1 /* SCTP kernel implementation
2 * (C) Copyright IBM Corp. 2001, 2004
3 * Copyright (c) 1999-2000 Cisco, Inc.
4 * Copyright (c) 1999-2001 Motorola, Inc.
5 * Copyright (c) 2001-2002 Intel Corp.
7 * This file is part of the SCTP kernel implementation
9 * These functions work with the state functions in sctp_sm_statefuns.c
10 * to implement the state operations. These functions implement the
11 * steps which require modifying existing data structures.
13 * This SCTP implementation is free software;
14 * you can redistribute it and/or modify it under the terms of
15 * the GNU General Public License as published by
16 * the Free Software Foundation; either version 2, or (at your option)
19 * This SCTP implementation is distributed in the hope that it
20 * will be useful, but WITHOUT ANY WARRANTY; without even the implied
21 * ************************
22 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
23 * See the GNU General Public License for more details.
25 * You should have received a copy of the GNU General Public License
26 * along with GNU CC; see the file COPYING. If not, write to
27 * the Free Software Foundation, 59 Temple Place - Suite 330,
28 * Boston, MA 02111-1307, USA.
30 * Please send any bug reports or fixes you make to the
32 * lksctp developers <lksctp-developers@lists.sourceforge.net>
34 * Or submit a bug report through the following website:
35 * http://www.sf.net/projects/lksctp
37 * Written or modified by:
38 * La Monte H.P. Yarroll <piggy@acm.org>
39 * Karl Knutson <karl@athena.chicago.il.us>
40 * C. Robin <chris@hundredacre.ac.uk>
41 * Jon Grimm <jgrimm@us.ibm.com>
42 * Xingang Guo <xingang.guo@intel.com>
43 * Dajiang Zhang <dajiang.zhang@nokia.com>
44 * Sridhar Samudrala <sri@us.ibm.com>
45 * Daisy Chang <daisyc@us.ibm.com>
46 * Ardelle Fan <ardelle.fan@intel.com>
47 * Kevin Gao <kevin.gao@intel.com>
49 * Any bugs reported given to us we will try to fix... any fixes shared will
50 * be incorporated into the next SCTP release.
53 #include <linux/types.h>
54 #include <linux/kernel.h>
56 #include <linux/ipv6.h>
57 #include <linux/net.h>
58 #include <linux/inet.h>
59 #include <linux/scatterlist.h>
60 #include <linux/crypto.h>
61 #include <linux/slab.h>
64 #include <linux/skbuff.h>
65 #include <linux/random.h> /* for get_random_bytes */
66 #include <net/sctp/sctp.h>
67 #include <net/sctp/sm.h>
70 struct sctp_chunk
*sctp_make_chunk(const struct sctp_association
*asoc
,
71 __u8 type
, __u8 flags
, int paylen
);
72 static sctp_cookie_param_t
*sctp_pack_cookie(const struct sctp_endpoint
*ep
,
73 const struct sctp_association
*asoc
,
74 const struct sctp_chunk
*init_chunk
,
76 const __u8
*raw_addrs
, int addrs_len
);
77 static int sctp_process_param(struct sctp_association
*asoc
,
78 union sctp_params param
,
79 const union sctp_addr
*peer_addr
,
81 static void *sctp_addto_param(struct sctp_chunk
*chunk
, int len
,
84 /* What was the inbound interface for this chunk? */
85 int sctp_chunk_iif(const struct sctp_chunk
*chunk
)
90 af
= sctp_get_af_specific(ipver2af(ip_hdr(chunk
->skb
)->version
));
92 iif
= af
->skb_iif(chunk
->skb
);
97 /* RFC 2960 3.3.2 Initiation (INIT) (1)
99 * Note 2: The ECN capable field is reserved for future use of
100 * Explicit Congestion Notification.
