mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-26 11:47:31 +00:00
Whitespace changes due to changes in ident.
This commit is contained in:
parent
7fb935da15
commit
0053ed28ff
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=336511
@ -419,7 +419,7 @@ struct sctp_error_unresolv_addr {
|
||||
|
||||
struct sctp_error_unrecognized_chunk {
|
||||
struct sctp_error_cause cause; /* code=SCTP_CAUSE_UNRECOG_CHUNK */
|
||||
struct sctp_chunkhdr ch;/* header from chunk in error */
|
||||
struct sctp_chunkhdr ch; /* header from chunk in error */
|
||||
} SCTP_PACKED;
|
||||
|
||||
struct sctp_error_no_user_data {
|
||||
|
@ -277,6 +277,7 @@ sctp_asconf_del_remote_addrs_except(struct sctp_tcb *stcb, struct sockaddr *src)
|
||||
/* not found */
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/* delete all destination addresses except the source */
|
||||
TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
|
||||
if (net != src_net) {
|
||||
@ -383,6 +384,7 @@ sctp_process_asconf_delete_ip(struct sockaddr *src,
|
||||
aparam_length);
|
||||
return (m_reply);
|
||||
}
|
||||
|
||||
/* if deleting 0.0.0.0/::0, delete all addresses except src addr */
|
||||
if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
|
||||
result = sctp_asconf_del_remote_addrs_except(stcb, src);
|
||||
@ -401,6 +403,7 @@ sctp_process_asconf_delete_ip(struct sockaddr *src,
|
||||
}
|
||||
return (m_reply);
|
||||
}
|
||||
|
||||
/* delete the address */
|
||||
result = sctp_del_remote_addr(stcb, sa);
|
||||
/*
|
||||
@ -616,6 +619,7 @@ sctp_handle_asconf(struct mbuf *m, unsigned int offset,
|
||||
serial_num, asoc->asconf_seq_in + 1);
|
||||
return;
|
||||
}
|
||||
|
||||
/* it's the expected "next" sequence number, so process it */
|
||||
asoc->asconf_seq_in = serial_num; /* update sequence */
|
||||
/* get length of all the param's in the ASCONF */
|
||||
@ -640,6 +644,7 @@ sctp_handle_asconf(struct mbuf *m, unsigned int offset,
|
||||
SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_asconf_ack), ack);
|
||||
}
|
||||
}
|
||||
|
||||
m_ack = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_ack_chunk), 0,
|
||||
M_NOWAIT, 1, MT_DATA);
|
||||
if (m_ack == NULL) {
|
||||
@ -974,6 +979,7 @@ sctp_assoc_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *dstnet)
|
||||
if (stcb->asoc.deleted_primary == NULL) {
|
||||
return;
|
||||
}
|
||||
|
||||
if (!TAILQ_EMPTY(&stcb->asoc.sent_queue)) {
|
||||
SCTPDBG(SCTP_DEBUG_ASCONF1, "assoc_immediate_retrans: Deleted primary is ");
|
||||
SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.deleted_primary->ro._l_addr.sa);
|
||||
@ -1077,6 +1083,7 @@ sctp_path_check_and_react(struct sctp_tcb *stcb, struct sctp_ifa *newifa)
|
||||
}
|
||||
return;
|
||||
}
|
||||
|
||||
/* Multiple local addresses exsist in the association. */
|
||||
TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
|
||||
/* clear any cached route and source address */
|
||||
@ -1323,6 +1330,7 @@ sctp_asconf_queue_add(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
|
||||
if (stcb->asoc.asconf_supported == 0) {
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/*
|
||||
* if this is deleting the last address from the assoc, mark it as
|
||||
* pending.
|
||||
@ -1343,6 +1351,7 @@ sctp_asconf_queue_add(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
|
||||
return (-1);
|
||||
}
|
||||
}
|
||||
|
||||
/* queue an asconf parameter */
|
||||
status = sctp_asconf_queue_mgmt(stcb, ifa, type);
|
||||
|
||||
@ -1364,6 +1373,7 @@ sctp_asconf_queue_add(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
|
||||
stcb->asoc.asconf_addr_del_pending = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
if (pending_delete_queued) {
|
||||
struct sctp_nets *net;
|
||||
|
||||
@ -1388,6 +1398,7 @@ sctp_asconf_queue_add(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
|
||||
SCTP_FROM_SCTP_ASCONF,
|
||||
__LINE__);
|
||||
}
|
||||
|
||||
/* queue in an advisory set primary too */
|
||||
(void)sctp_asconf_queue_mgmt(stcb, ifa, SCTP_SET_PRIM_ADDR);
|
||||
/* let caller know we should send this out immediately */
|
||||
@ -1685,11 +1696,13 @@ sctp_handle_asconf_ack(struct mbuf *m, int offset,
|
||||
serial_num, asoc->asconf_seq_out_acked + 1);
|
||||
return;
|
||||
}
|
||||
|
||||
if (serial_num == asoc->asconf_seq_out - 1) {
|
||||
/* stop our timer */
|
||||
sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, net,
|
||||
SCTP_FROM_SCTP_ASCONF + SCTP_LOC_5);
|
||||
}
|
||||
|
||||
/* process the ASCONF-ACK contents */
|
||||
ack_length = ntohs(cp->ch.chunk_length) -
|
||||
sizeof(struct sctp_asconf_ack_chunk);
|
||||
@ -1778,7 +1791,7 @@ sctp_handle_asconf_ack(struct mbuf *m, int offset,
|
||||
* at any given time
|
||||
*/
|
||||
if (last_error_id == 0)
|
||||
last_error_id--;/* set to "max" value */
|
||||
last_error_id--; /* set to "max" value */
|
||||
TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
|
||||
if (aa->sent == 1) {
|
||||
/*
|
||||
@ -2058,6 +2071,7 @@ sctp_asconf_iterator_ep_end(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP
|
||||
laddr->action = 0;
|
||||
break;
|
||||
}
|
||||
|
||||
}
|
||||
} else if (l->action == SCTP_DEL_IP_ADDRESS) {
|
||||
LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
|
||||
@ -2091,6 +2105,7 @@ sctp_asconf_iterator_stcb(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
|
||||
if (ifa->vrf_id != stcb->asoc.vrf_id) {
|
||||
continue;
|
||||
}
|
||||
|
||||
/* Same checks again for assoc */
|
||||
switch (ifa->address.sa.sa_family) {
|
||||
#ifdef INET6
|
||||
@ -2281,6 +2296,7 @@ sctp_set_primary_ip_address_sa(struct sctp_tcb *stcb, struct sockaddr *sa)
|
||||
/* Invalid address */
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/* queue an ASCONF:SET_PRIM_ADDR to be sent */
|
||||
if (!sctp_asconf_queue_add(stcb, ifa, SCTP_SET_PRIM_ADDR)) {
|
||||
/* set primary queuing succeeded */
|
||||
@ -2359,11 +2375,13 @@ sctp_is_addr_pending(struct sctp_tcb *stcb, struct sctp_ifa *sctp_ifa)
|
||||
SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length(%u) too short\n", param_length);
|
||||
break;
|
||||
}
|
||||
|
||||
aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, param_length, aparam_buf);
|
||||
if (aph == NULL) {
|
||||
SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get entire param\n");
|
||||
break;
|
||||
}
|
||||
|
||||
ph = (struct sctp_paramhdr *)(aph + 1);
|
||||
if (sctp_addr_match(ph, &sctp_ifa->address.sa) != 0) {
|
||||
switch (param_type) {
|
||||
@ -2378,6 +2396,7 @@ sctp_is_addr_pending(struct sctp_tcb *stcb, struct sctp_ifa *sctp_ifa)
|
||||
}
|
||||
last_param_type = param_type;
|
||||
}
|
||||
|
||||
offset += SCTP_SIZE32(param_length);
|
||||
if (offset >= asconf_limit) {
|
||||
/* no more data in the mbuf chain */
|
||||
@ -2461,6 +2480,7 @@ sctp_find_valid_localaddr(struct sctp_tcb *stcb, int addr_locked)
|
||||
if (sctp_ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
|
||||
continue;
|
||||
}
|
||||
|
||||
sin6 = &sctp_ifa->address.sin6;
|
||||
if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
|
||||
/*
|
||||
@ -2836,6 +2856,7 @@ sctp_process_initack_addresses(struct sctp_tcb *stcb, struct mbuf *m,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
next_addr:
|
||||
/*
|
||||
* Sanity check: Make sure the length isn't 0, otherwise
|
||||
@ -3370,6 +3391,7 @@ sctp_asconf_send_nat_state_update(struct sctp_tcb *stcb,
|
||||
if (vrf == NULL) {
|
||||
goto skip_rest;
|
||||
}
|
||||
|
||||
SCTP_IPI_ADDR_RLOCK();
|
||||
LIST_FOREACH(sctp_ifnp, &vrf->ifnlist, next_ifn) {
|
||||
LIST_FOREACH(sctp_ifap, &sctp_ifnp->ifalist, next_ifa) {
|
||||
|
@ -60,10 +60,10 @@ sctp_addr_mgmt_ep_sa(struct sctp_inpcb *, struct sockaddr *,
|
||||
uint32_t, uint32_t, struct sctp_ifa *);
|
||||
|
||||
|
||||
extern int
|
||||
extern int
|
||||
sctp_asconf_iterator_ep(struct sctp_inpcb *inp, void *ptr,
|
||||
uint32_t val);
|
||||
extern void
|
||||
extern void
|
||||
sctp_asconf_iterator_stcb(struct sctp_inpcb *inp,
|
||||
struct sctp_tcb *stcb,
|
||||
void *ptr, uint32_t type);
|
||||
|
@ -1309,6 +1309,7 @@ sctp_auth_setactivekey(struct sctp_tcb *stcb, uint16_t keyid)
|
||||
/* can't reactivate a deactivated key with other refcounts */
|
||||
return (-1);
|
||||
}
|
||||
|
||||
/* set the (new) active key */
|
||||
stcb->asoc.authinfo.active_keyid = keyid;
|
||||
/* reset the deactivated flag */
|
||||
@ -1363,6 +1364,7 @@ sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid)
|
||||
sctp_ulp_notify(SCTP_NOTIFY_AUTH_FREE_KEY, stcb, keyid, 0,
|
||||
SCTP_SO_LOCKED);
|
||||
}
|
||||
|
||||
/* mark the key as deactivated */
|
||||
skey->deactivated = 1;
|
||||
|
||||
@ -1582,6 +1584,7 @@ sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset,
|
||||
"Assoc Key");
|
||||
#endif
|
||||
}
|
||||
|
||||
/* set in the active key id */
|
||||
auth->shared_key_id = htons(keyid);
|
||||
|
||||
@ -1769,6 +1772,7 @@ sctp_notify_authentication(struct sctp_tcb *stcb, uint32_t indication,
|
||||
/* If the socket is gone we are out of here */
|
||||
return;
|
||||
}
|
||||
|
||||
if (sctp_stcb_is_feature_off(stcb->sctp_ep, stcb, SCTP_PCB_FLAGS_AUTHEVNT))
|
||||
/* event not enabled */
|
||||
return;
|
||||
@ -1929,6 +1933,7 @@ sctp_validate_init_auth_params(struct mbuf *m, int offset, int limit)
|
||||
if (num_chunks)
|
||||
got_chklist = 1;
|
||||
}
|
||||
|
||||
offset += SCTP_SIZE32(plen);
