blob: d3e69c68ba098611bfbb36998303d76c5393aa3d [file] [log] [blame]
Marco Varlese191a5942017-10-30 18:17:21 +01001/*
2 * Copyright (c) 2017 SUSE LLC.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at:
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15#include <vppinfra/sparse_vec.h>
16#include <vnet/sctp/sctp.h>
17#include <vnet/sctp/sctp_packet.h>
18#include <vnet/sctp/sctp_debug.h>
19#include <vnet/session/session.h>
20#include <math.h>
21
22static char *sctp_error_strings[] = {
23#define sctp_error(n,s) s,
24#include <vnet/sctp/sctp_error.def>
25#undef sctp_error
26};
27
28/* All SCTP nodes have the same outgoing arcs */
29#define foreach_sctp_state_next \
Marco Varlesefae40392018-02-14 15:38:35 +010030 _ (DROP4, "ip4-drop") \
31 _ (DROP6, "ip6-drop") \
Marco Varlese191a5942017-10-30 18:17:21 +010032 _ (SCTP4_OUTPUT, "sctp4-output") \
33 _ (SCTP6_OUTPUT, "sctp6-output")
34
35typedef enum _sctp_established_phase_next
36{
37#define _(s,n) SCTP_ESTABLISHED_PHASE_NEXT_##s,
38 foreach_sctp_state_next
39#undef _
40 SCTP_ESTABLISHED_PHASE_N_NEXT,
41} sctp_established_phase_next_t;
42
43typedef enum _sctp_rcv_phase_next
44{
45#define _(s,n) SCTP_RCV_PHASE_NEXT_##s,
46 foreach_sctp_state_next
47#undef _
48 SCTP_RCV_PHASE_N_NEXT,
49} sctp_rcv_phase_next_t;
50
51typedef enum _sctp_listen_phase_next
52{
53#define _(s,n) SCTP_LISTEN_PHASE_NEXT_##s,
54 foreach_sctp_state_next
55#undef _
56 SCTP_LISTEN_PHASE_N_NEXT,
57} sctp_listen_phase_next_t;
58
59typedef enum _sctp_shutdown_phase_next
60{
61#define _(s,n) SCTP_SHUTDOWN_PHASE_NEXT_##s,
62 foreach_sctp_state_next
63#undef _
64 SCTP_SHUTDOWN_PHASE_N_NEXT,
65} sctp_shutdown_phase_next_t;
66
67/* Generic, state independent indices */
68typedef enum _sctp_state_next
69{
70#define _(s,n) SCTP_NEXT_##s,
71 foreach_sctp_state_next
72#undef _
73 SCTP_STATE_N_NEXT,
74} sctp_state_next_t;
75
76typedef enum _sctp_input_next
77{
78 SCTP_INPUT_NEXT_DROP,
79 SCTP_INPUT_NEXT_LISTEN_PHASE,
80 SCTP_INPUT_NEXT_RCV_PHASE,
81 SCTP_INPUT_NEXT_ESTABLISHED_PHASE,
82 SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
83 SCTP_INPUT_NEXT_PUNT_PHASE,
84 SCTP_INPUT_N_NEXT
85} sctp_input_next_t;
86
87char *
88phase_to_string (u8 phase)
89{
90 switch (phase)
91 {
92 case SCTP_INPUT_NEXT_DROP:
93 return "SCTP_INPUT_NEXT_DROP";
94 case SCTP_INPUT_NEXT_LISTEN_PHASE:
95 return "SCTP_INPUT_NEXT_LISTEN_PHASE";
96 case SCTP_INPUT_NEXT_RCV_PHASE:
97 return "SCTP_INPUT_NEXT_RCV_PHASE";
98 case SCTP_INPUT_NEXT_ESTABLISHED_PHASE:
99 return "SCTP_INPUT_NEXT_ESTABLISHED_PHASE";
100 case SCTP_INPUT_NEXT_SHUTDOWN_PHASE:
101 return "SCTP_INPUT_NEXT_SHUTDOWN_PHASE";
102 case SCTP_INPUT_NEXT_PUNT_PHASE:
103 return "SCTP_INPUT_NEXT_PUNT_PHASE";
104 }
105 return NULL;
106}
107
108#define foreach_sctp4_input_next \
109 _ (DROP, "error-drop") \
110 _ (RCV_PHASE, "sctp4-rcv") \
111 _ (LISTEN_PHASE, "sctp4-listen") \
112 _ (ESTABLISHED_PHASE, "sctp4-established") \
113 _ (SHUTDOWN_PHASE, "sctp4-shutdown") \
114 _ (PUNT_PHASE, "ip4-punt")
115
116
117#define foreach_sctp6_input_next \
118 _ (DROP, "error-drop") \
119 _ (RCV_PHASE, "sctp6-rcv") \
120 _ (LISTEN_PHASE, "sctp6-listen") \
121 _ (ESTABLISHED_PHASE, "sctp6-established") \
122 _ (SHUTDOWN_PHASE, "sctp6-shutdown") \
123 _ (PUNT_PHASE, "ip6-punt")
124
125static u8
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100126sctp_lookup_is_valid (transport_connection_t * trans_conn,
Marco Varlese191a5942017-10-30 18:17:21 +0100127 sctp_header_t * sctp_hdr)
128{
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100129 sctp_connection_t *sctp_conn =
130 sctp_get_connection_from_transport (trans_conn);
Marco Varlese191a5942017-10-30 18:17:21 +0100131
132 if (!sctp_conn)
133 return 1;
134
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100135 u8 is_valid = (trans_conn->lcl_port == sctp_hdr->dst_port
Marco Varlese191a5942017-10-30 18:17:21 +0100136 && (sctp_conn->state == SCTP_STATE_CLOSED
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100137 || trans_conn->rmt_port == sctp_hdr->src_port));
Marco Varlese191a5942017-10-30 18:17:21 +0100138
139 return is_valid;
140}
141
142/**
143 * Lookup transport connection
144 */
145static sctp_connection_t *
146sctp_lookup_connection (u32 fib_index, vlib_buffer_t * b, u8 thread_index,
147 u8 is_ip4)
148{
149 sctp_main_t *tm = vnet_get_sctp_main ();
150 sctp_header_t *sctp_hdr;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100151 transport_connection_t *trans_conn;
Marco Varlese191a5942017-10-30 18:17:21 +0100152 sctp_connection_t *sctp_conn;
153 u8 is_filtered, i;
154 if (is_ip4)
155 {
156 ip4_header_t *ip4_hdr;
157 ip4_hdr = vlib_buffer_get_current (b);
158 sctp_hdr = ip4_next_header (ip4_hdr);
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100159 trans_conn = session_lookup_connection_wt4 (fib_index,
160 &ip4_hdr->dst_address,
161 &ip4_hdr->src_address,
162 sctp_hdr->dst_port,
163 sctp_hdr->src_port,
164 TRANSPORT_PROTO_SCTP,
165 thread_index, &is_filtered);
166 if (trans_conn == 0) /* Not primary connection */
Marco Varlese191a5942017-10-30 18:17:21 +0100167 {
168 for (i = 0; i < MAX_SCTP_CONNECTIONS; i++)
169 {
170 if ((tm->connections[thread_index]->sub_conn[i].
171 connection.lcl_ip.ip4.as_u32 ==
172 ip4_hdr->dst_address.as_u32)
173 && (tm->connections[thread_index]->sub_conn[i].
174 connection.rmt_ip.ip4.as_u32 ==
175 ip4_hdr->src_address.as_u32))
176 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100177 trans_conn =
Marco Varlese191a5942017-10-30 18:17:21 +0100178 &tm->connections[thread_index]->sub_conn[i].connection;
179 break;
180 }
181 }
182 }
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100183 ASSERT (trans_conn != 0);
184 ASSERT (sctp_lookup_is_valid (trans_conn, sctp_hdr));
Marco Varlese191a5942017-10-30 18:17:21 +0100185 }
186 else
187 {
188 ip6_header_t *ip6_hdr;
189 ip6_hdr = vlib_buffer_get_current (b);
190 sctp_hdr = ip6_next_header (ip6_hdr);
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100191 trans_conn = session_lookup_connection_wt6 (fib_index,
192 &ip6_hdr->dst_address,
193 &ip6_hdr->src_address,
194 sctp_hdr->dst_port,
195 sctp_hdr->src_port,
196 TRANSPORT_PROTO_SCTP,
197 thread_index, &is_filtered);
198 if (trans_conn == 0) /* Not primary connection */
Marco Varlese191a5942017-10-30 18:17:21 +0100199 {
200 for (i = 0; i < MAX_SCTP_CONNECTIONS; i++)
201 {
202 if ((tm->connections[thread_index]->sub_conn[i].
203 connection.lcl_ip.ip6.as_u64[0] ==
204 ip6_hdr->dst_address.as_u64[0]
205 && tm->connections[thread_index]->sub_conn[i].
206 connection.lcl_ip.ip6.as_u64[1] ==
207 ip6_hdr->dst_address.as_u64[1])
208 && (tm->connections[thread_index]->sub_conn[i].
209 connection.rmt_ip.ip6.as_u64[0] ==
210 ip6_hdr->src_address.as_u64[0]
211 && tm->connections[thread_index]->
212 sub_conn[i].connection.rmt_ip.ip6.as_u64[1] ==
213 ip6_hdr->src_address.as_u64[1]))
214 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100215 trans_conn =
Marco Varlese191a5942017-10-30 18:17:21 +0100216 &tm->connections[thread_index]->sub_conn[i].connection;
217 break;
218 }
219 }
220 }
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100221 ASSERT (trans_conn != 0);
222 ASSERT (sctp_lookup_is_valid (trans_conn, sctp_hdr));
Marco Varlese191a5942017-10-30 18:17:21 +0100223 }
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100224 sctp_conn = sctp_get_connection_from_transport (trans_conn);
Marco Varlese191a5942017-10-30 18:17:21 +0100225 return sctp_conn;
226}
227
228typedef struct
229{
230 sctp_header_t sctp_header;
231 sctp_connection_t sctp_connection;
232} sctp_rx_trace_t;
233
234#define sctp_next_output(is_ip4) (is_ip4 ? SCTP_NEXT_SCTP4_OUTPUT \
235 : SCTP_NEXT_SCTP6_OUTPUT)
236
Marco Varlesefae40392018-02-14 15:38:35 +0100237#define sctp_next_drop(is_ip4) (is_ip4 ? SCTP_NEXT_DROP4 \
238 : SCTP_NEXT_DROP6)
Marco Varlese191a5942017-10-30 18:17:21 +0100239
240void
241sctp_set_rx_trace_data (sctp_rx_trace_t * rx_trace,
242 sctp_connection_t * sctp_conn,
243 sctp_header_t * sctp_hdr, vlib_buffer_t * b0,
244 u8 is_ip4)
245{
246 if (sctp_conn)
247 {
248 clib_memcpy (&rx_trace->sctp_connection, sctp_conn,
249 sizeof (rx_trace->sctp_connection));
250 }
251 else
252 {
253 sctp_hdr = sctp_buffer_hdr (b0);
254 }
255 clib_memcpy (&rx_trace->sctp_header, sctp_hdr,
256 sizeof (rx_trace->sctp_header));
257}
258
259always_inline u16
260sctp_calculate_implied_length (ip4_header_t * ip4_hdr, ip6_header_t * ip6_hdr,
261 int is_ip4)
262{
263 u16 sctp_implied_packet_length = 0;
264
265 if (is_ip4)
266 sctp_implied_packet_length =
267 clib_net_to_host_u16 (ip4_hdr->length) - ip4_header_bytes (ip4_hdr);
268 else
269 sctp_implied_packet_length =
270 clib_net_to_host_u16 (ip6_hdr->payload_length) - sizeof (ip6_hdr);
271
272 return sctp_implied_packet_length;
273}
274
275always_inline u8
276sctp_is_bundling (u16 sctp_implied_length,
277 sctp_chunks_common_hdr_t * sctp_common_hdr)
278{
279 if (sctp_implied_length !=
280 sizeof (sctp_header_t) + vnet_sctp_get_chunk_length (sctp_common_hdr))
281 return 1;
282 return 0;
283}
284
285always_inline u16
286sctp_handle_init (sctp_header_t * sctp_hdr,
287 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
288 sctp_connection_t * sctp_conn, vlib_buffer_t * b0,
289 u16 sctp_implied_length)
290{
291 sctp_init_chunk_t *init_chunk = (sctp_init_chunk_t *) (sctp_hdr);
292 ip4_address_t *ip4_addr = 0;
293 ip6_address_t *ip6_addr = 0;
294 char hostname[FQDN_MAX_LENGTH];
295
296 /* Check the current state of the connection
297 *
298 * The logic required by the RFC4960 Section 5.2.2 is already taken care of
299 * in the code below and by the "sctp_prepare_initack_chunk" function.
300 * However, for debugging purposes it is nice to have a message printed out
301 * for these corner-case scenarios.