102 static const struct sctp_paramhdr ecap_param
= {
103 SCTP_PARAM_ECN_CAPABLE
,
104 cpu_to_be16(sizeof(struct sctp_paramhdr
)),
106 static const struct sctp_paramhdr prsctp_param
= {
107 SCTP_PARAM_FWD_TSN_SUPPORT
,
108 cpu_to_be16(sizeof(struct sctp_paramhdr
)),
111 /* A helper to initialize an op error inside a
112 * provided chunk, as most cause codes will be embedded inside an
115 void sctp_init_cause(struct sctp_chunk
*chunk
, __be16 cause_code
,
121 /* Cause code constants are now defined in network order. */
122 err
.cause
= cause_code
;
123 len
= sizeof(sctp_errhdr_t
) + paylen
;
124 err
.length
= htons(len
);
125 chunk
->subh
.err_hdr
= sctp_addto_chunk(chunk
, sizeof(sctp_errhdr_t
), &err
);
128 /* A helper to initialize an op error inside a
129 * provided chunk, as most cause codes will be embedded inside an
130 * abort chunk. Differs from sctp_init_cause in that it won't oops
131 * if there isn't enough space in the op error chunk
133 int sctp_init_cause_fixed(struct sctp_chunk
*chunk
, __be16 cause_code
,
139 /* Cause code constants are now defined in network order. */
140 err
.cause
= cause_code
;
141 len
= sizeof(sctp_errhdr_t
) + paylen
;
142 err
.length
= htons(len
);
144 if (skb_tailroom(chunk
->skb
) < len
)
146 chunk
->subh
.err_hdr
= sctp_addto_chunk_fixed(chunk
,
147 sizeof(sctp_errhdr_t
),
151 /* 3.3.2 Initiation (INIT) (1)
153 * This chunk is used to initiate a SCTP association between two
154 * endpoints. The format of the INIT chunk is shown below:
157 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
158 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
159 * | Type = 1 | Chunk Flags | Chunk Length |
160 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
162 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
163 * | Advertised Receiver Window Credit (a_rwnd) |
164 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
165 * | Number of Outbound Streams | Number of Inbound Streams |
166 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
168 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
170 * / Optional/Variable-Length Parameters /
172 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
175 * The INIT chunk contains the following parameters. Unless otherwise
176 * noted, each parameter MUST only be included once in the INIT chunk.
178 * Fixed Parameters Status
179 * ----------------------------------------------
180 * Initiate Tag Mandatory
181 * Advertised Receiver Window Credit Mandatory
182 * Number of Outbound Streams Mandatory
183 * Number of Inbound Streams Mandatory
184 * Initial TSN Mandatory
186 * Variable Parameters Status Type Value
187 * -------------------------------------------------------------
188 * IPv4 Address (Note 1) Optional 5
189 * IPv6 Address (Note 1) Optional 6
190 * Cookie Preservative Optional 9
191 * Reserved for ECN Capable (Note 2) Optional 32768 (0x8000)
192 * Host Name Address (Note 3) Optional 11
193 * Supported Address Types (Note 4) Optional 12
195 struct sctp_chunk
*sctp_make_init(const struct sctp_association
*asoc
,
196 const struct sctp_bind_addr
*bp
,
197 gfp_t gfp
, int vparam_len
)
200 union sctp_params addrs
;
202 struct sctp_chunk
*retval
= NULL
;
203 int num_types
, addrs_len
= 0;
204 struct sctp_sock
*sp
;
205 sctp_supported_addrs_param_t sat
;
207 sctp_adaptation_ind_param_t aiparam
;
208 sctp_supported_ext_param_t ext_param
;
211 sctp_paramhdr_t
*auth_chunks
= NULL
,
214 /* RFC 2960 3.3.2 Initiation (INIT) (1)
216 * Note 1: The INIT chunks can contain multiple addresses that
217 * can be IPv4 and/or IPv6 in any combination.
