2005-08-10 11:14:34 +08:00
|
|
|
/*
|
|
|
|
* net/dccp/input.c
|
2006-12-11 02:01:18 +08:00
|
|
|
*
|
2005-08-10 11:14:34 +08:00
|
|
|
* An implementation of the DCCP protocol
|
|
|
|
* Arnaldo Carvalho de Melo <acme@conectiva.com.br>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/dccp.h>
|
|
|
|
#include <linux/skbuff.h>
|
|
|
|
|
|
|
|
#include <net/sock.h>
|
|
|
|
|
2005-09-18 15:17:51 +08:00
|
|
|
#include "ackvec.h"
|
2005-08-10 11:14:34 +08:00
|
|
|
#include "ccid.h"
|
|
|
|
#include "dccp.h"
|
|
|
|
|
2007-10-18 10:33:06 +08:00
|
|
|
/* rate-limit for syncs in reply to sequence-invalid packets; RFC 4340, 7.5.4 */
|
|
|
|
int sysctl_dccp_sync_ratelimit __read_mostly = HZ / 8;
|
|
|
|
|
2005-08-10 11:14:34 +08:00
|
|
|
static void dccp_fin(struct sock *sk, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
sk->sk_shutdown |= RCV_SHUTDOWN;
|
|
|
|
sock_set_flag(sk, SOCK_DONE);
|
|
|
|
__skb_pull(skb, dccp_hdr(skb)->dccph_doff * 4);
|
|
|
|
__skb_queue_tail(&sk->sk_receive_queue, skb);
|
|
|
|
skb_set_owner_r(skb, sk);
|
|
|
|
sk->sk_data_ready(sk, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dccp_rcv_close(struct sock *sk, struct sk_buff *skb)
|
|
|
|
{
|
2006-03-21 11:25:24 +08:00
|
|
|
dccp_send_reset(sk, DCCP_RESET_CODE_CLOSED);
|
2005-08-24 12:50:06 +08:00
|
|
|
dccp_fin(sk, skb);
|
|
|
|
dccp_set_state(sk, DCCP_CLOSED);
|
2005-08-24 12:54:23 +08:00
|
|
|
sk_wake_async(sk, 1, POLL_HUP);
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void dccp_rcv_closereq(struct sock *sk, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Step 7: Check for unexpected packet types
|
|
|
|
* If (S.is_server and P.type == CloseReq)
|
|
|
|
* Send Sync packet acknowledging P.seqno
|
|
|
|
* Drop packet and return
|
|
|
|
*/
|
|
|
|
if (dccp_sk(sk)->dccps_role != DCCP_ROLE_CLIENT) {
|
2005-08-17 14:10:59 +08:00
|
|
|
dccp_send_sync(sk, DCCP_SKB_CB(skb)->dccpd_seq, DCCP_PKT_SYNC);
|
2005-08-10 11:14:34 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2005-09-14 06:03:15 +08:00
|
|
|
if (sk->sk_state != DCCP_CLOSING)
|
|
|
|
dccp_set_state(sk, DCCP_CLOSING);
|
2005-08-24 12:50:06 +08:00
|
|
|
dccp_send_close(sk, 0);
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
|
[DCCP]: Convert Reset code into socket error number
This adds support for converting the 11 currently defined Reset codes into system
error numbers, which are stored in sk_err for further interpretation.
This makes the externally visible API behaviour similar to TCP, since a client
connecting to a non-existing port will experience ECONNREFUSED.
* Code 0, Unspecified, is interpreted as non-error (0);
* Code 1, Closed (normal termination), also maps into 0;
* Code 2, Aborted, maps into "Connection reset by peer" (ECONNRESET);
* Code 3, No Connection and
Code 7, Connection Refused, map into "Connection refused" (ECONNREFUSED);
* Code 4, Packet Error, maps into "No message of desired type" (ENOMSG);
* Code 5, Option Error, maps into "Illegal byte sequence" (EILSEQ);
* Code 6, Mandatory Error, maps into "Operation not supported on transport endpoint" (EOPNOTSUPP);
* Code 8, Bad Service Code, maps into "Invalid request code" (EBADRQC);
* Code 9, Too Busy, maps into "Too many users" (EUSERS);
* Code 10, Bad Init Cookie, maps into "Invalid request descriptor" (EBADR);
* Code 11, Aggression Penalty, maps into "Quota exceeded" (EDQUOT)
which makes sense in terms of using more than the `fair share' of bandwidth.
