connection);
1191
Marco Varlesebe2251b2018-02-07 12:22:41 +01001192 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
1193
Marco Varlese191a5942017-10-30 18:17:21 +01001194 return SCTP_ERROR_NONE;
1195}
1196
1197always_inline uword
1198sctp46_shutdown_phase_inline (vlib_main_t * vm,
1199 vlib_node_runtime_t * node,
1200 vlib_frame_t * from_frame, int is_ip4)
1201{
1202 u32 n_left_from, next_index, *from, *to_next;
1203 u32 my_thread_index = vm->thread_index;
1204
1205 from = vlib_frame_vector_args (from_frame);
1206 n_left_from = from_frame->n_vectors;
1207
1208 next_index = node->cached_next_index;
1209
1210 while (n_left_from > 0)
1211 {
1212 u32 n_left_to_next;
1213
1214 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1215
1216 while (n_left_from > 0 && n_left_to_next > 0)
1217 {
1218 u32 bi0;
1219 vlib_buffer_t *b0;
1220 sctp_rx_trace_t *sctp_trace;
1221 sctp_header_t *sctp_hdr = 0;
1222 sctp_chunks_common_hdr_t *sctp_chunk_hdr = 0;
1223 ip4_header_t *ip4_hdr = 0;
1224 ip6_header_t *ip6_hdr = 0;
1225 sctp_connection_t *sctp_conn;
1226 u16 sctp_implied_length = 0;
1227 u16 error0 = SCTP_ERROR_NONE, next0 = SCTP_RCV_PHASE_N_NEXT;
1228
1229 bi0 = from[0];
1230 to_next[0] = bi0;
1231 from += 1;
1232 to_next += 1;
1233 n_left_from -= 1;
1234 n_left_to_next -= 1;
1235
1236 b0 = vlib_get_buffer (vm, bi0);
1237 sctp_conn =
1238 sctp_connection_get (vnet_buffer (b0)->sctp.connection_index,
1239 my_thread_index);
1240
1241 if (PREDICT_FALSE (sctp_conn == 0))
1242 {
1243 SCTP_DBG
1244 ("sctp_conn == NULL; return SCTP_ERROR_INVALID_CONNECTION");
1245 error0 = SCTP_ERROR_INVALID_CONNECTION;
1246 goto drop;
1247 }
1248
1249 if (is_ip4)
1250 {
1251 ip4_hdr = vlib_buffer_get_current (b0);
1252 sctp_hdr = ip4_next_header (ip4_hdr);
1253 }
1254 else
1255 {
1256 ip6_hdr = vlib_buffer_get_current (b0);
1257 sctp_hdr = ip6_next_header (ip6_hdr);
1258 }
1259
1260 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
1261 sctp_chunk_hdr = &full_hdr->common_hdr;
1262
1263 sctp_implied_length =
1264 sctp_calculate_implied_length (ip4_hdr, ip6_hdr, is_ip4);
1265
Marco Varlesebe2251b2018-02-07 12:22:41 +01001266 u8 idx = sctp_pick_conn_idx_on_state (sctp_conn->state);
1267
1268 u8 chunk_type = vnet_sctp_get_chunk_type (sctp_chunk_hdr);
1269 switch (chunk_type)
Marco Varlese191a5942017-10-30 18:17:21 +01001270 {
1271 case SHUTDOWN:
1272 error0 =
Marco Varlesebe2251b2018-02-07 12:22:41 +01001273 sctp_handle_shutdown (sctp_hdr, sctp_chunk_hdr, sctp_conn,
1274 idx, b0, sctp_implied_length, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001275 break;
1276
1277 case SHUTDOWN_ACK:
1278 error0 =
1279 sctp_handle_shutdown_ack (sctp_hdr, sctp_chunk_hdr, sctp_conn,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001280 idx, b0, sctp_implied_length,
1281 &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001282 break;
1283
1284 case SHUTDOWN_COMPLETE:
1285 error0 =
1286 sctp_handle_shutdown_complete (sctp_hdr, sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001287 sctp_conn, idx, b0,
1288 sctp_implied_length, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001289
1290 sctp_connection_cleanup (sctp_conn);
Marco Varlese191a5942017-10-30 18:17:21 +01001291 break;
1292
1293 /*
1294 * DATA chunks can still be transmitted/received in the SHUTDOWN-PENDING
1295 * and SHUTDOWN-SENT states (as per RFC4960 Section 6)
1296 */
1297 case DATA:
1298 error0 =
1299 sctp_handle_data ((sctp_payload_data_chunk_t *) sctp_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001300 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001301 break;
1302
1303 /* All UNEXPECTED scenarios (wrong chunk received per state-machine)
1304 * are handled by the input-dispatcher function using the table-lookup
1305 * hence we should never get to the "default" case below.