302 */
303 if (sctp_conn->state != SCTP_STATE_CLOSED)
304 { /* UNEXPECTED scenario */
305 switch (sctp_conn->state)
306 {
307 case SCTP_STATE_COOKIE_WAIT: /* TODO */
308 SCTP_ADV_DBG ("Received INIT chunk while in COOKIE_WAIT state");
309 break;
310 case SCTP_STATE_COOKIE_ECHOED: /* TODO */
311 SCTP_ADV_DBG ("Received INIT chunk while in COOKIE_ECHOED state");
312 break;
313 }
314 }
315
316 if (sctp_hdr->verification_tag != 0x0)
317 return SCTP_ERROR_INVALID_TAG_FOR_INIT;
318
319 /*
320 * It is not possible to bundle any other CHUNK with the INIT chunk
321 */
322 if (sctp_is_bundling (sctp_implied_length, &init_chunk->chunk_hdr))
323 return SCTP_ERROR_BUNDLING_VIOLATION;
324
325 /* Save the INITIATE_TAG of the remote peer for this connection:
326 * it MUST be used for the VERIFICATION_TAG parameter in the SCTP HEADER */
327 sctp_conn->remote_tag = init_chunk->initiate_tag;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100328 sctp_conn->remote_initial_tsn =
329 clib_net_to_host_u32 (init_chunk->initial_tsn);
330 sctp_conn->last_rcvd_tsn = sctp_conn->remote_initial_tsn;
331 sctp_conn->next_tsn_expected = sctp_conn->remote_initial_tsn + 1;
332 SCTP_CONN_TRACKING_DBG ("sctp_conn->remote_initial_tsn = %u",
333 sctp_conn->remote_initial_tsn);
334
Marco Varlese191a5942017-10-30 18:17:21 +0100335 sctp_conn->snd_opts.a_rwnd = clib_net_to_host_u32 (init_chunk->a_rwnd);
336
337 /*
338 * If the length specified in the INIT message is bigger than the size in bytes of our structure it means that
339 * optional parameters have been sent with the INIT chunk and we need to parse them.
340 */
341 u16 length = vnet_sctp_get_chunk_length (sctp_chunk_hdr);
342 if (length > sizeof (sctp_init_chunk_t))
343 {
344 /* There are optional parameters in the INIT chunk */
345 u16 pointer_offset = sizeof (sctp_init_chunk_t);
346 while (pointer_offset < length)
347 {
348 sctp_opt_params_hdr_t *opt_params_hdr =
349 (sctp_opt_params_hdr_t *) init_chunk + pointer_offset;
350
351 switch (clib_net_to_host_u16 (opt_params_hdr->type))
352 {
353 case SCTP_IPV4_ADDRESS_TYPE:
354 {
355 sctp_ipv4_addr_param_t *ipv4 =
356 (sctp_ipv4_addr_param_t *) opt_params_hdr;
357 clib_memcpy (ip4_addr, &ipv4->address,
358 sizeof (ip4_address_t));
359
360 sctp_sub_connection_add_ip4 (vlib_get_thread_index (), ipv4);
361
362 break;
363 }
364 case SCTP_IPV6_ADDRESS_TYPE:
365 {
366 sctp_ipv6_addr_param_t *ipv6 =
367 (sctp_ipv6_addr_param_t *) opt_params_hdr;
368 clib_memcpy (ip6_addr, &ipv6->address,
369 sizeof (ip6_address_t));
370
371 sctp_sub_connection_add_ip6 (vlib_get_thread_index (), ipv6);
372
373 break;
374 }
375 case SCTP_COOKIE_PRESERVATIVE_TYPE:
376 {
377 sctp_cookie_preservative_param_t *cookie_pres =
378 (sctp_cookie_preservative_param_t *) opt_params_hdr;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100379 sctp_conn->peer_cookie_life_span_increment =
380 cookie_pres->life_span_inc;
Marco Varlese191a5942017-10-30 18:17:21 +0100381 break;
382 }
383 case SCTP_HOSTNAME_ADDRESS_TYPE:
384 {
385 sctp_hostname_param_t *hostname_addr =
386 (sctp_hostname_param_t *) opt_params_hdr;
387 clib_memcpy (hostname, hostname_addr->hostname,
388 FQDN_MAX_LENGTH);
389 break;
390 }
391 case SCTP_SUPPORTED_ADDRESS_TYPES:
392 {
393 /* TODO */
394 break;
395 }
396 }
397 pointer_offset += clib_net_to_host_u16 (opt_params_hdr->length);
398 }
399 }
400
401 /* Reuse buffer to make init-ack and send */
Marco Varlese54432f82018-02-15 17:01:56 +0100402 sctp_prepare_initack_chunk (sctp_conn, MAIN_SCTP_SUB_CONN_IDX, b0, ip4_addr,
403 ip6_addr);
Marco Varlese191a5942017-10-30 18:17:21 +0100404 return SCTP_ERROR_NONE;
405}
406
407always_inline u16
408sctp_is_valid_init_ack (sctp_header_t * sctp_hdr,
409 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
410 sctp_connection_t * sctp_conn, vlib_buffer_t * b0,
411 u16 sctp_implied_length)
412{
413 sctp_init_ack_chunk_t *init_ack_chunk =
414 (sctp_init_ack_chunk_t *) (sctp_hdr);
415
416 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
417 if (sctp_conn->local_tag != init_ack_chunk->sctp_hdr.verification_tag)
418 {
419 return SCTP_ERROR_INVALID_TAG;
420 }
421
422 /*
423 * It is not possible to bundle any other CHUNK with the INIT_ACK chunk
424 */
425 if (sctp_is_bundling (sctp_implied_length, &init_ack_chunk->chunk_hdr))
426 return SCTP_ERROR_BUNDLING_VIOLATION;
427
428 return SCTP_ERROR_NONE;
429}
430
431always_inline u16
432sctp_handle_init_ack (sctp_header_t * sctp_hdr,
433 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlese21c8baf2018-02-02 17:17:51 +0100434 sctp_connection_t * sctp_conn, u8 idx,
435 vlib_buffer_t * b0, u16 sctp_implied_length)
Marco Varlese191a5942017-10-30 18:17:21 +0100436{
437 sctp_init_ack_chunk_t *init_ack_chunk =
438 (sctp_init_ack_chunk_t *) (sctp_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +0100439 sctp_state_cookie_param_t state_cookie;
440
441 char hostname[FQDN_MAX_LENGTH];
442
443 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
444 if (sctp_conn->local_tag != init_ack_chunk->sctp_hdr.verification_tag)
445 {
446 return SCTP_ERROR_INVALID_TAG;
447 }
448
449 /*
450 * It is not possible to bundle any other CHUNK with the INIT chunk
451 */
452 if (sctp_is_bundling (sctp_implied_length, &init_ack_chunk->chunk_hdr))
453 return SCTP_ERROR_BUNDLING_VIOLATION;
454
Marco Varlese21c8baf2018-02-02 17:17:51 +0100455 sctp_calculate_rto (sctp_conn, idx);
456
Marco Varlese191a5942017-10-30 18:17:21 +0100457 /* remote_tag to be placed in the VERIFICATION_TAG field of the COOKIE_ECHO chunk */
458 sctp_conn->remote_tag = init_ack_chunk->initiate_tag;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100459 sctp_conn->remote_initial_tsn =
460 clib_net_to_host_u32 (init_ack_chunk->initial_tsn);
461 sctp_conn->last_rcvd_tsn = sctp_conn->remote_initial_tsn;
462 sctp_conn->next_tsn_expected = sctp_conn->remote_initial_tsn + 1;
463 SCTP_CONN_TRACKING_DBG ("sctp_conn->remote_initial_tsn = %u",
464 sctp_conn->remote_initial_tsn);
Marco Varlese191a5942017-10-30 18:17:21 +0100465 sctp_conn->snd_opts.a_rwnd = clib_net_to_host_u32 (init_ack_chunk->a_rwnd);
466
467 u16 length = vnet_sctp_get_chunk_length (sctp_chunk_hdr);
468
469 if (length > sizeof (sctp_init_ack_chunk_t))
470 /*
471 * There are optional parameters in the INIT ACK chunk
472 */
473 {
474 u16 pointer_offset = sizeof (sctp_init_ack_chunk_t);
475
476 while (pointer_offset < length)
477 {
478 sctp_opt_params_hdr_t *opt_params_hdr =
479 (sctp_opt_params_hdr_t *) ((char *) init_ack_chunk +
480 pointer_offset);
481
482 switch (clib_net_to_host_u16 (opt_params_hdr->type))
483 {
484 case SCTP_IPV4_ADDRESS_TYPE:
485 {
486 sctp_ipv4_addr_param_t *ipv4 =
487 (sctp_ipv4_addr_param_t *) opt_params_hdr;
Marco Varlese191a5942017-10-30 18:17:21 +0100488
489 sctp_sub_connection_add_ip4 (vlib_get_thread_index (), ipv4);
490
491 break;
492 }
493 case SCTP_IPV6_ADDRESS_TYPE:
494 {
495 sctp_ipv6_addr_param_t *ipv6 =
496 (sctp_ipv6_addr_param_t *) opt_params_hdr;
Marco Varlese191a5942017-10-30 18:17:21 +0100497
498 sctp_sub_connection_add_ip6 (vlib_get_thread_index (), ipv6);
499
500 break;
501 }
502 case SCTP_STATE_COOKIE_TYPE:
503 {
504 sctp_state_cookie_param_t *state_cookie_param =
505 (sctp_state_cookie_param_t *) opt_params_hdr;
506
507 clib_memcpy (&state_cookie, state_cookie_param,
508 sizeof (sctp_state_cookie_param_t));
509 break;
510 }
511 case SCTP_HOSTNAME_ADDRESS_TYPE:
512 {
513 sctp_hostname_param_t *hostname_addr =
514 (sctp_hostname_param_t *) opt_params_hdr;
515 clib_memcpy (hostname, hostname_addr->hostname,
516 FQDN_MAX_LENGTH);
517 break;
518 }
519 case SCTP_UNRECOGNIZED_TYPE:
520 {
521 break;
522 }
523 }
524 u16 increment = clib_net_to_host_u16 (opt_params_hdr->length);
525 /* This indicates something really bad happened */
526 if (increment == 0)
527 {
528 return SCTP_ERROR_INVALID_TAG;
529 }
530 pointer_offset += increment;
531 }
532 }
533
Marco Varlese54432f82018-02-15 17:01:56 +0100534 sctp_prepare_cookie_echo_chunk (sctp_conn, idx, b0, &state_cookie);
Marco Varlese191a5942017-10-30 18:17:21 +0100535
536 /* Start the T1_COOKIE timer */
Marco Varlese54432f82018-02-15 17:01:56 +0100537 sctp_timer_set (sctp_conn, idx,
Marco Varlese21c8baf2018-02-02 17:17:51 +0100538 SCTP_TIMER_T1_COOKIE, sctp_conn->sub_conn[idx].RTO);
Marco Varlese191a5942017-10-30 18:17:21 +0100539
540 return SCTP_ERROR_NONE;
541}
542
Marco Varlese91389ac2018-01-31 11:00:01 +0100543/** Enqueue data out-of-order for delivery to application */
544always_inline int
545sctp_session_enqueue_data_ooo (sctp_connection_t * sctp_conn,
546 vlib_buffer_t * b, u16 data_len, u8 conn_idx)
547{
548 int written, error = SCTP_ERROR_ENQUEUED;
549
550 written =
551 session_enqueue_stream_connection (&sctp_conn->
552 sub_conn[conn_idx].connection, b, 0,
553 1 /* queue event */ ,
554 0);
555
556 /* Update next_tsn_expected */
557 if (PREDICT_TRUE (written == data_len))
558 {
559 sctp_conn->next_tsn_expected += written;
560
561 SCTP_ADV_DBG ("CONN = %u, WRITTEN [%u] == DATA_LEN [%d]",
562 sctp_conn->sub_conn[conn_idx].connection.c_index,
563 written, data_len);
564 }
565 /* If more data written than expected, account for out-of-order bytes. */
566 else if (written > data_len)
567 {
568 sctp_conn->next_tsn_expected += written;
569
570 SCTP_ADV_DBG ("CONN = %u, WRITTEN [%u] > DATA_LEN [%d]",
571 sctp_conn->sub_conn[conn_idx].connection.c_index,
572 written, data_len);
573 }
574 else if (written > 0)
575 {
576 /* We've written something but FIFO is probably full now */
577 sctp_conn->next_tsn_expected += written;
578
579 error = SCTP_ERROR_PARTIALLY_ENQUEUED;
580
581 SCTP_ADV_DBG
582 ("CONN = %u, WRITTEN [%u] > 0 (SCTP_ERROR_PARTIALLY_ENQUEUED)",
583 sctp_conn->sub_conn[conn_idx].connection.c_index, written);
584 }
585 else
586 {
587 SCTP_ADV_DBG ("CONN = %u, WRITTEN == 0 (SCTP_ERROR_FIFO_FULL)",
588 sctp_conn->sub_conn[conn_idx].connection.c_index);
589
590 return SCTP_ERROR_FIFO_FULL;
591 }
592
593 /* TODO: Update out_of_order_map & SACK list */
594
595 return error;
596}
597
Marco Varlese191a5942017-10-30 18:17:21 +0100598/** Enqueue data for delivery to application */
599always_inline int
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100600sctp_session_enqueue_data (sctp_connection_t * sctp_conn, vlib_buffer_t * b,
Marco Varlese191a5942017-10-30 18:17:21 +0100601 u16 data_len, u8 conn_idx)
602{
603 int written, error = SCTP_ERROR_ENQUEUED;
604
605 written =
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100606 session_enqueue_stream_connection (&sctp_conn->
607 sub_conn[conn_idx].connection, b, 0,
608 1 /* queue event */ ,
609 1);
Marco Varlese191a5942017-10-30 18:17:21 +0100610
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100611 /* Update next_tsn_expected */
Marco Varlese191a5942017-10-30 18:17:21 +0100612 if (PREDICT_TRUE (written == data_len))
613 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100614 sctp_conn->next_tsn_expected += written;
Marco Varlese191a5942017-10-30 18:17:21 +0100615
616 SCTP_ADV_DBG ("CONN = %u, WRITTEN [%u] == DATA_LEN [%d]",
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100617 sctp_conn->sub_conn[conn_idx].connection.c_index,
Marco Varlese191a5942017-10-30 18:17:21 +0100618 written, data_len);
619 }
620 /* If more data written than expected, account for out-of-order bytes. */
621 else if (written > data_len)
622 {