|
||||
if (offset >= limit) {
|
||||
break;
|
||||
@ -2023,6 +2028,7 @@ sctp_initialize_auth_params(struct sctp_inpcb *inp, struct sctp_tcb *stcb)
|
||||
new_key->key[keylen++] = i;
|
||||
}
|
||||
}
|
||||
|
||||
/* append in the HMACs */
|
||||
ph = (struct sctp_paramhdr *)(new_key->key + keylen);
|
||||
ph->param_type = htons(SCTP_HMAC_LIST);
|
||||
|
@ -87,7 +87,7 @@ typedef struct sctp_hmaclist {
|
||||
typedef struct sctp_authinformation {
|
||||
sctp_key_t *random; /* local random key (concatenated) */
|
||||
uint32_t random_len; /* local random number length for param */
|
||||
sctp_key_t *peer_random;/* peer's random key (concatenated) */
|
||||
sctp_key_t *peer_random; /* peer's random key (concatenated) */
|
||||
sctp_key_t *assoc_key; /* cached concatenated send key */
|
||||
sctp_key_t *recv_key; /* cached concatenated recv key */
|
||||
uint16_t active_keyid; /* active send keyid */
|
||||
@ -114,13 +114,13 @@ extern sctp_auth_chklist_t *sctp_copy_chunklist(sctp_auth_chklist_t *chklist);
|
||||
extern int sctp_auth_add_chunk(uint8_t chunk, sctp_auth_chklist_t *list);
|
||||
extern int sctp_auth_delete_chunk(uint8_t chunk, sctp_auth_chklist_t *list);
|
||||
extern size_t sctp_auth_get_chklist_size(const sctp_auth_chklist_t *list);
|
||||
extern int
|
||||
extern int
|
||||
sctp_serialize_auth_chunks(const sctp_auth_chklist_t *list,
|
||||
uint8_t *ptr);
|
||||
extern int
|
||||
extern int
|
||||
sctp_pack_auth_chunks(const sctp_auth_chklist_t *list,
|
||||
uint8_t *ptr);
|
||||
extern int
|
||||
extern int
|
||||
sctp_unpack_auth_chunks(const uint8_t *ptr, uint8_t num_chunks,
|
||||
sctp_auth_chklist_t *list);
|
||||
|
||||
@ -141,16 +141,16 @@ extern void sctp_free_sharedkey(sctp_sharedkey_t *skey);
|
||||
extern sctp_sharedkey_t *
|
||||
sctp_find_sharedkey(struct sctp_keyhead *shared_keys,
|
||||
uint16_t key_id);
|
||||
extern int
|
||||
extern int
|
||||
sctp_insert_sharedkey(struct sctp_keyhead *shared_keys,
|
||||
sctp_sharedkey_t *new_skey);
|
||||
extern int
|
||||
extern int
|
||||
sctp_copy_skeylist(const struct sctp_keyhead *src,
|
||||
struct sctp_keyhead *dest);
|
||||
|
||||
/* ref counts on shared keys, by key id */
|
||||
extern void sctp_auth_key_acquire(struct sctp_tcb *stcb, uint16_t keyid);
|
||||
extern void
|
||||
extern void
|
||||
sctp_auth_key_release(struct sctp_tcb *stcb, uint16_t keyid,
|
||||
int so_locked);
|
||||
|
||||
@ -161,11 +161,11 @@ extern void sctp_free_hmaclist(sctp_hmaclist_t *list);
|
||||
extern int sctp_auth_add_hmacid(sctp_hmaclist_t *list, uint16_t hmac_id);
|
||||
extern sctp_hmaclist_t *sctp_copy_hmaclist(sctp_hmaclist_t *list);
|
||||
extern sctp_hmaclist_t *sctp_default_supported_hmaclist(void);
|
||||
extern uint16_t
|
||||
extern uint16_t
|
||||
sctp_negotiate_hmacid(sctp_hmaclist_t *peer,
|
||||
sctp_hmaclist_t *local);
|
||||
extern int sctp_serialize_hmaclist(sctp_hmaclist_t *list, uint8_t *ptr);
|
||||
extern int
|
||||
extern int
|
||||
sctp_verify_hmac_param(struct sctp_auth_hmac_algo *hmacs,
|
||||
uint32_t num_hmacs);
|
||||
|
||||
@ -175,22 +175,22 @@ extern void sctp_free_authinfo(sctp_authinfo_t *authinfo);
|
||||
/* keyed-HMAC functions */
|
||||
extern uint32_t sctp_get_auth_chunk_len(uint16_t hmac_algo);
|
||||
extern uint32_t sctp_get_hmac_digest_len(uint16_t hmac_algo);
|
||||
extern uint32_t
|
||||
extern uint32_t
|
||||
sctp_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
||||
uint8_t *text, uint32_t textlen, uint8_t *digest);
|
||||
extern int
|
||||
extern int
|
||||
sctp_verify_hmac(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
||||
uint8_t *text, uint32_t textlen, uint8_t *digest, uint32_t digestlen);
|
||||
extern uint32_t
|
||||
extern uint32_t
|
||||
sctp_compute_hmac(uint16_t hmac_algo, sctp_key_t *key,
|
||||
uint8_t *text, uint32_t textlen, uint8_t *digest);
|
||||
extern int sctp_auth_is_supported_hmac(sctp_hmaclist_t *list, uint16_t id);
|
||||
|
||||
/* mbuf versions */
|
||||
extern uint32_t
|
||||
extern uint32_t
|
||||
sctp_hmac_m(uint16_t hmac_algo, uint8_t *key, uint32_t keylen,
|
||||
struct mbuf *m, uint32_t m_offset, uint8_t *digest, uint32_t trailer);
|
||||
extern uint32_t
|
||||
extern uint32_t
|
||||
sctp_compute_hmac_m(uint16_t hmac_algo, sctp_key_t *key,
|
||||
struct mbuf *m, uint32_t m_offset, uint8_t *digest);
|
||||
|
||||
@ -206,26 +206,26 @@ extern int sctp_auth_setactivekey_ep(struct sctp_inpcb *inp, uint16_t keyid);
|
||||
extern int sctp_deact_sharedkey(struct sctp_tcb *stcb, uint16_t keyid);
|
||||
extern int sctp_deact_sharedkey_ep(struct sctp_inpcb *inp, uint16_t keyid);
|
||||
|
||||
extern void
|
||||
extern void
|
||||
sctp_auth_get_cookie_params(struct sctp_tcb *stcb, struct mbuf *m,
|
||||
uint32_t offset, uint32_t length);
|
||||
extern void
|
||||
extern void
|
||||
sctp_fill_hmac_digest_m(struct mbuf *m, uint32_t auth_offset,
|
||||
struct sctp_auth_chunk *auth, struct sctp_tcb *stcb, uint16_t key_id);
|
||||
extern struct mbuf *
|
||||
sctp_add_auth_chunk(struct mbuf *m, struct mbuf **m_end,
|
||||
struct sctp_auth_chunk **auth_ret, uint32_t *offset,
|
||||
struct sctp_tcb *stcb, uint8_t chunk);
|
||||
extern int
|
||||
extern int
|
||||
sctp_handle_auth(struct sctp_tcb *stcb, struct sctp_auth_chunk *ch,
|
||||
struct mbuf *m, uint32_t offset);
|
||||
extern void
|
||||
extern void
|
||||
sctp_notify_authentication(struct sctp_tcb *stcb,
|
||||
uint32_t indication, uint16_t keyid, uint16_t alt_keyid, int so_locked);
|
||||
extern int
|
||||
extern int
|
||||
sctp_validate_init_auth_params(struct mbuf *m, int offset,
|
||||
int limit);
|
||||
extern void
|
||||
extern void
|
||||
sctp_initialize_auth_params(struct sctp_inpcb *inp,
|
||||
struct sctp_tcb *stcb);
|
||||
|
||||
|
@ -305,10 +305,12 @@ sctp_addr_change(struct ifaddr *ifa, int cmd)
|
||||
SCTP_BASE_VAR(first_time) = 1;
|
||||
sctp_init_ifns_for_vrf(SCTP_DEFAULT_VRFID);
|
||||
}
|
||||
|
||||
if ((cmd != RTM_ADD) && (cmd != RTM_DELETE)) {
|
||||
/* don't know what to do with this */
|
||||
return;
|
||||
}
|
||||
|
||||
if (ifa->ifa_addr == NULL) {
|
||||
return;
|
||||
}
|
||||
|
@ -131,6 +131,7 @@ sctp_cwnd_update_after_fr(struct sctp_tcb *stcb,
|
||||
t_ucwnd_sbw = 1;
|
||||
}
|
||||
}
|
||||
|
||||
/*-
|
||||
* CMT fast recovery code. Need to debug. ((sctp_cmt_on_off > 0) &&
|
||||
* (net->fast_retran_loss_recovery == 0)))
|
||||
@ -1119,6 +1120,7 @@ sctp_cwnd_update_after_ecn_echo_common(struct sctp_tcb *stcb, struct sctp_nets *
|
||||
if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_CWND_MONITOR_ENABLE) {
|
||||
sctp_log_cwnd(stcb, net, (net->cwnd - old_cwnd), SCTP_CWND_LOG_FROM_SAT);
|
||||
}
|
||||
|
||||
}
|
||||
SCTP_STAT_INCR(sctps_ecnereducedcwnd);
|
||||
} else {
|
||||
@ -1318,7 +1320,7 @@ sctp_cwnd_update_rtcc_after_ecn_echo(struct sctp_tcb *stcb, struct sctp_nets *ne
|
||||
|
||||
|
||||
static
|
||||
void
|
||||
void
|
||||
sctp_cwnd_update_rtcc_tsn_acknowledged(struct sctp_nets *net,
|
||||
struct sctp_tmit_chunk *tp1)
|
||||
{
|
||||
@ -1935,6 +1937,7 @@ measure_achieved_throughput(struct sctp_nets *net)
|
||||
net->cc_mod.htcp_ca.lasttime = now;
|
||||
return;
|
||||
}
|
||||
|
||||
net->cc_mod.htcp_ca.bytecount += net->net_ack;
|
||||
if ((net->cc_mod.htcp_ca.bytecount >= net->cwnd - (((net->cc_mod.htcp_ca.alpha >> 7) ? (net->cc_mod.htcp_ca.alpha >> 7) : 1) * net->mtu)) &&
|
||||
(now - net->cc_mod.htcp_ca.lasttime >= net->cc_mod.htcp_ca.minRTT) &&
|
||||
@ -1971,6 +1974,7 @@ htcp_beta_update(struct htcp *ca, uint32_t minRTT, uint32_t maxRTT)
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
if (ca->modeswitch && minRTT > (uint32_t)MSEC_TO_TICKS(10) && maxRTT) {
|
||||
ca->beta = (minRTT << 7) / maxRTT;
|
||||
if (ca->beta < BETA_MIN)
|
||||
@ -1994,6 +1998,7 @@ htcp_alpha_update(struct htcp *ca)
|
||||
diff -= hz;
|
||||
factor = 1 + (10 * diff + ((diff / 2) * (diff / 2) / hz)) / hz;
|
||||
}
|
||||
|
||||
if (use_rtt_scaling && minRTT) {
|
||||
uint32_t scale = (hz << 3) / (10 * minRTT);
|
||||
|
||||
@ -2003,6 +2008,7 @@ htcp_alpha_update(struct htcp *ca)
|
||||
if (!factor)
|
||||
factor = 1;
|
||||
}
|
||||
|
||||
ca->alpha = 2 * factor * ((1 << 7) - ca->beta);
|
||||
if (!ca->alpha)
|
||||
ca->alpha = ALPHA_BASE;
|
||||
@ -2057,12 +2063,14 @@ htcp_cong_avoid(struct sctp_tcb *stcb, struct sctp_nets *net)
|
||||
sctp_log_cwnd(stcb, net, net->mtu,
|
||||
SCTP_CWND_LOG_FROM_SS);
|
||||
}
|
||||
|
||||
} else {
|
||||
net->cwnd += net->net_ack;
|
||||
if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_CWND_MONITOR_ENABLE) {
|
||||
sctp_log_cwnd(stcb, net, net->net_ack,
|
||||
SCTP_CWND_LOG_FROM_SS);
|
||||
}
|
||||
|
||||
}
|
||||
sctp_enforce_cwnd_limit(&stcb->asoc, net);
|
||||
} else {
|
||||
|
@ -48,7 +48,7 @@ __FBSDID("$FreeBSD$");
|
||||
* Parameter structures
|
||||
*/
|
||||
struct sctp_ipv4addr_param {
|
||||
struct sctp_paramhdr ph;/* type=SCTP_IPV4_PARAM_TYPE, len=8 */
|
||||
struct sctp_paramhdr ph; /* type=SCTP_IPV4_PARAM_TYPE, len=8 */
|
||||
uint32_t addr; /* IPV4 address */
|
||||
} SCTP_PACKED;
|
||||
|
||||
@ -56,20 +56,20 @@ struct sctp_ipv4addr_param {
|
||||
|
||||
|
||||
struct sctp_ipv6addr_param {
|
||||
struct sctp_paramhdr ph;/* type=SCTP_IPV6_PARAM_TYPE, len=20 */
|
||||
struct sctp_paramhdr ph; /* type=SCTP_IPV6_PARAM_TYPE, len=20 */
|
||||
uint8_t addr[SCTP_V6_ADDR_BYTES]; /* IPV6 address */
|
||||