1306 */
1307 default:
1308 error0 = SCTP_ERROR_UNKOWN_CHUNK;
1309 next0 = SCTP_NEXT_DROP;
1310 goto drop;
1311 }
1312
1313 if (error0 != SCTP_ERROR_NONE)
1314 {
1315 clib_warning ("error while parsing chunk");
1316 sctp_connection_cleanup (sctp_conn);
1317 next0 = SCTP_NEXT_DROP;
1318 goto drop;
1319 }
1320
1321 drop:
1322 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
1323 {
1324 sctp_trace =
1325 vlib_add_trace (vm, node, b0, sizeof (*sctp_trace));
Marco Varlesef429a932018-02-06 17:31:06 +01001326
1327 if (sctp_hdr != NULL)
1328 clib_memcpy (&sctp_trace->sctp_header, sctp_hdr,
1329 sizeof (sctp_trace->sctp_header));
1330
1331 if (sctp_conn != NULL)
1332 clib_memcpy (&sctp_trace->sctp_connection, sctp_conn,
1333 sizeof (sctp_trace->sctp_connection));
Marco Varlese191a5942017-10-30 18:17:21 +01001334 }
1335
1336 b0->error = node->errors[error0];
1337
1338 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1339 n_left_to_next, bi0, next0);
1340 }
1341
1342 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1343 }
1344
1345 return from_frame->n_vectors;
1346
1347}
1348
1349static uword
1350sctp4_shutdown_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1351 vlib_frame_t * from_frame)
1352{
1353 return sctp46_shutdown_phase_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1354}
1355
1356static uword
1357sctp6_shutdown_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1358 vlib_frame_t * from_frame)
1359{
1360 return sctp46_shutdown_phase_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1361}
1362
1363/* *INDENT-OFF* */
1364VLIB_REGISTER_NODE (sctp4_shutdown_phase_node) =
1365{
1366 .function = sctp4_shutdown_phase,
1367 .name = "sctp4-shutdown",
1368 /* Takes a vector of packets. */
1369 .vector_size = sizeof (u32),
1370 .n_errors = SCTP_N_ERROR,
1371 .error_strings = sctp_error_strings,
1372 .n_next_nodes = SCTP_SHUTDOWN_PHASE_N_NEXT,
1373 .next_nodes =
1374 {
1375#define _(s,n) [SCTP_SHUTDOWN_PHASE_NEXT_##s] = n,
1376 foreach_sctp_state_next
1377#undef _
1378 },
1379 .format_trace = format_sctp_rx_trace_short,
1380};
1381/* *INDENT-ON* */
1382
1383VLIB_NODE_FUNCTION_MULTIARCH (sctp4_shutdown_phase_node,
1384 sctp4_shutdown_phase);
1385
1386/* *INDENT-OFF* */
1387VLIB_REGISTER_NODE (sctp6_shutdown_phase_node) =
1388{
1389 .function = sctp6_shutdown_phase,
1390 .name = "sctp6-shutdown",
1391 /* Takes a vector of packets. */
1392 .vector_size = sizeof (u32),
1393 .n_errors = SCTP_N_ERROR,
1394 .error_strings = sctp_error_strings,
1395 .n_next_nodes = SCTP_SHUTDOWN_PHASE_N_NEXT,
1396 .next_nodes =
1397 {
1398#define _(s,n) [SCTP_SHUTDOWN_PHASE_NEXT_##s] = n,
1399 foreach_sctp_state_next
1400#undef _
1401 },
1402 .format_trace = format_sctp_rx_trace_short,
1403};
1404/* *INDENT-ON* */
1405
1406VLIB_NODE_FUNCTION_MULTIARCH (sctp6_shutdown_phase_node,
1407 sctp6_shutdown_phase);
1408
1409vlib_node_registration_t sctp4_listen_phase_node;
1410vlib_node_registration_t sctp6_listen_phase_node;
1411
1412vlib_node_registration_t sctp4_established_phase_node;
1413vlib_node_registration_t sctp6_established_phase_node;
1414
1415always_inline u16
1416sctp_handle_sack (sctp_selective_ack_chunk_t * sack_chunk,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001417 sctp_connection_t * sctp_conn, u8 idx, vlib_buffer_t * b0,
Marco Varlese191a5942017-10-30 18:17:21 +01001418 u16 * next0)
1419{
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001420 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1421 if (sctp_conn->local_tag != sack_chunk->sctp_hdr.verification_tag)
1422 {
1423 return SCTP_ERROR_INVALID_TAG;
1424 }
1425
Marco Varlese21c8baf2018-02-02 17:17:51 +01001426 sctp_calculate_rto (sctp_conn, idx);
1427
1428 sctp_timer_update (sctp_conn, idx, SCTP_TIMER_T3_RXTX,
1429 sctp_conn->sub_conn[idx].RTO);
1430
1431 sctp_conn->sub_conn[idx].RTO_pending = 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001432
1433 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].connection.is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +01001434
1435 return SCTP_ERROR_NONE;
1436}
1437
1438always_inline u16
1439sctp_handle_heartbeat (sctp_hb_req_chunk_t * sctp_hb_chunk,
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001440 sctp_connection_t * sctp_conn, u8 idx,
1441 vlib_buffer_t * b0, u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001442{
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001443 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1444 if (sctp_conn->local_tag != sctp_hb_chunk->sctp_hdr.verification_tag)
1445 {
1446 return SCTP_ERROR_INVALID_TAG;
1447 }
1448
1449 sctp_prepare_heartbeat_ack_chunk (sctp_conn, b0);
1450
1451 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].connection.is_ip4);
1452
Marco Varlese191a5942017-10-30 18:17:21 +01001453 return SCTP_ERROR_NONE;
1454}
1455
1456always_inline u16
1457sctp_handle_heartbeat_ack (sctp_hb_ack_chunk_t * sctp_hb_ack_chunk,
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001458 sctp_connection_t * sctp_conn, u8 idx,
1459 vlib_buffer_t * b0, u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001460{
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001461 sctp_conn->sub_conn[idx].unacknowledged_hb -= 1;
1462
1463 sctp_timer_update (sctp_conn, idx, SCTP_TIMER_T4_HEARTBEAT,
1464 sctp_conn->sub_conn[idx].RTO);
1465
1466 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].connection.is_ip4);
1467
Marco Varlese191a5942017-10-30 18:17:21 +01001468 return SCTP_ERROR_NONE;
1469}
1470
1471always_inline void
1472sctp_node_inc_counter (vlib_main_t * vm, u32 tcp4_node, u32 tcp6_node,
1473 u8 is_ip4, u8 evt, u8 val)
1474{
1475 if (PREDICT_TRUE (!val))
1476 return;
1477
1478 if (is_ip4)
1479 vlib_node_increment_counter (vm, tcp4_node, evt, val);
1480 else
1481 vlib_node_increment_counter (vm, tcp6_node, evt, val);
1482}
1483
1484always_inline uword
1485sctp46_listen_process_inline (vlib_main_t * vm,
1486 vlib_node_runtime_t * node,
1487 vlib_frame_t * from_frame, int is_ip4)
1488{
1489 u32 n_left_from, next_index, *from, *to_next;
1490 u32 my_thread_index = vm->thread_index;
1491
1492 from = vlib_frame_vector_args (from_frame);
1493 n_left_from = from_frame->n_vectors;
1494
1495 next_index = node->cached_next_index;
1496
1497 while (n_left_from > 0)
1498 {
1499 u32 n_left_to_next;
1500
1501 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1502
1503 while (n_left_from > 0 && n_left_to_next > 0)
1504 {
1505 u32 bi0;
1506 vlib_buffer_t *b0;
1507 sctp_header_t *sctp_hdr = 0;
1508 ip4_header_t *ip4_hdr;
1509 ip6_header_t *ip6_hdr;
1510 sctp_connection_t *child_conn;
1511 sctp_connection_t *sctp_listener;
1512 u16 next0 = SCTP_LISTEN_PHASE_N_NEXT, error0 = SCTP_ERROR_ENQUEUED;
1513
1514 bi0 = from[0];
1515 to_next[0] = bi0;
1516 from += 1;
1517 to_next += 1;
1518 n_left_from -= 1;
1519 n_left_to_next -= 1;
1520
1521 b0 = vlib_get_buffer (vm, bi0);
1522 sctp_listener =
1523 sctp_listener_get (vnet_buffer (b0)->sctp.connection_index);
1524
1525 if (is_ip4)
1526 {
1527 ip4_hdr = vlib_buffer_get_current (b0);
1528 sctp_hdr = ip4_next_header (ip4_hdr);
1529 }
1530 else
1531 {
1532 ip6_hdr = vlib_buffer_get_current (b0);
1533 sctp_hdr = ip6_next_header (ip6_hdr);
1534 }
1535
1536 child_conn =
1537 sctp_lookup_connection (sctp_listener->sub_conn
1538 [MAIN_SCTP_SUB_CONN_IDX].c_fib_index, b0,
1539 my_thread_index, is_ip4);
1540
1541 if (PREDICT_FALSE (child_conn->state != SCTP_STATE_CLOSED))
1542 {
1543 SCTP_DBG
1544 ("conn_index = %u: child_conn->state != SCTP_STATE_CLOSED.... STATE=%s",
1545 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].