221 /* Convert the provided bind address list to raw format. */
222 addrs
= sctp_bind_addrs_to_raw(bp
, &addrs_len
, gfp
);
224 init
.init_tag
= htonl(asoc
->c
.my_vtag
);
225 init
.a_rwnd
= htonl(asoc
->rwnd
);
226 init
.num_outbound_streams
= htons(asoc
->c
.sinit_num_ostreams
);
227 init
.num_inbound_streams
= htons(asoc
->c
.sinit_max_instreams
);
228 init
.initial_tsn
= htonl(asoc
->c
.initial_tsn
);
230 /* How many address types are needed? */
231 sp
= sctp_sk(asoc
->base
.sk
);
232 num_types
= sp
->pf
->supported_addrs(sp
, types
);
234 chunksize
= sizeof(init
) + addrs_len
;
235 chunksize
+= WORD_ROUND(SCTP_SAT_LEN(num_types
));
236 chunksize
+= sizeof(ecap_param
);
238 if (sctp_prsctp_enable
)
239 chunksize
+= sizeof(prsctp_param
);
241 /* ADDIP: Section 4.2.7:
242 * An implementation supporting this extension [ADDIP] MUST list
243 * the ASCONF,the ASCONF-ACK, and the AUTH chunks in its INIT and
244 * INIT-ACK parameters.
246 if (sctp_addip_enable
) {
247 extensions
[num_ext
] = SCTP_CID_ASCONF
;
248 extensions
[num_ext
+1] = SCTP_CID_ASCONF_ACK
;
252 if (sp
->adaptation_ind
)
253 chunksize
+= sizeof(aiparam
);
255 chunksize
+= vparam_len
;
257 /* Account for AUTH related parameters */
258 if (sctp_auth_enable
) {
259 /* Add random parameter length*/
260 chunksize
+= sizeof(asoc
->c
.auth_random
);
262 /* Add HMACS parameter length if any were defined */
263 auth_hmacs
= (sctp_paramhdr_t
*)asoc
->c
.auth_hmacs
;
264 if (auth_hmacs
->length
)
265 chunksize
+= WORD_ROUND(ntohs(auth_hmacs
->length
));
269 /* Add CHUNKS parameter length */
270 auth_chunks
= (sctp_paramhdr_t
*)asoc
->c
.auth_chunks
;
271 if (auth_chunks
->length
)
272 chunksize
+= WORD_ROUND(ntohs(auth_chunks
->length
));
276 extensions
[num_ext
] = SCTP_CID_AUTH
;
280 /* If we have any extensions to report, account for that */
282 chunksize
+= WORD_ROUND(sizeof(sctp_supported_ext_param_t
) +
286 retval
= sctp_make_chunk(asoc
, SCTP_CID_INIT
, 0, chunksize
);
290 retval
->subh
.init_hdr
=
291 sctp_addto_chunk(retval
, sizeof(init
), &init
);
292 retval
->param_hdr
.v
=
293 sctp_addto_chunk(retval
, addrs_len
, addrs
.v
);
295 /* RFC 2960 3.3.2 Initiation (INIT) (1)
297 * Note 4: This parameter, when present, specifies all the
298 * address types the sending endpoint can support. The absence
299 * of this parameter indicates that the sending endpoint can
300 * support any address type.
302 sat
.param_hdr
.type
= SCTP_PARAM_SUPPORTED_ADDRESS_TYPES
;
303 sat
.param_hdr
.length
= htons(SCTP_SAT_LEN(num_types
));
304 sctp_addto_chunk(retval
, sizeof(sat
), &sat
);
305 sctp_addto_chunk(retval
, num_types
* sizeof(__u16
), &types
);
307 sctp_addto_chunk(retval
, sizeof(ecap_param
), &ecap_param
);
309 /* Add the supported extensions parameter. Be nice and add this
310 * fist before addiding the parameters for the extensions themselves
313 ext_param
.param_hdr
.type
= SCTP_PARAM_SUPPORTED_EXT
;
314 ext_param
.param_hdr
.length
=
315 htons(sizeof(sctp_supported_ext_param_t
) + num_ext
);
316 sctp_addto_chunk(retval
, sizeof(sctp_supported_ext_param_t
),
318 sctp_addto_param(retval
, num_ext
, extensions
);
321 if (sctp_prsctp_enable
)
322 sctp_addto_chunk(retval