} SCTP_PACKED;
|
||||
|
||||
/* Cookie Preservative */
|
||||
struct sctp_cookie_perserve_param {
|
||||
struct sctp_paramhdr ph;/* type=SCTP_COOKIE_PRESERVE, len=8 */
|
||||
struct sctp_paramhdr ph; /* type=SCTP_COOKIE_PRESERVE, len=8 */
|
||||
uint32_t time; /* time in ms to extend cookie */
|
||||
} SCTP_PACKED;
|
||||
|
||||
#define SCTP_ARRAY_MIN_LEN 1
|
||||
/* Host Name Address */
|
||||
struct sctp_host_name_param {
|
||||
struct sctp_paramhdr ph;/* type=SCTP_HOSTNAME_ADDRESS */
|
||||
struct sctp_paramhdr ph; /* type=SCTP_HOSTNAME_ADDRESS */
|
||||
char name[SCTP_ARRAY_MIN_LEN]; /* host name */
|
||||
} SCTP_PACKED;
|
||||
|
||||
@ -80,7 +80,7 @@ struct sctp_host_name_param {
|
||||
#define SCTP_MAX_ADDR_PARAMS_SIZE 12
|
||||
/* supported address type */
|
||||
struct sctp_supported_addr_param {
|
||||
struct sctp_paramhdr ph;/* type=SCTP_SUPPORTED_ADDRTYPE */
|
||||
struct sctp_paramhdr ph; /* type=SCTP_SUPPORTED_ADDRTYPE */
|
||||
uint16_t addr_type[2]; /* array of supported address types */
|
||||
} SCTP_PACKED;
|
||||
|
||||
@ -108,8 +108,8 @@ struct sctp_prsctp_supported_param {
|
||||
|
||||
/* draft-ietf-tsvwg-addip-sctp */
|
||||
struct sctp_asconf_paramhdr { /* an ASCONF "parameter" */
|
||||
struct sctp_paramhdr ph;/* a SCTP parameter header */
|
||||
uint32_t correlation_id;/* correlation id for this param */
|
||||
struct sctp_paramhdr ph; /* a SCTP parameter header */
|
||||
uint32_t correlation_id; /* correlation id for this param */
|
||||
} SCTP_PACKED;
|
||||
|
||||
struct sctp_asconf_addr_param { /* an ASCONF address parameter */
|
||||
@ -133,7 +133,7 @@ struct sctp_asconf_addrv4_param { /* an ASCONF address (v4) parameter */
|
||||
#define SCTP_MAX_SUPPORTED_EXT 256
|
||||
|
||||
struct sctp_supported_chunk_types_param {
|
||||
struct sctp_paramhdr ph;/* type = 0x8008 len = x */
|
||||
struct sctp_paramhdr ph; /* type = 0x8008 len = x */
|
||||
uint8_t chunk_types[];
|
||||
} SCTP_PACKED;
|
||||
|
||||
@ -206,8 +206,8 @@ struct sctp_state_cookie { /* this is our definition... */
|
||||
|
||||
uint16_t peerport; /* port address of the peer in the INIT */
|
||||
uint16_t myport; /* my port address used in the INIT */
|
||||
uint8_t ipv4_addr_legal;/* Are V4 addr legal? */
|
||||
uint8_t ipv6_addr_legal;/* Are V6 addr legal? */
|
||||
uint8_t ipv4_addr_legal; /* Are V4 addr legal? */
|
||||
uint8_t ipv6_addr_legal; /* Are V6 addr legal? */
|
||||
uint8_t local_scope; /* IPv6 local scope flag */
|
||||
uint8_t site_scope; /* IPv6 site scope flag */
|
||||
|
||||
@ -512,17 +512,17 @@ struct sctp_stream_reset_resp_tsn {
|
||||
/* Should we make the max be 32? */
|
||||
#define SCTP_RANDOM_MAX_SIZE 256
|
||||
struct sctp_auth_random {
|
||||
struct sctp_paramhdr ph;/* type = 0x8002 */
|
||||
struct sctp_paramhdr ph; /* type = 0x8002 */
|
||||
uint8_t random_data[];
|
||||
} SCTP_PACKED;
|
||||
|
||||
struct sctp_auth_chunk_list {
|
||||
struct sctp_paramhdr ph;/* type = 0x8003 */
|
||||
struct sctp_paramhdr ph; /* type = 0x8003 */
|
||||
uint8_t chunk_types[];
|
||||
} SCTP_PACKED;
|
||||
|
||||
struct sctp_auth_hmac_algo {
|
||||
struct sctp_paramhdr ph;/* type = 0x8004 */
|
||||
struct sctp_paramhdr ph; /* type = 0x8004 */
|
||||
uint16_t hmac_ids[];
|
||||
} SCTP_PACKED;
|
||||
|
||||
|
@ -90,6 +90,7 @@ sctp_calc_rwnd(struct sctp_tcb *stcb, struct sctp_association *asoc)
|
||||
if (stcb->sctp_socket == NULL) {
|
||||
return (calc);
|
||||
}
|
||||
|
||||
KASSERT(asoc->cnt_on_reasm_queue > 0 || asoc->size_on_reasm_queue == 0,
|
||||
("size_on_reasm_queue is %u", asoc->size_on_reasm_queue));
|
||||
KASSERT(asoc->cnt_on_all_streams > 0 || asoc->size_on_all_streams == 0,
|
||||
@ -115,6 +116,7 @@ sctp_calc_rwnd(struct sctp_tcb *stcb, struct sctp_association *asoc)
|
||||
/* out of space */
|
||||
return (calc);
|
||||
}
|
||||
|
||||
/* what is the overhead of all these rwnd's */
|
||||
calc = sctp_sbspace_sub(calc, stcb->asoc.my_rwnd_control_len);
|
||||
/*
|
||||
@ -185,6 +187,7 @@ sctp_build_ctl_nchunk(struct sctp_inpcb *inp, struct sctp_sndrcvinfo *sinfo)
|
||||
/* user does not want any ancillary data */
|
||||
return (NULL);
|
||||
}
|
||||
|
||||
len = 0;
|
||||
if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_RECVRCVINFO)) {
|
||||
len += CMSG_SPACE(sizeof(struct sctp_rcvinfo));
|
||||
@ -1044,6 +1047,7 @@ sctp_inject_old_unordered_data(struct sctp_tcb *stcb,
|
||||
SCTP_FROM_SCTP_INDATA + SCTP_LOC_5);
|
||||
return;
|
||||
}
|
||||
|
||||
}
|
||||
if (inserted == 0) {
|
||||
/* Its at the end */
|
||||
@ -2138,6 +2142,7 @@ sctp_process_a_data_chunk(struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
control = NULL;
|
||||
goto finish_express_del;
|
||||
}
|
||||
|
||||
/* Now will we need a chunk too? */
|
||||
if ((chk_flags & SCTP_DATA_NOT_FRAG) != SCTP_DATA_NOT_FRAG) {
|
||||
sctp_alloc_a_chunk(stcb, chk);
|
||||
@ -3096,6 +3101,7 @@ sctp_process_segment_range(struct sctp_tcb *stcb, struct sctp_tmit_chunk **p_tp1
|
||||
tp1->do_rtt = 0;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
if (tp1->sent <= SCTP_DATAGRAM_RESEND) {
|
||||
if (SCTP_TSN_GT(tp1->rec.data.tsn,
|
||||
@ -3361,6 +3367,7 @@ sctp_strike_gap_ack_chunks(struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
if (SCTP_TSN_GT(tp1->rec.data.tsn, asoc->this_sack_highest_gap) &&
|
||||
!(accum_moved && asoc->fast_retran_loss_recovery)) {
|
||||
@ -3596,6 +3603,7 @@ sctp_strike_gap_ack_chunks(struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
tp1);
|
||||
}
|
||||
}
|
||||
|
||||
if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_LOG_RWND_ENABLE) {
|
||||
sctp_log_rwnd(SCTP_INCREASE_PEER_RWND,
|
||||
asoc->peers_rwnd, tp1->send_size, SCTP_BASE_SYSCTL(sctp_peer_chunk_oh));
|
||||
@ -3677,6 +3685,7 @@ sctp_strike_gap_ack_chunks(struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
tp1->whoTo->find_pseudo_cumack = 1;
|
||||
tp1->whoTo->find_rtx_pseudo_cumack = 1;
|
||||
}
|
||||
|
||||
} else { /* CMT is OFF */
|
||||
|
||||
#ifdef SCTP_FR_TO_ALTERNATE
|
||||
@ -3965,6 +3974,7 @@ sctp_express_handle_sack(struct sctp_tcb *stcb, uint32_t cumack,
|
||||
}
|
||||
return;
|
||||
}
|
||||
|
||||
/* First setup for CC stuff */
|
||||
TAILQ_FOREACH(net, &asoc->nets, sctp_next) {
|
||||
if (SCTP_TSN_GT(cumack, net->cwr_window_tsn)) {
|
||||
@ -4230,6 +4240,7 @@ sctp_express_handle_sack(struct sctp_tcb *stcb, uint32_t cumack,
|
||||
asoc->total_flight = 0;
|
||||
asoc->total_flight_count = 0;
|
||||
}
|
||||
|
||||
/* RWND update */
|
||||
asoc->peers_rwnd = sctp_sbspace_sub(rwnd,
|
||||
(uint32_t)(asoc->total_flight + (asoc->total_flight_count * SCTP_BASE_SYSCTL(sctp_peer_chunk_oh))));
|
||||
@ -4482,6 +4493,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
sctp_misc_ints(SCTP_SACK_LOG_NORMAL, cum_ack,
|
||||
rwnd, stcb->asoc.last_acked_seq, stcb->asoc.peers_rwnd);
|
||||
}
|
||||
|
||||
old_rwnd = stcb->asoc.peers_rwnd;
|
||||
if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_THRESHOLD_LOGGING) {
|
||||
sctp_misc_ints(SCTP_THRESHOLD_CLEAR,
|
||||
@ -4553,6 +4565,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
/* acking something behind */
|
||||
return;
|
||||
}
|
||||
|
||||
/* update the Rwnd of the peer */
|
||||
if (TAILQ_EMPTY(&asoc->sent_queue) &&
|
||||
TAILQ_EMPTY(&asoc->send_queue) &&
|
||||
@ -4606,6 +4619,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
if (stcb->asoc.cc_functions.sctp_cwnd_prepare_net_for_sack) {
|
||||
(*stcb->asoc.cc_functions.sctp_cwnd_prepare_net_for_sack) (stcb, net);
|
||||
}
|
||||
|
||||
/*
|
||||
* CMT: SFR algo (and HTNA) - this_sack_highest_newack has
|
||||
* to be greater than the cumack. Also reset saw_newack to 0
|
||||
@ -4841,6 +4855,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
#endif
|
||||
asoc->total_flight = 0;
|
||||
}
|
||||
|
||||
/* sa_ignore NO_NULL_CHK */
|
||||
if ((wake_him) && (stcb->sctp_socket)) {
|
||||
#if defined(__APPLE__) || defined(SCTP_SO_LOCK_TESTING)
|
||||
@ -4945,6 +4960,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb,
|
||||
0, (void *)net, SCTP_SO_NOT_LOCKED);
|
||||
}
|
||||
|
||||
if (net == stcb->asoc.primary_destination) {
|
||||
if (stcb->asoc.alternate) {
|
||||
/*
|
||||
@ -4955,6 +4971,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
stcb->asoc.alternate = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
if (net->dest_state & SCTP_ADDR_PF) {
|
||||
net->dest_state &= ~SCTP_ADDR_PF;
|
||||
sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT,
|
||||
@ -4977,6 +4994,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
}
|
||||
asoc->cc_functions.sctp_cwnd_update_after_sack(stcb, asoc, accum_moved, reneged_all, will_exit_fast_recovery);
|
||||
}
|
||||
|
||||
if (TAILQ_EMPTY(&asoc->sent_queue)) {
|
||||
/* nothing left in-flight */
|
||||
TAILQ_FOREACH(net, &asoc->nets, sctp_next) {
|
||||
@ -4990,6 +5008,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
asoc->total_flight = 0;
|
||||
asoc->total_flight_count = 0;
|
||||
}
|
||||
|
||||
/**********************************/
|
||||
/* Now what about shutdown issues */
|
||||
/**********************************/
|
||||
@ -5124,6 +5143,7 @@ sctp_handle_sack(struct mbuf *m, int offset_seg, int offset_dup,
|
||||
if (asoc->peers_rwnd > old_rwnd) {
|
||||
win_probe_recovery = 1;
|
||||
}
|
||||
|
||||
/*
|
||||
* Now we must setup so we have a timer up for anyone with
|
||||
* outstanding data.