Signed-off-by: Gerrit Renker <gerrit@erg.abdn.ac.uk>
Acked-by: Ian McDonald <ian.mcdonald@jandi.co.nz>
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2007-10-24 20:27:48 +08:00
|
|
|
static u8 dccp_reset_code_convert(const u8 code)
|
|
|
|
{
|
|
|
|
const u8 error_code[] = {
|
|
|
|
[DCCP_RESET_CODE_CLOSED] = 0, /* normal termination */
|
|
|
|
[DCCP_RESET_CODE_UNSPECIFIED] = 0, /* nothing known */
|
|
|
|
[DCCP_RESET_CODE_ABORTED] = ECONNRESET,
|
|
|
|
|
|
|
|
[DCCP_RESET_CODE_NO_CONNECTION] = ECONNREFUSED,
|
|
|
|
[DCCP_RESET_CODE_CONNECTION_REFUSED] = ECONNREFUSED,
|
|
|
|
[DCCP_RESET_CODE_TOO_BUSY] = EUSERS,
|
|
|
|
[DCCP_RESET_CODE_AGGRESSION_PENALTY] = EDQUOT,
|
|
|
|
|
|
|
|
[DCCP_RESET_CODE_PACKET_ERROR] = ENOMSG,
|
|
|
|
[DCCP_RESET_CODE_BAD_INIT_COOKIE] = EBADR,
|
|
|
|
[DCCP_RESET_CODE_BAD_SERVICE_CODE] = EBADRQC,
|
|
|
|
[DCCP_RESET_CODE_OPTION_ERROR] = EILSEQ,
|
|
|
|
[DCCP_RESET_CODE_MANDATORY_ERROR] = EOPNOTSUPP,
|
|
|
|
};
|
|
|
|
|
|
|
|
return code >= DCCP_MAX_RESET_CODES ? 0 : error_code[code];
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dccp_rcv_reset(struct sock *sk, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
u8 err = dccp_reset_code_convert(dccp_hdr_reset(skb)->dccph_reset_code);
|
|
|
|
|
|
|
|
sk->sk_err = err;
|
|
|
|
|
|
|
|
/* Queue the equivalent of TCP fin so that dccp_recvmsg exits the loop */
|
|
|
|
dccp_fin(sk, skb);
|
|
|
|
|
|
|
|
if (err && !sock_flag(sk, SOCK_DEAD))
|
|
|
|
sk_wake_async(sk, 0, POLL_ERR);
|
|
|
|
dccp_time_wait(sk, DCCP_TIME_WAIT, 0);
|
|
|
|
}
|
|
|
|
|
2006-03-21 13:58:56 +08:00
|
|
|
static void dccp_event_ack_recv(struct sock *sk, struct sk_buff *skb)
|
2005-08-10 11:14:34 +08:00
|
|
|
{
|
|
|
|
struct dccp_sock *dp = dccp_sk(sk);
|
|
|
|
|
2006-03-21 14:50:58 +08:00
|
|
|
if (dccp_msk(sk)->dccpms_send_ack_vector)
|
2005-09-18 15:17:51 +08:00
|
|
|
dccp_ackvec_check_rcv_ackno(dp->dccps_hc_rx_ackvec, sk,
|
|
|
|
DCCP_SKB_CB(skb)->dccpd_ack_seq);
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int dccp_check_seqno(struct sock *sk, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
const struct dccp_hdr *dh = dccp_hdr(skb);
|
|
|
|
struct dccp_sock *dp = dccp_sk(sk);
|
2007-09-26 13:41:19 +08:00
|
|
|
u64 lswl, lawl, seqno = DCCP_SKB_CB(skb)->dccpd_seq,
|
|
|
|
ackno = DCCP_SKB_CB(skb)->dccpd_ack_seq;
|
2005-08-10 11:14:34 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Step 5: Prepare sequence numbers for Sync
|
|
|
|
* If P.type == Sync or P.type == SyncAck,
|
|
|
|
* If S.AWL <= P.ackno <= S.AWH and P.seqno >= S.SWL,
|
|
|
|
* / * P is valid, so update sequence number variables
|
|
|
|
* accordingly. After this update, P will pass the tests
|
|
|
|
* in Step 6. A SyncAck is generated if necessary in
|
|
|
|
* Step 15 * /
|
|
|
|
* Update S.GSR, S.SWL, S.SWH
|
|
|
|
* Otherwise,
|
|
|
|
* Drop packet and return
|
|
|
|
*/
|
2006-12-11 02:01:18 +08:00
|
|
|
if (dh->dccph_type == DCCP_PKT_SYNC ||
|
2005-08-10 11:14:34 +08:00
|
|
|
dh->dccph_type == DCCP_PKT_SYNCACK) {
|
2007-09-26 13:41:19 +08:00
|
|
|
if (between48(ackno, dp->dccps_awl, dp->dccps_awh) &&
|
|
|
|
dccp_delta_seqno(dp->dccps_swl, seqno) >= 0)
|
|
|
|
dccp_update_gsr(sk, seqno);
|
2005-08-10 11:14:34 +08:00
|
|
|
else
|
|
|
|
return -1;
|
2005-08-17 14:10:59 +08:00
|
|
|
}
|
2007-02-09 22:24:38 +08:00
|
|
|
|
2005-08-10 11:14:34 +08:00
|
|
|
/*
|
|
|
|
* Step 6: Check sequence numbers
|
|
|
|
* Let LSWL = S.SWL and LAWL = S.AWL
|
|
|
|
* If P.type == CloseReq or P.type == Close or P.type == Reset,
|
|
|
|
* LSWL := S.GSR + 1, LAWL := S.GAR
|
|
|
|
* If LSWL <= P.seqno <= S.SWH
|
|
|
|
* and (P.ackno does not exist or LAWL <= P.ackno <= S.AWH),
|
|
|
|
* Update S.GSR, S.SWL, S.SWH
|
|
|
|
* If P.type != Sync,
|
|
|
|
* Update S.GAR
|
|
|
|
*/
|
2005-08-17 14:10:59 +08:00
|
|
|
lswl = dp->dccps_swl;
|
|
|
|
lawl = dp->dccps_awl;
|
|
|
|
|
|
|
|
if (dh->dccph_type == DCCP_PKT_CLOSEREQ ||
|
2005-08-19 08:12:02 +08:00
|
|
|
dh->dccph_type == DCCP_PKT_CLOSE ||
|
|
|
|
dh->dccph_type == DCCP_PKT_RESET) {
|
2007-09-26 13:41:19 +08:00
|
|
|
lswl = ADD48(dp->dccps_gsr, 1);
|
2005-08-10 11:14:34 +08:00
|
|
|
lawl = dp->dccps_gar;
|
|
|
|
}
|
|
|
|
|
2007-09-26 13:41:19 +08:00
|
|
|
if (between48(seqno, lswl, dp->dccps_swh) &&
|
|
|
|
(ackno == DCCP_PKT_WITHOUT_ACK_SEQ ||
|
|
|
|
between48(ackno, lawl, dp->dccps_awh))) {
|
|
|
|
dccp_update_gsr(sk, seqno);
|
2005-08-10 11:14:34 +08:00
|
|
|
|
|
|
|
if (dh->dccph_type != DCCP_PKT_SYNC &&
|
2007-09-26 13:41:19 +08:00
|
|
|
(ackno != DCCP_PKT_WITHOUT_ACK_SEQ))
|
|
|
|
dp->dccps_gar = ackno;
|
2005-08-10 11:14:34 +08:00
|
|
|
} else {
|
2007-09-26 22:31:49 +08:00
|
|
|
unsigned long now = jiffies;
|
|
|
|
/*
|
|
|
|
* Step 6: Check sequence numbers
|
|
|
|
* Otherwise,
|
|
|
|
* If P.type == Reset,
|
|
|
|
* Send Sync packet acknowledging S.GSR
|
|
|
|
* Otherwise,
|
|
|
|
* Send Sync packet acknowledging P.seqno
|
|
|
|
* Drop packet and return
|
|
|
|
*
|
|
|
|
* These Syncs are rate-limited as per RFC 4340, 7.5.4:
|
|
|
|
* at most 1 / (dccp_sync_rate_limit * HZ) Syncs per second.