, sizeof(prsctp_param
), &prsctp_param
);
324 if (sp
->adaptation_ind
) {
325 aiparam
.param_hdr
.type
= SCTP_PARAM_ADAPTATION_LAYER_IND
;
326 aiparam
.param_hdr
.length
= htons(sizeof(aiparam
));
327 aiparam
.adaptation_ind
= htonl(sp
->adaptation_ind
);
328 sctp_addto_chunk(retval
, sizeof(aiparam
), &aiparam
);
331 /* Add SCTP-AUTH chunks to the parameter list */
332 if (sctp_auth_enable
) {
333 sctp_addto_chunk(retval
, sizeof(asoc
->c
.auth_random
),
334 asoc
->c
.auth_random
);
336 sctp_addto_chunk(retval
, ntohs(auth_hmacs
->length
),
339 sctp_addto_chunk(retval
, ntohs(auth_chunks
->length
),
347 struct sctp_chunk
*sctp_make_init_ack(const struct sctp_association
*asoc
,
348 const struct sctp_chunk
*chunk
,
349 gfp_t gfp
, int unkparam_len
)
351 sctp_inithdr_t initack
;
352 struct sctp_chunk
*retval
;
353 union sctp_params addrs
;
354 struct sctp_sock
*sp
;
356 sctp_cookie_param_t
*cookie
;
359 sctp_adaptation_ind_param_t aiparam
;
360 sctp_supported_ext_param_t ext_param
;
363 sctp_paramhdr_t
*auth_chunks
= NULL
,
369 /* Note: there may be no addresses to embed. */
370 addrs
= sctp_bind_addrs_to_raw(&asoc
->base
.bind_addr
, &addrs_len
, gfp
);
372 initack
.init_tag
= htonl(asoc
->c
.my_vtag
);
373 initack
.a_rwnd
= htonl(asoc
->rwnd
);
374 initack
.num_outbound_streams
= htons(asoc
->c
.sinit_num_ostreams
);
375 initack
.num_inbound_streams
= htons(asoc
->c
.sinit_max_instreams
);
376 initack
.initial_tsn
= htonl(asoc
->c
.initial_tsn
);
378 cookie
= sctp_pack_cookie(asoc
->ep
, asoc
, chunk
, &cookie_len
,
383 /* Calculate the total size of allocation, include the reserved
384 * space for reporting unknown parameters if it is specified.
386 sp
= sctp_sk(asoc
->base
.sk
);
387 chunksize
= sizeof(initack
) + addrs_len
+ cookie_len
+ unkparam_len
;
389 /* Tell peer that we'll do ECN only if peer advertised such cap. */
390 if (asoc
->peer
.ecn_capable
)
391 chunksize
+= sizeof(ecap_param
);
393 if (asoc
->peer
.prsctp_capable
)
394 chunksize
+= sizeof(prsctp_param
);
396 if (asoc
->peer
.asconf_capable
) {
397 extensions
[num_ext
] = SCTP_CID_ASCONF
;
398 extensions
[num_ext
+1] = SCTP_CID_ASCONF_ACK
;
402 if (sp
->adaptation_ind
)
403 chunksize
+= sizeof(aiparam
);
405 if (asoc
->peer
.auth_capable
) {
406 auth_random
= (sctp_paramhdr_t
*)asoc
->c
.auth_random
;
407 chunksize
+= ntohs(auth_random
->length
);
409 auth_hmacs
= (sctp_paramhdr_t
*)asoc
->c
.auth_hmacs
;
410 if (auth_hmacs
->length
)
411 chunksize
+= WORD_ROUND(ntohs(auth_hmacs
->length
));
415 auth_chunks
= (sctp_paramhdr_t
*)asoc
->c
.auth_chunks
;
416 if (auth_chunks
->length
)
417 chunksize
+= WORD_ROUND(ntohs(auth_chunks
->length
));
421 extensions
[num_ext
] = SCTP_CID_AUTH
;
426 chunksize
+= WORD_ROUND(sizeof(sctp_supported_ext_param_t
) +
429 /* Now allocate and fill out the chunk. */
430 retval
= sctp_make_chunk(asoc
, SCTP_CID_INIT_ACK
, 0, chunksize
);
434 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
436 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
437 * HEARTBEAT ACK, * etc.) to the same destination transport
438 * address from which it received the DATA or control chunk
439 * to which it is replying.