1546 connection.c_index,
1547 sctp_state_to_string (child_conn->state));
1548 error0 = SCTP_ERROR_CREATE_EXISTS;
1549 goto drop;
1550 }
1551
1552 /* Create child session and send SYN-ACK */
1553 child_conn = sctp_connection_new (my_thread_index);
1554 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].parent = child_conn;
1555 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_lcl_port =
1556 sctp_hdr->dst_port;
1557 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_rmt_port =
1558 sctp_hdr->src_port;
1559 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_is_ip4 = is_ip4;
1560 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].connection.proto =
1561 sctp_listener->sub_conn[MAIN_SCTP_SUB_CONN_IDX].connection.proto;
1562 child_conn->state = SCTP_STATE_CLOSED;
1563
1564 if (is_ip4)
1565 {
1566 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_lcl_ip4.as_u32 =
1567 ip4_hdr->dst_address.as_u32;
1568 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_rmt_ip4.as_u32 =
1569 ip4_hdr->src_address.as_u32;
1570 }
1571 else
1572 {
1573 clib_memcpy (&child_conn->
1574 sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_lcl_ip6,
1575 &ip6_hdr->dst_address, sizeof (ip6_address_t));
1576 clib_memcpy (&child_conn->
1577 sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_rmt_ip6,
1578 &ip6_hdr->src_address, sizeof (ip6_address_t));
1579 }
1580
1581 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
1582 sctp_chunks_common_hdr_t *sctp_chunk_hdr = &full_hdr->common_hdr;
1583
1584 u8 chunk_type = vnet_sctp_get_chunk_type (sctp_chunk_hdr);
1585 if (chunk_type != INIT)
1586 {
1587 SCTP_DBG
1588 ("conn_index = %u: chunk_type != INIT... chunk_type=%s",
1589 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].
1590 connection.c_index, sctp_chunk_to_string (chunk_type));
1591
1592 error0 = SCTP_ERROR_UNKOWN_CHUNK;
1593 next0 = SCTP_NEXT_DROP;
1594 goto drop;
1595 }
1596
1597 u16 sctp_implied_length =
1598 sctp_calculate_implied_length (ip4_hdr, ip6_hdr, is_ip4);
1599
1600 switch (chunk_type)
1601 {
1602 case INIT:
1603 sctp_connection_timers_init (child_conn);
1604
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001605 sctp_init_snd_vars (child_conn);
1606
Marco Varlese191a5942017-10-30 18:17:21 +01001607 error0 =
1608 sctp_handle_init (sctp_hdr, sctp_chunk_hdr, child_conn, b0,
1609 sctp_implied_length);
1610
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001611 sctp_init_mss (child_conn);
Marco Varlese191a5942017-10-30 18:17:21 +01001612
1613 if (error0 == SCTP_ERROR_NONE)
1614 {
1615 if (stream_session_accept
1616 (&child_conn->
1617 sub_conn[MAIN_SCTP_SUB_CONN_IDX].connection,
1618 sctp_listener->
1619 sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_s_index, 0))
1620 {
1621 clib_warning ("session accept fail");
1622 sctp_connection_cleanup (child_conn);
1623 error0 = SCTP_ERROR_CREATE_SESSION_FAIL;
1624 goto drop;
1625 }
1626 }
1627 next0 = sctp_next_output (is_ip4);
1628 break;
1629
1630 /* Reception of a DATA chunk whilst in the CLOSED state is called
1631 * "Out of the Blue" packet and handling of the chunk needs special treatment
1632 * as per RFC4960 section 8.4
1633 */
1634 case DATA:
1635 break;
1636 }
1637
1638 drop:
1639 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
1640 {
1641 sctp_rx_trace_t *t0 =
1642 vlib_add_trace (vm, node, b0, sizeof (*t0));
1643 clib_memcpy (&t0->sctp_header, sctp_hdr,
1644 sizeof (t0->sctp_header));
1645 clib_memcpy (&t0->sctp_connection, sctp_listener,
1646 sizeof (t0->sctp_connection));
1647 }
1648
1649 b0->error = node->errors[error0];
1650
1651 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1652 n_left_to_next, bi0, next0);
1653 }
1654 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1655
1656 }
1657 return from_frame->n_vectors;
1658}
1659
1660static uword
1661sctp4_listen_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1662 vlib_frame_t * from_frame)
1663{
1664 return sctp46_listen_process_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1665}
1666
1667static uword
1668sctp6_listen_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1669 vlib_frame_t * from_frame)
1670{
1671 return sctp46_listen_process_inline (vm, node, from_frame, 0 /* is_ip4 */ );
1672}
1673
1674always_inline uword
1675sctp46_established_phase_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
1676 vlib_frame_t * from_frame, int is_ip4)
1677{
1678 u32 n_left_from, next_index, *from, *to_next;