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100623 sctp_conn->next_tsn_expected += written;
Marco Varlese191a5942017-10-30 18:17:21 +0100624
625 SCTP_ADV_DBG ("CONN = %u, WRITTEN [%u] > DATA_LEN [%d]",
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100626 sctp_conn->sub_conn[conn_idx].connection.c_index,
Marco Varlese191a5942017-10-30 18:17:21 +0100627 written, data_len);
628 }
629 else if (written > 0)
630 {
631 /* We've written something but FIFO is probably full now */
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100632 sctp_conn->next_tsn_expected += written;
Marco Varlese191a5942017-10-30 18:17:21 +0100633
634 error = SCTP_ERROR_PARTIALLY_ENQUEUED;
635
636 SCTP_ADV_DBG
637 ("CONN = %u, WRITTEN [%u] > 0 (SCTP_ERROR_PARTIALLY_ENQUEUED)",
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100638 sctp_conn->sub_conn[conn_idx].connection.c_index, written);
Marco Varlese191a5942017-10-30 18:17:21 +0100639 }
640 else
641 {
642 SCTP_ADV_DBG ("CONN = %u, WRITTEN == 0 (SCTP_ERROR_FIFO_FULL)",
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100643 sctp_conn->sub_conn[conn_idx].connection.c_index);
Marco Varlese191a5942017-10-30 18:17:21 +0100644
645 return SCTP_ERROR_FIFO_FULL;
646 }
647
648 return error;
649}
650
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100651always_inline u8
Marco Varlese54432f82018-02-15 17:01:56 +0100652sctp_is_sack_delayable (sctp_connection_t * sctp_conn, u8 idx, u8 is_gapping)
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100653{
Marco Varlesea38783e2018-02-13 12:38:52 +0100654 if (is_gapping != 0)
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100655 {
656 SCTP_CONN_TRACKING_DBG
657 ("gapping != 0: CONN_INDEX = %u, sctp_conn->ack_state = %u",
658 sctp_conn->sub_conn[idx].connection.c_index, sctp_conn->ack_state);
Marco Varlesea38783e2018-02-13 12:38:52 +0100659 return 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100660 }
661
662 if (sctp_conn->ack_state >= MAX_ENQUEABLE_SACKS)
663 {
664 SCTP_CONN_TRACKING_DBG
665 ("sctp_conn->ack_state >= MAX_ENQUEABLE_SACKS: CONN_INDEX = %u, sctp_conn->ack_state = %u",
666 sctp_conn->sub_conn[idx].connection.c_index, sctp_conn->ack_state);
Marco Varlesea38783e2018-02-13 12:38:52 +0100667 return 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100668 }
669
670 sctp_conn->ack_state += 1;
671
Marco Varlesea38783e2018-02-13 12:38:52 +0100672 return 1;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100673}
674
Marco Varlese91389ac2018-01-31 11:00:01 +0100675always_inline void
676sctp_is_connection_gapping (sctp_connection_t * sctp_conn, u32 tsn,
677 u8 * gapping)
678{
679 if (sctp_conn->next_tsn_expected != tsn) // It means data transmission is GAPPING
680 {
681 SCTP_CONN_TRACKING_DBG
682 ("GAPPING: CONN_INDEX = %u, sctp_conn->next_tsn_expected = %u, tsn = %u, diff = %u",
Marco Varlese54432f82018-02-15 17:01:56 +0100683 sctp_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].connection.c_index,
Marco Varlese91389ac2018-01-31 11:00:01 +0100684 sctp_conn->next_tsn_expected, tsn,
685 sctp_conn->next_tsn_expected - tsn);
686
687 *gapping = 1;
688 }
689}
690
Marco Varlese191a5942017-10-30 18:17:21 +0100691always_inline u16
692sctp_handle_data (sctp_payload_data_chunk_t * sctp_data_chunk,
Marco Varlesebe2251b2018-02-07 12:22:41 +0100693 sctp_connection_t * sctp_conn, u8 idx, vlib_buffer_t * b,
Marco Varlese191a5942017-10-30 18:17:21 +0100694 u16 * next0)
695{
696 u32 error = 0, n_data_bytes;
Marco Varlese91389ac2018-01-31 11:00:01 +0100697 u8 is_gapping = 0;
Marco Varlese191a5942017-10-30 18:17:21 +0100698
699 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
700 if (sctp_conn->local_tag != sctp_data_chunk->sctp_hdr.verification_tag)
701 {
702 return SCTP_ERROR_INVALID_TAG;
703 }
704
705 vnet_buffer (b)->sctp.sid = sctp_data_chunk->stream_id;
706 vnet_buffer (b)->sctp.ssn = sctp_data_chunk->stream_seq;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100707
708 u32 tsn = clib_net_to_host_u32 (sctp_data_chunk->tsn);
Marco Varlese191a5942017-10-30 18:17:21 +0100709
710 vlib_buffer_advance (b, vnet_buffer (b)->sctp.data_offset);
711 n_data_bytes = vnet_buffer (b)->sctp.data_len;
712 ASSERT (n_data_bytes);
713
Marco Varlese91389ac2018-01-31 11:00:01 +0100714 sctp_is_connection_gapping (sctp_conn, tsn, &is_gapping);
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100715
716 sctp_conn->last_rcvd_tsn = tsn;
717
Marco Varlese191a5942017-10-30 18:17:21 +0100718 SCTP_ADV_DBG ("POINTER_WITH_DATA = %p", b->data);
719
Marco Varlese91389ac2018-01-31 11:00:01 +0100720 u8 bbit = vnet_sctp_get_bbit (&sctp_data_chunk->chunk_hdr);
721 u8 ebit = vnet_sctp_get_ebit (&sctp_data_chunk->chunk_hdr);
722
723 if (bbit == 1 && ebit == 1) /* Unfragmented message */
724 {
725 /* In order data, enqueue. Fifo figures out by itself if any out-of-order
726 * segments can be enqueued after fifo tail offset changes. */
Marco Varlese54432f82018-02-15 17:01:56 +0100727 if (PREDICT_FALSE (is_gapping == 1))
728 error =
729 sctp_session_enqueue_data_ooo (sctp_conn, b, n_data_bytes, idx);
730 else
731 error = sctp_session_enqueue_data (sctp_conn, b, n_data_bytes, idx);
Marco Varlese91389ac2018-01-31 11:00:01 +0100732 }
733 else if (bbit == 1 && ebit == 0) /* First piece of a fragmented user message */
734 {
735 error = sctp_session_enqueue_data (sctp_conn, b, n_data_bytes, idx);
736 }
737 else if (bbit == 0 && ebit == 1) /* Last piece of a fragmented user message */
738 {
739 if (PREDICT_FALSE (is_gapping == 1))
740 error =
741 sctp_session_enqueue_data_ooo (sctp_conn, b, n_data_bytes, idx);
742 else
743 error = sctp_session_enqueue_data (sctp_conn, b, n_data_bytes, idx);
744 }
745 else /* Middle piece of a fragmented user message */
746 {
747 if (PREDICT_FALSE (is_gapping == 1))
748 error =
749 sctp_session_enqueue_data_ooo (sctp_conn, b, n_data_bytes, idx);
750 else
751 error = sctp_session_enqueue_data (sctp_conn, b, n_data_bytes, idx);
752 }
753 sctp_conn->last_rcvd_tsn = tsn;
Marco Varlese191a5942017-10-30 18:17:21 +0100754
Marco Varlesefae40392018-02-14 15:38:35 +0100755 *next0 = sctp_next_drop (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlese8ad6a2d2018-01-26 16:50:01 +0100756
Marco Varlese91389ac2018-01-31 11:00:01 +0100757 SCTP_ADV_DBG ("POINTER_WITH_DATA = %p", b->data);
758
Marco Varlese54432f82018-02-15 17:01:56 +0100759 if (!sctp_is_sack_delayable (sctp_conn, idx, is_gapping))
760 sctp_prepare_sack_chunk (sctp_conn, idx, b);
761
762 sctp_conn->sub_conn[idx].enqueue_state = error;
Marco Varlese191a5942017-10-30 18:17:21 +0100763
764 return error;
765}
766
767always_inline u16
768sctp_handle_cookie_echo (sctp_header_t * sctp_hdr,
769 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +0100770 sctp_connection_t * sctp_conn, u8 idx,
771 vlib_buffer_t * b0, u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +0100772{
Marco Varlese21c8baf2018-02-02 17:17:51 +0100773 u32 now = sctp_time_now ();
Marco Varlese191a5942017-10-30 18:17:21 +0100774
Marco Varlese91389ac2018-01-31 11:00:01 +0100775 sctp_cookie_echo_chunk_t *cookie_echo =
776 (sctp_cookie_echo_chunk_t *) sctp_hdr;
777
Marco Varlese191a5942017-10-30 18:17:21 +0100778 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
779 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
780 {
781 return SCTP_ERROR_INVALID_TAG;
782 }
783
Marco Varlese21c8baf2018-02-02 17:17:51 +0100784 sctp_calculate_rto (sctp_conn, idx);
785
Marco Varlese91389ac2018-01-31 11:00:01 +0100786 u32 creation_time =
787 clib_net_to_host_u32 (cookie_echo->cookie.creation_time);
788 u32 cookie_lifespan =
789 clib_net_to_host_u32 (cookie_echo->cookie.cookie_lifespan);
790 if (now > creation_time + cookie_lifespan)
791 {
792 SCTP_DBG ("now (%u) > creation_time (%u) + cookie_lifespan (%u)",
793 now, creation_time, cookie_lifespan);
794 return SCTP_ERROR_COOKIE_ECHO_VIOLATION;
795 }
796
Marco Varlese54432f82018-02-15 17:01:56 +0100797 sctp_prepare_cookie_ack_chunk (sctp_conn, idx, b0);
Marco Varlese191a5942017-10-30 18:17:21 +0100798
799 /* Change state */
800 sctp_conn->state = SCTP_STATE_ESTABLISHED;
Marco Varlese54432f82018-02-15 17:01:56 +0100801 sctp_conn->sub_conn[idx].state = SCTP_SUBCONN_STATE_UP;
Marco Varlesebe2251b2018-02-07 12:22:41 +0100802 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100803
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100804 sctp_timer_set (sctp_conn, idx, SCTP_TIMER_T4_HEARTBEAT,
805 sctp_conn->sub_conn[idx].RTO);
806
Marco Varlese15cc6a82018-02-21 12:39:52 +0100807 stream_session_accept_notify (&sctp_conn->sub_conn[idx].connection);
808
Marco Varlese191a5942017-10-30 18:17:21 +0100809 return SCTP_ERROR_NONE;
810
811}
812
813always_inline u16
814sctp_handle_cookie_ack (sctp_header_t * sctp_hdr,
815 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +0100816 sctp_connection_t * sctp_conn, u8 idx,
817 vlib_buffer_t * b0, u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +0100818{
Marco Varlese191a5942017-10-30 18:17:21 +0100819 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
820 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
821 {
822 return SCTP_ERROR_INVALID_TAG;
823 }
824
Marco Varlese21c8baf2018-02-02 17:17:51 +0100825 sctp_calculate_rto (sctp_conn, idx);
826
Marco Varlese191a5942017-10-30 18:17:21 +0100827 sctp_timer_reset (sctp_conn, idx, SCTP_TIMER_T1_COOKIE);
828 /* Change state */
829 sctp_conn->state = SCTP_STATE_ESTABLISHED;
Marco Varlese54432f82018-02-15 17:01:56 +0100830 sctp_conn->sub_conn[idx].state = SCTP_SUBCONN_STATE_UP;
831
Marco Varlesefae40392018-02-14 15:38:35 +0100832 *next0 = sctp_next_drop (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100833
Marco Varlesedf5a99c2018-02-06 13:48:30 +0100834 sctp_timer_set (sctp_conn, idx, SCTP_TIMER_T4_HEARTBEAT,
835 sctp_conn->sub_conn[idx].RTO);
836
Marco Varlese15cc6a82018-02-21 12:39:52 +0100837 stream_session_accept_notify (&sctp_conn->sub_conn[idx].connection);
838
Marco Varlese191a5942017-10-30 18:17:21 +0100839 return SCTP_ERROR_NONE;
840
841}
842
843always_inline uword
844sctp46_rcv_phase_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
845 vlib_frame_t * from_frame, int is_ip4)
846{
847 sctp_main_t *tm = vnet_get_sctp_main ();
848
849 u32 n_left_from, next_index, *from, *to_next;
850 u32 my_thread_index = vm->thread_index;
851
852 from = vlib_frame_vector_args (from_frame);
853 n_left_from = from_frame->n_vectors;
854
855 next_index = node->cached_next_index;
856
857 while (n_left_from > 0)
858 {
859 u32 n_left_to_next;
860
861 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
862
863 while (n_left_from > 0 && n_left_to_next > 0)
864 {
865 u32 bi0;
866 vlib_buffer_t *b0;
867 sctp_header_t *sctp_hdr = 0;
868 sctp_chunks_common_hdr_t *sctp_chunk_hdr = 0;
869 ip4_header_t *ip4_hdr = 0;
870 ip6_header_t *ip6_hdr = 0;
871 sctp_connection_t *sctp_conn, *new_sctp_conn;
872 u16 sctp_implied_length = 0;
Marco Varlesef3ab4892018-02-19 15:23:13 +0100873 u16 error0 = SCTP_ERROR_NONE, next0 = sctp_next_drop (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100874 u8 idx;
875
876 bi0 = from[0];
877 to_next[0] = bi0;
878 from += 1;
879 to_next += 1;
880 n_left_from -= 1;
881 n_left_to_next -= 1;
882
883 b0 = vlib_get_buffer (vm, bi0);
884
885 /* If we are in SCTP_COOKIE_WAIT_STATE then the connection
886 * will come from the half-open connections pool.