|
||||
|
@ -99,8 +99,7 @@ void
|
||||
sctp_handle_forward_tsn(struct sctp_tcb *,
|
||||
struct sctp_forward_tsn_chunk *, int *, struct mbuf *, int);
|
||||
|
||||
struct sctp_tmit_chunk *
|
||||
sctp_try_advance_peer_ack_point(struct sctp_tcb *, struct sctp_association *);
|
||||
struct sctp_tmit_chunk *sctp_try_advance_peer_ack_point(struct sctp_tcb *, struct sctp_association *);
|
||||
|
||||
void sctp_service_queues(struct sctp_tcb *, struct sctp_association *);
|
||||
|
||||
|
@ -305,6 +305,7 @@ sctp_process_init(struct sctp_init_chunk *cp, struct sctp_tcb *stcb)
|
||||
if (SCTP_BASE_SYSCTL(sctp_logging_level) & (SCTP_CWND_MONITOR_ENABLE | SCTP_CWND_LOGGING_ENABLE)) {
|
||||
sctp_log_cwnd(stcb, lnet, 0, SCTP_CWND_INITIALIZATION);
|
||||
}
|
||||
|
||||
}
|
||||
}
|
||||
SCTP_TCB_SEND_LOCK(stcb);
|
||||
@ -491,6 +492,7 @@ sctp_process_init_ack(struct mbuf *m, int iphlen, int offset,
|
||||
SCTP_FREE(param, SCTP_M_ASC_ADDR);
|
||||
}
|
||||
}
|
||||
|
||||
stcb->asoc.peer_hmac_id = sctp_negotiate_hmacid(stcb->asoc.peer_hmacs,
|
||||
stcb->asoc.local_hmacs);
|
||||
if (op_err) {
|
||||
@ -553,6 +555,7 @@ sctp_process_init_ack(struct mbuf *m, int iphlen, int offset,
|
||||
}
|
||||
return (retval);
|
||||
}
|
||||
|
||||
return (0);
|
||||
}
|
||||
|
||||
@ -570,6 +573,7 @@ sctp_handle_heartbeat_ack(struct sctp_heartbeat_chunk *cp,
|
||||
/* Invalid length */
|
||||
return;
|
||||
}
|
||||
|
||||
memset(&store, 0, sizeof(store));
|
||||
switch (cp->heartbeat.hb_info.addr_family) {
|
||||
#ifdef INET
|
||||
@ -1716,6 +1720,7 @@ sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset,
|
||||
asoc->cookie_how[how_indx] = 5;
|
||||
return (stcb);
|
||||
}
|
||||
|
||||
if (ntohl(initack_cp->init.initiate_tag) != asoc->my_vtag &&
|
||||
ntohl(init_cp->init.initiate_tag) == asoc->peer_vtag &&
|
||||
cookie->tie_tag_my_vtag == 0 &&
|
||||
@ -2291,6 +2296,7 @@ sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset,
|
||||
stcb->asoc.authenticated = 1;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* if we're doing ASCONFs, check to see if we have any new local
|
||||
* addresses that need to get added to the peer (eg. addresses
|
||||
@ -2588,6 +2594,7 @@ sctp_handle_cookie_echo(struct mbuf *m, int iphlen, int offset,
|
||||
(uint32_t)offset, cookie_offset, sig_offset);
|
||||
return (NULL);
|
||||
}
|
||||
|
||||
/*
|
||||
* check the cookie timestamps to be sure it's not stale
|
||||
*/
|
||||
@ -2708,6 +2715,7 @@ sctp_handle_cookie_echo(struct mbuf *m, int iphlen, int offset,
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
cookie_len -= SCTP_SIGNATURE_SIZE;
|
||||
if (*stcb == NULL) {
|
||||
/* this is the "normal" case... get a new TCB */
|
||||
@ -2910,6 +2918,7 @@ sctp_handle_cookie_echo(struct mbuf *m, int iphlen, int offset,
|
||||
sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_CONFIRMED,
|
||||
(*stcb), 0, (void *)netl, SCTP_SO_NOT_LOCKED);
|
||||
}
|
||||
|
||||
/*
|
||||
* Pull it from the incomplete queue and wake the
|
||||
* guy
|
||||
@ -2950,6 +2959,7 @@ sctp_handle_cookie_ack(struct sctp_cookie_ack_chunk *cp SCTP_UNUSED,
|
||||
if ((stcb == NULL) || (net == NULL)) {
|
||||
return;
|
||||
}
|
||||
|
||||
asoc = &stcb->asoc;
|
||||
if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_THRESHOLD_LOGGING) {
|
||||
sctp_misc_ints(SCTP_THRESHOLD_CLEAR,
|
||||
@ -3016,6 +3026,7 @@ sctp_handle_cookie_ack(struct sctp_cookie_ack_chunk *cp SCTP_UNUSED,
|
||||
*/
|
||||
goto closed_socket;
|
||||
}
|
||||
|
||||
sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep,
|
||||
stcb, net);
|
||||
|
||||
@ -3794,6 +3805,7 @@ sctp_handle_stream_reset_response(struct sctp_tcb *stcb,
|
||||
if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_MAP_LOGGING_ENABLE) {
|
||||
sctp_log_map(0, 7, asoc->highest_tsn_inside_map, SCTP_MAP_SLIDE_RESULT);
|
||||
}
|
||||
|
||||
stcb->asoc.tsn_last_delivered = stcb->asoc.cumulative_tsn = stcb->asoc.highest_tsn_inside_map;
|
||||
stcb->asoc.mapping_array_base_tsn = ntohl(resp->senders_next_tsn);
|
||||
memset(stcb->asoc.mapping_array, 0, stcb->asoc.mapping_array_size);
|
||||
@ -4393,6 +4405,7 @@ sctp_handle_packet_dropped(struct sctp_pktdrop_chunk *cp,
|
||||
if (trunc_len > limit) {
|
||||
trunc_len = limit;
|
||||
}
|
||||
|
||||
/* now the chunks themselves */
|
||||
while ((ch != NULL) && (chlen >= sizeof(struct sctp_chunkhdr))) {
|
||||
desc.chunk_type = ch->chunk_type;
|
||||
@ -4652,6 +4665,7 @@ sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
|
||||
*/
|
||||
SCTP_INP_DECR_REF(inp);
|
||||
}
|
||||
|
||||
/* now go back and verify any auth chunk to be sure */
|
||||
if (auth_skipped && (stcb != NULL)) {
|
||||
struct sctp_auth_chunk *auth;
|
||||
@ -4751,6 +4765,7 @@ sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
|
||||
sctp_handle_cookie_ack((struct sctp_cookie_ack_chunk *)ch, stcb,
|
||||
*netp);
|
||||
}
|
||||
|
||||
process_control_chunks:
|
||||
while (IS_SCTP_CONTROL(ch)) {
|
||||
/* validate chunk length */
|
||||
@ -4790,6 +4805,7 @@ sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
|
||||
}
|
||||
return (NULL);
|
||||
}
|
||||
|
||||
num_chunks++;
|
||||
/* Save off the last place we got a control from */
|
||||
if (stcb != NULL) {
|
||||
@ -5156,6 +5172,7 @@ sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
|
||||
goto abend;
|
||||
}
|
||||
}
|
||||
|
||||
if (netp != NULL) {
|
||||
struct sctp_tcb *locked_stcb;
|
||||
|
||||
@ -5328,6 +5345,7 @@ sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
|
||||
*offset = length;
|
||||
return (stcb);
|
||||
}
|
||||
|
||||
if (stcb != NULL) {
|
||||
int abort_flag = 0;
|
||||
|
||||
@ -5390,6 +5408,7 @@ sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
|
||||
*offset = length;
|
||||
return (stcb);
|
||||
}
|
||||
|
||||
if ((ch != NULL) && (stcb != NULL) && (netp != NULL) && (*netp != NULL)) {
|
||||
if (stcb->asoc.pktdrop_supported == 0) {
|
||||
goto unknown_chunk;
|
||||
@ -5652,6 +5671,7 @@ sctp_common_input_processing(struct mbuf **mm, int iphlen, int offset, int lengt
|
||||
vrf_id, port);
|
||||
goto out;
|
||||
}
|
||||
|
||||
}
|
||||
if (IS_SCTP_CONTROL(ch)) {
|
||||
/* process the control portion of the SCTP packet */
|
||||
@ -5727,6 +5747,7 @@ sctp_common_input_processing(struct mbuf **mm, int iphlen, int offset, int lengt
|
||||
*/
|
||||
goto out;
|
||||
}
|
||||
|
||||
/*
|
||||
* DATA chunk processing
|
||||
*/
|
||||
@ -5805,6 +5826,7 @@ sctp_common_input_processing(struct mbuf **mm, int iphlen, int offset, int lengt
|
||||
* process_data
|
||||
*/
|
||||
}
|
||||
|
||||
/* take care of ecn */
|
||||
if ((data_processed == 1) &&
|
||||
(stcb->asoc.ecn_supported == 1) &&
|
||||
@ -5812,6 +5834,7 @@ sctp_common_input_processing(struct mbuf **mm, int iphlen, int offset, int lengt
|
||||
/* Yep, we need to add a ECNE */
|
||||
sctp_send_ecn_echo(stcb, net, high_tsn);
|
||||
}
|
||||
|
||||
if ((data_processed == 0) && (fwd_tsn_seen)) {
|
||||
int was_a_gap;
|
||||
uint32_t highest_tsn;
|
||||
|
@ -52,7 +52,7 @@ struct sctp_stream_reset_request *
|
||||
sctp_find_stream_reset(struct sctp_tcb *stcb, uint32_t seq,
|
||||
struct sctp_tmit_chunk **bchk);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_reset_in_stream(struct sctp_tcb *stcb, uint32_t number_entries,
|
||||
uint16_t *list);
|
||||
|
||||
|
@ -74,7 +74,7 @@ int
|
||||
int
|
||||
sctp_v4src_match_nexthop(struct sctp_ifa *sifa, sctp_route_t *ro);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_send_initiate(struct sctp_inpcb *, struct sctp_tcb *, int
|
||||
#if !defined(__APPLE__) && !defined(SCTP_SO_LOCK_TESTING)
|
||||
SCTP_UNUSED
|
||||
@ -117,7 +117,7 @@ void sctp_send_shutdown_ack(struct sctp_tcb *, struct sctp_nets *);
|
||||
|
||||
void sctp_send_shutdown_complete(struct sctp_tcb *, struct sctp_nets *, int);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_send_shutdown_complete2(struct sockaddr *, struct sockaddr *,
|
||||
struct sctphdr *,
|
||||
uint8_t, uint32_t, uint16_t,
|
||||
@ -146,13 +146,13 @@ int
|
||||
sctp_output(struct sctp_inpcb *, struct mbuf *, struct sockaddr *,
|
||||
struct mbuf *, struct thread *, int);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_chunk_output(struct sctp_inpcb *, struct sctp_tcb *, int, int
|
||||
#if !defined(__APPLE__) && !defined(SCTP_SO_LOCK_TESTING)
|
||||
SCTP_UNUSED
|
||||
#endif
|
||||
);
|
||||
void
|
||||
void
|
||||
sctp_send_abort_tcb(struct sctp_tcb *, struct mbuf *, int
|
||||
#if !defined(__APPLE__) && !defined(SCTP_SO_LOCK_TESTING)
|
||||
SCTP_UNUSED
|
||||
@ -201,7 +201,7 @@ sctp_send_abort(struct mbuf *, int, struct sockaddr *, struct sockaddr *,
|
||||
uint8_t, uint32_t, uint16_t,
|
||||
uint32_t, uint16_t);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_send_operr_to(struct sockaddr *, struct sockaddr *,
|
||||
struct sctphdr *, uint32_t, struct mbuf *,
|
||||
uint8_t, uint32_t, uint16_t,
|
||||
|
@ -185,6 +185,7 @@ sctp_allocate_vrf(int vrf_id)
|
||||
SCTP_FREE(vrf, SCTP_M_VRF);
|
||||
return (NULL);
|
||||
}
|
||||
|
||||
/* Add it to the hash table */
|
||||
bucket = &SCTP_BASE_INFO(sctp_vrfhash)[(vrf_id & SCTP_BASE_INFO(hashvrfmark))];
|
||||
LIST_INSERT_HEAD(bucket, vrf, next_vrf);
|
||||
@ -736,6 +737,7 @@ sctp_del_addr_from_vrf(uint32_t vrf_id, struct sockaddr *addr,
|
||||
SCTPDBG(SCTP_DEBUG_PCB4, "Can't find vrf_id 0x%x\n", vrf_id);
|
||||
goto out_now;
|
||||
}
|
||||
|
||||
#ifdef SCTP_DEBUG
|
||||
SCTPDBG(SCTP_DEBUG_PCB4, "vrf_id 0x%x: deleting address:", vrf_id);
|
||||
SCTPDBG_ADDR(SCTP_DEBUG_PCB4, addr);
|
||||
@ -864,6 +866,7 @@ sctp_does_stcb_own_this_addr(struct sctp_tcb *stcb, struct sockaddr *to)
|
||||
SCTP_IPI_ADDR_RUNLOCK();
|
||||
return (0);
|
||||
}
|
||||
|
||||
if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
|
||||
LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
|
||||
if ((loopback_scope == 0) &&
|
||||
@ -1025,6 +1028,7 @@ sctp_tcb_special_locate(struct sctp_inpcb **inp_p, struct sockaddr *from,
|
||||
if ((to == NULL) || (from == NULL)) {
|
||||
return (NULL);
|
||||
}
|
||||
|
||||
switch (to->sa_family) {
|
||||
#ifdef INET
|
||||
case AF_INET:
|
||||
@ -1387,6 +1391,7 @@ sctp_findassociation_ep_addr(struct sctp_inpcb **inp_p, struct sockaddr *remote,
|
||||
if (locked_tcb) {
|
||||
atomic_subtract_int(&locked_tcb->asoc.refcnt, 1);
|
||||
}
|
||||
|
||||
SCTP_INP_WUNLOCK(inp);
|
||||
SCTP_INP_INFO_RUNLOCK();
|
||||
return (stcb);
|
||||
@ -2252,6 +2257,7 @@ sctp_findassociation_addr(struct mbuf *m, int offset,
|
||||
return (stcb);
|
||||
}
|
||||
}
|
||||
|
||||
if (inp_p) {
|
||||
stcb = sctp_findassociation_addr_sa(src, dst, inp_p, netp,
|
||||
1, vrf_id);
|
||||
@ -2847,6 +2853,7 @@ sctp_inpcb_bind(struct socket *so, struct sockaddr *addr,
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PCB, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
sin = (struct sockaddr_in *)addr;
|
||||
lport = sin->sin_port;
|
||||
/*
|
||||
@ -3501,6 +3508,7 @@ sctp_inpcb_free(struct sctp_inpcb *inp, int immediate, int from)
|
||||
LIST_REMOVE(inp, sctp_hash);
|
||||
inp->sctp_flags |= SCTP_PCB_FLAGS_UNBOUND;
|
||||
}
|
||||
|
||||
/*
|
||||
* If there is a timer running to kill us, forget it, since it may
|
||||
* have a contest on the INP lock.. which would cause us to die ...
|
||||
@ -3633,6 +3641,8 @@ sctp_inpcb_free(struct sctp_inpcb *inp, int immediate, int from)
|
||||
(void)sctp_m_free(ip_pcb->inp_options);
|
||||
ip_pcb->inp_options = 0;
|
||||
}
|
||||
|
||||
|
||||
#ifdef INET6
|
||||
if (ip_pcb->inp_vflag & INP_IPV6) {
|
||||
struct in6pcb *in6p;
|
||||
@ -4860,6 +4870,7 @@ sctp_free_assoc(struct sctp_inpcb *inp, struct sctp_tcb *stcb, int from_inpcbfre
|
||||
sctp_sorwakeup(inp, so);
|
||||
sctp_sowwakeup(inp, so);
|
||||
}
|
||||
|
||||
#ifdef SCTP_LOG_CLOSING
|
||||
sctp_log_closing(inp, stcb, 9);
|
||||
#endif
|
||||
@ -4918,6 +4929,7 @@ sctp_free_assoc(struct sctp_inpcb *inp, struct sctp_tcb *stcb, int from_inpcbfre
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* Make it invalid too, that way if its about to run it will abort
|
||||
* and return.