|
|
|
|
*/
|
|
|
|
if (time_before(now, (dp->dccps_rate_last +
|
|
|
|
sysctl_dccp_sync_ratelimit)))
|
|
|
|
return 0;
|
|
|
|
|
2006-11-21 04:39:23 +08:00
|
|
|
DCCP_WARN("DCCP: Step 6 failed for %s packet, "
|
|
|
|
"(LSWL(%llu) <= P.seqno(%llu) <= S.SWH(%llu)) and "
|
|
|
|
"(P.ackno %s or LAWL(%llu) <= P.ackno(%llu) <= S.AWH(%llu), "
|
|
|
|
"sending SYNC...\n", dccp_packet_name(dh->dccph_type),
|
2007-09-26 13:41:19 +08:00
|
|
|
(unsigned long long) lswl, (unsigned long long) seqno,
|
2006-11-21 04:39:23 +08:00
|
|
|
(unsigned long long) dp->dccps_swh,
|
2007-09-26 13:41:19 +08:00
|
|
|
(ackno == DCCP_PKT_WITHOUT_ACK_SEQ) ? "doesn't exist"
|
|
|
|
: "exists",
|
|
|
|
(unsigned long long) lawl, (unsigned long long) ackno,
|
2006-11-21 04:39:23 +08:00
|
|
|
(unsigned long long) dp->dccps_awh);
|
2007-09-26 22:31:49 +08:00
|
|
|
|
|
|
|
dp->dccps_rate_last = now;
|
|
|
|
|
2007-09-26 13:41:56 +08:00
|
|
|
if (dh->dccph_type == DCCP_PKT_RESET)
|
|
|
|
seqno = dp->dccps_gsr;
|
2007-09-26 13:41:19 +08:00
|
|
|
dccp_send_sync(sk, seqno, DCCP_PKT_SYNC);
|
2005-08-10 11:14:34 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-03-21 13:58:56 +08:00
|
|
|
static int __dccp_rcv_established(struct sock *sk, struct sk_buff *skb,
|
|
|
|
const struct dccp_hdr *dh, const unsigned len)
|
2005-08-10 11:14:34 +08:00
|
|
|
{
|
|
|
|
struct dccp_sock *dp = dccp_sk(sk);
|
|
|
|
|
|
|
|
switch (dccp_hdr(skb)->dccph_type) {
|
|
|
|
case DCCP_PKT_DATAACK:
|
|
|
|
case DCCP_PKT_DATA:
|
|
|
|
/*
|
2005-08-14 07:34:54 +08:00
|
|
|
* FIXME: check if sk_receive_queue is full, schedule DATA_DROPPED
|
|
|
|
* option if it is.
|
2005-08-10 11:14:34 +08:00
|
|
|
*/
|
|
|
|
__skb_pull(skb, dh->dccph_doff * 4);
|
|
|
|
__skb_queue_tail(&sk->sk_receive_queue, skb);
|
|
|
|
skb_set_owner_r(skb, sk);
|
|
|
|
sk->sk_data_ready(sk, 0);
|
|
|
|
return 0;
|
|
|
|
case DCCP_PKT_ACK:
|
|
|
|
goto discard;
|
|
|
|
case DCCP_PKT_RESET:
|
|
|
|
/*
|
|
|
|
* Step 9: Process Reset
|
|
|
|
* If P.type == Reset,
|
|
|
|
* Tear down connection
|
|
|
|
* S.state := TIMEWAIT
|
|
|
|
* Set TIMEWAIT timer
|
|
|
|
* Drop packet and return
|
[DCCP]: Convert Reset code into socket error number
This adds support for converting the 11 currently defined Reset codes into system
error numbers, which are stored in sk_err for further interpretation.
This makes the externally visible API behaviour similar to TCP, since a client
connecting to a non-existing port will experience ECONNREFUSED.
* Code 0, Unspecified, is interpreted as non-error (0);
* Code 1, Closed (normal termination), also maps into 0;
* Code 2, Aborted, maps into "Connection reset by peer" (ECONNRESET);
* Code 3, No Connection and
Code 7, Connection Refused, map into "Connection refused" (ECONNREFUSED);
* Code 4, Packet Error, maps into "No message of desired type" (ENOMSG);
* Code 5, Option Error, maps into "Illegal byte sequence" (EILSEQ);
* Code 6, Mandatory Error, maps into "Operation not supported on transport endpoint" (EOPNOTSUPP);
* Code 8, Bad Service Code, maps into "Invalid request code" (EBADRQC);
* Code 9, Too Busy, maps into "Too many users" (EUSERS);
* Code 10, Bad Init Cookie, maps into "Invalid request descriptor" (EBADR);
* Code 11, Aggression Penalty, maps into "Quota exceeded" (EDQUOT)
which makes sense in terms of using more than the `fair share' of bandwidth.