887 */
888 sctp_conn =
889 sctp_half_open_connection_get (vnet_buffer (b0)->
890 sctp.connection_index);
891
892 if (PREDICT_FALSE (sctp_conn == 0))
893 {
Marco Varlese191a5942017-10-30 18:17:21 +0100894 SCTP_ADV_DBG
895 ("sctp_conn == NULL; return SCTP_ERROR_INVALID_CONNECTION");
896 error0 = SCTP_ERROR_INVALID_CONNECTION;
897 goto drop;
898 }
899 if (is_ip4)
900 {
901 ip4_hdr = vlib_buffer_get_current (b0);
902 sctp_hdr = ip4_next_header (ip4_hdr);
Marco Varlese54432f82018-02-15 17:01:56 +0100903 idx = sctp_sub_conn_id_via_ip4h (sctp_conn, ip4_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +0100904 }
905 else
906 {
907 ip6_hdr = vlib_buffer_get_current (b0);
908 sctp_hdr = ip6_next_header (ip6_hdr);
Marco Varlese54432f82018-02-15 17:01:56 +0100909 idx = sctp_sub_conn_id_via_ip6h (sctp_conn, ip6_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +0100910 }
Marco Varlese191a5942017-10-30 18:17:21 +0100911
Marco Varlese54432f82018-02-15 17:01:56 +0100912 sctp_conn->sub_conn[idx].parent = sctp_conn;
Marco Varlese191a5942017-10-30 18:17:21 +0100913 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
914
Marco Varlese191a5942017-10-30 18:17:21 +0100915 sctp_chunk_hdr =
916 (sctp_chunks_common_hdr_t *) (&full_hdr->common_hdr);
917
918 sctp_implied_length =
919 sctp_calculate_implied_length (ip4_hdr, ip6_hdr, is_ip4);
920
921 u8 chunk_type = vnet_sctp_get_chunk_type (&full_hdr->common_hdr);
922
923 switch (chunk_type)
924 {
925 case INIT_ACK:
926 error0 =
927 sctp_is_valid_init_ack (sctp_hdr, sctp_chunk_hdr, sctp_conn,
928 b0, sctp_implied_length);
929
930 if (error0 == SCTP_ERROR_NONE)
931 {
932 pool_get (tm->connections[my_thread_index], new_sctp_conn);
933 clib_memcpy (new_sctp_conn, sctp_conn,
934 sizeof (*new_sctp_conn));
935 new_sctp_conn->sub_conn[idx].c_c_index =
936 new_sctp_conn - tm->connections[my_thread_index];
937 new_sctp_conn->sub_conn[idx].c_thread_index =
938 my_thread_index;
Marco Varlesef3ab4892018-02-19 15:23:13 +0100939 new_sctp_conn->sub_conn[idx].PMTU =
940 sctp_conn->sub_conn[idx].PMTU;
Marco Varlese191a5942017-10-30 18:17:21 +0100941 new_sctp_conn->sub_conn[idx].parent = new_sctp_conn;
942
943 if (sctp_half_open_connection_cleanup (sctp_conn))
944 {
945 SCTP_DBG
946 ("Cannot cleanup half-open connection; not the owning thread");
947 }
948
949 sctp_connection_timers_init (new_sctp_conn);
950
951 error0 =
952 sctp_handle_init_ack (sctp_hdr, sctp_chunk_hdr,
Marco Varlese21c8baf2018-02-02 17:17:51 +0100953 new_sctp_conn, idx, b0,
Marco Varlese191a5942017-10-30 18:17:21 +0100954 sctp_implied_length);
955
Marco Varlesef3ab4892018-02-19 15:23:13 +0100956 sctp_init_cwnd (new_sctp_conn);
Marco Varlese191a5942017-10-30 18:17:21 +0100957
958 if (session_stream_connect_notify
959 (&new_sctp_conn->sub_conn[idx].connection, 0))
960 {
961 SCTP_DBG
962 ("conn_index = %u: session_stream_connect_notify error; cleaning up connection",
963 new_sctp_conn->sub_conn[idx].connection.c_index);
964 sctp_connection_cleanup (new_sctp_conn);
965 goto drop;
966 }
Marco Varlesef3ab4892018-02-19 15:23:13 +0100967 next0 = sctp_next_output (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100968 }
Marco Varlese191a5942017-10-30 18:17:21 +0100969 break;
970
971 /* All UNEXPECTED scenarios (wrong chunk received per state-machine)
972 * are handled by the input-dispatcher function using the table-lookup
973 * hence we should never get to the "default" case below.
974 */
975 default:
976 error0 = SCTP_ERROR_UNKOWN_CHUNK;
Marco Varlesefae40392018-02-14 15:38:35 +0100977 next0 = sctp_next_drop (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100978 goto drop;
979 }
980
981 if (error0 != SCTP_ERROR_NONE)
982 {
983 clib_warning ("error while parsing chunk");
984 sctp_connection_cleanup (sctp_conn);
Marco Varlesefae40392018-02-14 15:38:35 +0100985 next0 = sctp_next_drop (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +0100986 goto drop;
987 }
988
989 drop:
990 b0->error = node->errors[error0];
991 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
992 {
993 sctp_rx_trace_t *t0 =
994 vlib_add_trace (vm, node, b0, sizeof (*t0));
995 sctp_set_rx_trace_data (t0, sctp_conn, sctp_hdr, b0, is_ip4);
996 }
997
998 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
999 n_left_to_next, bi0, next0);
1000 }
1001
1002 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1003 }
1004 return from_frame->n_vectors;
1005}
1006
1007static uword
1008sctp4_rcv_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1009 vlib_frame_t * from_frame)
1010{
1011 return sctp46_rcv_phase_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1012}
1013
1014static uword
1015sctp6_rcv_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1016 vlib_frame_t * from_frame)
1017{
1018 return sctp46_rcv_phase_inline (vm, node, from_frame, 0 /* is_ip4 */ );
1019}
1020
1021u8 *
1022format_sctp_rx_trace_short (u8 * s, va_list * args)
1023{
1024 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
1025 CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
1026 sctp_rx_trace_t *t = va_arg (*args, sctp_rx_trace_t *);
1027
1028 s = format (s, "%d -> %d (%U)",
1029 clib_net_to_host_u16 (t->sctp_header.src_port),
1030 clib_net_to_host_u16 (t->sctp_header.dst_port),
1031 format_sctp_state, t->sctp_connection.state);
1032
1033 return s;
1034}
1035
1036/* *INDENT-OFF* */
1037VLIB_REGISTER_NODE (sctp4_rcv_phase_node) =
1038{
1039 .function = sctp4_rcv_phase,
1040 .name = "sctp4-rcv",
1041 /* Takes a vector of packets. */
1042 .vector_size = sizeof (u32),
1043 .n_errors = SCTP_N_ERROR,
1044 .error_strings = sctp_error_strings,
1045 .n_next_nodes = SCTP_RCV_PHASE_N_NEXT,
1046 .next_nodes =
1047 {
1048#define _(s,n) [SCTP_RCV_PHASE_NEXT_##s] = n,
1049 foreach_sctp_state_next
1050#undef _
1051 },
1052 .format_trace = format_sctp_rx_trace_short,
1053};
1054/* *INDENT-ON* */
1055
1056VLIB_NODE_FUNCTION_MULTIARCH (sctp4_rcv_phase_node, sctp4_rcv_phase);
1057
1058/* *INDENT-OFF* */
1059VLIB_REGISTER_NODE (sctp6_init_phase_node) =
1060{
1061 .function = sctp6_rcv_phase,
1062 .name = "sctp6-rcv",
1063 /* Takes a vector of packets. */
1064 .vector_size = sizeof (u32),
1065 .n_errors = SCTP_N_ERROR,
1066 .error_strings = sctp_error_strings,
1067 .n_next_nodes = SCTP_RCV_PHASE_N_NEXT,
1068 .next_nodes =
1069 {
1070#define _(s,n) [SCTP_RCV_PHASE_NEXT_##s] = n,
1071 foreach_sctp_state_next
1072#undef _
1073 },
1074 .format_trace = format_sctp_rx_trace_short,
1075};
1076/* *INDENT-ON* */
1077
1078VLIB_NODE_FUNCTION_MULTIARCH (sctp6_init_phase_node, sctp6_rcv_phase);
1079
1080vlib_node_registration_t sctp4_shutdown_phase_node;
1081vlib_node_registration_t sctp6_shutdown_phase_node;
1082
1083always_inline u16
1084sctp_handle_shutdown (sctp_header_t * sctp_hdr,
1085 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001086 sctp_connection_t * sctp_conn, u8 idx,
1087 vlib_buffer_t * b0, u16 sctp_implied_length,
1088 u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001089{
1090 sctp_shutdown_association_chunk_t *shutdown_chunk =
1091 (sctp_shutdown_association_chunk_t *) (sctp_hdr);
1092
1093 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1094 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
1095 {
1096 return SCTP_ERROR_INVALID_TAG;
1097 }
1098
1099 /*
1100 * It is not possible to bundle any other CHUNK with the SHUTDOWN chunk
1101 */
1102 if (sctp_is_bundling (sctp_implied_length, &shutdown_chunk->chunk_hdr))
1103 return SCTP_ERROR_BUNDLING_VIOLATION;
1104
1105 switch (sctp_conn->state)
1106 {
1107 case SCTP_STATE_ESTABLISHED:
1108 if (sctp_check_outstanding_data_chunks (sctp_conn) == 0)
1109 sctp_conn->state = SCTP_STATE_SHUTDOWN_RECEIVED;
Marco Varlese54432f82018-02-15 17:01:56 +01001110 sctp_send_shutdown_ack (sctp_conn, idx, b0);
Marco Varlese191a5942017-10-30 18:17:21 +01001111 break;
1112
1113 case SCTP_STATE_SHUTDOWN_SENT:
Marco Varlese54432f82018-02-15 17:01:56 +01001114 sctp_send_shutdown_ack (sctp_conn, idx, b0);
Marco Varlese191a5942017-10-30 18:17:21 +01001115 break;
1116 }
1117
Marco Varlesebe2251b2018-02-07 12:22:41 +01001118 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
1119
Marco Varlese191a5942017-10-30 18:17:21 +01001120 return SCTP_ERROR_NONE;
1121}
1122
1123always_inline u16
1124sctp_handle_shutdown_ack (sctp_header_t * sctp_hdr,
1125 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001126 sctp_connection_t * sctp_conn, u8 idx,
1127 vlib_buffer_t * b0, u16 sctp_implied_length,
1128 u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001129{
1130 sctp_shutdown_ack_chunk_t *shutdown_ack_chunk =
1131 (sctp_shutdown_ack_chunk_t *) (sctp_hdr);
1132
1133 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1134 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
1135 {
1136 return SCTP_ERROR_INVALID_TAG;
1137 }
1138
1139 /*
1140 * It is not possible to bundle any other CHUNK with the SHUTDOWN chunk
1141 */
1142 if (sctp_is_bundling (sctp_implied_length, &shutdown_ack_chunk->chunk_hdr))
1143 return SCTP_ERROR_BUNDLING_VIOLATION;
1144
1145 /* Whether we are in SCTP_STATE_SHUTDOWN_SENT or SCTP_STATE_SHUTDOWN_ACK_SENT
1146 * the reception of a SHUTDOWN_ACK chunk leads to the same actions:
1147 * - STOP T2_SHUTDOWN timer
1148 * - SEND SHUTDOWN_COMPLETE chunk
1149 */
1150 sctp_timer_reset (sctp_conn, MAIN_SCTP_SUB_CONN_IDX,
1151 SCTP_TIMER_T2_SHUTDOWN);
Marco Varlesea38783e2018-02-13 12:38:52 +01001152
Marco Varlese54432f82018-02-15 17:01:56 +01001153 sctp_send_shutdown_complete (sctp_conn, idx, b0);
Marco Varlese191a5942017-10-30 18:17:21 +01001154
Marco Varlesebe2251b2018-02-07 12:22:41 +01001155 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].c_is_ip4);
1156
Marco Varlese191a5942017-10-30 18:17:21 +01001157 return SCTP_ERROR_NONE;
1158}
1159
1160always_inline u16
1161sctp_handle_shutdown_complete (sctp_header_t * sctp_hdr,
1162 sctp_chunks_common_hdr_t * sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001163 sctp_connection_t * sctp_conn, u8 idx,
1164 vlib_buffer_t * b0, u16 sctp_implied_length,
1165 u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001166{
1167 sctp_shutdown_complete_chunk_t *shutdown_complete =
1168 (sctp_shutdown_complete_chunk_t *) (sctp_hdr);
1169
1170 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1171 if (sctp_conn->local_tag != sctp_hdr->verification_tag)
1172 {
1173 return SCTP_ERROR_INVALID_TAG;
1174 }
1175
1176 /*
1177 * It is not possible to bundle any other CHUNK with the SHUTDOWN chunk
1178 */
1179 if (sctp_is_bundling (sctp_implied_length, &shutdown_complete->chunk_hdr))
1180 return SCTP_ERROR_BUNDLING_VIOLATION;
1181
Marco Varlesef3ab4892018-02-19 15:23:13 +01001182 sctp_timer_reset (sctp_conn, idx, SCTP_TIMER_T2_SHUTDOWN);
1183
1184 stream_session_disconnect_notify (&sctp_conn->sub_conn[idx].connection);
Marco Varlese191a5942017-10-30 18:17:21 +01001185
1186 sctp_conn->state = SCTP_STATE_CLOSED;
1187
Marco Varlesefae40392018-02-14 15:38:35 +01001188 *next0 = sctp_next_drop (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlesebe2251b2018-02-07 12:22:41 +01001189
Marco Varlese191a5942017-10-30 18:17:21 +01001190 return SCTP_ERROR_NONE;
1191}
1192
1193always_inline uword
1194sctp46_shutdown_phase_inline (vlib_main_t * vm,
1195 vlib_node_runtime_t * node,
1196 vlib_frame_t * from_frame, int is_ip4)
1197{
1198 u32 n_left_from, next_index, *from, *to_next;
1199 u32 my_thread_index = vm->thread_index;
1200
1201 from = vlib_frame_vector_args (from_frame);
1202 n_left_from = from_frame->n_vectors;
1203
1204 next_index = node->cached_next_index;
1205
1206 while (n_left_from > 0)
1207 {
1208 u32 n_left_to_next;
1209
1210 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1211
1212 while (n_left_from > 0 && n_left_to_next > 0)
1213 {
1214 u32 bi0;
1215 vlib_buffer_t *b0;
1216 sctp_rx_trace_t *sctp_trace;
1217 sctp_header_t *sctp_hdr = 0;
1218 sctp_chunks_common_hdr_t *sctp_chunk_hdr = 0;
1219 ip4_header_t *ip4_hdr = 0;
1220 ip6_header_t *ip6_hdr = 0;
1221 sctp_connection_t *sctp_conn;