|
||||
@ -5335,6 +5347,7 @@ sctp_update_ep_vflag(struct sctp_inpcb *inp)
|
||||
__func__);
|
||||
continue;
|
||||
}
|
||||
|
||||
if (laddr->ifa->localifa_flags & SCTP_BEING_DELETED) {
|
||||
continue;
|
||||
}
|
||||
@ -5748,6 +5761,7 @@ sctp_startup_mcore_threads(void)
|
||||
i++;
|
||||
}
|
||||
}
|
||||
|
||||
/* Now start them all */
|
||||
CPU_FOREACH(cpu) {
|
||||
(void)kproc_create(sctp_mcore_thread,
|
||||
@ -6282,6 +6296,7 @@ sctp_load_addresses_from_init(struct sctp_tcb *stcb, struct mbuf *m,
|
||||
}
|
||||
SCTP_TCB_UNLOCK(stcb_tmp);
|
||||
}
|
||||
|
||||
if (stcb->asoc.state == 0) {
|
||||
/* the assoc was freed? */
|
||||
return (-12);
|
||||
@ -7001,6 +7016,7 @@ sctp_drain_mbufs(struct sctp_tcb *stcb)
|
||||
if (!fnd) {
|
||||
asoc->highest_tsn_inside_map = asoc->mapping_array_base_tsn - 1;
|
||||
}
|
||||
|
||||
/*
|
||||
* Question, should we go through the delivery queue? The
|
||||
* only reason things are on here is the app not reading OR
|
||||
|
@ -363,7 +363,7 @@ struct sctp_inpcb {
|
||||
union {
|
||||
struct inpcb inp;
|
||||
char align[(sizeof(struct in6pcb) + SCTP_ALIGNM1) &
|
||||
~SCTP_ALIGNM1];
|
||||
~SCTP_ALIGNM1];
|
||||
} ip_inp;
|
||||
|
||||
|
||||
@ -389,7 +389,7 @@ struct sctp_inpcb {
|
||||
uint64_t sctp_features; /* Feature flags */
|
||||
uint32_t sctp_flags; /* INP state flag set */
|
||||
uint32_t sctp_mobility_features; /* Mobility Feature flags */
|
||||
struct sctp_pcb sctp_ep;/* SCTP ep data */
|
||||
struct sctp_pcb sctp_ep; /* SCTP ep data */
|
||||
/* head of the hash of all associations */
|
||||
struct sctpasochead *sctp_tcbhash;
|
||||
u_long sctp_hashmark;
|
||||
@ -492,8 +492,7 @@ int SCTP6_ARE_ADDR_EQUAL(struct sockaddr_in6 *a, struct sockaddr_in6 *b);
|
||||
|
||||
void sctp_fill_pcbinfo(struct sctp_pcbinfo *);
|
||||
|
||||
struct sctp_ifn *
|
||||
sctp_find_ifn(void *ifn, uint32_t ifn_index);
|
||||
struct sctp_ifn *sctp_find_ifn(void *ifn, uint32_t ifn_index);
|
||||
|
||||
struct sctp_vrf *sctp_allocate_vrf(int vrfid);
|
||||
struct sctp_vrf *sctp_find_vrf(uint32_t vrfid);
|
||||
@ -524,7 +523,7 @@ void sctp_free_ifn(struct sctp_ifn *sctp_ifnp);
|
||||
void sctp_free_ifa(struct sctp_ifa *sctp_ifap);
|
||||
|
||||
|
||||
void
|
||||
void
|
||||
sctp_del_addr_from_vrf(uint32_t vrfid, struct sockaddr *addr,
|
||||
uint32_t ifn_index, const char *if_name);
|
||||
|
||||
@ -534,7 +533,7 @@ struct sctp_nets *sctp_findnet(struct sctp_tcb *, struct sockaddr *);
|
||||
|
||||
struct sctp_inpcb *sctp_pcb_findep(struct sockaddr *, int, int, uint32_t);
|
||||
|
||||
int
|
||||
int
|
||||
sctp_inpcb_bind(struct socket *, struct sockaddr *,
|
||||
struct sctp_ifa *, struct thread *);
|
||||
|
||||
@ -563,8 +562,7 @@ sctp_findassociation_ep_addr(struct sctp_inpcb **,
|
||||
struct sockaddr *, struct sctp_nets **, struct sockaddr *,
|
||||
struct sctp_tcb *);
|
||||
|
||||
struct sctp_tcb *
|
||||
sctp_findasoc_ep_asocid_locked(struct sctp_inpcb *inp, sctp_assoc_t asoc_id, int want_lock);
|
||||
struct sctp_tcb *sctp_findasoc_ep_asocid_locked(struct sctp_inpcb *inp, sctp_assoc_t asoc_id, int want_lock);
|
||||
|
||||
struct sctp_tcb *
|
||||
sctp_findassociation_ep_asocid(struct sctp_inpcb *,
|
||||
|
@ -103,6 +103,7 @@ sctp_do_peeloff(struct socket *head, struct socket *so, sctp_assoc_t assoc_id)
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
|
||||
return (ENOTCONN);
|
||||
}
|
||||
|
||||
state = SCTP_GET_STATE((&stcb->asoc));
|
||||
if ((state == SCTP_STATE_EMPTY) ||
|
||||
(state == SCTP_STATE_INUSE)) {
|
||||
@ -110,6 +111,7 @@ sctp_do_peeloff(struct socket *head, struct socket *so, sctp_assoc_t assoc_id)
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
|
||||
return (ENOTCONN);
|
||||
}
|
||||
|
||||
n_inp = (struct sctp_inpcb *)so->so_pcb;
|
||||
n_inp->sctp_flags = (SCTP_PCB_FLAGS_UDPTYPE |
|
||||
SCTP_PCB_FLAGS_CONNECTED |
|
||||
|
@ -105,7 +105,7 @@ TAILQ_HEAD(sctp_resethead, sctp_stream_reset_list);
|
||||
#define SCTP_ASOC_ANY_STATE 0x00000000
|
||||
|
||||
typedef void (*asoc_func) (struct sctp_inpcb *, struct sctp_tcb *, void *ptr,
|
||||
uint32_t val);
|
||||
uint32_t val);
|
||||
typedef int (*inp_func) (struct sctp_inpcb *, void *ptr, uint32_t val);
|
||||
typedef void (*end_func) (void *ptr, uint32_t val);
|
||||
|
||||
@ -144,7 +144,7 @@ struct sctp_iterator {
|
||||
asoc_func function_assoc; /* per assoc function */
|
||||
inp_func function_inp; /* per endpoint function */
|
||||
inp_func function_inp_end; /* end INP function */
|
||||
end_func function_atend;/* iterator completion function */
|
||||
end_func function_atend; /* iterator completion function */
|
||||
void *pointer; /* pointer for apply func to use */
|
||||
uint32_t val; /* value for apply func to use */
|
||||
uint32_t pcb_flags; /* endpoint flags being checked */
|
||||
@ -231,7 +231,7 @@ struct rtcc_cc {
|
||||
uint64_t bw_tot_time; /* The total time since sending began */
|
||||
uint64_t new_tot_time; /* temp holding the new value */
|
||||
uint64_t bw_bytes_at_last_rttc; /* What bw_bytes was at last rtt calc */
|
||||
uint32_t cwnd_at_bw_set;/* Cwnd at last bw saved - lbw */
|
||||
uint32_t cwnd_at_bw_set; /* Cwnd at last bw saved - lbw */
|
||||
uint32_t vol_reduce; /* cnt of voluntary reductions */
|
||||
uint16_t steady_step; /* The number required to be in steady state */
|
||||
uint16_t step_cnt; /* The current number */
|
||||
@ -240,7 +240,8 @@ struct rtcc_cc {
|
||||
uint8_t use_dccc_ecn; /* Flag to enable DCCC ECN */
|
||||
uint8_t tls_needs_set; /* Flag to indicate we need to set tls 0 or 1
|
||||
* means set at send 2 not */
|
||||
uint8_t last_step_state;/* Last state if steady state stepdown is on */
|
||||
uint8_t last_step_state; /* Last state if steady state stepdown
|
||||
* is on */
|
||||
uint8_t rtt_set_this_sack; /* Flag saying this sack had RTT calc
|
||||
* on it */
|
||||
uint8_t last_inst_ind; /* Last saved inst indication */
|
||||
@ -331,8 +332,8 @@ struct sctp_nets {
|
||||
uint8_t dscp;
|
||||
|
||||
struct timeval start_time; /* time when this net was created */
|
||||
uint32_t marked_retrans;/* number or DATA chunks marked for timer
|
||||
* based retransmissions */
|
||||
uint32_t marked_retrans; /* number or DATA chunks marked for
|
||||
* timer based retransmissions */
|
||||
uint32_t marked_fastretrans;
|
||||
uint32_t heart_beat_delay; /* Heart Beat delay in ms */
|
||||
|
||||
@ -706,28 +707,28 @@ struct sctp_nonpad_sndrcvinfo {
|
||||
struct sctp_cc_functions {
|
||||
void (*sctp_set_initial_cc_param) (struct sctp_tcb *stcb, struct sctp_nets *net);
|
||||
void (*sctp_cwnd_update_after_sack) (struct sctp_tcb *stcb,
|
||||
struct sctp_association *asoc,
|
||||
int accum_moved, int reneged_all, int will_exit);
|
||||
struct sctp_association *asoc,
|
||||
int accum_moved, int reneged_all, int will_exit);
|
||||
void (*sctp_cwnd_update_exit_pf) (struct sctp_tcb *stcb, struct sctp_nets *net);
|
||||
void (*sctp_cwnd_update_after_fr) (struct sctp_tcb *stcb,
|
||||
struct sctp_association *asoc);
|
||||
struct sctp_association *asoc);
|
||||
void (*sctp_cwnd_update_after_timeout) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net);
|
||||
struct sctp_nets *net);
|
||||
void (*sctp_cwnd_update_after_ecn_echo) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net, int in_window, int num_pkt_lost);
|
||||
struct sctp_nets *net, int in_window, int num_pkt_lost);
|
||||
void (*sctp_cwnd_update_after_packet_dropped) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net, struct sctp_pktdrop_chunk *cp,
|
||||
uint32_t *bottle_bw, uint32_t *on_queue);
|
||||
struct sctp_nets *net, struct sctp_pktdrop_chunk *cp,
|
||||
uint32_t *bottle_bw, uint32_t *on_queue);
|
||||
void (*sctp_cwnd_update_after_output) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net, int burst_limit);
|
||||
struct sctp_nets *net, int burst_limit);
|
||||
void (*sctp_cwnd_update_packet_transmitted) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net);
|
||||
struct sctp_nets *net);
|
||||
void (*sctp_cwnd_update_tsn_acknowledged) (struct sctp_nets *net,
|
||||
struct sctp_tmit_chunk *);
|
||||
struct sctp_tmit_chunk *);
|
||||
void (*sctp_cwnd_new_transmission_begins) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net);
|
||||
struct sctp_nets *net);
|
||||
void (*sctp_cwnd_prepare_net_for_sack) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net);
|
||||
struct sctp_nets *net);
|
||||
int (*sctp_cwnd_socket_option) (struct sctp_tcb *stcb, int set, struct sctp_cc_option *);
|
||||
void (*sctp_rtt_calculated) (struct sctp_tcb *, struct sctp_nets *, struct timeval *);
|
||||
};
|
||||
@ -738,25 +739,25 @@ struct sctp_cc_functions {
|
||||
*/
|
||||
struct sctp_ss_functions {
|
||||
void (*sctp_ss_init) (struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
int holds_lock);
|
||||
int holds_lock);
|
||||
void (*sctp_ss_clear) (struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
int clear_values, int holds_lock);
|
||||
int clear_values, int holds_lock);
|
||||
void (*sctp_ss_init_stream) (struct sctp_tcb *stcb, struct sctp_stream_out *strq, struct sctp_stream_out *with_strq);
|
||||
void (*sctp_ss_add_to_stream) (struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
struct sctp_stream_out *strq, struct sctp_stream_queue_pending *sp, int holds_lock);
|
||||
struct sctp_stream_out *strq, struct sctp_stream_queue_pending *sp, int holds_lock);
|
||||
int (*sctp_ss_is_empty) (struct sctp_tcb *stcb, struct sctp_association *asoc);
|
||||
void (*sctp_ss_remove_from_stream) (struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
struct sctp_stream_out *strq, struct sctp_stream_queue_pending *sp, int holds_lock);
|
||||
struct sctp_stream_out *(*sctp_ss_select_stream) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net, struct sctp_association *asoc);
|
||||
struct sctp_stream_out *strq, struct sctp_stream_queue_pending *sp, int holds_lock);
|
||||
struct sctp_stream_out *(*sctp_ss_select_stream) (struct sctp_tcb *stcb,
|
||||
struct sctp_nets *net, struct sctp_association *asoc);
|
||||
void (*sctp_ss_scheduled) (struct sctp_tcb *stcb, struct sctp_nets *net,
|
||||
struct sctp_association *asoc, struct sctp_stream_out *strq, int moved_how_much);
|
||||
struct sctp_association *asoc, struct sctp_stream_out *strq, int moved_how_much);
|
||||
void (*sctp_ss_packet_done) (struct sctp_tcb *stcb, struct sctp_nets *net,
|
||||
struct sctp_association *asoc);
|
||||
struct sctp_association *asoc);
|
||||
int (*sctp_ss_get_value) (struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
struct sctp_stream_out *strq, uint16_t *value);
|
||||
struct sctp_stream_out *strq, uint16_t *value);
|
||||
int (*sctp_ss_set_value) (struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
struct sctp_stream_out *strq, uint16_t value);
|
||||
struct sctp_stream_out *strq, uint16_t value);
|
||||
int (*sctp_ss_is_user_msgs_incomplete) (struct sctp_tcb *stcb, struct sctp_association *asoc);
|
||||
};
|
||||
|
||||
|
@ -649,6 +649,7 @@ sctp_mark_all_for_resend(struct sctp_tcb *stcb,
|
||||
sctp_log_fr(chk->rec.data.tsn, chk->snd_count,
|
||||
0, SCTP_FR_T3_MARKED);
|
||||
}
|
||||
|
||||
if (chk->rec.data.chunk_was_revoked) {
|
||||
/* deflate the cwnd */
|
||||
chk->whoTo->cwnd -= chk->book_size;
|
||||
@ -715,6 +716,7 @@ sctp_mark_all_for_resend(struct sctp_tcb *stcb,
|
||||
/* we did not subtract the same things? */
|
||||
audit_tf = 1;
|
||||
}
|
||||
|
||||
if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_FR_LOGGING_ENABLE) {
|
||||
sctp_log_fr(tsnfirst, tsnlast, num_mk, SCTP_FR_T3_TIMEOUT);
|
||||
}
|
||||
@ -789,6 +791,7 @@ sctp_mark_all_for_resend(struct sctp_tcb *stcb,
|
||||
(uint32_t)(uintptr_t)chk->whoTo,
|
||||
chk->rec.data.tsn);
|
||||
}
|
||||
|
||||
sctp_flight_size_increase(chk);
|
||||
sctp_total_flight_increase(stcb, chk);
|
||||
}
|
||||
@ -909,6 +912,7 @@ sctp_t3rxt_timer(struct sctp_inpcb *inp,
|
||||
(net->flight_size == 0)) {
|
||||
(*stcb->asoc.cc_functions.sctp_cwnd_new_transmission_begins) (stcb, net);
|
||||
}
|
||||
|
||||
/*
|
||||
* setup the sat loss recovery that prevents satellite cwnd advance.