Signed-off-by: Gerrit Renker <gerrit@erg.abdn.ac.uk>
Acked-by: Ian McDonald <ian.mcdonald@jandi.co.nz>
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2007-10-24 20:27:48 +08:00
|
|
|
*/
|
|
|
|
dccp_rcv_reset(sk, skb);
|
2005-08-10 11:14:34 +08:00
|
|
|
return 0;
|
|
|
|
case DCCP_PKT_CLOSEREQ:
|
|
|
|
dccp_rcv_closereq(sk, skb);
|
|
|
|
goto discard;
|
|
|
|
case DCCP_PKT_CLOSE:
|
|
|
|
dccp_rcv_close(sk, skb);
|
|
|
|
return 0;
|
|
|
|
case DCCP_PKT_REQUEST:
|
2006-12-11 02:01:18 +08:00
|
|
|
/* Step 7
|
|
|
|
* or (S.is_server and P.type == Response)
|
2005-08-10 11:14:34 +08:00
|
|
|
* or (S.is_client and P.type == Request)
|
|
|
|
* or (S.state >= OPEN and P.type == Request
|
|
|
|
* and P.seqno >= S.OSR)
|
|
|
|
* or (S.state >= OPEN and P.type == Response
|
|
|
|
* and P.seqno >= S.OSR)
|
|
|
|
* or (S.state == RESPOND and P.type == Data),
|
|
|
|
* Send Sync packet acknowledging P.seqno
|
|
|
|
* Drop packet and return
|
|
|
|
*/
|
|
|
|
if (dp->dccps_role != DCCP_ROLE_LISTEN)
|
|
|
|
goto send_sync;
|
|
|
|
goto check_seq;
|
|
|
|
case DCCP_PKT_RESPONSE:
|
|
|
|
if (dp->dccps_role != DCCP_ROLE_CLIENT)
|
|
|
|
goto send_sync;
|
|
|
|
check_seq:
|
2007-03-21 00:08:19 +08:00
|
|
|
if (dccp_delta_seqno(dp->dccps_osr,
|
|
|
|
DCCP_SKB_CB(skb)->dccpd_seq) >= 0) {
|
2005-08-10 11:14:34 +08:00
|
|
|
send_sync:
|
2005-08-17 14:10:59 +08:00
|
|
|
dccp_send_sync(sk, DCCP_SKB_CB(skb)->dccpd_seq,
|
|
|
|
DCCP_PKT_SYNC);
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
break;
|
2005-08-17 14:10:59 +08:00
|
|
|
case DCCP_PKT_SYNC:
|
|
|
|
dccp_send_sync(sk, DCCP_SKB_CB(skb)->dccpd_seq,
|
|
|
|
DCCP_PKT_SYNCACK);
|
|
|
|
/*
|
2006-10-25 07:17:51 +08:00
|
|
|
* From RFC 4340, sec. 5.7
|
2005-08-17 14:10:59 +08:00
|
|
|
*
|
|
|
|
* As with DCCP-Ack packets, DCCP-Sync and DCCP-SyncAck packets
|
|
|
|
* MAY have non-zero-length application data areas, whose
|
2006-10-25 07:17:51 +08:00
|
|
|
* contents receivers MUST ignore.
|
2005-08-17 14:10:59 +08:00
|
|
|
*/
|
|
|
|
goto discard;
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
DCCP_INC_STATS_BH(DCCP_MIB_INERRS);
|
|
|
|
discard:
|
|
|
|
__kfree_skb(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-01-04 06:25:17 +08:00
|
|
|
int dccp_rcv_established(struct sock *sk, struct sk_buff *skb,
|
|
|
|
const struct dccp_hdr *dh, const unsigned len)
|
|
|
|
{
|
|
|
|
struct dccp_sock *dp = dccp_sk(sk);
|
|
|
|
|
|
|
|
if (dccp_check_seqno(sk, skb))
|
|
|
|
goto discard;
|
|
|
|
|
|
|
|
if (dccp_parse_options(sk, skb))
|
|
|
|
goto discard;
|
|
|
|
|
|
|
|
if (DCCP_SKB_CB(skb)->dccpd_ack_seq != DCCP_PKT_WITHOUT_ACK_SEQ)
|
|
|
|
dccp_event_ack_recv(sk, skb);
|
|
|
|
|
2006-03-21 14:50:58 +08:00
|
|
|
if (dccp_msk(sk)->dccpms_send_ack_vector &&
|
2006-01-04 06:25:17 +08:00
|
|
|
dccp_ackvec_add(dp->dccps_hc_rx_ackvec, sk,
|
|
|
|
DCCP_SKB_CB(skb)->dccpd_seq,
|
|
|
|
DCCP_ACKVEC_STATE_RECEIVED))
|
|
|
|
goto discard;
|
|
|
|
|
2007-03-08 04:53:48 +08:00
|
|
|
ccid_hc_rx_packet_recv(dp->dccps_hc_rx_ccid, sk, skb);
|
|
|
|
ccid_hc_tx_packet_recv(dp->dccps_hc_tx_ccid, sk, skb);
|
2006-01-04 06:25:17 +08:00
|
|
|
|
|
|
|
return __dccp_rcv_established(sk, skb, dh, len);
|
|
|
|
discard:
|
|
|
|
__kfree_skb(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-12-14 15:24:16 +08:00
|
|
|
EXPORT_SYMBOL_GPL(dccp_rcv_established);
|
|
|
|
|
2005-08-10 11:14:34 +08:00
|
|
|
static int dccp_rcv_request_sent_state_process(struct sock *sk,
|
|
|
|