1679 u32 my_thread_index = vm->thread_index, errors = 0;
1680
1681 from = vlib_frame_vector_args (from_frame);
1682 n_left_from = from_frame->n_vectors;
1683
1684 next_index = node->cached_next_index;
1685
1686 while (n_left_from > 0)
1687 {
1688 u32 n_left_to_next;
1689
1690 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1691
1692 while (n_left_from > 0 && n_left_to_next > 0)
1693 {
1694 u32 bi0;
1695 vlib_buffer_t *b0;
1696 sctp_header_t *sctp_hdr = 0;
1697 sctp_chunks_common_hdr_t *sctp_chunk_hdr = 0;
1698 ip4_header_t *ip4_hdr = 0;
1699 ip6_header_t *ip6_hdr = 0;
1700 sctp_connection_t *sctp_conn;
1701 u16 error0 = SCTP_ERROR_NONE, next0 = SCTP_ESTABLISHED_PHASE_N_NEXT;
1702 u8 idx;
1703
1704 bi0 = from[0];
1705 to_next[0] = bi0;
1706 from += 1;
1707 to_next += 1;
1708 n_left_from -= 1;
1709 n_left_to_next -= 1;
1710
1711 b0 = vlib_get_buffer (vm, bi0);
1712 sctp_conn =
1713 sctp_connection_get (vnet_buffer (b0)->sctp.connection_index,
1714 my_thread_index);
1715
1716 if (PREDICT_FALSE (sctp_conn == 0))
1717 {
1718 SCTP_DBG
1719 ("sctp_conn == NULL; return SCTP_ERROR_INVALID_CONNECTION");
1720 error0 = SCTP_ERROR_INVALID_CONNECTION;
1721 goto done;
1722 }
1723 if (is_ip4)
1724 {
1725 ip4_hdr = vlib_buffer_get_current (b0);
1726 sctp_hdr = ip4_next_header (ip4_hdr);
1727 }
1728 else
1729 {
1730 ip6_hdr = vlib_buffer_get_current (b0);
1731 sctp_hdr = ip6_next_header (ip6_hdr);
1732 }
1733
1734 idx = sctp_pick_conn_idx_on_state (sctp_conn->state);
1735
1736 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
1737
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001738 transport_connection_t *trans_conn =
Marco Varlese191a5942017-10-30 18:17:21 +01001739 &sctp_conn->sub_conn[idx].connection;
1740
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001741 trans_conn->lcl_port = sctp_hdr->dst_port;
1742 trans_conn->rmt_port = sctp_hdr->src_port;
1743 trans_conn->is_ip4 = is_ip4;
Marco Varlese191a5942017-10-30 18:17:21 +01001744
1745 sctp_conn->sub_conn[idx].parent = sctp_conn;
1746
1747 if (is_ip4)
1748 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001749 trans_conn->lcl_ip.ip4.as_u32 = ip4_hdr->dst_address.as_u32;
1750 trans_conn->rmt_ip.ip4.as_u32 = ip4_hdr->src_address.as_u32;
Marco Varlese191a5942017-10-30 18:17:21 +01001751 }
1752 else
1753 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001754 clib_memcpy (&trans_conn->lcl_ip.ip6, &ip6_hdr->dst_address,
Marco Varlese191a5942017-10-30 18:17:21 +01001755 sizeof (ip6_address_t));
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001756 clib_memcpy (&trans_conn->rmt_ip.ip6, &ip6_hdr->src_address,
Marco Varlese191a5942017-10-30 18:17:21 +01001757 sizeof (ip6_address_t));
1758 }
1759
1760 sctp_chunk_hdr =
1761 (sctp_chunks_common_hdr_t *) (&full_hdr->common_hdr);
1762
1763 u8 chunk_type = vnet_sctp_get_chunk_type (&full_hdr->common_hdr);
1764
1765 switch (chunk_type)
1766 {
1767 case COOKIE_ECHO:
1768 error0 =
1769 sctp_handle_cookie_echo (sctp_hdr, sctp_chunk_hdr, sctp_conn,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001770 idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001771 break;
1772
1773 case COOKIE_ACK:
1774 error0 =
1775 sctp_handle_cookie_ack (sctp_hdr, sctp_chunk_hdr, sctp_conn,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001776 idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001777 break;
1778
1779 case SACK:
1780 error0 =
1781 sctp_handle_sack ((sctp_selective_ack_chunk_t *) sctp_hdr,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001782 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001783 break;
1784
1785 case HEARTBEAT:
1786 error0 =
1787 sctp_handle_heartbeat ((sctp_hb_req_chunk_t *) sctp_hdr,
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001788 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001789 break;
1790
1791 case HEARTBEAT_ACK:
1792 error0 =
1793 sctp_handle_heartbeat_ack ((sctp_hb_ack_chunk_t *) sctp_hdr,
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001794 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001795 break;
1796
1797 case DATA:
1798 error0 =
1799 sctp_handle_data ((sctp_payload_data_chunk_t *) sctp_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001800 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001801 break;
1802
1803 /* All UNEXPECTED scenarios (wrong chunk received per state-machine)
1804 * are handled by the input-dispatcher function using the table-lookup
1805 * hence we should never get to the "default" case below.