|
||||
*/
|
||||
@ -937,6 +941,7 @@ sctp_t3rxt_timer(struct sctp_inpcb *inp,
|
||||
RTFREE(net->ro.ro_rt);
|
||||
net->ro.ro_rt = NULL;
|
||||
}
|
||||
|
||||
/* Was it our primary? */
|
||||
if ((stcb->asoc.primary_destination == net) && (alt != net)) {
|
||||
/*
|
||||
@ -1210,6 +1215,7 @@ sctp_asconf_timer(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
|
||||
asconf->whoTo = alt;
|
||||
atomic_add_int(&alt->ref_count, 1);
|
||||
}
|
||||
|
||||
/* See if an ECN Echo is also stranded */
|
||||
TAILQ_FOREACH(chk, &stcb->asoc.control_send_queue, sctp_next) {
|
||||
if ((chk->whoTo == net) &&
|
||||
|
@ -258,13 +258,14 @@ struct sctp_snd_all_completes {
|
||||
/* for the endpoint */
|
||||
|
||||
/* The lower four bits is an enumeration of PR-SCTP policies */
|
||||
#define SCTP_PR_SCTP_NONE 0x0000/* Reliable transfer */
|
||||
#define SCTP_PR_SCTP_TTL 0x0001/* Time based PR-SCTP */
|
||||
#define SCTP_PR_SCTP_PRIO 0x0002/* Buffer based PR-SCTP */
|
||||
#define SCTP_PR_SCTP_NONE 0x0000 /* Reliable transfer */
|
||||
#define SCTP_PR_SCTP_TTL 0x0001 /* Time based PR-SCTP */
|
||||
#define SCTP_PR_SCTP_PRIO 0x0002 /* Buffer based PR-SCTP */
|
||||
#define SCTP_PR_SCTP_BUF SCTP_PR_SCTP_PRIO /* For backwards compatibility */
|
||||
#define SCTP_PR_SCTP_RTX 0x0003/* Number of retransmissions based PR-SCTP */
|
||||
#define SCTP_PR_SCTP_RTX 0x0003 /* Number of retransmissions based
|
||||
* PR-SCTP */
|
||||
#define SCTP_PR_SCTP_MAX SCTP_PR_SCTP_RTX
|
||||
#define SCTP_PR_SCTP_ALL 0x000f/* Used for aggregated stats */
|
||||
#define SCTP_PR_SCTP_ALL 0x000f /* Used for aggregated stats */
|
||||
|
||||
#define PR_SCTP_POLICY(x) ((x) & 0x0f)
|
||||
#define PR_SCTP_ENABLED(x) ((PR_SCTP_POLICY(x) != SCTP_PR_SCTP_NONE) && \
|
||||
@ -744,7 +745,7 @@ struct sctp_prstatus {
|
||||
|
||||
struct sctp_cwnd_args {
|
||||
struct sctp_nets *net; /* network to *//* FIXME: LP64 issue */
|
||||
uint32_t cwnd_new_value;/* cwnd in k */
|
||||
uint32_t cwnd_new_value; /* cwnd in k */
|
||||
uint32_t pseudo_cumack;
|
||||
uint16_t inflight; /* flightsize in k */
|
||||
uint16_t cwnd_augment; /* increment to it */
|
||||
@ -758,9 +759,9 @@ struct sctp_blk_args {
|
||||
uint32_t onsb; /* in 1k bytes */
|
||||
uint32_t sndlen; /* len of send being attempted */
|
||||
uint32_t peer_rwnd; /* rwnd of peer */
|
||||
uint16_t send_sent_qcnt;/* chnk cnt */
|
||||
uint16_t send_sent_qcnt; /* chnk cnt */
|
||||
uint16_t stream_qcnt; /* chnk cnt */
|
||||
uint16_t chunks_on_oque;/* chunks out */
|
||||
uint16_t chunks_on_oque; /* chunks out */
|
||||
uint16_t flight_size; /* flight size in k */
|
||||
};
|
||||
|
||||
@ -952,7 +953,7 @@ struct sctpstat {
|
||||
uint32_t sctps_collisionestab;
|
||||
uint32_t sctps_passiveestab; /* sctpStats 3 (Counter32) */
|
||||
uint32_t sctps_aborted; /* sctpStats 4 (Counter32) */
|
||||
uint32_t sctps_shutdown;/* sctpStats 5 (Counter32) */
|
||||
uint32_t sctps_shutdown; /* sctpStats 5 (Counter32) */
|
||||
uint32_t sctps_outoftheblue; /* sctpStats 6 (Counter32) */
|
||||
uint32_t sctps_checksumerrors; /* sctpStats 7 (Counter32) */
|
||||
uint32_t sctps_outcontrolchunks; /* sctpStats 8 (Counter64) */
|
||||
@ -971,12 +972,12 @@ struct sctpstat {
|
||||
uint32_t sctps_recvdatagrams; /* total input datagrams */
|
||||
uint32_t sctps_recvpktwithdata; /* total packets that had data */
|
||||
uint32_t sctps_recvsacks; /* total input SACK chunks */
|
||||
uint32_t sctps_recvdata;/* total input DATA chunks */
|
||||
uint32_t sctps_recvdata; /* total input DATA chunks */
|
||||
uint32_t sctps_recvdupdata; /* total input duplicate DATA chunks */
|
||||
uint32_t sctps_recvheartbeat; /* total input HB chunks */
|
||||
uint32_t sctps_recvheartbeatack; /* total input HB-ACK chunks */
|
||||
uint32_t sctps_recvecne;/* total input ECNE chunks */
|
||||
uint32_t sctps_recvauth;/* total input AUTH chunks */
|
||||
uint32_t sctps_recvecne; /* total input ECNE chunks */
|
||||
uint32_t sctps_recvauth; /* total input AUTH chunks */
|
||||
uint32_t sctps_recvauthmissing; /* total input chunks missing AUTH */
|
||||
uint32_t sctps_recvivalhmacid; /* total number of invalid HMAC ids
|
||||
* received */
|
||||
@ -993,7 +994,7 @@ struct sctpstat {
|
||||
/* output statistics: */
|
||||
uint32_t sctps_sendpackets; /* total output packets */
|
||||
uint32_t sctps_sendsacks; /* total output SACKs */
|
||||
uint32_t sctps_senddata;/* total output DATA chunks */
|
||||
uint32_t sctps_senddata; /* total output DATA chunks */
|
||||
uint32_t sctps_sendretransdata; /* total output retransmitted DATA
|
||||
* chunks */
|
||||
uint32_t sctps_sendfastretrans; /* total output fast retransmitted
|
||||
@ -1003,8 +1004,8 @@ struct sctpstat {
|
||||
* chunk (u-del multi-fr
|
||||
* algo). */
|
||||
uint32_t sctps_sendheartbeat; /* total output HB chunks */
|
||||
uint32_t sctps_sendecne;/* total output ECNE chunks */
|
||||
uint32_t sctps_sendauth;/* total output AUTH chunks FIXME */
|
||||
uint32_t sctps_sendecne; /* total output ECNE chunks */
|
||||
uint32_t sctps_sendauth; /* total output AUTH chunks FIXME */
|
||||
uint32_t sctps_senderrors; /* ip_output error counter */
|
||||
uint32_t sctps_send_spare; /* formerly sctps_sendnocrc */
|
||||
uint32_t sctps_sendswcrc;
|
||||
@ -1012,8 +1013,8 @@ struct sctpstat {
|
||||
/* PCKDROPREP statistics: */
|
||||
uint32_t sctps_pdrpfmbox; /* Packet drop from middle box */
|
||||
uint32_t sctps_pdrpfehos; /* P-drop from end host */
|
||||
uint32_t sctps_pdrpmbda;/* P-drops with data */
|
||||
uint32_t sctps_pdrpmbct;/* P-drops, non-data, non-endhost */
|
||||
uint32_t sctps_pdrpmbda; /* P-drops with data */
|
||||
uint32_t sctps_pdrpmbct; /* P-drops, non-data, non-endhost */
|
||||
uint32_t sctps_pdrpbwrpt; /* P-drop, non-endhost, bandwidth rep
|
||||
* only */
|
||||
uint32_t sctps_pdrpcrupt; /* P-drop, not enough for chunk header */
|
||||
@ -1024,16 +1025,17 @@ struct sctpstat {
|
||||
uint32_t sctps_pdrpdnfnd; /* P-drop, attempt reverse TSN lookup */
|
||||
uint32_t sctps_pdrpdiwnp; /* P-drop, e-host confirms zero-rwnd */
|
||||
uint32_t sctps_pdrpdizrw; /* P-drop, midbox confirms no space */
|
||||
uint32_t sctps_pdrpbadd;/* P-drop, data did not match TSN */
|
||||
uint32_t sctps_pdrpmark;/* P-drop, TSN's marked for Fast Retran */
|
||||
uint32_t sctps_pdrpbadd; /* P-drop, data did not match TSN */
|
||||
uint32_t sctps_pdrpmark; /* P-drop, TSN's marked for Fast
|
||||
* Retran */
|
||||
/* timeouts */
|
||||
uint32_t sctps_timoiterator; /* Number of iterator timers that
|
||||
* fired */
|
||||
uint32_t sctps_timodata;/* Number of T3 data time outs */
|
||||
uint32_t sctps_timodata; /* Number of T3 data time outs */
|
||||
uint32_t sctps_timowindowprobe; /* Number of window probe (T3) timers
|
||||
* that fired */
|
||||
uint32_t sctps_timoinit;/* Number of INIT timers that fired */
|
||||
uint32_t sctps_timosack;/* Number of sack timers that fired */
|
||||
uint32_t sctps_timoinit; /* Number of INIT timers that fired */
|
||||
uint32_t sctps_timosack; /* Number of sack timers that fired */
|
||||
uint32_t sctps_timoshutdown; /* Number of shutdown timers that
|
||||
* fired */
|
||||
uint32_t sctps_timoheartbeat; /* Number of heartbeat timers that
|
||||
@ -1189,7 +1191,7 @@ struct xsctp_tcb {
|
||||
uint32_t state; /* sctpAssocEntry 8 */
|
||||
uint32_t in_streams; /* sctpAssocEntry 9 */
|
||||
uint32_t out_streams; /* sctpAssocEntry 10 */
|
||||
uint32_t max_nr_retrans;/* sctpAssocEntry 11 */
|
||||
uint32_t max_nr_retrans; /* sctpAssocEntry 11 */
|
||||
uint32_t primary_process; /* sctpAssocEntry 12 */
|
||||
uint32_t T1_expireries; /* sctpAssocEntry 13 */
|
||||
uint32_t T2_expireries; /* sctpAssocEntry 14 */
|
||||
@ -1302,37 +1304,37 @@ void sctp_freeladdrs(struct sockaddr *);
|
||||
int sctp_opt_info(int, sctp_assoc_t, int, void *, socklen_t *);
|
||||
|
||||
/* deprecated */
|
||||
ssize_t
|
||||
ssize_t
|
||||
sctp_sendmsg(int, const void *, size_t, const struct sockaddr *,
|
||||
socklen_t, uint32_t, uint32_t, uint16_t, uint32_t, uint32_t);
|
||||
|
||||
/* deprecated */
|
||||
ssize_t
|
||||
ssize_t
|
||||
sctp_send(int, const void *, size_t,
|
||||
const struct sctp_sndrcvinfo *, int);
|
||||
|
||||
/* deprecated */
|
||||
ssize_t
|
||||
ssize_t
|
||||
sctp_sendx(int, const void *, size_t, struct sockaddr *,
|
||||
int, struct sctp_sndrcvinfo *, int);
|
||||
|
||||
/* deprecated */
|
||||
ssize_t
|
||||
ssize_t
|
||||
sctp_sendmsgx(int sd, const void *, size_t, struct sockaddr *,
|
||||
int, uint32_t, uint32_t, uint16_t, uint32_t, uint32_t);
|
||||
|
||||
sctp_assoc_t sctp_getassocid(int, struct sockaddr *);
|
||||
|
||||
/* deprecated */
|
||||
ssize_t
|
||||
ssize_t
|
||||
sctp_recvmsg(int, void *, size_t, struct sockaddr *, socklen_t *,
|
||||
struct sctp_sndrcvinfo *, int *);
|
||||
|
||||
ssize_t
|
||||
ssize_t
|
||||
sctp_sendv(int, const struct iovec *, int, struct sockaddr *,
|
||||
int, void *, socklen_t, unsigned int, int);
|
||||
|
||||
ssize_t
|
||||
ssize_t
|
||||
sctp_recvv(int, const struct iovec *, int, struct sockaddr *,
|
||||
socklen_t *, void *, socklen_t *, unsigned int *, int *);
|
||||
|
||||
|
@ -389,6 +389,7 @@ sctp_getcred(SYSCTL_HANDLER_ARGS)
|
||||
SCTP_INP_DECR_REF(inp);
|
||||
goto cred_can_cont;
|
||||
}
|
||||
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOENT);
|
||||
error = ENOENT;
|
||||
goto out;
|
||||
@ -429,6 +430,7 @@ sctp_abort(struct socket *so)
|
||||
if (inp == NULL) {
|
||||
return;
|
||||
}
|
||||
|
||||
sctp_must_try_again:
|
||||
flags = inp->sctp_flags;
|
||||