struct sk_buff *skb,
|
|
|
|
const struct dccp_hdr *dh,
|
|
|
|
const unsigned len)
|
|
|
|
{
|
2006-12-11 02:01:18 +08:00
|
|
|
/*
|
2005-08-10 11:14:34 +08:00
|
|
|
* Step 4: Prepare sequence numbers in REQUEST
|
|
|
|
* If S.state == REQUEST,
|
|
|
|
* If (P.type == Response or P.type == Reset)
|
|
|
|
* and S.AWL <= P.ackno <= S.AWH,
|
|
|
|
* / * Set sequence number variables corresponding to the
|
|
|
|
* other endpoint, so P will pass the tests in Step 6 * /
|
|
|
|
* Set S.GSR, S.ISR, S.SWL, S.SWH
|
|
|
|
* / * Response processing continues in Step 10; Reset
|
|
|
|
* processing continues in Step 9 * /
|
|
|
|
*/
|
|
|
|
if (dh->dccph_type == DCCP_PKT_RESPONSE) {
|
|
|
|
const struct inet_connection_sock *icsk = inet_csk(sk);
|
|
|
|
struct dccp_sock *dp = dccp_sk(sk);
|
2007-09-26 13:40:44 +08:00
|
|
|
long tstamp = dccp_timestamp();
|
2005-08-10 11:14:34 +08:00
|
|
|
|
|
|
|
/* Stop the REQUEST timer */
|
|
|
|
inet_csk_clear_xmit_timer(sk, ICSK_TIME_RETRANS);
|
|
|
|
BUG_TRAP(sk->sk_send_head != NULL);
|
|
|
|
__kfree_skb(sk->sk_send_head);
|
|
|
|
sk->sk_send_head = NULL;
|
|
|
|
|
2005-08-14 07:34:54 +08:00
|
|
|
if (!between48(DCCP_SKB_CB(skb)->dccpd_ack_seq,
|
|
|
|
dp->dccps_awl, dp->dccps_awh)) {
|
|
|
|
dccp_pr_debug("invalid ackno: S.AWL=%llu, "
|
|
|
|
"P.ackno=%llu, S.AWH=%llu \n",
|
|
|
|
(unsigned long long)dp->dccps_awl,
|
|
|
|
(unsigned long long)DCCP_SKB_CB(skb)->dccpd_ack_seq,
|
|
|
|
(unsigned long long)dp->dccps_awh);
|
2005-08-10 11:14:34 +08:00
|
|
|
goto out_invalid_packet;
|
|
|
|
}
|
2006-01-04 06:25:49 +08:00
|
|
|
|
[DCCP]: Initial feature negotiation implementation
Still needs more work, but boots and doesn't crashes, even
does some negotiation!
18:38:52.174934 127.0.0.1.43458 > 127.0.0.1.5001: request <change_l ack_ratio 2, change_r ccid 2, change_l ccid 2>
18:38:52.218526 127.0.0.1.5001 > 127.0.0.1.43458: response <nop, nop, change_l ack_ratio 2, confirm_r ccid 2 2, confirm_l ccid 2 2, confirm_r ack_ratio 2>
18:38:52.185398 127.0.0.1.43458 > 127.0.0.1.5001: <nop, confirm_r ack_ratio 2, ack_vector0 0x00, elapsed_time 212>
:-)
Signed-off-by: Andrea Bittau <a.bittau@cs.ucl.ac.uk>
Signed-off-by: Arnaldo Carvalho de Melo <acme@mandriva.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-03-21 09:43:56 +08:00
|
|
|
if (dccp_parse_options(sk, skb))
|
|
|
|
goto out_invalid_packet;
|
|
|
|
|
2007-09-26 13:40:44 +08:00
|
|
|
/* Obtain usec RTT sample from SYN exchange (used by CCID 3) */
|
|
|
|
if (likely(dp->dccps_options_received.dccpor_timestamp_echo))
|
|
|
|
dp->dccps_syn_rtt = dccp_sample_rtt(sk, 10 * (tstamp -
|
|
|
|
dp->dccps_options_received.dccpor_timestamp_echo));
|
2007-03-21 02:27:17 +08:00
|
|
|
|
2007-02-09 22:24:38 +08:00
|
|
|
if (dccp_msk(sk)->dccpms_send_ack_vector &&
|
|
|
|
dccp_ackvec_add(dp->dccps_hc_rx_ackvec, sk,
|
|
|
|
DCCP_SKB_CB(skb)->dccpd_seq,
|
|
|
|
DCCP_ACKVEC_STATE_RECEIVED))
|
|
|
|
goto out_invalid_packet; /* FIXME: change error code */
|
2005-08-10 11:14:34 +08:00
|
|
|
|
|
|
|
dp->dccps_isr = DCCP_SKB_CB(skb)->dccpd_seq;
|
2005-08-21 16:36:45 +08:00
|
|
|
dccp_update_gsr(sk, dp->dccps_isr);
|
|
|
|
/*
|
|
|
|
* SWL and AWL are initially adjusted so that they are not less than
|
|
|
|
* the initial Sequence Numbers received and sent, respectively:
|
|
|
|
* SWL := max(GSR + 1 - floor(W/4), ISR),
|
|
|
|
* AWL := max(GSS - W' + 1, ISS).
|
|
|
|
* These adjustments MUST be applied only at the beginning of the
|
|
|
|
* connection.