1222 u16 sctp_implied_length = 0;
1223 u16 error0 = SCTP_ERROR_NONE, next0 = SCTP_RCV_PHASE_N_NEXT;
Marco Varlese54432f82018-02-15 17:01:56 +01001224 u8 idx = 0;
Marco Varlese191a5942017-10-30 18:17:21 +01001225
1226 bi0 = from[0];
1227 to_next[0] = bi0;
1228 from += 1;
1229 to_next += 1;
1230 n_left_from -= 1;
1231 n_left_to_next -= 1;
1232
1233 b0 = vlib_get_buffer (vm, bi0);
1234 sctp_conn =
1235 sctp_connection_get (vnet_buffer (b0)->sctp.connection_index,
1236 my_thread_index);
1237
1238 if (PREDICT_FALSE (sctp_conn == 0))
1239 {
1240 SCTP_DBG
1241 ("sctp_conn == NULL; return SCTP_ERROR_INVALID_CONNECTION");
1242 error0 = SCTP_ERROR_INVALID_CONNECTION;
1243 goto drop;
1244 }
1245
1246 if (is_ip4)
1247 {
1248 ip4_hdr = vlib_buffer_get_current (b0);
1249 sctp_hdr = ip4_next_header (ip4_hdr);
Marco Varlese54432f82018-02-15 17:01:56 +01001250 idx = sctp_sub_conn_id_via_ip4h (sctp_conn, ip4_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +01001251 }
1252 else
1253 {
1254 ip6_hdr = vlib_buffer_get_current (b0);
1255 sctp_hdr = ip6_next_header (ip6_hdr);
Marco Varlese54432f82018-02-15 17:01:56 +01001256 idx = sctp_sub_conn_id_via_ip6h (sctp_conn, ip6_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +01001257 }
1258
1259 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
1260 sctp_chunk_hdr = &full_hdr->common_hdr;
1261
1262 sctp_implied_length =
1263 sctp_calculate_implied_length (ip4_hdr, ip6_hdr, is_ip4);
1264
Marco Varlesebe2251b2018-02-07 12:22:41 +01001265 u8 chunk_type = vnet_sctp_get_chunk_type (sctp_chunk_hdr);
1266 switch (chunk_type)
Marco Varlese191a5942017-10-30 18:17:21 +01001267 {
1268 case SHUTDOWN:
1269 error0 =
Marco Varlesebe2251b2018-02-07 12:22:41 +01001270 sctp_handle_shutdown (sctp_hdr, sctp_chunk_hdr, sctp_conn,
1271 idx, b0, sctp_implied_length, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001272 break;
1273
1274 case SHUTDOWN_ACK:
1275 error0 =
1276 sctp_handle_shutdown_ack (sctp_hdr, sctp_chunk_hdr, sctp_conn,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001277 idx, b0, sctp_implied_length,
1278 &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001279 break;
1280
1281 case SHUTDOWN_COMPLETE:
1282 error0 =
1283 sctp_handle_shutdown_complete (sctp_hdr, sctp_chunk_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001284 sctp_conn, idx, b0,
1285 sctp_implied_length, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001286
1287 sctp_connection_cleanup (sctp_conn);
Marco Varlese191a5942017-10-30 18:17:21 +01001288 break;
1289
1290 /*
1291 * DATA chunks can still be transmitted/received in the SHUTDOWN-PENDING
1292 * and SHUTDOWN-SENT states (as per RFC4960 Section 6)
1293 */
1294 case DATA:
1295 error0 =
1296 sctp_handle_data ((sctp_payload_data_chunk_t *) sctp_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001297 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001298 break;
1299
1300 /* All UNEXPECTED scenarios (wrong chunk received per state-machine)
1301 * are handled by the input-dispatcher function using the table-lookup
1302 * hence we should never get to the "default" case below.
1303 */
1304 default:
1305 error0 = SCTP_ERROR_UNKOWN_CHUNK;
Marco Varlesefae40392018-02-14 15:38:35 +01001306 next0 = sctp_next_drop (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +01001307 goto drop;
1308 }
1309
1310 if (error0 != SCTP_ERROR_NONE)
1311 {
1312 clib_warning ("error while parsing chunk");
1313 sctp_connection_cleanup (sctp_conn);
Marco Varlesefae40392018-02-14 15:38:35 +01001314 next0 = sctp_next_drop (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +01001315 goto drop;
1316 }
1317
1318 drop:
1319 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
1320 {
1321 sctp_trace =
1322 vlib_add_trace (vm, node, b0, sizeof (*sctp_trace));
Marco Varlesef429a932018-02-06 17:31:06 +01001323
1324 if (sctp_hdr != NULL)
1325 clib_memcpy (&sctp_trace->sctp_header, sctp_hdr,
1326 sizeof (sctp_trace->sctp_header));
1327
1328 if (sctp_conn != NULL)
1329 clib_memcpy (&sctp_trace->sctp_connection, sctp_conn,
1330 sizeof (sctp_trace->sctp_connection));
Marco Varlese191a5942017-10-30 18:17:21 +01001331 }
1332
1333 b0->error = node->errors[error0];
1334
1335 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1336 n_left_to_next, bi0, next0);
1337 }
1338
1339 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1340 }
1341
1342 return from_frame->n_vectors;
1343
1344}
1345
1346static uword
1347sctp4_shutdown_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1348 vlib_frame_t * from_frame)
1349{
1350 return sctp46_shutdown_phase_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1351}
1352
1353static uword
1354sctp6_shutdown_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1355 vlib_frame_t * from_frame)
1356{
1357 return sctp46_shutdown_phase_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1358}
1359
1360/* *INDENT-OFF* */
1361VLIB_REGISTER_NODE (sctp4_shutdown_phase_node) =
1362{
1363 .function = sctp4_shutdown_phase,
1364 .name = "sctp4-shutdown",
1365 /* Takes a vector of packets. */
1366 .vector_size = sizeof (u32),
1367 .n_errors = SCTP_N_ERROR,
1368 .error_strings = sctp_error_strings,
1369 .n_next_nodes = SCTP_SHUTDOWN_PHASE_N_NEXT,
1370 .next_nodes =
1371 {
1372#define _(s,n) [SCTP_SHUTDOWN_PHASE_NEXT_##s] = n,
1373 foreach_sctp_state_next
1374#undef _
1375 },
1376 .format_trace = format_sctp_rx_trace_short,
1377};
1378/* *INDENT-ON* */
1379
1380VLIB_NODE_FUNCTION_MULTIARCH (sctp4_shutdown_phase_node,
1381 sctp4_shutdown_phase);
1382
1383/* *INDENT-OFF* */
1384VLIB_REGISTER_NODE (sctp6_shutdown_phase_node) =
1385{
1386 .function = sctp6_shutdown_phase,
1387 .name = "sctp6-shutdown",
1388 /* Takes a vector of packets. */
1389 .vector_size = sizeof (u32),
1390 .n_errors = SCTP_N_ERROR,
1391 .error_strings = sctp_error_strings,
1392 .n_next_nodes = SCTP_SHUTDOWN_PHASE_N_NEXT,
1393 .next_nodes =
1394 {
1395#define _(s,n) [SCTP_SHUTDOWN_PHASE_NEXT_##s] = n,
1396 foreach_sctp_state_next
1397#undef _
1398 },
1399 .format_trace = format_sctp_rx_trace_short,
1400};
1401/* *INDENT-ON* */
1402
1403VLIB_NODE_FUNCTION_MULTIARCH (sctp6_shutdown_phase_node,
1404 sctp6_shutdown_phase);
1405
1406vlib_node_registration_t sctp4_listen_phase_node;
1407vlib_node_registration_t sctp6_listen_phase_node;
1408
1409vlib_node_registration_t sctp4_established_phase_node;
1410vlib_node_registration_t sctp6_established_phase_node;
1411
1412always_inline u16
1413sctp_handle_sack (sctp_selective_ack_chunk_t * sack_chunk,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001414 sctp_connection_t * sctp_conn, u8 idx, vlib_buffer_t * b0,
Marco Varlese191a5942017-10-30 18:17:21 +01001415 u16 * next0)
1416{
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001417 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1418 if (sctp_conn->local_tag != sack_chunk->sctp_hdr.verification_tag)
1419 {
1420 return SCTP_ERROR_INVALID_TAG;
1421 }
1422
Marco Varlese54432f82018-02-15 17:01:56 +01001423 sctp_conn->sub_conn[idx].last_seen = sctp_time_now ();
1424
Marco Varlesef3ab4892018-02-19 15:23:13 +01001425 /* Section 7.2.2; point (2) */
1426 if (sctp_conn->sub_conn[idx].cwnd > sctp_conn->sub_conn[idx].ssthresh)
1427 sctp_conn->sub_conn[idx].partially_acked_bytes =
1428 sctp_conn->next_tsn - sack_chunk->cumulative_tsn_ack;
1429
1430 /* Section 7.2.2; point (5) */
1431 if (sctp_conn->next_tsn - sack_chunk->cumulative_tsn_ack == 0)
1432 sctp_conn->sub_conn[idx].partially_acked_bytes = 0;
1433
1434 sctp_conn->last_unacked_tsn = sack_chunk->cumulative_tsn_ack;
1435
Marco Varlese21c8baf2018-02-02 17:17:51 +01001436 sctp_calculate_rto (sctp_conn, idx);
1437
1438 sctp_timer_update (sctp_conn, idx, SCTP_TIMER_T3_RXTX,
1439 sctp_conn->sub_conn[idx].RTO);
1440
1441 sctp_conn->sub_conn[idx].RTO_pending = 0;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001442
Marco Varlesefae40392018-02-14 15:38:35 +01001443 *next0 = sctp_next_drop (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +01001444
1445 return SCTP_ERROR_NONE;
1446}
1447
1448always_inline u16
1449sctp_handle_heartbeat (sctp_hb_req_chunk_t * sctp_hb_chunk,
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001450 sctp_connection_t * sctp_conn, u8 idx,
1451 vlib_buffer_t * b0, u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001452{
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001453 /* Check that the LOCALLY generated tag is being used by the REMOTE peer as the verification tag */
1454 if (sctp_conn->local_tag != sctp_hb_chunk->sctp_hdr.verification_tag)
1455 {
1456 return SCTP_ERROR_INVALID_TAG;
1457 }
1458
Marco Varlese54432f82018-02-15 17:01:56 +01001459 sctp_prepare_heartbeat_ack_chunk (sctp_conn, idx, b0);
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001460
1461 *next0 = sctp_next_output (sctp_conn->sub_conn[idx].connection.is_ip4);
1462
Marco Varlese191a5942017-10-30 18:17:21 +01001463 return SCTP_ERROR_NONE;
1464}
1465
1466always_inline u16
1467sctp_handle_heartbeat_ack (sctp_hb_ack_chunk_t * sctp_hb_ack_chunk,
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001468 sctp_connection_t * sctp_conn, u8 idx,
1469 vlib_buffer_t * b0, u16 * next0)
Marco Varlese191a5942017-10-30 18:17:21 +01001470{
Marco Varlese54432f82018-02-15 17:01:56 +01001471 sctp_conn->sub_conn[idx].last_seen = sctp_time_now ();
1472
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001473 sctp_conn->sub_conn[idx].unacknowledged_hb -= 1;
1474
1475 sctp_timer_update (sctp_conn, idx, SCTP_TIMER_T4_HEARTBEAT,
1476 sctp_conn->sub_conn[idx].RTO);
1477
Marco Varlesefae40392018-02-14 15:38:35 +01001478 *next0 = sctp_next_drop (sctp_conn->sub_conn[idx].c_is_ip4);
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001479
Marco Varlese191a5942017-10-30 18:17:21 +01001480 return SCTP_ERROR_NONE;
1481}
1482
1483always_inline void
1484sctp_node_inc_counter (vlib_main_t * vm, u32 tcp4_node, u32 tcp6_node,
1485 u8 is_ip4, u8 evt, u8 val)
1486{
1487 if (PREDICT_TRUE (!val))
1488 return;
1489
1490 if (is_ip4)
1491 vlib_node_increment_counter (vm, tcp4_node, evt, val);
1492 else
1493 vlib_node_increment_counter (vm, tcp6_node, evt, val);
1494}
1495
1496always_inline uword
1497sctp46_listen_process_inline (vlib_main_t * vm,
1498 vlib_node_runtime_t * node,
1499 vlib_frame_t * from_frame, int is_ip4)
1500{
1501 u32 n_left_from, next_index, *from, *to_next;
1502 u32 my_thread_index = vm->thread_index;
1503
1504 from = vlib_frame_vector_args (from_frame);
1505 n_left_from = from_frame->n_vectors;
1506
1507 next_index = node->cached_next_index;
1508
1509 while (n_left_from > 0)
1510 {
1511 u32 n_left_to_next;
1512
1513 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1514
1515 while (n_left_from > 0 && n_left_to_next > 0)
1516 {
1517 u32 bi0;
1518 vlib_buffer_t *b0;
1519 sctp_header_t *sctp_hdr = 0;
1520 ip4_header_t *ip4_hdr;
1521 ip6_header_t *ip6_hdr;
1522 sctp_connection_t *child_conn;
1523 sctp_connection_t *sctp_listener;
Marco Varlesef3ab4892018-02-19 15:23:13 +01001524 u16 next0 = sctp_next_drop (is_ip4), error0 = SCTP_ERROR_ENQUEUED;
Marco Varlese191a5942017-10-30 18:17:21 +01001525
1526 bi0 = from[0];
1527 to_next[0] = bi0;
1528 from += 1;
1529 to_next += 1;
1530 n_left_from -= 1;
1531 n_left_to_next -= 1;
1532
1533 b0 = vlib_get_buffer (vm, bi0);
1534 sctp_listener =
1535 sctp_listener_get (vnet_buffer (b0)->sctp.connection_index);
1536
1537 if (is_ip4)
1538 {
1539 ip4_hdr = vlib_buffer_get_current (b0);
1540 sctp_hdr = ip4_next_header (ip4_hdr);
1541 }
1542 else
1543 {
1544 ip6_hdr = vlib_buffer_get_current (b0);
1545 sctp_hdr = ip6_next_header (ip6_hdr);
1546 }
1547
1548 child_conn =
1549 sctp_lookup_connection (sctp_listener->sub_conn
1550 [MAIN_SCTP_SUB_CONN_IDX].c_fib_index, b0,
1551 my_thread_index, is_ip4);
1552
1553 if (PREDICT_FALSE (child_conn->state != SCTP_STATE_CLOSED))
1554 {
1555 SCTP_DBG
1556 ("conn_index = %u: child_conn->state != SCTP_STATE_CLOSED.... STATE=%s",
1557 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].