#ifdef SCTP_LOG_CLOSING
|
||||
@ -1367,11 +1369,13 @@ sctp_do_connect_x(struct socket *so, struct sctp_inpcb *inp, void *optval,
|
||||
SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EADDRINUSE);
|
||||
return (EADDRINUSE);
|
||||
}
|
||||
|
||||
if ((inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL) &&
|
||||
(sctp_is_feature_off(inp, SCTP_PCB_FLAGS_PORTREUSE))) {
|
||||
SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
if (inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) {
|
||||
SCTP_INP_RLOCK(inp);
|
||||
stcb = LIST_FIRST(&inp->sctp_asoc_list);
|
||||
@ -1436,6 +1440,7 @@ sctp_do_connect_x(struct socket *so, struct sctp_inpcb *inp, void *optval,
|
||||
goto out_now;
|
||||
}
|
||||
}
|
||||
|
||||
/* FIX ME: do we want to pass in a vrf on the connect call? */
|
||||
vrf_id = inp->def_vrf_id;
|
||||
|
||||
@ -1547,6 +1552,7 @@ sctp_getopt(struct socket *so, int optname, void *optval, size_t *optsize,
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
inp = (struct sctp_inpcb *)so->so_pcb;
|
||||
if (inp == NULL) {
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
|
||||
@ -2391,6 +2397,7 @@ sctp_getopt(struct socket *so, int optname, void *optval, size_t *optsize,
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (stcb != NULL) {
|
||||
/* Applies to the specific association */
|
||||
paddrp->spp_flags = 0;
|
||||
@ -3260,6 +3267,7 @@ sctp_getopt(struct socket *so, int optname, void *optval, size_t *optsize,
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (stcb != NULL) {
|
||||
if (net != NULL) {
|
||||
thlds->spt_pathmaxrxt = net->failure_threshold;
|
||||
@ -3372,6 +3380,7 @@ sctp_getopt(struct socket *so, int optname, void *optval, size_t *optsize,
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (stcb != NULL) {
|
||||
if (net) {
|
||||
encaps->sue_port = net->port;
|
||||
@ -4397,6 +4406,7 @@ sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
|
||||
error = EINVAL;
|
||||
break;
|
||||
}
|
||||
|
||||
hmaclist = sctp_alloc_hmaclist((uint16_t)shmac->shmac_number_of_idents);
|
||||
if (hmaclist == NULL) {
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, ENOMEM);
|
||||
@ -4589,6 +4599,7 @@ sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
|
||||
}
|
||||
SCTP_INP_RUNLOCK(inp);
|
||||
}
|
||||
|
||||
}
|
||||
break;
|
||||
}
|
||||
@ -5272,12 +5283,14 @@ sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
if ((paddrp->spp_flags & SPP_PMTUD_ENABLE) && (paddrp->spp_flags & SPP_PMTUD_DISABLE)) {
|
||||
if (stcb)
|
||||
SCTP_TCB_UNLOCK(stcb);
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
if (stcb != NULL) {
|
||||
/************************TCB SPECIFIC SET ******************/
|
||||
if (net != NULL) {
|
||||
@ -5413,6 +5426,7 @@ sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
|
||||
net->failure_threshold = paddrp->spp_pathmaxrxt;
|
||||
}
|
||||
}
|
||||
|
||||
if (paddrp->spp_flags & SPP_HB_ENABLE) {
|
||||
if (paddrp->spp_hbinterval != 0) {
|
||||
stcb->asoc.heart_beat_delay = paddrp->spp_hbinterval;
|
||||
@ -5523,6 +5537,7 @@ sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
|
||||
if (paddrp->spp_pathmaxrxt != 0) {
|
||||
inp->sctp_ep.def_net_failure = paddrp->spp_pathmaxrxt;
|
||||
}
|
||||
|
||||
if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO)
|
||||
inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = 0;
|
||||
else if (paddrp->spp_hbinterval != 0) {
|
||||
@ -5530,6 +5545,7 @@ sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
|
||||
paddrp->spp_hbinterval = SCTP_MAX_HB_INTERVAL;
|
||||
inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = MSEC_TO_TICKS(paddrp->spp_hbinterval);
|
||||
}
|
||||
|
||||
if (paddrp->spp_flags & SPP_HB_ENABLE) {
|
||||
if (paddrp->spp_flags & SPP_HB_TIME_IS_ZERO) {
|
||||
inp->sctp_ep.sctp_timeoutticks[SCTP_TIMER_HEARTBEAT] = 0;
|
||||
@ -6482,6 +6498,7 @@ sctp_setopt(struct socket *so, int optname, void *optval, size_t optsize,
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (stcb != NULL) {
|
||||
if (net != NULL) {
|
||||
net->port = encaps->sue_port;
|
||||
@ -6865,6 +6882,7 @@ sctp_connect(struct socket *so, struct sockaddr *addr, struct thread *p)
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL);
|
||||
return EINVAL;
|
||||
}
|
||||
|
||||
switch (addr->sa_family) {
|
||||
#ifdef INET6
|
||||
case AF_INET6:
|
||||
@ -6970,6 +6988,7 @@ sctp_connect(struct socket *so, struct sockaddr *addr, struct thread *p)
|
||||
error = EALREADY;
|
||||
goto out_now;
|
||||
}
|
||||
|
||||
vrf_id = inp->def_vrf_id;
|
||||
/* We are GOOD to go */
|
||||
stcb = sctp_aloc_assoc(inp, addr, &error, 0, vrf_id,
|
||||
@ -6996,6 +7015,7 @@ sctp_connect(struct socket *so, struct sockaddr *addr, struct thread *p)
|
||||
if (create_lock_on) {
|
||||
SCTP_ASOC_CREATE_UNLOCK(inp);
|
||||
}
|
||||
|
||||
SCTP_INP_DECR_REF(inp);
|
||||
return (error);
|
||||
}
|
||||
@ -7134,6 +7154,7 @@ sctp_listen(struct socket *so, int backlog, struct thread *p)
|
||||
return (EADDRINUSE);
|
||||
}
|
||||
}
|
||||
|
||||
if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
|
||||
(inp->sctp_flags & SCTP_PCB_FLAGS_CONNECTED)) {
|
||||
/* We are already connected AND the TCP model */
|
||||
@ -7336,6 +7357,7 @@ sctp_ingetaddr(struct socket *so, struct sockaddr **addr)
|
||||
SCTP_TCB_UNLOCK(stcb);
|
||||
goto notConn;
|
||||
}
|
||||
|
||||
vrf_id = inp->def_vrf_id;
|
||||
sctp_ifa = sctp_source_address_selection(inp,
|
||||
stcb,
|
||||
|
@ -341,12 +341,12 @@ int sctp_input(struct mbuf **, int *, int);
|
||||
void sctp_pathmtu_adjustment(struct sctp_tcb *, uint16_t);
|
||||
void sctp_drain(void);
|
||||
void sctp_init(void);
|
||||
void
|
||||
void
|
||||
sctp_notify(struct sctp_inpcb *, struct sctp_tcb *, struct sctp_nets *,
|
||||
uint8_t, uint8_t, uint16_t, uint32_t);
|
||||
int sctp_flush(struct socket *, int);
|
||||
int sctp_shutdown(struct socket *);
|
||||
int
|
||||
int
|
||||
sctp_bindx(struct socket *, int, struct sockaddr_storage *,
|
||||
int, int, struct proc *);
|
||||
|
||||
|
@ -1433,6 +1433,7 @@ sctp_iterator_work(struct sctp_iterator *it)
|
||||
atomic_add_int(&it->stcb->asoc.refcnt, -1);
|
||||
iteration_count = 0;
|
||||
}
|
||||
|
||||
/* run function on this one */
|
||||
(*it->function_assoc) (it->inp, it->stcb, it->pointer, it->val);
|
||||
|
||||
@ -1786,6 +1787,7 @@ sctp_timeout_handler(void *t)
|
||||
if ((stcb == NULL) || (inp == NULL)) {
|
||||
break;
|
||||
}
|
||||
|
||||
if (sctp_cookie_timer(inp, stcb, net)) {
|
||||
/* no need to unlock on tcb its gone */
|
||||
goto out_decr;
|
||||
@ -1981,6 +1983,7 @@ sctp_timeout_handler(void *t)
|
||||
if (inp) {
|
||||
SCTP_INP_DECR_REF(inp);
|
||||
}
|
||||
|
||||
out_no_decr:
|
||||
SCTPDBG(SCTP_DEBUG_TIMER1, "Timer now complete (type = %d)\n", type);
|
||||
CURVNET_RESTORE();
|
||||
@ -2496,9 +2499,8 @@ sctp_calculate_rto(struct sctp_tcb *stcb,
|
||||
}
|
||||
timevalsub(&now, old);
|
||||
/* store the current RTT in us */
|
||||
net->rtt = (uint64_t)1000000 *(uint64_t)now.tv_sec +
|
||||
(uint64_t)now.tv_usec;
|
||||
|
||||
net->rtt = (uint64_t)1000000 * (uint64_t)now.tv_sec +
|
||||
(uint64_t)now.tv_usec;
|
||||
/* compute rtt in ms */
|
||||
rtt = (int32_t)(net->rtt / 1000);
|
||||
if ((asoc->cc_functions.sctp_rtt_calculated) && (rtt_from_sack == SCTP_RTT_FROM_DATA)) {
|
||||
@ -2520,6 +2522,7 @@ sctp_calculate_rto(struct sctp_tcb *stcb,
|
||||
net->lan_type = SCTP_LAN_LOCAL;
|
||||
}
|
||||
}
|
||||
|
||||
/***************************/
|
||||
/* 2. update RTTVAR & SRTT */
|
||||
/***************************/
|
||||
@ -2958,6 +2961,7 @@ sctp_notify_send_failed(struct sctp_tcb *stcb, uint8_t sent, uint32_t error,
|
||||
/* event not enabled */
|
||||
return;
|
||||
}
|
||||
|
||||
if (sctp_stcb_is_feature_on(stcb->sctp_ep, stcb, SCTP_PCB_FLAGS_RECVNSENDFAILEVNT)) {
|
||||
notifhdr_len = sizeof(struct sctp_send_failed_event);
|
||||
} else {
|
||||
@ -3186,6 +3190,7 @@ sctp_notify_adaptation_layer(struct sctp_tcb *stcb)
|
||||
/* event not enabled */
|
||||
return;
|
||||
}
|
||||
|
||||
m_notify = sctp_get_mbuf_for_msg(sizeof(struct sctp_adaption_event), 0, M_NOWAIT, 1, MT_DATA);
|
||||
if (m_notify == NULL)
|
||||
/* no space left */
|
||||
@ -3242,6 +3247,7 @@ sctp_notify_partial_delivery_indication(struct sctp_tcb *stcb, uint32_t error,
|
||||
if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_SOCKET_CANT_READ) {
|
||||
return;
|
||||
}
|
||||
|
||||
m_notify = sctp_get_mbuf_for_msg(sizeof(struct sctp_pdapi_event), 0, M_NOWAIT, 1, MT_DATA);
|
||||
if (m_notify == NULL)
|
||||
/* no space left */
|
||||
@ -3350,6 +3356,7 @@ sctp_notify_shutdown_event(struct sctp_tcb *stcb)
|
||||
/* event not enabled */
|
||||
return;
|
||||
}
|
||||
|
||||
m_notify = sctp_get_mbuf_for_msg(sizeof(struct sctp_shutdown_event), 0, M_NOWAIT, 1, MT_DATA);
|
||||
if (m_notify == NULL)
|
||||
/* no space left */
|
||||
@ -3399,6 +3406,7 @@ sctp_notify_sender_dry_event(struct sctp_tcb *stcb,
|
||||
/* event not enabled */
|
||||
return;
|
||||
}
|
||||
|
||||
m_notify = sctp_get_mbuf_for_msg(sizeof(struct sctp_sender_dry_event), 0, M_NOWAIT, 1, MT_DATA);
|
||||
if (m_notify == NULL) {
|
||||
/* no space left */
|
||||
@ -3555,6 +3563,7 @@ sctp_notify_stream_reset(struct sctp_tcb *stcb,
|
||||
/* event not enabled */
|
||||
return;
|
||||
}
|
||||
|
||||
m_notify = sctp_get_mbuf_for_msg(MCLBYTES, 0, M_NOWAIT, 1, MT_DATA);
|
||||
if (m_notify == NULL)
|
||||
/* no space left */
|
||||
@ -4969,6 +4978,7 @@ sctp_find_ifa_in_ep(struct sctp_inpcb *inp, struct sockaddr *addr,
|
||||
if (holds_lock == 0) {