|
|
|
|
*
|
|
|
|
* AWL was adjusted in dccp_v4_connect -acme
|
|
|
|
*/
|
|
|
|
dccp_set_seqno(&dp->dccps_swl,
|
|
|
|
max48(dp->dccps_swl, dp->dccps_isr));
|
2005-08-10 11:14:34 +08:00
|
|
|
|
2005-12-14 15:26:10 +08:00
|
|
|
dccp_sync_mss(sk, icsk->icsk_pmtu_cookie);
|
2005-08-10 11:14:34 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Step 10: Process REQUEST state (second part)
|
|
|
|
* If S.state == REQUEST,
|
2005-08-14 07:34:54 +08:00
|
|
|
* / * If we get here, P is a valid Response from the
|
|
|
|
* server (see Step 4), and we should move to
|
|
|
|
* PARTOPEN state. PARTOPEN means send an Ack,
|
|
|
|
* don't send Data packets, retransmit Acks
|
|
|
|
* periodically, and always include any Init Cookie
|
|
|
|
* from the Response * /
|
2005-08-10 11:14:34 +08:00
|
|
|
* S.state := PARTOPEN
|
|
|
|
* Set PARTOPEN timer
|
2006-12-11 02:01:18 +08:00
|
|
|
* Continue with S.state == PARTOPEN
|
2005-08-14 07:34:54 +08:00
|
|
|
* / * Step 12 will send the Ack completing the
|
|
|
|
* three-way handshake * /
|
2005-08-10 11:14:34 +08:00
|
|
|
*/
|
|
|
|
dccp_set_state(sk, DCCP_PARTOPEN);
|
|
|
|
|
|
|
|
/* Make sure socket is routed, for correct metrics. */
|
2005-12-14 15:16:16 +08:00
|
|
|
icsk->icsk_af_ops->rebuild_header(sk);
|
2005-08-10 11:14:34 +08:00
|
|
|
|
|
|
|
if (!sock_flag(sk, SOCK_DEAD)) {
|
|
|
|
sk->sk_state_change(sk);
|
|
|
|
sk_wake_async(sk, 0, POLL_OUT);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sk->sk_write_pending || icsk->icsk_ack.pingpong ||
|
|
|
|
icsk->icsk_accept_queue.rskq_defer_accept) {
|
|
|
|
/* Save one ACK. Data will be ready after
|
|
|
|
* several ticks, if write_pending is set.
|
|
|
|
*
|
|
|
|
* It may be deleted, but with this feature tcpdumps
|
|
|
|
* look so _wonderfully_ clever, that I was not able
|
|
|
|
* to stand against the temptation 8) --ANK
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* OK, in DCCP we can as well do a similar trick, its
|
|
|
|
* even in the draft, but there is no need for us to
|
|
|
|
* schedule an ack here, as dccp_sendmsg does this for
|
|
|
|
* us, also stated in the draft. -acme
|
|
|
|
*/
|
|
|
|
__kfree_skb(skb);
|
|
|
|
return 0;
|
2006-12-11 02:01:18 +08:00
|
|
|
}
|
2005-08-10 11:14:34 +08:00
|
|
|
dccp_send_ack(sk);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
out_invalid_packet:
|
2005-09-17 07:58:33 +08:00
|
|
|
/* dccp_v4_do_rcv will send a reset */
|
|
|
|
DCCP_SKB_CB(skb)->dccpd_reset_code = DCCP_RESET_CODE_PACKET_ERROR;
|
2006-12-11 02:01:18 +08:00
|
|
|
return 1;
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int dccp_rcv_respond_partopen_state_process(struct sock *sk,
|
|
|
|
struct sk_buff *skb,
|
|
|
|
const struct dccp_hdr *dh,
|
|
|
|
const unsigned len)
|
|
|
|
{
|
|
|
|
int queued = 0;
|
|
|
|
|
|
|
|
switch (dh->dccph_type) {
|
|
|
|
case DCCP_PKT_RESET:
|
|
|
|
inet_csk_clear_xmit_timer(sk, ICSK_TIME_DACK);
|
|
|
|
break;
|
2005-10-11 12:25:00 +08:00
|
|
|
case DCCP_PKT_DATA:
|
|
|
|
if (sk->sk_state == DCCP_RESPOND)
|
|
|
|
break;
|
2005-08-10 11:14:34 +08:00
|
|
|
case DCCP_PKT_DATAACK:
|
|
|
|
case DCCP_PKT_ACK:
|
|
|
|
/*
|
2005-08-14 07:34:54 +08:00
|
|
|
* FIXME: we should be reseting the PARTOPEN (DELACK) timer
|
|
|
|
* here but only if we haven't used the DELACK timer for
|
|
|
|
* something else, like sending a delayed ack for a TIMESTAMP
|
|
|
|
* echo, etc, for now were not clearing it, sending an extra
|
|
|
|
* ACK when there is nothing else to do in DELACK is not a big
|
|
|
|
* deal after all.
|
2005-08-10 11:14:34 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
/* Stop the PARTOPEN timer */
|
|
|
|
if (sk->sk_state == DCCP_PARTOPEN)
|
|
|
|
inet_csk_clear_xmit_timer(sk, ICSK_TIME_DACK);
|
|
|
|
|
|
|
|
dccp_sk(sk)->dccps_osr = DCCP_SKB_CB(skb)->dccpd_seq;
|
|
|
|
dccp_set_state(sk, DCCP_OPEN);
|
|
|
|
|
2005-10-11 12:25:00 +08:00
|
|
|
if (dh->dccph_type == DCCP_PKT_DATAACK ||
|
|
|
|
dh->dccph_type == DCCP_PKT_DATA) {
|
2006-01-04 06:25:17 +08:00
|
|
|
__dccp_rcv_established(sk, skb, dh, len);
|
2005-08-14 07:34:54 +08:00
|
|
|
queued = 1; /* packet was queued
|
2006-01-04 06:25:17 +08:00
|
|
|
(by __dccp_rcv_established) */
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return queued;
|
|
|
|
}
|
|
|
|
|
|
|
|
int dccp_rcv_state_process(struct sock *sk, struct sk_buff *skb,
|
|
|
|
struct dccp_hdr *dh, unsigned len)
|
|
|
|
{