1806 */
1807 default:
1808 error0 = SCTP_ERROR_UNKOWN_CHUNK;
1809 next0 = SCTP_NEXT_DROP;
1810 goto done;
1811 }
1812
1813 done:
1814 b0->error = node->errors[error0];
1815 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
1816 {
1817 sctp_rx_trace_t *t0 =
1818 vlib_add_trace (vm, node, b0, sizeof (*t0));
1819 sctp_set_rx_trace_data (t0, sctp_conn, sctp_hdr, b0, is_ip4);
1820 }
1821
1822 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1823 n_left_to_next, bi0, next0);
1824 }
1825
1826 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1827 }
1828
1829 errors = session_manager_flush_enqueue_events (TRANSPORT_PROTO_SCTP,
1830 my_thread_index);
1831
1832 sctp_node_inc_counter (vm, is_ip4, sctp4_established_phase_node.index,
1833 sctp6_established_phase_node.index,
1834 SCTP_ERROR_EVENT_FIFO_FULL, errors);
1835 sctp_flush_frame_to_output (vm, my_thread_index, is_ip4);
1836
1837 return from_frame->n_vectors;
1838}
1839
1840static uword
1841sctp4_established_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1842 vlib_frame_t * from_frame)
1843{
1844 return sctp46_established_phase_inline (vm, node, from_frame,
1845 1 /* is_ip4 */ );
1846}
1847
1848static uword
1849sctp6_established_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1850 vlib_frame_t * from_frame)
1851{
1852 return sctp46_established_phase_inline (vm, node, from_frame,
1853 0 /* is_ip4 */ );
1854}
1855
1856u8 *
1857format_sctp_rx_trace (u8 * s, va_list * args)
1858{
1859 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
1860 CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
1861 sctp_rx_trace_t *t = va_arg (*args, sctp_rx_trace_t *);
1862 u32 indent = format_get_indent (s);
1863
1864 s = format (s, "%U\n%U%U",
1865 format_sctp_header, &t->sctp_header, 128,
1866 format_white_space, indent,
1867 format_sctp_connection, &t->sctp_connection, 1);
1868
1869 return s;
1870}
1871
1872/* *INDENT-OFF* */
1873VLIB_REGISTER_NODE (sctp4_listen_phase_node) =
1874{
1875 .function = sctp4_listen_phase,
1876 .name = "sctp4-listen",
1877 /* Takes a vector of packets. */
1878 .vector_size = sizeof (u32),
1879 .n_errors = SCTP_N_ERROR,
1880 .error_strings = sctp_error_strings,
1881 .n_next_nodes = SCTP_LISTEN_PHASE_N_NEXT,
1882 .next_nodes =
1883 {
1884#define _(s,n) [SCTP_LISTEN_PHASE_NEXT_##s] = n,
1885 foreach_sctp_state_next
1886#undef _
1887 },
1888 .format_trace = format_sctp_rx_trace_short,
1889};
1890/* *INDENT-ON* */
1891
1892VLIB_NODE_FUNCTION_MULTIARCH (sctp4_listen_phase_node, sctp4_listen_phase);
1893
1894/* *INDENT-OFF* */
1895VLIB_REGISTER_NODE (sctp6_listen_phase_node) =
1896{
1897 .function = sctp6_listen_phase,
1898 .name = "sctp6-listen",
1899 /* Takes a vector of packets. */
1900 .vector_size = sizeof (u32),
1901 .n_errors = SCTP_N_ERROR,
1902 .error_strings = sctp_error_strings,
1903 .n_next_nodes = SCTP_LISTEN_PHASE_N_NEXT,
1904 .next_nodes =
1905 {
1906#define _(s,n) [SCTP_LISTEN_PHASE_NEXT_##s] = n,
1907 foreach_sctp_state_next
1908#undef _
1909 },
1910 .format_trace = format_sctp_rx_trace_short,
1911};
1912/* *INDENT-ON* */
1913
1914VLIB_NODE_FUNCTION_MULTIARCH (sctp6_listen_phase_node, sctp6_listen_phase);
1915
1916/* *INDENT-OFF* */
1917VLIB_REGISTER_NODE (sctp4_established_phase_node) =
1918{
1919 .function = sctp4_established_phase,
1920 .name = "sctp4-established",
1921 /* Takes a vector of packets. */
1922 .vector_size = sizeof (u32),
1923 .n_errors = SCTP_N_ERROR,
1924 .error_strings = sctp_error_strings,
1925 .n_next_nodes = SCTP_ESTABLISHED_PHASE_N_NEXT,
1926 .next_nodes =
1927 {
1928#define _(s,n) [SCTP_ESTABLISHED_PHASE_NEXT_##s] = n,
1929 foreach_sctp_state_next
1930#undef _
1931 },
1932 .format_trace = format_sctp_rx_trace_short,
1933};
1934/* *INDENT-ON* */
1935
1936VLIB_NODE_FUNCTION_MULTIARCH (sctp4_established_phase_node,
1937 sctp4_established_phase);
1938
1939/* *INDENT-OFF* */
1940VLIB_REGISTER_NODE (sctp6_established_phase_node) =
1941{
1942 .function = sctp6_established_phase,
1943 .name = "sctp6-established",
1944 /* Takes a vector of packets. */
1945 .vector_size = sizeof (u32),
1946 .n_errors = SCTP_N_ERROR,
1947 .error_strings = sctp_error_strings,
1948 .n_next_nodes = SCTP_LISTEN_PHASE_N_NEXT,
1949 .next_nodes =
1950 {
1951#define _(s,n) [SCTP_LISTEN_PHASE_NEXT_##s] = n,
1952 foreach_sctp_state_next
1953#undef _
1954 },
1955 .format_trace = format_sctp_rx_trace_short,
1956};
1957/* *INDENT-ON* */
1958
1959VLIB_NODE_FUNCTION_MULTIARCH (sctp6_established_phase_node,
1960 sctp6_established_phase);
1961
1962/*
1963 * This is the function executed first for the SCTP graph.
1964 * It takes care of doing the initial message parsing and
1965 * dispatch to the specialized function.