|
||||
SCTP_INP_RLOCK(inp);
|
||||
}
|
||||
|
||||
LIST_FOREACH(laddr, &inp->sctp_addr_list, sctp_nxt_addr) {
|
||||
if (laddr->ifa == NULL)
|
||||
continue;
|
||||
@ -5058,6 +5068,7 @@ sctp_find_ifa_by_addr(struct sockaddr *addr, uint32_t vrf_id, int holds_lock)
|
||||
SCTP_IPI_ADDR_RUNLOCK();
|
||||
return (NULL);
|
||||
}
|
||||
|
||||
hash_of_addr = sctp_get_ifa_hash_val(addr);
|
||||
|
||||
hash_head = &vrf->vrf_addr_hash[(hash_of_addr & vrf->vrf_addr_hashmark)];
|
||||
@ -5182,6 +5193,7 @@ sctp_user_rcvd(struct sctp_tcb *stcb, uint32_t *freed_so_far, int hold_rlock,
|
||||
if (so && r_unlocked && hold_rlock) {
|
||||
SCTP_INP_READ_LOCK(stcb->sctp_ep);
|
||||
}
|
||||
|
||||
SCTP_INP_DECR_REF(stcb->sctp_ep);
|
||||
no_lock:
|
||||
atomic_add_int(&stcb->asoc.refcnt, -1);
|
||||
@ -5231,6 +5243,7 @@ sctp_sorecvmsg(struct socket *so,
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTPUTIL, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
if (msg_flags) {
|
||||
in_flags = *msg_flags;
|
||||
if (in_flags & MSG_PEEK)
|
||||
@ -5274,6 +5287,8 @@ sctp_sorecvmsg(struct socket *so,
|
||||
sctp_misc_ints(SCTP_SORECV_ENTERPL,
|
||||
rwnd_req, block_allowed, so->so_rcv.sb_cc, (uint32_t)uio->uio_resid);
|
||||
}
|
||||
|
||||
|
||||
error = sblock(&so->so_rcv, (block_allowed ? SBL_WAIT : 0));
|
||||
if (error) {
|
||||
goto release_unlocked;
|
||||
@ -5383,6 +5398,7 @@ sctp_sorecvmsg(struct socket *so,
|
||||
hold_rlock = 0;
|
||||
goto restart;
|
||||
}
|
||||
|
||||
if ((control->length == 0) &&
|
||||
(control->do_not_ref_stcb)) {
|
||||
/*
|
||||
@ -5566,6 +5582,7 @@ sctp_sorecvmsg(struct socket *so,
|
||||
control->do_not_ref_stcb == 0) {
|
||||
stcb->asoc.strmin[control->sinfo_stream].delivery_started = 1;
|
||||
}
|
||||
|
||||
/* First lets get off the sinfo and sockaddr info */
|
||||
if ((sinfo != NULL) && (filling_sinfo != 0)) {
|
||||
sinfo->sinfo_stream = control->sinfo_stream;
|
||||
@ -5727,6 +5744,7 @@ sctp_sorecvmsg(struct socket *so,
|
||||
if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) {
|
||||
goto release;
|
||||
}
|
||||
|
||||
if ((control->do_not_ref_stcb == 0) && stcb &&
|
||||
stcb->asoc.state & SCTP_STATE_ABOUT_TO_BE_FREED) {
|
||||
no_rcv_needed = 1;
|
||||
@ -5939,6 +5957,7 @@ sctp_sorecvmsg(struct socket *so,
|
||||
if (so->so_rcv.sb_state & SBS_CANTRCVMORE) {
|
||||
goto release;
|
||||
}
|
||||
|
||||
if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE)
|
||||
goto release;
|
||||
|
||||
@ -6067,6 +6086,7 @@ sctp_sorecvmsg(struct socket *so,
|
||||
SOCKBUF_UNLOCK(&so->so_rcv);
|
||||
hold_sblock = 0;
|
||||
}
|
||||
|
||||
sbunlock(&so->so_rcv);
|
||||
sockbuf_lock = 0;
|
||||
|
||||
@ -6104,6 +6124,7 @@ sctp_sorecvmsg(struct socket *so,
|
||||
if (sockbuf_lock) {
|
||||
sbunlock(&so->so_rcv);
|
||||
}
|
||||
|
||||
if (freecnt_applied) {
|
||||
/*
|
||||
* The lock on the socket buffer protects us so the free
|
||||
@ -6701,6 +6722,7 @@ sctp_local_addr_count(struct sctp_tcb *stcb)
|
||||
SCTP_IPI_ADDR_RUNLOCK();
|
||||
return (0);
|
||||
}
|
||||
|
||||
if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
|
||||
/*
|
||||
* bound all case: go through all ifns on the vrf
|
||||
|
@ -72,11 +72,9 @@ int32_t
|
||||
uint32_t
|
||||
sctp_get_ifa_hash_val(struct sockaddr *addr);
|
||||
|
||||
struct sctp_ifa *
|
||||
sctp_find_ifa_in_ep(struct sctp_inpcb *inp, struct sockaddr *addr, int hold_lock);
|
||||
struct sctp_ifa *sctp_find_ifa_in_ep(struct sctp_inpcb *inp, struct sockaddr *addr, int hold_lock);
|
||||
|
||||
struct sctp_ifa *
|
||||
sctp_find_ifa_by_addr(struct sockaddr *addr, uint32_t vrf_id, int holds_lock);
|
||||
struct sctp_ifa *sctp_find_ifa_by_addr(struct sockaddr *addr, uint32_t vrf_id, int holds_lock);
|
||||
|
||||
uint32_t sctp_select_initial_TSN(struct sctp_pcb *);
|
||||
|
||||
@ -147,13 +145,11 @@ struct sctp_paramhdr *
|
||||
sctp_get_next_param(struct mbuf *, int,
|
||||
struct sctp_paramhdr *, int);
|
||||
|
||||
struct mbuf *
|
||||
sctp_add_pad_tombuf(struct mbuf *, int);
|
||||
struct mbuf *sctp_add_pad_tombuf(struct mbuf *, int);
|
||||
|
||||
struct mbuf *
|
||||
sctp_pad_lastmbuf(struct mbuf *, int, struct mbuf *);
|
||||
struct mbuf *sctp_pad_lastmbuf(struct mbuf *, int, struct mbuf *);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_ulp_notify(uint32_t, struct sctp_tcb *, uint32_t, void *, int
|
||||
#if !defined(__APPLE__) && !defined(SCTP_SO_LOCK_TESTING)
|
||||
SCTP_UNUSED
|
||||
@ -168,7 +164,7 @@ sctp_pull_off_control_to_new_inp(struct sctp_inpcb *old_inp,
|
||||
|
||||
void sctp_stop_timers_for_shutdown(struct sctp_tcb *);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_report_all_outbound(struct sctp_tcb *, uint16_t, int, int
|
||||
#if !defined(__APPLE__) && !defined(SCTP_SO_LOCK_TESTING)
|
||||
SCTP_UNUSED
|
||||
@ -177,7 +173,7 @@ sctp_report_all_outbound(struct sctp_tcb *, uint16_t, int, int
|
||||
|
||||
int sctp_expand_mapping_array(struct sctp_association *, uint32_t);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_abort_notification(struct sctp_tcb *, uint8_t, uint16_t,
|
||||
struct sctp_abort_chunk *, int
|
||||
#if !defined(__APPLE__) && !defined(SCTP_SO_LOCK_TESTING)
|
||||
@ -203,7 +199,7 @@ sctp_abort_an_association(struct sctp_inpcb *, struct sctp_tcb *,
|
||||
#endif
|
||||
);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_handle_ootb(struct mbuf *, int, int,
|
||||
struct sockaddr *, struct sockaddr *,
|
||||
struct sctphdr *, struct sctp_inpcb *,
|
||||
@ -211,7 +207,7 @@ sctp_handle_ootb(struct mbuf *, int, int,
|
||||
uint8_t, uint32_t, uint16_t,
|
||||
uint32_t, uint16_t);
|
||||
|
||||
int
|
||||
int
|
||||
sctp_connectx_helper_add(struct sctp_tcb *stcb, struct sockaddr *addr,
|
||||
int totaddr, int *error);
|
||||
|
||||
@ -224,8 +220,7 @@ int sctp_is_there_an_abort_here(struct mbuf *, int, uint32_t *);
|
||||
#ifdef INET6
|
||||
uint32_t sctp_is_same_scope(struct sockaddr_in6 *, struct sockaddr_in6 *);
|
||||
|
||||
struct sockaddr_in6 *
|
||||
sctp_recover_scope(struct sockaddr_in6 *, struct sockaddr_in6 *);
|
||||
struct sockaddr_in6 *sctp_recover_scope(struct sockaddr_in6 *, struct sockaddr_in6 *);
|
||||
|
||||
#define sctp_recover_scope_mac(addr, store) do { \
|
||||
if ((addr->sin6_family == AF_INET6) && \
|
||||
@ -258,11 +253,11 @@ sctp_release_pr_sctp_chunk(struct sctp_tcb *, struct sctp_tmit_chunk *,
|
||||
struct mbuf *sctp_generate_cause(uint16_t, char *);
|
||||
struct mbuf *sctp_generate_no_user_data_cause(uint32_t);
|
||||
|
||||
void
|
||||
void
|
||||
sctp_bindx_add_address(struct socket *so, struct sctp_inpcb *inp,
|
||||
struct sockaddr *sa, sctp_assoc_t assoc_id,
|
||||
uint32_t vrf_id, int *error, void *p);
|
||||
void
|
||||
void
|
||||
sctp_bindx_delete_address(struct sctp_inpcb *inp,
|
||||
struct sockaddr *sa, sctp_assoc_t assoc_id,
|
||||
uint32_t vrf_id, int *error);
|
||||
|
@ -271,6 +271,7 @@ sctp6_ctlinput(int cmd, struct sockaddr *pktdst, void *d)
|
||||
pktdst->sa_len != sizeof(struct sockaddr_in6)) {
|
||||
return;
|
||||
}
|
||||
|
||||
if ((unsigned)cmd >= PRC_NCMDS) {
|
||||
return;
|
||||
}
|
||||
@ -294,6 +295,7 @@ sctp6_ctlinput(int cmd, struct sockaddr *pktdst, void *d)
|
||||
if (ip6cp->ip6c_m == NULL) {
|
||||
return;
|
||||
}
|
||||
|
||||
/*
|
||||
* Check if we can safely examine the ports and the
|
||||
* verification tag of the SCTP common header.
|
||||
@ -302,6 +304,7 @@ sctp6_ctlinput(int cmd, struct sockaddr *pktdst, void *d)
|
||||
(int32_t)(ip6cp->ip6c_off + offsetof(struct sctphdr, checksum))) {
|
||||
return;
|
||||
}
|
||||
|
||||
/* Copy out the port numbers and the verification tag. */
|
||||
memset(&sh, 0, sizeof(sh));
|
||||
m_copydata(ip6cp->ip6c_m,
|
||||
@ -525,6 +528,7 @@ sctp6_attach(struct socket *so, int proto SCTP_UNUSED, struct thread *p SCTP_UNU
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP6_USRREQ, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
|
||||
error = SCTP_SORESERVE(so, SCTP_BASE_SYSCTL(sctp_sendspace), SCTP_BASE_SYSCTL(sctp_recvspace));
|
||||
if (error)
|
||||
@ -565,6 +569,7 @@ sctp6_bind(struct socket *so, struct sockaddr *addr, struct thread *p)
|
||||
SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP6_USRREQ, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
if (addr) {
|
||||
switch (addr->sa_family) {
|
||||
#ifdef INET
|
||||
@ -1101,6 +1106,7 @@ sctp6_in6getaddr(struct socket *so, struct sockaddr **nam)
|
||||
SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP6_USRREQ, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
/* allow v6 addresses precedence */
|
||||
error = sctp6_getaddr(so, nam);
|
||||
#ifdef INET
|
||||
@ -1136,6 +1142,7 @@ sctp6_getpeeraddr(struct socket *so, struct sockaddr **nam)
|
||||
SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP6_USRREQ, EINVAL);
|
||||
return (EINVAL);
|
||||
}
|
||||
|
||||
/* allow v6 addresses precedence */
|
||||
error = sctp6_peeraddr(so, nam);
|
||||
#ifdef INET
|
||||
|
@ -45,11 +45,11 @@ extern struct pr_usrreqs sctp6_usrreqs;
|
||||
|
||||
int sctp6_input(struct mbuf **, int *, int);
|
||||
int sctp6_input_with_port(struct mbuf **, int *, uint16_t);
|
||||
int
|
||||
int
|
||||
sctp6_output(struct sctp_inpcb *, struct mbuf *, struct sockaddr *,
|
||||
struct mbuf *, struct proc *);
|
||||
void sctp6_ctlinput(int, struct sockaddr *, void *);
|
||||
void
|
||||
void
|
||||
sctp6_notify(struct sctp_inpcb *, struct sctp_tcb *, struct sctp_nets *,
|
||||
uint8_t, uint8_t, uint32_t);
|
||||
#endif
|
||||
|
Loading…
Reference in New Issue
Block a user