|
|
|
|
struct dccp_sock *dp = dccp_sk(sk);
|
2005-09-17 07:58:33 +08:00
|
|
|
struct dccp_skb_cb *dcb = DCCP_SKB_CB(skb);
|
2005-08-10 11:14:34 +08:00
|
|
|
const int old_state = sk->sk_state;
|
|
|
|
int queued = 0;
|
|
|
|
|
2005-08-14 07:36:01 +08:00
|
|
|
/*
|
|
|
|
* Step 3: Process LISTEN state
|
|
|
|
*
|
|
|
|
* If S.state == LISTEN,
|
2006-11-11 02:29:14 +08:00
|
|
|
* If P.type == Request or P contains a valid Init Cookie option,
|
|
|
|
* (* Must scan the packet's options to check for Init
|
|
|
|
* Cookies. Only Init Cookies are processed here,
|
|
|
|
* however; other options are processed in Step 8. This
|
|
|
|
* scan need only be performed if the endpoint uses Init
|
|
|
|
* Cookies *)
|
|
|
|
* (* Generate a new socket and switch to that socket *)
|
|
|
|
* Set S := new socket for this port pair
|
|
|
|
* S.state = RESPOND
|
|
|
|
* Choose S.ISS (initial seqno) or set from Init Cookies
|
|
|
|
* Initialize S.GAR := S.ISS
|
|
|
|
* Set S.ISR, S.GSR, S.SWL, S.SWH from packet or Init
|
|
|
|
* Cookies Continue with S.state == RESPOND
|
|
|
|
* (* A Response packet will be generated in Step 11 *)
|
|
|
|
* Otherwise,
|
|
|
|
* Generate Reset(No Connection) unless P.type == Reset
|
|
|
|
* Drop packet and return
|
2005-08-14 07:36:01 +08:00
|
|
|
*/
|
|
|
|
if (sk->sk_state == DCCP_LISTEN) {
|
|
|
|
if (dh->dccph_type == DCCP_PKT_REQUEST) {
|
2005-12-14 15:16:16 +08:00
|
|
|
if (inet_csk(sk)->icsk_af_ops->conn_request(sk,
|
|
|
|
skb) < 0)
|
2005-08-14 07:36:01 +08:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* FIXME: do congestion control initialization */
|
|
|
|
goto discard;
|
|
|
|
}
|
|
|
|
if (dh->dccph_type == DCCP_PKT_RESET)
|
|
|
|
goto discard;
|
|
|
|
|
2005-09-17 07:58:33 +08:00
|
|
|
/* Caller (dccp_v4_do_rcv) will send Reset */
|
|
|
|
dcb->dccpd_reset_code = DCCP_RESET_CODE_NO_CONNECTION;
|
2005-08-14 07:36:01 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sk->sk_state != DCCP_REQUESTING) {
|
2005-08-10 11:14:34 +08:00
|
|
|
if (dccp_check_seqno(sk, skb))
|
|
|
|
goto discard;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Step 8: Process options and mark acknowledgeable
|
|
|
|
*/
|
|
|
|
if (dccp_parse_options(sk, skb))
|
|
|
|
goto discard;
|
|
|
|
|
2005-09-17 07:58:33 +08:00
|
|
|
if (dcb->dccpd_ack_seq != DCCP_PKT_WITHOUT_ACK_SEQ)
|
2005-08-10 11:14:34 +08:00
|
|
|
dccp_event_ack_recv(sk, skb);
|
|
|
|
|
2006-12-11 02:01:18 +08:00
|
|
|
if (dccp_msk(sk)->dccpms_send_ack_vector &&
|
2005-09-18 15:17:51 +08:00
|
|
|
dccp_ackvec_add(dp->dccps_hc_rx_ackvec, sk,
|
2006-12-11 02:01:18 +08:00
|
|
|
DCCP_SKB_CB(skb)->dccpd_seq,
|
|
|
|
DCCP_ACKVEC_STATE_RECEIVED))
|
|
|
|
goto discard;
|
2006-01-04 06:26:15 +08:00
|
|
|
|
2007-03-08 04:53:48 +08:00
|
|
|
ccid_hc_rx_packet_recv(dp->dccps_hc_rx_ccid, sk, skb);
|
|
|
|
ccid_hc_tx_packet_recv(dp->dccps_hc_tx_ccid, sk, skb);
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Step 9: Process Reset
|
|
|
|
* If P.type == Reset,
|
|
|
|
* Tear down connection
|
|
|
|
* S.state := TIMEWAIT
|
|
|
|
* Set TIMEWAIT timer
|
|
|
|
* Drop packet and return
|
|
|
|
*/
|
|
|
|
if (dh->dccph_type == DCCP_PKT_RESET) {
|
[DCCP]: Convert Reset code into socket error number
This adds support for converting the 11 currently defined Reset codes into system
error numbers, which are stored in sk_err for further interpretation.
This makes the externally visible API behaviour similar to TCP, since a client
connecting to a non-existing port will experience ECONNREFUSED.
* Code 0, Unspecified, is interpreted as non-error (0);
* Code 1, Closed (normal termination), also maps into 0;
* Code 2, Aborted, maps into "Connection reset by peer" (ECONNRESET);
* Code 3, No Connection and
Code 7, Connection Refused, map into "Connection refused" (ECONNREFUSED);
* Code 4, Packet Error, maps into "No message of desired type" (ENOMSG);
* Code 5, Option Error, maps into "Illegal byte sequence" (EILSEQ);
* Code 6, Mandatory Error, maps into "Operation not supported on transport endpoint" (EOPNOTSUPP);
* Code 8, Bad Service Code, maps into "Invalid request code" (EBADRQC);
* Code 9, Too Busy, maps into "Too many users" (EUSERS);
* Code 10, Bad Init Cookie, maps into "Invalid request descriptor" (EBADR);
* Code 11, Aggression Penalty, maps into "Quota exceeded" (EDQUOT)
which makes sense in terms of using more than the `fair share' of bandwidth.