1558 connection.c_index,
1559 sctp_state_to_string (child_conn->state));
1560 error0 = SCTP_ERROR_CREATE_EXISTS;
1561 goto drop;
1562 }
1563
1564 /* Create child session and send SYN-ACK */
1565 child_conn = sctp_connection_new (my_thread_index);
1566 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].parent = child_conn;
1567 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_lcl_port =
1568 sctp_hdr->dst_port;
1569 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_rmt_port =
1570 sctp_hdr->src_port;
1571 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_is_ip4 = is_ip4;
1572 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].connection.proto =
1573 sctp_listener->sub_conn[MAIN_SCTP_SUB_CONN_IDX].connection.proto;
Marco Varlesef3ab4892018-02-19 15:23:13 +01001574 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].PMTU =
1575 sctp_listener->sub_conn[MAIN_SCTP_SUB_CONN_IDX].PMTU;
Marco Varlese191a5942017-10-30 18:17:21 +01001576 child_conn->state = SCTP_STATE_CLOSED;
1577
1578 if (is_ip4)
1579 {
1580 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_lcl_ip4.as_u32 =
1581 ip4_hdr->dst_address.as_u32;
1582 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_rmt_ip4.as_u32 =
1583 ip4_hdr->src_address.as_u32;
1584 }
1585 else
1586 {
1587 clib_memcpy (&child_conn->
1588 sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_lcl_ip6,
1589 &ip6_hdr->dst_address, sizeof (ip6_address_t));
1590 clib_memcpy (&child_conn->
1591 sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_rmt_ip6,
1592 &ip6_hdr->src_address, sizeof (ip6_address_t));
1593 }
1594
1595 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
1596 sctp_chunks_common_hdr_t *sctp_chunk_hdr = &full_hdr->common_hdr;
1597
1598 u8 chunk_type = vnet_sctp_get_chunk_type (sctp_chunk_hdr);
1599 if (chunk_type != INIT)
1600 {
1601 SCTP_DBG
1602 ("conn_index = %u: chunk_type != INIT... chunk_type=%s",
1603 child_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].
1604 connection.c_index, sctp_chunk_to_string (chunk_type));
1605
1606 error0 = SCTP_ERROR_UNKOWN_CHUNK;
Marco Varlesefae40392018-02-14 15:38:35 +01001607 next0 = sctp_next_drop (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +01001608 goto drop;
1609 }
1610
1611 u16 sctp_implied_length =
1612 sctp_calculate_implied_length (ip4_hdr, ip6_hdr, is_ip4);
1613
1614 switch (chunk_type)
1615 {
1616 case INIT:
1617 sctp_connection_timers_init (child_conn);
1618
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001619 sctp_init_snd_vars (child_conn);
1620
Marco Varlese191a5942017-10-30 18:17:21 +01001621 error0 =
1622 sctp_handle_init (sctp_hdr, sctp_chunk_hdr, child_conn, b0,
1623 sctp_implied_length);
1624
Marco Varlesef3ab4892018-02-19 15:23:13 +01001625 sctp_init_cwnd (child_conn);
Marco Varlese191a5942017-10-30 18:17:21 +01001626
1627 if (error0 == SCTP_ERROR_NONE)
1628 {
1629 if (stream_session_accept
1630 (&child_conn->
1631 sub_conn[MAIN_SCTP_SUB_CONN_IDX].connection,
1632 sctp_listener->
1633 sub_conn[MAIN_SCTP_SUB_CONN_IDX].c_s_index, 0))
1634 {
1635 clib_warning ("session accept fail");
1636 sctp_connection_cleanup (child_conn);
1637 error0 = SCTP_ERROR_CREATE_SESSION_FAIL;
1638 goto drop;
1639 }
Marco Varlesef3ab4892018-02-19 15:23:13 +01001640 next0 = sctp_next_output (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +01001641 }
Marco Varlese191a5942017-10-30 18:17:21 +01001642 break;
1643
1644 /* Reception of a DATA chunk whilst in the CLOSED state is called
1645 * "Out of the Blue" packet and handling of the chunk needs special treatment
1646 * as per RFC4960 section 8.4
1647 */
1648 case DATA:
1649 break;
1650 }
1651
1652 drop:
1653 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
1654 {
1655 sctp_rx_trace_t *t0 =
1656 vlib_add_trace (vm, node, b0, sizeof (*t0));
1657 clib_memcpy (&t0->sctp_header, sctp_hdr,
1658 sizeof (t0->sctp_header));
1659 clib_memcpy (&t0->sctp_connection, sctp_listener,
1660 sizeof (t0->sctp_connection));
1661 }
1662
1663 b0->error = node->errors[error0];
1664
1665 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1666 n_left_to_next, bi0, next0);
1667 }
1668 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1669
1670 }
1671 return from_frame->n_vectors;
1672}
1673
1674static uword
1675sctp4_listen_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1676 vlib_frame_t * from_frame)
1677{
1678 return sctp46_listen_process_inline (vm, node, from_frame, 1 /* is_ip4 */ );
1679}
1680
1681static uword
1682sctp6_listen_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1683 vlib_frame_t * from_frame)
1684{
1685 return sctp46_listen_process_inline (vm, node, from_frame, 0 /* is_ip4 */ );
1686}
1687
1688always_inline uword
1689sctp46_established_phase_inline (vlib_main_t * vm, vlib_node_runtime_t * node,
1690 vlib_frame_t * from_frame, int is_ip4)
1691{
1692 u32 n_left_from, next_index, *from, *to_next;
1693 u32 my_thread_index = vm->thread_index, errors = 0;
1694
1695 from = vlib_frame_vector_args (from_frame);
1696 n_left_from = from_frame->n_vectors;
1697
1698 next_index = node->cached_next_index;
1699
1700 while (n_left_from > 0)
1701 {
1702 u32 n_left_to_next;
1703
1704 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1705
1706 while (n_left_from > 0 && n_left_to_next > 0)
1707 {
1708 u32 bi0;
1709 vlib_buffer_t *b0;
1710 sctp_header_t *sctp_hdr = 0;
1711 sctp_chunks_common_hdr_t *sctp_chunk_hdr = 0;
1712 ip4_header_t *ip4_hdr = 0;
1713 ip6_header_t *ip6_hdr = 0;
1714 sctp_connection_t *sctp_conn;
Marco Varlesefae40392018-02-14 15:38:35 +01001715 u16 error0 = SCTP_ERROR_ENQUEUED, next0 =
1716 SCTP_ESTABLISHED_PHASE_N_NEXT;
Marco Varlese191a5942017-10-30 18:17:21 +01001717 u8 idx;
1718
1719 bi0 = from[0];
1720 to_next[0] = bi0;
1721 from += 1;
1722 to_next += 1;
1723 n_left_from -= 1;
1724 n_left_to_next -= 1;
1725
1726 b0 = vlib_get_buffer (vm, bi0);
1727 sctp_conn =
1728 sctp_connection_get (vnet_buffer (b0)->sctp.connection_index,
1729 my_thread_index);
1730
1731 if (PREDICT_FALSE (sctp_conn == 0))
1732 {
1733 SCTP_DBG
1734 ("sctp_conn == NULL; return SCTP_ERROR_INVALID_CONNECTION");
1735 error0 = SCTP_ERROR_INVALID_CONNECTION;
1736 goto done;
1737 }
1738 if (is_ip4)
1739 {
1740 ip4_hdr = vlib_buffer_get_current (b0);
1741 sctp_hdr = ip4_next_header (ip4_hdr);
Marco Varlese54432f82018-02-15 17:01:56 +01001742 idx = sctp_sub_conn_id_via_ip4h (sctp_conn, ip4_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +01001743 }
1744 else
1745 {
1746 ip6_hdr = vlib_buffer_get_current (b0);
1747 sctp_hdr = ip6_next_header (ip6_hdr);
Marco Varlese54432f82018-02-15 17:01:56 +01001748 idx = sctp_sub_conn_id_via_ip6h (sctp_conn, ip6_hdr);
Marco Varlese191a5942017-10-30 18:17:21 +01001749 }
1750
Marco Varlese191a5942017-10-30 18:17:21 +01001751 sctp_conn->sub_conn[idx].parent = sctp_conn;
1752
Marco Varlese54432f82018-02-15 17:01:56 +01001753 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
Marco Varlese191a5942017-10-30 18:17:21 +01001754 sctp_chunk_hdr =
1755 (sctp_chunks_common_hdr_t *) (&full_hdr->common_hdr);
1756
1757 u8 chunk_type = vnet_sctp_get_chunk_type (&full_hdr->common_hdr);
1758
1759 switch (chunk_type)
1760 {
1761 case COOKIE_ECHO:
1762 error0 =
1763 sctp_handle_cookie_echo (sctp_hdr, sctp_chunk_hdr, sctp_conn,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001764 idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001765 break;
1766
1767 case COOKIE_ACK:
1768 error0 =
1769 sctp_handle_cookie_ack (sctp_hdr, sctp_chunk_hdr, sctp_conn,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001770 idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001771 break;
1772
1773 case SACK:
1774 error0 =
1775 sctp_handle_sack ((sctp_selective_ack_chunk_t *) sctp_hdr,
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001776 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001777 break;
1778
1779 case HEARTBEAT:
1780 error0 =
1781 sctp_handle_heartbeat ((sctp_hb_req_chunk_t *) sctp_hdr,
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001782 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001783 break;
1784
1785 case HEARTBEAT_ACK:
1786 error0 =
1787 sctp_handle_heartbeat_ack ((sctp_hb_ack_chunk_t *) sctp_hdr,
Marco Varlesedf5a99c2018-02-06 13:48:30 +01001788 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001789 break;
1790
1791 case DATA:
1792 error0 =
1793 sctp_handle_data ((sctp_payload_data_chunk_t *) sctp_hdr,
Marco Varlesebe2251b2018-02-07 12:22:41 +01001794 sctp_conn, idx, b0, &next0);
Marco Varlese191a5942017-10-30 18:17:21 +01001795 break;
1796
1797 /* All UNEXPECTED scenarios (wrong chunk received per state-machine)
1798 * are handled by the input-dispatcher function using the table-lookup
1799 * hence we should never get to the "default" case below.