1966 */
1967always_inline uword
1968sctp46_input_dispatcher (vlib_main_t * vm, vlib_node_runtime_t * node,
1969 vlib_frame_t * from_frame, int is_ip4)
1970{
1971 u32 n_left_from, next_index, *from, *to_next;
1972 u32 my_thread_index = vm->thread_index;
1973 u8 is_filtered;
1974 sctp_main_t *tm = vnet_get_sctp_main ();
1975
1976 from = vlib_frame_vector_args (from_frame);
1977 n_left_from = from_frame->n_vectors;
1978 next_index = node->cached_next_index;
1979 sctp_set_time_now (my_thread_index);
1980
1981 while (n_left_from > 0)
1982 {
1983 u32 n_left_to_next;
1984
1985 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1986
1987 while (n_left_from > 0 && n_left_to_next > 0)
1988 {
1989 int n_advance_bytes0, n_data_bytes0;
1990 u32 bi0, fib_index0;
1991 vlib_buffer_t *b0;
1992 sctp_header_t *sctp_hdr = 0;
1993 sctp_chunks_common_hdr_t *sctp_chunk_hdr = 0;
1994 sctp_connection_t *sctp_conn;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001995 transport_connection_t *trans_conn;
Marco Varlese191a5942017-10-30 18:17:21 +01001996 ip4_header_t *ip4_hdr;
1997 ip6_header_t *ip6_hdr;
1998 u32 error0 = SCTP_ERROR_NO_LISTENER, next0 = SCTP_INPUT_NEXT_DROP;
1999
2000 bi0 = from[0];
2001 to_next[0] = bi0;
2002 from += 1;
2003 to_next += 1;
2004 n_left_from -= 1;
2005 n_left_to_next -= 1;
2006
2007 b0 = vlib_get_buffer (vm, bi0);
2008 vnet_buffer (b0)->tcp.flags = 0;
2009 fib_index0 = vnet_buffer (b0)->ip.fib_index;
2010
2011 /* Checksum computed by ipx_local no need to compute again */
2012
2013 if (is_ip4)
2014 {
2015 ip4_hdr = vlib_buffer_get_current (b0);
2016 sctp_hdr = ip4_next_header (ip4_hdr);
2017
2018 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
2019 sctp_chunk_hdr = &full_hdr->common_hdr;
2020
2021 n_advance_bytes0 =
2022 (ip4_header_bytes (ip4_hdr) +
2023 sizeof (sctp_payload_data_chunk_t));
2024 n_data_bytes0 =
2025 clib_net_to_host_u16 (ip4_hdr->length) - n_advance_bytes0;
2026
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01002027 trans_conn = session_lookup_connection_wt4 (fib_index0,
2028 &ip4_hdr->dst_address,
2029 &ip4_hdr->src_address,
2030 sctp_hdr->dst_port,
2031 sctp_hdr->src_port,
2032 TRANSPORT_PROTO_SCTP,
2033 my_thread_index,
2034 &is_filtered);
Marco Varlese191a5942017-10-30 18:17:21 +01002035 }
2036 else
2037 {
2038 ip6_hdr = vlib_buffer_get_current (b0);
2039 sctp_hdr = ip6_next_header (ip6_hdr);
2040
2041 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
2042 sctp_chunk_hdr = &full_hdr->common_hdr;
2043
2044 n_advance_bytes0 = sctp_header_bytes ();
2045 n_data_bytes0 =
2046 clib_net_to_host_u16 (ip6_hdr->payload_length) -
2047 n_advance_bytes0;
2048 n_advance_bytes0 += sizeof (ip6_hdr[0]);
2049
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01002050 trans_conn = session_lookup_connection_wt6 (fib_index0,
2051 &ip6_hdr->dst_address,
2052 &ip6_hdr->src_address,
2053 sctp_hdr->dst_port,
2054 sctp_hdr->src_port,
2055 TRANSPORT_PROTO_SCTP,
2056 my_thread_index,
2057 &is_filtered);
Marco Varlese191a5942017-10-30 18:17:21 +01002058 }
2059
2060 /* Length check */
2061 if (PREDICT_FALSE (n_advance_bytes0 < 0))
2062 {
2063 error0 = SCTP_ERROR_LENGTH;
2064 goto done;
2065 }
2066
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01002067 sctp_conn = sctp_get_connection_from_transport (trans_conn);
Marco Varlese191a5942017-10-30 18:17:21 +01002068 vnet_sctp_common_hdr_params_net_to_host (sctp_chunk_hdr);
2069
2070 u8 type = vnet_sctp_get_chunk_type (sctp_chunk_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +01002071#if SCTP_DEBUG_STATE_MACHINE
2072 u8 idx = sctp_pick_conn_idx_on_state (sctp_conn->state);
2073#endif
2074 vnet_buffer (b0)->sctp.hdr_offset =
2075 (u8 *) sctp_hdr - (u8 *) vlib_buffer_get_current (b0);
2076
2077 /* Session exists */
2078 if (PREDICT_TRUE (0 != sctp_conn))
2079 {
2080 /* Save connection index */
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01002081 vnet_buffer (b0)->sctp.connection_index = trans_conn->c_index;
Marco Varlese191a5942017-10-30 18:17:21 +01002082 vnet_buffer (b0)->sctp.data_offset = n_advance_bytes0;
2083 vnet_buffer (b0)->sctp.data_len = n_data_bytes0;
2084
2085 next0 = tm->dispatch_table[sctp_conn->state][type].next;
2086 error0 = tm->dispatch_table[sctp_conn->state][type].error;
2087
2088 SCTP_DBG_STATE_MACHINE ("CONNECTION_INDEX = %u: "
2089 "CURRENT_CONNECTION_STATE = %s,"
2090 "CHUNK_TYPE_RECEIVED = %s "
2091 "NEXT_PHASE = %s",
2092 sctp_conn->sub_conn
2093 [idx].connection.c_index,
2094 sctp_state_to_string (sctp_conn->state),
2095 sctp_chunk_to_string (type),
2096 phase_to_string (next0));
2097
2098 if (type == DATA)
2099 SCTP_ADV_DBG ("n_advance_bytes0 = %u, n_data_bytes0 = %u",
2100 n_advance_bytes0, n_data_bytes0);
2101
2102 }
2103 else
2104 {
2105 if (is_filtered)
2106 {
2107 next0 = SCTP_INPUT_NEXT_DROP;
2108 error0 = SCTP_ERROR_FILTERED;
2109 }
2110 else if ((is_ip4 && tm->punt_unknown4) ||
2111 (!is_ip4 && tm->punt_unknown6))
2112 {
2113 next0 = SCTP_INPUT_NEXT_PUNT_PHASE;
2114 error0 = SCTP_ERROR_PUNT;
2115 }
2116 else
2117 {
2118 next0 = SCTP_INPUT_NEXT_DROP;
2119 error0 = SCTP_ERROR_NO_LISTENER;
2120 }
2121 SCTP_DBG_STATE_MACHINE ("sctp_conn == NULL, NEXT_PHASE = %s",
2122 phase_to_string (next0));
2123 sctp_conn = 0;
2124 }
2125
2126 done:
2127 b0->error = error0 ? node->errors[error0] : 0;
2128
2129 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
2130 {
2131 sctp_rx_trace_t *t0 =
2132 vlib_add_trace (vm, node, b0, sizeof (*t0));
2133 sctp_set_rx_trace_data (t0, sctp_conn, sctp_hdr, b0, is_ip4);
2134 }
2135 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
2136 n_left_to_next, bi0, next0);
2137 }
2138
2139 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
2140 }
2141 return from_frame->n_vectors;
2142}
2143
2144static uword
2145sctp4_input_dispatcher (vlib_main_t * vm, vlib_node_runtime_t * node,
2146 vlib_frame_t * from_frame)
2147{
2148 return sctp46_input_dispatcher (vm, node, from_frame, 1 /* is_ip4 */ );
2149}
2150
2151static uword
2152sctp6_input_dispatcher (vlib_main_t * vm, vlib_node_runtime_t * node,
2153 vlib_frame_t * from_frame)
2154{
2155 return sctp46_input_dispatcher (vm, node, from_frame, 0 /* is_ip4 */ );
2156}
2157
2158/* *INDENT-OFF* */