Signed-off-by: Gerrit Renker <gerrit@erg.abdn.ac.uk>
Acked-by: Ian McDonald <ian.mcdonald@jandi.co.nz>
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2007-10-24 20:27:48 +08:00
|
|
|
dccp_rcv_reset(sk, skb);
|
2005-08-10 11:14:34 +08:00
|
|
|
return 0;
|
|
|
|
/*
|
|
|
|
* Step 7: Check for unexpected packet types
|
|
|
|
* If (S.is_server and P.type == CloseReq)
|
|
|
|
* or (S.is_server and P.type == Response)
|
|
|
|
* or (S.is_client and P.type == Request)
|
|
|
|
* or (S.state == RESPOND and P.type == Data),
|
|
|
|
* Send Sync packet acknowledging P.seqno
|
|
|
|
* Drop packet and return
|
|
|
|
*/
|
|
|
|
} else if ((dp->dccps_role != DCCP_ROLE_CLIENT &&
|
2005-08-14 07:34:54 +08:00
|
|
|
(dh->dccph_type == DCCP_PKT_RESPONSE ||
|
|
|
|
dh->dccph_type == DCCP_PKT_CLOSEREQ)) ||
|
2005-08-10 11:14:34 +08:00
|
|
|
(dp->dccps_role == DCCP_ROLE_CLIENT &&
|
|
|
|
dh->dccph_type == DCCP_PKT_REQUEST) ||
|
2005-08-14 07:34:54 +08:00
|
|
|
(sk->sk_state == DCCP_RESPOND &&
|
|
|
|
dh->dccph_type == DCCP_PKT_DATA)) {
|
2005-09-17 07:58:33 +08:00
|
|
|
dccp_send_sync(sk, dcb->dccpd_seq, DCCP_PKT_SYNC);
|
2005-08-10 11:14:34 +08:00
|
|
|
goto discard;
|
2005-08-24 12:50:06 +08:00
|
|
|
} else if (dh->dccph_type == DCCP_PKT_CLOSEREQ) {
|
|
|
|
dccp_rcv_closereq(sk, skb);
|
|
|
|
goto discard;
|
|
|
|
} else if (dh->dccph_type == DCCP_PKT_CLOSE) {
|
|
|
|
dccp_rcv_close(sk, skb);
|
|
|
|
return 0;
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
switch (sk->sk_state) {
|
|
|
|
case DCCP_CLOSED:
|
2005-09-17 07:58:33 +08:00
|
|
|
dcb->dccpd_reset_code = DCCP_RESET_CODE_NO_CONNECTION;
|
2005-08-10 11:14:34 +08:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
case DCCP_REQUESTING:
|
|
|
|
/* FIXME: do congestion control initialization */
|
|
|
|
|
|
|
|
queued = dccp_rcv_request_sent_state_process(sk, skb, dh, len);
|
|
|
|
if (queued >= 0)
|
|
|
|
return queued;
|
|
|
|
|
|
|
|
__kfree_skb(skb);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
case DCCP_RESPOND:
|
|
|
|
case DCCP_PARTOPEN:
|
2005-08-14 07:34:54 +08:00
|
|
|
queued = dccp_rcv_respond_partopen_state_process(sk, skb,
|
|
|
|
dh, len);
|
2005-08-10 11:14:34 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2005-08-14 07:34:54 +08:00
|
|
|
if (dh->dccph_type == DCCP_PKT_ACK ||
|
|
|
|
dh->dccph_type == DCCP_PKT_DATAACK) {
|
2005-08-10 11:14:34 +08:00
|
|
|
switch (old_state) {
|
|
|
|
case DCCP_PARTOPEN:
|
|
|
|
sk->sk_state_change(sk);
|
|
|
|
sk_wake_async(sk, 0, POLL_OUT);
|
|
|
|
break;
|
|
|
|
}
|
2007-09-26 21:30:05 +08:00
|
|
|
} else if (unlikely(dh->dccph_type == DCCP_PKT_SYNC)) {
|
|
|
|
dccp_send_sync(sk, dcb->dccpd_seq, DCCP_PKT_SYNCACK);
|
|
|
|
goto discard;
|
2005-08-10 11:14:34 +08:00
|
|
|
}
|
|
|
|
|
2006-12-11 02:01:18 +08:00
|
|
|
if (!queued) {
|
2005-08-10 11:14:34 +08:00
|
|
|
discard:
|
|
|
|
__kfree_skb(skb);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2005-12-14 15:24:16 +08:00
|
|
|
|
|
|
|
EXPORT_SYMBOL_GPL(dccp_rcv_state_process);
|
2007-03-21 02:23:18 +08:00
|
|
|
|
|
|
|
/**
|
2007-09-26 13:40:44 +08:00
|
|
|
* dccp_sample_rtt - Validate and finalise computation of RTT sample
|
|
|
|
* @delta: number of microseconds between packet and acknowledgment
|
|
|
|
* The routine is kept generic to work in different contexts. It should be
|
|
|
|
* called immediately when the ACK used for the RTT sample arrives.
|
2007-03-21 02:23:18 +08:00
|
|
|
*/
|
2007-09-26 13:40:44 +08:00
|
|
|
u32 dccp_sample_rtt(struct sock *sk, long delta)
|
2007-03-21 02:23:18 +08:00
|
|
|
{
|
2007-09-26 13:40:44 +08:00
|
|
|
/* dccpor_elapsed_time is either zeroed out or set and > 0 */
|
|
|
|
delta -= dccp_sk(sk)->dccps_options_received.dccpor_elapsed_time * 10;
|
2007-03-21 02:23:18 +08:00
|
|
|
|
|
|
|
if (unlikely(delta <= 0)) {
|
2007-09-26 13:40:44 +08:00
|
|
|
DCCP_WARN("unusable RTT sample %ld, using min\n", delta);
|
2007-03-21 02:23:18 +08:00
|
|
|
return DCCP_SANE_RTT_MIN;
|
|
|
|
}
|
2007-09-26 13:40:44 +08:00
|
|
|
if (unlikely(delta > DCCP_SANE_RTT_MAX)) {
|
|
|
|
DCCP_WARN("RTT sample %ld too large, using max\n", delta);
|
2007-03-21 02:23:18 +08:00
|
|
|
return DCCP_SANE_RTT_MAX;
|
|
|
|
}
|
|
|
|
|
|
|
|
return delta;
|
|
|
|
}
|
|
|
|
|
|
|
|
EXPORT_SYMBOL_GPL(dccp_sample_rtt);
|