441 * [INIT ACK back to where the INIT came from.]
443 retval
->transport
= chunk
->transport
;
445 retval
->subh
.init_hdr
=
446 sctp_addto_chunk(retval
, sizeof(initack
), &initack
);
447 retval
->param_hdr
.v
= sctp_addto_chunk(retval
, addrs_len
, addrs
.v
);
448 sctp_addto_chunk(retval
, cookie_len
, cookie
);
449 if (asoc
->peer
.ecn_capable
)
450 sctp_addto_chunk(retval
, sizeof(ecap_param
), &ecap_param
);
452 ext_param
.param_hdr
.type
= SCTP_PARAM_SUPPORTED_EXT
;
453 ext_param
.param_hdr
.length
=
454 htons(sizeof(sctp_supported_ext_param_t
) + num_ext
);
455 sctp_addto_chunk(retval
, sizeof(sctp_supported_ext_param_t
),
457 sctp_addto_param(retval
, num_ext
, extensions
);
459 if (asoc
->peer
.prsctp_capable
)
460 sctp_addto_chunk(retval
, sizeof(prsctp_param
), &prsctp_param
);
462 if (sp
->adaptation_ind
) {
463 aiparam
.param_hdr
.type
= SCTP_PARAM_ADAPTATION_LAYER_IND
;
464 aiparam
.param_hdr
.length
= htons(sizeof(aiparam
));
465 aiparam
.adaptation_ind
= htonl(sp
->adaptation_ind
);
466 sctp_addto_chunk(retval
, sizeof(aiparam
), &aiparam
);
469 if (asoc
->peer
.auth_capable
) {
470 sctp_addto_chunk(retval
, ntohs(auth_random
->length
),
473 sctp_addto_chunk(retval
, ntohs(auth_hmacs
->length
),
476 sctp_addto_chunk(retval
, ntohs(auth_chunks
->length
),
480 /* We need to remove the const qualifier at this point. */
481 retval
->asoc
= (struct sctp_association
*) asoc
;
490 /* 3.3.11 Cookie Echo (COOKIE ECHO) (10):
492 * This chunk is used only during the initialization of an association.
493 * It is sent by the initiator of an association to its peer to complete
494 * the initialization process. This chunk MUST precede any DATA chunk
495 * sent within the association, but MAY be bundled with one or more DATA
496 * chunks in the same packet.
499 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
500 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
501 * | Type = 10 |Chunk Flags | Length |
502 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
505 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
509 * Set to zero on transmit and ignored on receipt.
511 * Length: 16 bits (unsigned integer)
513 * Set to the size of the chunk in bytes, including the 4 bytes of
514 * the chunk header and the size of the Cookie.
516 * Cookie: variable size
518 * This field must contain the exact cookie received in the
519 * State Cookie parameter from the previous INIT ACK.
521 * An implementation SHOULD make the cookie as small as possible
522 * to insure interoperability.
524 struct sctp_chunk
*sctp_make_cookie_echo(const struct sctp_association
*asoc
,
525 const struct sctp_chunk
*chunk
)
527 struct sctp_chunk
*retval
;
531 cookie
= asoc
->peer
.cookie
;
532 cookie_len
= asoc
->peer
.cookie_len
;
534 /* Build a cookie echo chunk. */
535 retval
= sctp_make_chunk(asoc
, SCTP_CID_COOKIE_ECHO
, 0, cookie_len
);
538 retval
->subh
.cookie_hdr
=
539 sctp_addto_chunk(retval
, cookie_len
, cookie
);
541 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
543 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
544 * HEARTBEAT ACK, * etc.) to the same destination transport
545 * address from which it * received the DATA or control chunk
546 * to which it is replying.
548 * [COOKIE ECHO back to where the INIT ACK came from.]