1800 */
1801 default:
1802 error0 = SCTP_ERROR_UNKOWN_CHUNK;
Marco Varlesefae40392018-02-14 15:38:35 +01001803 next0 = sctp_next_drop (is_ip4);
Marco Varlese191a5942017-10-30 18:17:21 +01001804 goto done;
1805 }
1806
1807 done:
1808 b0->error = node->errors[error0];
1809 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
1810 {
1811 sctp_rx_trace_t *t0 =
1812 vlib_add_trace (vm, node, b0, sizeof (*t0));
1813 sctp_set_rx_trace_data (t0, sctp_conn, sctp_hdr, b0, is_ip4);
1814 }
1815
1816 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
1817 n_left_to_next, bi0, next0);
1818 }
1819
1820 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
1821 }
1822
1823 errors = session_manager_flush_enqueue_events (TRANSPORT_PROTO_SCTP,
1824 my_thread_index);
1825
1826 sctp_node_inc_counter (vm, is_ip4, sctp4_established_phase_node.index,
1827 sctp6_established_phase_node.index,
1828 SCTP_ERROR_EVENT_FIFO_FULL, errors);
1829 sctp_flush_frame_to_output (vm, my_thread_index, is_ip4);
1830
1831 return from_frame->n_vectors;
1832}
1833
1834static uword
1835sctp4_established_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1836 vlib_frame_t * from_frame)
1837{
1838 return sctp46_established_phase_inline (vm, node, from_frame,
1839 1 /* is_ip4 */ );
1840}
1841
1842static uword
1843sctp6_established_phase (vlib_main_t * vm, vlib_node_runtime_t * node,
1844 vlib_frame_t * from_frame)
1845{
1846 return sctp46_established_phase_inline (vm, node, from_frame,
1847 0 /* is_ip4 */ );
1848}
1849
1850u8 *
1851format_sctp_rx_trace (u8 * s, va_list * args)
1852{
1853 CLIB_UNUSED (vlib_main_t * vm) = va_arg (*args, vlib_main_t *);
1854 CLIB_UNUSED (vlib_node_t * node) = va_arg (*args, vlib_node_t *);
1855 sctp_rx_trace_t *t = va_arg (*args, sctp_rx_trace_t *);
1856 u32 indent = format_get_indent (s);
1857
1858 s = format (s, "%U\n%U%U",
1859 format_sctp_header, &t->sctp_header, 128,
1860 format_white_space, indent,
1861 format_sctp_connection, &t->sctp_connection, 1);
1862
1863 return s;
1864}
1865
1866/* *INDENT-OFF* */
1867VLIB_REGISTER_NODE (sctp4_listen_phase_node) =
1868{
1869 .function = sctp4_listen_phase,
1870 .name = "sctp4-listen",
1871 /* Takes a vector of packets. */
1872 .vector_size = sizeof (u32),
1873 .n_errors = SCTP_N_ERROR,
1874 .error_strings = sctp_error_strings,
1875 .n_next_nodes = SCTP_LISTEN_PHASE_N_NEXT,
1876 .next_nodes =
1877 {
1878#define _(s,n) [SCTP_LISTEN_PHASE_NEXT_##s] = n,
1879 foreach_sctp_state_next
1880#undef _
1881 },
1882 .format_trace = format_sctp_rx_trace_short,
1883};
1884/* *INDENT-ON* */
1885
1886VLIB_NODE_FUNCTION_MULTIARCH (sctp4_listen_phase_node, sctp4_listen_phase);
1887
1888/* *INDENT-OFF* */
1889VLIB_REGISTER_NODE (sctp6_listen_phase_node) =
1890{
1891 .function = sctp6_listen_phase,
1892 .name = "sctp6-listen",
1893 /* Takes a vector of packets. */
1894 .vector_size = sizeof (u32),
1895 .n_errors = SCTP_N_ERROR,
1896 .error_strings = sctp_error_strings,
1897 .n_next_nodes = SCTP_LISTEN_PHASE_N_NEXT,
1898 .next_nodes =
1899 {
1900#define _(s,n) [SCTP_LISTEN_PHASE_NEXT_##s] = n,
1901 foreach_sctp_state_next
1902#undef _
1903 },
1904 .format_trace = format_sctp_rx_trace_short,
1905};
1906/* *INDENT-ON* */
1907
1908VLIB_NODE_FUNCTION_MULTIARCH (sctp6_listen_phase_node, sctp6_listen_phase);
1909
1910/* *INDENT-OFF* */
1911VLIB_REGISTER_NODE (sctp4_established_phase_node) =
1912{
1913 .function = sctp4_established_phase,
1914 .name = "sctp4-established",
1915 /* Takes a vector of packets. */
1916 .vector_size = sizeof (u32),
1917 .n_errors = SCTP_N_ERROR,
1918 .error_strings = sctp_error_strings,
1919 .n_next_nodes = SCTP_ESTABLISHED_PHASE_N_NEXT,
1920 .next_nodes =
1921 {
1922#define _(s,n) [SCTP_ESTABLISHED_PHASE_NEXT_##s] = n,
1923 foreach_sctp_state_next
1924#undef _
1925 },
1926 .format_trace = format_sctp_rx_trace_short,
1927};
1928/* *INDENT-ON* */
1929
1930VLIB_NODE_FUNCTION_MULTIARCH (sctp4_established_phase_node,
1931 sctp4_established_phase);
1932
1933/* *INDENT-OFF* */
1934VLIB_REGISTER_NODE (sctp6_established_phase_node) =
1935{
1936 .function = sctp6_established_phase,
1937 .name = "sctp6-established",
1938 /* Takes a vector of packets. */
1939 .vector_size = sizeof (u32),
1940 .n_errors = SCTP_N_ERROR,
1941 .error_strings = sctp_error_strings,
1942 .n_next_nodes = SCTP_LISTEN_PHASE_N_NEXT,
1943 .next_nodes =
1944 {
1945#define _(s,n) [SCTP_LISTEN_PHASE_NEXT_##s] = n,
1946 foreach_sctp_state_next
1947#undef _
1948 },
1949 .format_trace = format_sctp_rx_trace_short,
1950};
1951/* *INDENT-ON* */
1952
1953VLIB_NODE_FUNCTION_MULTIARCH (sctp6_established_phase_node,
1954 sctp6_established_phase);
1955
1956/*
1957 * This is the function executed first for the SCTP graph.
1958 * It takes care of doing the initial message parsing and
1959 * dispatch to the specialized function.
1960 */
1961always_inline uword
1962sctp46_input_dispatcher (vlib_main_t * vm, vlib_node_runtime_t * node,
1963 vlib_frame_t * from_frame, int is_ip4)
1964{
1965 u32 n_left_from, next_index, *from, *to_next;
1966 u32 my_thread_index = vm->thread_index;
1967 u8 is_filtered;
1968 sctp_main_t *tm = vnet_get_sctp_main ();
1969
1970 from = vlib_frame_vector_args (from_frame);
1971 n_left_from = from_frame->n_vectors;
1972 next_index = node->cached_next_index;
1973 sctp_set_time_now (my_thread_index);
1974
1975 while (n_left_from > 0)
1976 {
1977 u32 n_left_to_next;
1978
1979 vlib_get_next_frame (vm, node, next_index, to_next, n_left_to_next);
1980
1981 while (n_left_from > 0 && n_left_to_next > 0)
1982 {
1983 int n_advance_bytes0, n_data_bytes0;
1984 u32 bi0, fib_index0;
1985 vlib_buffer_t *b0;
1986 sctp_header_t *sctp_hdr = 0;
1987 sctp_chunks_common_hdr_t *sctp_chunk_hdr = 0;
1988 sctp_connection_t *sctp_conn;
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01001989 transport_connection_t *trans_conn;
Marco Varlese191a5942017-10-30 18:17:21 +01001990 ip4_header_t *ip4_hdr;
1991 ip6_header_t *ip6_hdr;
1992 u32 error0 = SCTP_ERROR_NO_LISTENER, next0 = SCTP_INPUT_NEXT_DROP;
1993
1994 bi0 = from[0];
1995 to_next[0] = bi0;
1996 from += 1;
1997 to_next += 1;
1998 n_left_from -= 1;
1999 n_left_to_next -= 1;
2000
2001 b0 = vlib_get_buffer (vm, bi0);
2002 vnet_buffer (b0)->tcp.flags = 0;
2003 fib_index0 = vnet_buffer (b0)->ip.fib_index;
2004
2005 /* Checksum computed by ipx_local no need to compute again */
2006
2007 if (is_ip4)
2008 {
2009 ip4_hdr = vlib_buffer_get_current (b0);
2010 sctp_hdr = ip4_next_header (ip4_hdr);
2011
2012 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
2013 sctp_chunk_hdr = &full_hdr->common_hdr;
2014
2015 n_advance_bytes0 =
2016 (ip4_header_bytes (ip4_hdr) +
2017 sizeof (sctp_payload_data_chunk_t));
2018 n_data_bytes0 =
2019 clib_net_to_host_u16 (ip4_hdr->length) - n_advance_bytes0;
2020
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01002021 trans_conn = session_lookup_connection_wt4 (fib_index0,
2022 &ip4_hdr->dst_address,
2023 &ip4_hdr->src_address,
2024 sctp_hdr->dst_port,
2025 sctp_hdr->src_port,
2026 TRANSPORT_PROTO_SCTP,
2027 my_thread_index,
2028 &is_filtered);
Marco Varlese191a5942017-10-30 18:17:21 +01002029 }
2030 else
2031 {
2032 ip6_hdr = vlib_buffer_get_current (b0);
2033 sctp_hdr = ip6_next_header (ip6_hdr);
2034
2035 sctp_full_hdr_t *full_hdr = (sctp_full_hdr_t *) sctp_hdr;
2036 sctp_chunk_hdr = &full_hdr->common_hdr;
2037
2038 n_advance_bytes0 = sctp_header_bytes ();
2039 n_data_bytes0 =
2040 clib_net_to_host_u16 (ip6_hdr->payload_length) -
2041 n_advance_bytes0;
2042 n_advance_bytes0 += sizeof (ip6_hdr[0]);
2043
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01002044 trans_conn = session_lookup_connection_wt6 (fib_index0,
2045 &ip6_hdr->dst_address,
2046 &ip6_hdr->src_address,
2047 sctp_hdr->dst_port,
2048 sctp_hdr->src_port,
2049 TRANSPORT_PROTO_SCTP,
2050 my_thread_index,
2051 &is_filtered);
Marco Varlese191a5942017-10-30 18:17:21 +01002052 }
2053
2054 /* Length check */
2055 if (PREDICT_FALSE (n_advance_bytes0 < 0))
2056 {
2057 error0 = SCTP_ERROR_LENGTH;
2058 goto done;
2059 }
2060
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01002061 sctp_conn = sctp_get_connection_from_transport (trans_conn);
Marco Varlese191a5942017-10-30 18:17:21 +01002062 vnet_sctp_common_hdr_params_net_to_host (sctp_chunk_hdr);
2063
Marco Varlesefae40392018-02-14 15:38:35 +01002064 u8 chunk_type = vnet_sctp_get_chunk_type (sctp_chunk_hdr);
2065 if (chunk_type >= UNKNOWN)
2066 {
2067 clib_warning
2068 ("Received an unrecognized chunk... something is really bad.");
2069 error0 = SCTP_ERROR_UNKOWN_CHUNK;
2070 next0 = SCTP_INPUT_NEXT_DROP;
2071 goto done;
2072 }
2073
Marco Varlese191a5942017-10-30 18:17:21 +01002074 vnet_buffer (b0)->sctp.hdr_offset =
2075 (u8 *) sctp_hdr - (u8 *) vlib_buffer_get_current (b0);
2076
2077 /* Session exists */
2078 if (PREDICT_TRUE (0 != sctp_conn))
2079 {
2080 /* Save connection index */
Marco Varlese8ad6a2d2018-01-26 16:50:01 +01002081 vnet_buffer (b0)->sctp.connection_index = trans_conn->c_index;
Marco Varlese191a5942017-10-30 18:17:21 +01002082 vnet_buffer (b0)->sctp.data_offset = n_advance_bytes0;
2083 vnet_buffer (b0)->sctp.data_len = n_data_bytes0;
2084
Marco Varlesefae40392018-02-14 15:38:35 +01002085 next0 = tm->dispatch_table[sctp_conn->state][chunk_type].next;
2086 error0 = tm->dispatch_table[sctp_conn->state][chunk_type].error;
Marco Varlese191a5942017-10-30 18:17:21 +01002087
Marco Varlesef3ab4892018-02-19 15:23:13 +01002088 SCTP_DBG_STATE_MACHINE
Marco Varlese15cc6a82018-02-21 12:39:52 +01002089 ("S_INDEX = %u, C_INDEX = %u, TRANS_CONN = %p, SCTP_CONN = %p, CURRENT_CONNECTION_STATE = %s,"
Marco Varlesef3ab4892018-02-19 15:23:13 +01002090 "CHUNK_TYPE_RECEIVED = %s " "NEXT_PHASE = %s",
2091 sctp_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].
Marco Varlese15cc6a82018-02-21 12:39:52 +01002092 connection.s_index,
2093 sctp_conn->sub_conn[MAIN_SCTP_SUB_CONN_IDX].