2159VLIB_REGISTER_NODE (sctp4_input_node) =
2160{
2161 .function = sctp4_input_dispatcher,
2162 .name = "sctp4-input",
2163 /* Takes a vector of packets. */
2164 .vector_size = sizeof (u32),
2165 .n_errors = SCTP_N_ERROR,
2166 .error_strings = sctp_error_strings,
2167 .n_next_nodes = SCTP_INPUT_N_NEXT,
2168 .next_nodes =
2169 {
2170#define _(s,n) [SCTP_INPUT_NEXT_##s] = n,
2171 foreach_sctp4_input_next
2172#undef _
2173 },
2174 .format_buffer = format_sctp_header,
2175 .format_trace = format_sctp_rx_trace,
2176};
2177/* *INDENT-ON* */
2178
2179VLIB_NODE_FUNCTION_MULTIARCH (sctp4_input_node, sctp4_input_dispatcher);
2180
2181/* *INDENT-OFF* */
2182VLIB_REGISTER_NODE (sctp6_input_node) =
2183{
2184 .function = sctp6_input_dispatcher,
2185 .name = "sctp6-input",
2186 /* Takes a vector of packets. */
2187 .vector_size = sizeof (u32),
2188 .n_errors = SCTP_N_ERROR,
2189 .error_strings = sctp_error_strings,
2190 .n_next_nodes = SCTP_INPUT_N_NEXT,
2191 .next_nodes =
2192 {
2193#define _(s,n) [SCTP_INPUT_NEXT_##s] = n,
2194 foreach_sctp6_input_next
2195#undef _
2196 },
2197 .format_buffer = format_sctp_header,
2198 .format_trace = format_sctp_rx_trace,
2199};
2200/* *INDENT-ON* */
2201
2202VLIB_NODE_FUNCTION_MULTIARCH (sctp6_input_node, sctp6_input_dispatcher);
2203
2204vlib_node_registration_t sctp4_input_node;
2205vlib_node_registration_t sctp6_input_node;
2206
2207static void
2208sctp_dispatch_table_init (sctp_main_t * tm)
2209{
2210 int i, j;
2211 for (i = 0; i < ARRAY_LEN (tm->dispatch_table); i++)
2212 for (j = 0; j < ARRAY_LEN (tm->dispatch_table[i]); j++)
2213 {
2214 tm->dispatch_table[i][j].next = SCTP_INPUT_NEXT_DROP;
2215 tm->dispatch_table[i][j].error = SCTP_ERROR_DISPATCH;
2216 }
2217
2218#define _(t,f,n,e) \
2219do { \
2220 tm->dispatch_table[SCTP_STATE_##t][f].next = (n); \
2221 tm->dispatch_table[SCTP_STATE_##t][f].error = (e); \
2222} while (0)
2223
2224 /*
2225 * SCTP STATE-MACHINE states:
2226 *
2227 * _(CLOSED, "CLOSED") \
2228 * _(COOKIE_WAIT, "COOKIE_WAIT") \
2229 * _(COOKIE_ECHOED, "COOKIE_ECHOED") \
2230 * _(ESTABLISHED, "ESTABLISHED") \
2231 * _(SHUTDOWN_PENDING, "SHUTDOWN_PENDING") \
2232 * _(SHUTDOWN_SENT, "SHUTDOWN_SENT") \
2233 * _(SHUTDOWN_RECEIVED, "SHUTDOWN_RECEIVED") \
2234 * _(SHUTDOWN_ACK_SENT, "SHUTDOWN_ACK_SENT")
2235 */
Marco Varlesef429a932018-02-06 17:31:06 +01002236 _(CLOSED, DATA, SCTP_INPUT_NEXT_LISTEN_PHASE, SCTP_ERROR_NONE); /* UNEXPECTED DATA chunk which requires special handling */
Marco Varlese191a5942017-10-30 18:17:21 +01002237 _(CLOSED, INIT, SCTP_INPUT_NEXT_LISTEN_PHASE, SCTP_ERROR_NONE);
2238 _(CLOSED, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2239 _(CLOSED, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED SACK chunk */
2240 _(CLOSED, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2241 _(CLOSED, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2242 _(CLOSED, ABORT, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE);
2243 _(CLOSED, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2244 _(CLOSED, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2245 _(CLOSED, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2246 _(CLOSED, COOKIE_ECHO, SCTP_INPUT_NEXT_ESTABLISHED_PHASE, SCTP_ERROR_NONE);
2247 _(CLOSED, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2248 _(CLOSED, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2249 _(CLOSED, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2250 _(CLOSED, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2251
2252 _(COOKIE_WAIT, DATA, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_NONE);
2253 _(COOKIE_WAIT, INIT, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE); /* UNEXPECTED INIT chunk which requires special handling */
2254 _(COOKIE_WAIT, INIT_ACK, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE);
2255 _(COOKIE_WAIT, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED SACK chunk */
2256 _(COOKIE_WAIT, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2257 _(COOKIE_WAIT, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2258 _(COOKIE_WAIT, ABORT, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE);
2259 _(COOKIE_WAIT, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2260 _(COOKIE_WAIT, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2261 _(COOKIE_WAIT, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2262 _(COOKIE_WAIT, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2263 _(COOKIE_WAIT, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2264 _(COOKIE_WAIT, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2265 _(COOKIE_WAIT, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2266 _(COOKIE_WAIT, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2267
2268 _(COOKIE_ECHOED, DATA, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_NONE);
2269 _(COOKIE_ECHOED, INIT, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE); /* UNEXPECTED INIT chunk which requires special handling */
2270 _(COOKIE_ECHOED, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2271 _(COOKIE_ECHOED, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED SACK chunk */
2272 _(COOKIE_ECHOED, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2273 _(COOKIE_ECHOED, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2274 _(COOKIE_ECHOED, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2275 _(COOKIE_ECHOED, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2276 _(COOKIE_ECHOED, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2277 _(COOKIE_ECHOED, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2278 _(COOKIE_ECHOED, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2279 _(COOKIE_ECHOED, COOKIE_ACK, SCTP_INPUT_NEXT_ESTABLISHED_PHASE,
2280 SCTP_ERROR_NONE);
2281 _(COOKIE_ECHOED, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2282 _(COOKIE_ECHOED, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2283 _(COOKIE_ECHOED, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2284
2285 _(ESTABLISHED, DATA, SCTP_INPUT_NEXT_ESTABLISHED_PHASE, SCTP_ERROR_NONE);
2286 _(ESTABLISHED, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2287 _(ESTABLISHED, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2288 _(ESTABLISHED, SACK, SCTP_INPUT_NEXT_ESTABLISHED_PHASE, SCTP_ERROR_NONE);