551 retval
->transport
= chunk
->transport
;
557 /* 3.3.12 Cookie Acknowledgement (COOKIE ACK) (11):
559 * This chunk is used only during the initialization of an
560 * association. It is used to acknowledge the receipt of a COOKIE
561 * ECHO chunk. This chunk MUST precede any DATA or SACK chunk sent
562 * within the association, but MAY be bundled with one or more DATA
563 * chunks or SACK chunk in the same SCTP packet.
566 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
567 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
568 * | Type = 11 |Chunk Flags | Length = 4 |
569 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
571 * Chunk Flags: 8 bits
573 * Set to zero on transmit and ignored on receipt.
575 struct sctp_chunk
*sctp_make_cookie_ack(const struct sctp_association
*asoc
,
576 const struct sctp_chunk
*chunk
)
578 struct sctp_chunk
*retval
;
580 retval
= sctp_make_chunk(asoc
, SCTP_CID_COOKIE_ACK
, 0, 0);
582 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
584 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
585 * HEARTBEAT ACK, * etc.) to the same destination transport
586 * address from which it * received the DATA or control chunk
587 * to which it is replying.
589 * [COOKIE ACK back to where the COOKIE ECHO came from.]
592 retval
->transport
= chunk
->transport
;
598 * Appendix A: Explicit Congestion Notification:
601 * RFC 2481 details a specific bit for a sender to send in the header of
602 * its next outbound TCP segment to indicate to its peer that it has
603 * reduced its congestion window. This is termed the CWR bit. For
604 * SCTP the same indication is made by including the CWR chunk.
605 * This chunk contains one data element, i.e. the TSN number that
606 * was sent in the ECNE chunk. This element represents the lowest
607 * TSN number in the datagram that was originally marked with the
611 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
612 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
613 * | Chunk Type=13 | Flags=00000000| Chunk Length = 8 |
614 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
615 * | Lowest TSN Number |
616 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
618 * Note: The CWR is considered a Control chunk.
620 struct sctp_chunk
*sctp_make_cwr(const struct sctp_association
*asoc
,
621 const __u32 lowest_tsn
,
622 const struct sctp_chunk
*chunk
)
624 struct sctp_chunk
*retval
;
627 cwr
.lowest_tsn
= htonl(lowest_tsn
);
628 retval
= sctp_make_chunk(asoc
, SCTP_CID_ECN_CWR
, 0,
629 sizeof(sctp_cwrhdr_t
));
634 retval
->subh
.ecn_cwr_hdr
=
635 sctp_addto_chunk(retval
, sizeof(cwr
), &cwr
);
637 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
639 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
640 * HEARTBEAT ACK, * etc.) to the same destination transport
641 * address from which it * received the DATA or control chunk
642 * to which it is replying.
644 * [Report a reduced congestion window back to where the ECNE
648 retval
->transport
= chunk
->transport
;
654 /* Make an ECNE chunk. This is a congestion experienced report. */
655 struct sctp_chunk
*sctp_make_ecne(const struct sctp_association
*asoc
,
656 const __u32 lowest_tsn
)
658 struct sctp_chunk
*retval
;
661 ecne
.lowest_tsn
= htonl(lowest_tsn
);
662 retval
= sctp_make_chunk(asoc
, SCTP_CID_ECN_ECNE
, 0,
663 sizeof(sctp_ecnehdr_t
));
666 retval
->subh
.ecne_hdr
=
667 sctp_addto_chunk(retval
, sizeof(ecne
), &ecne
);
673 /* Make a DATA chunk for the given association from the provided
674 * parameters. However, do not populate the data payload.
676 struct sctp_chunk
*sctp_make_datafrag_empty(struct sctp_association
*asoc
,
677 const struct sctp_sndrcvinfo
*sinfo
,
678 int data_len
, __u8 flags
, __u16 ssn
)
680 struct sctp_chunk
*retval
;
681 struct sctp_datahdr dp
;
684 /* We assign the TSN as LATE as possible, not here when
685 * creating the chunk.