2094 connection.c_index, trans_conn, sctp_conn,
2095 sctp_state_to_string (sctp_conn->state),
Marco Varlesef3ab4892018-02-19 15:23:13 +01002096 sctp_chunk_to_string (chunk_type), phase_to_string (next0));
Marco Varlese191a5942017-10-30 18:17:21 +01002097
Marco Varlesefae40392018-02-14 15:38:35 +01002098 if (chunk_type == DATA)
Marco Varlese191a5942017-10-30 18:17:21 +01002099 SCTP_ADV_DBG ("n_advance_bytes0 = %u, n_data_bytes0 = %u",
2100 n_advance_bytes0, n_data_bytes0);
2101
2102 }
2103 else
2104 {
2105 if (is_filtered)
2106 {
2107 next0 = SCTP_INPUT_NEXT_DROP;
2108 error0 = SCTP_ERROR_FILTERED;
2109 }
2110 else if ((is_ip4 && tm->punt_unknown4) ||
2111 (!is_ip4 && tm->punt_unknown6))
2112 {
2113 next0 = SCTP_INPUT_NEXT_PUNT_PHASE;
2114 error0 = SCTP_ERROR_PUNT;
2115 }
2116 else
2117 {
2118 next0 = SCTP_INPUT_NEXT_DROP;
2119 error0 = SCTP_ERROR_NO_LISTENER;
2120 }
2121 SCTP_DBG_STATE_MACHINE ("sctp_conn == NULL, NEXT_PHASE = %s",
2122 phase_to_string (next0));
2123 sctp_conn = 0;
2124 }
2125
2126 done:
2127 b0->error = error0 ? node->errors[error0] : 0;
2128
2129 if (PREDICT_FALSE (b0->flags & VLIB_BUFFER_IS_TRACED))
2130 {
2131 sctp_rx_trace_t *t0 =
2132 vlib_add_trace (vm, node, b0, sizeof (*t0));
2133 sctp_set_rx_trace_data (t0, sctp_conn, sctp_hdr, b0, is_ip4);
2134 }
2135 vlib_validate_buffer_enqueue_x1 (vm, node, next_index, to_next,
2136 n_left_to_next, bi0, next0);
2137 }
2138
2139 vlib_put_next_frame (vm, node, next_index, n_left_to_next);
2140 }
2141 return from_frame->n_vectors;
2142}
2143
2144static uword
2145sctp4_input_dispatcher (vlib_main_t * vm, vlib_node_runtime_t * node,
2146 vlib_frame_t * from_frame)
2147{
2148 return sctp46_input_dispatcher (vm, node, from_frame, 1 /* is_ip4 */ );
2149}
2150
2151static uword
2152sctp6_input_dispatcher (vlib_main_t * vm, vlib_node_runtime_t * node,
2153 vlib_frame_t * from_frame)
2154{
2155 return sctp46_input_dispatcher (vm, node, from_frame, 0 /* is_ip4 */ );
2156}
2157
2158/* *INDENT-OFF* */
2159VLIB_REGISTER_NODE (sctp4_input_node) =
2160{
2161 .function = sctp4_input_dispatcher,
2162 .name = "sctp4-input",
2163 /* Takes a vector of packets. */
2164 .vector_size = sizeof (u32),
2165 .n_errors = SCTP_N_ERROR,
2166 .error_strings = sctp_error_strings,
2167 .n_next_nodes = SCTP_INPUT_N_NEXT,
2168 .next_nodes =
2169 {
2170#define _(s,n) [SCTP_INPUT_NEXT_##s] = n,
2171 foreach_sctp4_input_next
2172#undef _
2173 },
2174 .format_buffer = format_sctp_header,
2175 .format_trace = format_sctp_rx_trace,
2176};
2177/* *INDENT-ON* */
2178
2179VLIB_NODE_FUNCTION_MULTIARCH (sctp4_input_node, sctp4_input_dispatcher);
2180
2181/* *INDENT-OFF* */
2182VLIB_REGISTER_NODE (sctp6_input_node) =
2183{
2184 .function = sctp6_input_dispatcher,
2185 .name = "sctp6-input",
2186 /* Takes a vector of packets. */
2187 .vector_size = sizeof (u32),
2188 .n_errors = SCTP_N_ERROR,
2189 .error_strings = sctp_error_strings,
2190 .n_next_nodes = SCTP_INPUT_N_NEXT,
2191 .next_nodes =
2192 {
2193#define _(s,n) [SCTP_INPUT_NEXT_##s] = n,
2194 foreach_sctp6_input_next
2195#undef _
2196 },
2197 .format_buffer = format_sctp_header,
2198 .format_trace = format_sctp_rx_trace,
2199};
2200/* *INDENT-ON* */
2201
2202VLIB_NODE_FUNCTION_MULTIARCH (sctp6_input_node, sctp6_input_dispatcher);
2203
2204vlib_node_registration_t sctp4_input_node;
2205vlib_node_registration_t sctp6_input_node;
2206
2207static void
2208sctp_dispatch_table_init (sctp_main_t * tm)
2209{
2210 int i, j;
2211 for (i = 0; i < ARRAY_LEN (tm->dispatch_table); i++)
2212 for (j = 0; j < ARRAY_LEN (tm->dispatch_table[i]); j++)
2213 {
2214 tm->dispatch_table[i][j].next = SCTP_INPUT_NEXT_DROP;
2215 tm->dispatch_table[i][j].error = SCTP_ERROR_DISPATCH;
2216 }
2217
2218#define _(t,f,n,e) \
2219do { \
2220 tm->dispatch_table[SCTP_STATE_##t][f].next = (n); \
2221 tm->dispatch_table[SCTP_STATE_##t][f].error = (e); \
2222} while (0)
2223
2224 /*
2225 * SCTP STATE-MACHINE states:
2226 *
2227 * _(CLOSED, "CLOSED") \
2228 * _(COOKIE_WAIT, "COOKIE_WAIT") \
2229 * _(COOKIE_ECHOED, "COOKIE_ECHOED") \
2230 * _(ESTABLISHED, "ESTABLISHED") \
2231 * _(SHUTDOWN_PENDING, "SHUTDOWN_PENDING") \
2232 * _(SHUTDOWN_SENT, "SHUTDOWN_SENT") \
2233 * _(SHUTDOWN_RECEIVED, "SHUTDOWN_RECEIVED") \
2234 * _(SHUTDOWN_ACK_SENT, "SHUTDOWN_ACK_SENT")
2235 */
Marco Varlesef3ab4892018-02-19 15:23:13 +01002236 //_(CLOSED, DATA, SCTP_INPUT_NEXT_LISTEN_PHASE, SCTP_ERROR_NONE); /* UNEXPECTED DATA chunk which requires special handling */
Marco Varlese191a5942017-10-30 18:17:21 +01002237 _(CLOSED, INIT, SCTP_INPUT_NEXT_LISTEN_PHASE, SCTP_ERROR_NONE);
2238 _(CLOSED, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2239 _(CLOSED, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED SACK chunk */
2240 _(CLOSED, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2241 _(CLOSED, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2242 _(CLOSED, ABORT, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE);
2243 _(CLOSED, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2244 _(CLOSED, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2245 _(CLOSED, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2246 _(CLOSED, COOKIE_ECHO, SCTP_INPUT_NEXT_ESTABLISHED_PHASE, SCTP_ERROR_NONE);
2247 _(CLOSED, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2248 _(CLOSED, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2249 _(CLOSED, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2250 _(CLOSED, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2251
2252 _(COOKIE_WAIT, DATA, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_NONE);
2253 _(COOKIE_WAIT, INIT, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE); /* UNEXPECTED INIT chunk which requires special handling */
2254 _(COOKIE_WAIT, INIT_ACK, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE);
2255 _(COOKIE_WAIT, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED SACK chunk */
2256 _(COOKIE_WAIT, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2257 _(COOKIE_WAIT, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2258 _(COOKIE_WAIT, ABORT, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE);
2259 _(COOKIE_WAIT, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2260 _(COOKIE_WAIT, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2261 _(COOKIE_WAIT, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2262 _(COOKIE_WAIT, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2263 _(COOKIE_WAIT, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2264 _(COOKIE_WAIT, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2265 _(COOKIE_WAIT, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2266 _(COOKIE_WAIT, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2267
2268 _(COOKIE_ECHOED, DATA, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_NONE);
2269 _(COOKIE_ECHOED, INIT, SCTP_INPUT_NEXT_RCV_PHASE, SCTP_ERROR_NONE); /* UNEXPECTED INIT chunk which requires special handling */
2270 _(COOKIE_ECHOED, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2271 _(COOKIE_ECHOED, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED SACK chunk */
2272 _(COOKIE_ECHOED, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2273 _(COOKIE_ECHOED, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2274 _(COOKIE_ECHOED, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2275 _(COOKIE_ECHOED, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2276 _(COOKIE_ECHOED, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2277 _(COOKIE_ECHOED, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2278 _(COOKIE_ECHOED, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2279 _(COOKIE_ECHOED, COOKIE_ACK, SCTP_INPUT_NEXT_ESTABLISHED_PHASE,
2280 SCTP_ERROR_NONE);
2281 _(COOKIE_ECHOED, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2282 _(COOKIE_ECHOED, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2283 _(COOKIE_ECHOED, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2284
2285 _(ESTABLISHED, DATA, SCTP_INPUT_NEXT_ESTABLISHED_PHASE, SCTP_ERROR_NONE);
2286 _(ESTABLISHED, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2287 _(ESTABLISHED, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2288 _(ESTABLISHED, SACK, SCTP_INPUT_NEXT_ESTABLISHED_PHASE, SCTP_ERROR_NONE);
2289 _(ESTABLISHED, HEARTBEAT, SCTP_INPUT_NEXT_ESTABLISHED_PHASE,
2290 SCTP_ERROR_NONE);
2291 _(ESTABLISHED, HEARTBEAT_ACK, SCTP_INPUT_NEXT_ESTABLISHED_PHASE,
2292 SCTP_ERROR_NONE);
2293 _(ESTABLISHED, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2294 _(ESTABLISHED, SHUTDOWN, SCTP_INPUT_NEXT_SHUTDOWN_PHASE, SCTP_ERROR_NONE);
2295 _(ESTABLISHED, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2296 _(ESTABLISHED, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2297 _(ESTABLISHED, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2298 _(ESTABLISHED, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2299 _(ESTABLISHED, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2300 _(ESTABLISHED, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2301 _(ESTABLISHED, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2302
2303 _(SHUTDOWN_PENDING, DATA, SCTP_INPUT_NEXT_SHUTDOWN_PHASE, SCTP_ERROR_NONE);
2304 _(SHUTDOWN_PENDING, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2305 _(SHUTDOWN_PENDING, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2306 _(SHUTDOWN_PENDING, SACK, SCTP_INPUT_NEXT_LISTEN_PHASE, SCTP_ERROR_NONE);
2307 _(SHUTDOWN_PENDING, HEARTBEAT, SCTP_INPUT_NEXT_LISTEN_PHASE,
2308 SCTP_ERROR_NONE);
2309 _(SHUTDOWN_PENDING, HEARTBEAT_ACK, SCTP_INPUT_NEXT_LISTEN_PHASE,
2310 SCTP_ERROR_NONE);
2311 _(SHUTDOWN_PENDING, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2312 _(SHUTDOWN_PENDING, SHUTDOWN, SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
2313 SCTP_ERROR_NONE);
2314 _(SHUTDOWN_PENDING, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2315 _(SHUTDOWN_PENDING, OPERATION_ERROR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_OPERATION_ERROR_VIOLATION); /* UNEXPECTED OPERATION_ERROR chunk */
2316 _(SHUTDOWN_PENDING, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2317 _(SHUTDOWN_PENDING, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2318 _(SHUTDOWN_PENDING, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2319 _(SHUTDOWN_PENDING, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2320 _(SHUTDOWN_PENDING, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2321
2322 _(SHUTDOWN_SENT, DATA, SCTP_INPUT_NEXT_SHUTDOWN_PHASE, SCTP_ERROR_NONE);
2323 _(SHUTDOWN_SENT, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2324 _(SHUTDOWN_SENT, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2325 _(SHUTDOWN_SENT, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED SACK chunk */
2326 _(SHUTDOWN_SENT, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2327 _(SHUTDOWN_SENT, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2328 _(SHUTDOWN_SENT, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2329 _(SHUTDOWN_SENT, SHUTDOWN, SCTP_INPUT_NEXT_SHUTDOWN_PHASE, SCTP_ERROR_NONE);
2330 _(SHUTDOWN_SENT, SHUTDOWN_ACK, SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
2331 SCTP_ERROR_NONE);
2332 _(SHUTDOWN_SENT, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2333 _(SHUTDOWN_SENT, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2334 _(SHUTDOWN_SENT, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2335 _(SHUTDOWN_SENT, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2336 _(SHUTDOWN_SENT, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2337
2338 _(SHUTDOWN_RECEIVED, DATA, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_DATA_CHUNK_VIOLATION); /* UNEXPECTED DATA chunk */
2339 _(SHUTDOWN_RECEIVED, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2340 _(SHUTDOWN_RECEIVED, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2341 _(SHUTDOWN_RECEIVED, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2342 _(SHUTDOWN_RECEIVED, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2343 _(SHUTDOWN_RECEIVED, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2344 _(SHUTDOWN_RECEIVED, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2345 _(SHUTDOWN_RECEIVED, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2346 _(SHUTDOWN_RECEIVED, SHUTDOWN_ACK, SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
2347 SCTP_ERROR_NONE);
2348 _(SHUTDOWN_RECEIVED, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2349 _(SHUTDOWN_RECEIVED, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2350 _(SHUTDOWN_RECEIVED, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2351 _(SHUTDOWN_RECEIVED, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2352 _(SHUTDOWN_RECEIVED, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_COMPLETE_VIOLATION); /* UNEXPECTED SHUTDOWN_COMPLETE chunk */
2353
2354 _(SHUTDOWN_ACK_SENT, DATA, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_DATA_CHUNK_VIOLATION); /* UNEXPECTED DATA chunk */
2355 _(SHUTDOWN_ACK_SENT, INIT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_INIT_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2356 _(SHUTDOWN_ACK_SENT, INIT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED INIT_ACK chunk */
2357 _(SHUTDOWN_ACK_SENT, SACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SACK_CHUNK_VIOLATION); /* UNEXPECTED INIT chunk */
2358 _(SHUTDOWN_ACK_SENT, HEARTBEAT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT chunk */
2359 _(SHUTDOWN_ACK_SENT, HEARTBEAT_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_HEARTBEAT_ACK_CHUNK_VIOLATION); /* UNEXPECTED HEARTBEAT_ACK chunk */
2360 _(SHUTDOWN_ACK_SENT, ABORT, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ABORT_CHUNK_VIOLATION); /* UNEXPECTED ABORT chunk */
2361 _(SHUTDOWN_ACK_SENT, SHUTDOWN, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN chunk */
2362 _(SHUTDOWN_ACK_SENT, SHUTDOWN_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_SHUTDOWN_ACK_CHUNK_VIOLATION); /* UNEXPECTED SHUTDOWN_ACK chunk */
2363 _(SHUTDOWN_ACK_SENT, COOKIE_ECHO, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_COOKIE_ECHO_VIOLATION); /* UNEXPECTED COOKIE_ECHO chunk */
2364 _(SHUTDOWN_ACK_SENT, COOKIE_ACK, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ACK_DUP); /* UNEXPECTED COOKIE_ACK chunk */
2365 _(SHUTDOWN_ACK_SENT, ECNE, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_ECNE_VIOLATION); /* UNEXPECTED ECNE chunk */
2366 _(SHUTDOWN_ACK_SENT, CWR, SCTP_INPUT_NEXT_DROP, SCTP_ERROR_CWR_VIOLATION); /* UNEXPECTED CWR chunk */
2367 _(SHUTDOWN_ACK_SENT, SHUTDOWN_COMPLETE, SCTP_INPUT_NEXT_SHUTDOWN_PHASE,
2368 SCTP_ERROR_NONE);
2369
2370 /* TODO: Handle COOKIE ECHO when a TCB Exists */
2371
2372#undef _
2373}
2374
2375clib_error_t *
2376sctp_input_init (vlib_main_t * vm)
2377{
2378 clib_error_t *error = 0;
2379 sctp_main_t *tm = vnet_get_sctp_main ();
2380
2381 if ((error = vlib_call_init_function (vm, sctp_init)))
2382 return error;
2383
2384 /* Initialize dispatch table. */
2385 sctp_dispatch_table_init (tm);
2386
2387 return error;
2388}
2389
2390VLIB_INIT_FUNCTION (sctp_input_init);
2391
2392/*
2393 * fd.io coding-style-patch-verification: ON
2394 *
2395 * Local Variables:
2396 * eval: (c-set-style "gnu")
2397 * End:
2398 */