2289 _(ESTABLISHED, HEARTBEAT, SCTP_INPUT_NEXT_ESTABLISHED_PHASE,
2290 SCTP_ERROR_NONE);
2291 _(ESTABLISHED, HEARTBEAT_ACK, SCTP_INPUT_NEXT_ESTABLISHED_PHASE,
2292 SCTP_ERROR_NONE);
2293 _(ESTABLISHED, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2294 _(ESTABLISHED, SHUTDOWN, SCTP_INPUT_NEXT_SHUTDOWN_PHASE, SCTP_ERROR_NONE);
2295 _(ESTABLISHED, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2296 _(ESTABLISHED, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2297 _(ESTABLISHED, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2298 _(ESTABLISHED, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2299 _(ESTABLISHED, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2300 _(ESTABLISHED, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2301 _(ESTABLISHED, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2302
2303 _(SHUTDOWN_PENDING, DATA, SCTP_INPUT_NEXT_SHUTDOWN_PHASE, SCTP_ERROR_NONE);
2304 _(SHUTDOWN_PENDING, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2305 _(SHUTDOWN_PENDING, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2306 _(SHUTDOWN_PENDING, SACK, SCTP_INPUT_NEXT_LISTEN_PHASE, SCTP_ERROR_NONE);
2307 _(SHUTDOWN_PENDING, HEARTBEAT, SCTP_INPUT_NEXT_LISTEN_PHASE,
2308 SCTP_ERROR_NONE);
2309 _(SHUTDOWN_PENDING, HEARTBEAT_ACK, SCTP_INPUT_NEXT_LISTEN_PHASE,
2310 SCTP_ERROR_NONE);
2311 _(SHUTDOWN_PENDING, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2312 _(SHUTDOWN_PENDING, SHUTDOWN, SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
2313 SCTP_ERROR_NONE);
2314 _(SHUTDOWN_PENDING, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2315 _(SHUTDOWN_PENDING, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2316 _(SHUTDOWN_PENDING, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2317 _(SHUTDOWN_PENDING, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2318 _(SHUTDOWN_PENDING, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2319 _(SHUTDOWN_PENDING, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2320 _(SHUTDOWN_PENDING, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2321
2322 _(SHUTDOWN_SENT, DATA, SCTP_INPUT_NEXT_SHUTDOWN_PHASE, SCTP_ERROR_NONE);
2323 _(SHUTDOWN_SENT, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2324 _(SHUTDOWN_SENT, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2325 _(SHUTDOWN_SENT, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED SACK chunk */
2326 _(SHUTDOWN_SENT, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2327 _(SHUTDOWN_SENT, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2328 _(SHUTDOWN_SENT, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2329 _(SHUTDOWN_SENT, SHUTDOWN, SCTP_INPUT_NEXT_SHUTDOWN_PHASE, SCTP_ERROR_NONE);
2330 _(SHUTDOWN_SENT, SHUTDOWN_ACK, SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
2331 SCTP_ERROR_NONE);
2332 _(SHUTDOWN_SENT, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2333 _(SHUTDOWN_SENT, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2334 _(SHUTDOWN_SENT, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2335 _(SHUTDOWN_SENT, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2336 _(SHUTDOWN_SENT, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2337
2338 _(SHUTDOWN_RECEIVED, DATA, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_DATA_CHUNK_VIOLATION); /* UNEXPECTED DATA chunk */
2339 _(SHUTDOWN_RECEIVED, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2340 _(SHUTDOWN_RECEIVED, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2341 _(SHUTDOWN_RECEIVED, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2342 _(SHUTDOWN_RECEIVED, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2343 _(SHUTDOWN_RECEIVED, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2344 _(SHUTDOWN_RECEIVED, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2345 _(SHUTDOWN_RECEIVED, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2346 _(SHUTDOWN_RECEIVED, SHUTDOWN_ACK, SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
2347 SCTP_ERROR_NONE);
2348 _(SHUTDOWN_RECEIVED, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2349 _(SHUTDOWN_RECEIVED, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2350 _(SHUTDOWN_RECEIVED, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2351 _(SHUTDOWN_RECEIVED, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2352 _(SHUTDOWN_RECEIVED, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2353
2354 _(SHUTDOWN_ACK_SENT, DATA, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_DATA_CHUNK_VIOLATION); /* UNEXPECTED DATA chunk */
2355 _(SHUTDOWN_ACK_SENT, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2356 _(SHUTDOWN_ACK_SENT, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2357 _(SHUTDOWN_ACK_SENT, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2358 _(SHUTDOWN_ACK_SENT, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2359 _(SHUTDOWN_ACK_SENT, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2360 _(SHUTDOWN_ACK_SENT, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2361 _(SHUTDOWN_ACK_SENT, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2362 _(SHUTDOWN_ACK_SENT, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2363 _(SHUTDOWN_ACK_SENT, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2364 _(SHUTDOWN_ACK_SENT, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2365 _(SHUTDOWN_ACK_SENT, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2366 _(SHUTDOWN_ACK_SENT, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2367 _(SHUTDOWN_ACK_SENT, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
2368 SCTP_ERROR_NONE);
2369
2370 /* TODO: Handle COOKIE ECHO when a TCB Exists */
2371
2372#undef _
2373}
2374
2375clib_error_t *
2376sctp_input_init (vlib_main_t * vm)
2377{
2378 clib_error_t *error = 0;
2379 sctp_main_t *tm = vnet_get_sctp_main ();
2380
2381 if ((error = vlib_call_init_function (vm, sctp_init)))
2382 return error;
2383
2384 /* Initialize dispatch table. */
2385 sctp_dispatch_table_init (tm);
2386
2387 return error;
2388}
2389
2390VLIB_INIT_FUNCTION (sctp_input_init);
2391
2392/*
2393 * fd.io coding-style-patch-verification: ON
2394 *
2395 * Local Variables:
2396 * eval: (c-set-style "gnu")
2397 * End:
2398 */