688 dp
.stream
= htons(sinfo
->sinfo_stream
);
689 dp
.ppid
= sinfo
->sinfo_ppid
;
691 /* Set the flags for an unordered send. */
692 if (sinfo
->sinfo_flags
& SCTP_UNORDERED
) {
693 flags
|= SCTP_DATA_UNORDERED
;
698 chunk_len
= sizeof(dp
) + data_len
;
699 retval
= sctp_make_chunk(asoc
, SCTP_CID_DATA
, flags
, chunk_len
);
703 retval
->subh
.data_hdr
= sctp_addto_chunk(retval
, sizeof(dp
), &dp
);
704 memcpy(&retval
->sinfo
, sinfo
, sizeof(struct sctp_sndrcvinfo
));
710 /* Create a selective ackowledgement (SACK) for the given
711 * association. This reports on which TSN's we've seen to date,
712 * including duplicates and gaps.
714 struct sctp_chunk
*sctp_make_sack(const struct sctp_association
*asoc
)
716 struct sctp_chunk
*retval
;
717 struct sctp_sackhdr sack
;
720 __u16 num_gabs
, num_dup_tsns
;
721 struct sctp_tsnmap
*map
= (struct sctp_tsnmap
*)&asoc
->peer
.tsn_map
;
722 struct sctp_gap_ack_block gabs
[SCTP_MAX_GABS
];
724 memset(gabs
, 0, sizeof(gabs
));
725 ctsn
= sctp_tsnmap_get_ctsn(map
);
726 SCTP_DEBUG_PRINTK("sackCTSNAck sent: 0x%x.\n", ctsn
);
728 /* How much room is needed in the chunk? */
729 num_gabs
= sctp_tsnmap_num_gabs(map
, gabs
);
730 num_dup_tsns
= sctp_tsnmap_num_dups(map
);
732 /* Initialize the SACK header. */
733 sack
.cum_tsn_ack
= htonl(ctsn
);
734 sack
.a_rwnd
= htonl(asoc
->a_rwnd
);
735 sack
.num_gap_ack_blocks
= htons(num_gabs
);
736 sack
.num_dup_tsns
= htons(num_dup_tsns
);
739 + sizeof(struct sctp_gap_ack_block
) * num_gabs
740 + sizeof(__u32
) * num_dup_tsns
;
742 /* Create the chunk. */
743 retval
= sctp_make_chunk(asoc
, SCTP_CID_SACK
, 0, len
);
747 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
749 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
750 * HEARTBEAT ACK, etc.) to the same destination transport
751 * address from which it received the DATA or control chunk to
752 * which it is replying. This rule should also be followed if
753 * the endpoint is bundling DATA chunks together with the
756 * However, when acknowledging multiple DATA chunks received
757 * in packets from different source addresses in a single
758 * SACK, the SACK chunk may be transmitted to one of the
759 * destination transport addresses from which the DATA or
760 * control chunks being acknowledged were received.
762 * [BUG: We do not implement the following paragraph.
763 * Perhaps we should remember the last transport we used for a
764 * SACK and avoid that (if possible) if we have seen any
765 * duplicates. --piggy]
767 * When a receiver of a duplicate DATA chunk sends a SACK to a
768 * multi- homed endpoint it MAY be beneficial to vary the
769 * destination address and not use the source address of the
770 * DATA chunk. The reason being that receiving a duplicate
771 * from a multi-homed endpoint might indicate that the return
772 * path (as specified in the source address of the DATA chunk)
773 * for the SACK is broken.
775 * [Send to the address from which we last received a DATA chunk.]
777 retval
->transport
= asoc
->peer
.last_data_from
;
779 retval
->subh
.sack_hdr
=
780 sctp_addto_chunk(retval
, sizeof(sack
), &sack
);
782 /* Add the gap ack block information. */
784 sctp_addto_chunk(retval
, sizeof(__u32
) * num_gabs
,
787 /* Add the duplicate TSN information. */
789 sctp_addto_chunk(retval
, sizeof(__u32
) * num_dup_tsns
,
790 sctp_tsnmap_get_dups(map
));
796 /* Make a SHUTDOWN chunk. */
797 struct sctp_chunk
*sctp_make_shutdown(const struct sctp_association
*asoc
,
798 const struct sctp_chunk
*chunk
)
800 struct sctp_chunk
*retval
;
801 sctp_shutdownhdr_t shut
;
804 ctsn
= sctp_tsnmap_get_ctsn(&asoc
->peer
.tsn_map
);
805 shut
.cum_tsn_ack
= htonl(ctsn
);
807 retval
= sctp_make_chunk(asoc
, SCTP_CID_SHUTDOWN
, 0,
808 sizeof(sctp_shutdownhdr_t
));
812 retval
->subh
.shutdown_hdr
=
813 sctp_addto_chunk(retval
, sizeof(shut
), &shut
);
816 retval
->transport
= chunk
->transport
;
821 struct sctp_chunk
*sctp_make_shutdown_ack(const struct sctp_association
*asoc
,
822 const struct sctp_chunk
*chunk
)
824 struct sctp_chunk
*retval
;
826 retval
= sctp_make_chunk(asoc
, SCTP_CID_SHUTDOWN_ACK
, 0, 0);
828 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
830 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
831 * HEARTBEAT ACK, * etc.) to the same destination transport
832 * address from which it * received the DATA or control chunk
833 * to which it is replying.
835 * [ACK back to where the SHUTDOWN came from.]
838 retval
->transport
= chunk
->transport
;
843 struct sctp_chunk
*sctp_make_shutdown_complete(
844 const struct sctp_association
*asoc
,
845 const struct sctp_chunk
*chunk
)
847 struct sctp_chunk
*retval
;
850 /* Set the T-bit if we have no association (vtag will be
853 flags
|= asoc
? 0 : SCTP_CHUNK_FLAG_T
;
855 retval
= sctp_make_chunk(asoc
, SCTP_CID_SHUTDOWN_COMPLETE
, flags
, 0);
857 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
859 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
860 * HEARTBEAT ACK, * etc.) to the same destination transport
861 * address from which it * received the DATA or control chunk
862 * to which it is replying.
864 * [Report SHUTDOWN COMPLETE back to where the SHUTDOWN ACK
868 retval
->transport
= chunk
->transport
;
873 /* Create an ABORT. Note that we set the T bit if we have no
874 * association, except when responding to an INIT (sctpimpguide 2.41).
876 struct sctp_chunk
*sctp_make_abort(const struct sctp_association
*asoc
,
877 const struct sctp_chunk
*chunk
,
880 struct sctp_chunk
*retval
;
883 /* Set the T-bit if we have no association and 'chunk' is not
884 * an INIT (vtag will be reflected).
887 if (chunk
&& chunk
->chunk_hdr
&&
888 chunk
->chunk_hdr
->type
== SCTP_CID_INIT
)
891 flags
= SCTP_CHUNK_FLAG_T
;
894 retval
= sctp_make_chunk(asoc
, SCTP_CID_ABORT
, flags
, hint
);
896 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
898 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
899 * HEARTBEAT ACK, * etc.) to the same destination transport
900 * address from which it * received the DATA or control chunk
901 * to which it is replying.
903 * [ABORT back to where the offender came from.]
906 retval
->transport
= chunk
->transport
;
911 /* Helper to create ABORT with a NO_USER_DATA error. */
912 struct sctp_chunk
*sctp_make_abort_no_data(
913 const struct sctp_association
*asoc
,
914 const struct sctp_chunk
*chunk
, __u32 tsn
)
916 struct sctp_chunk
*retval
;
919 retval
= sctp_make_abort(asoc
, chunk
, sizeof(sctp_errhdr_t
)
925 /* Put the tsn back into network byte order. */
926 payload
= htonl(tsn
);
927 sctp_init_cause(retval
, SCTP_ERROR_NO_DATA
, sizeof(payload
));
928 sctp_addto_chunk(retval
, sizeof(payload
), (const void *)&payload
);
930 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
932 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
933 * HEARTBEAT ACK, * etc.) to the same destination transport
934 * address from which it * received the DATA or control chunk
935 * to which it is replying.
937 * [ABORT back to where the offender came from.]
940 retval
->transport
= chunk
->transport
;
946 /* Helper to create ABORT with a SCTP_ERROR_USER_ABORT error. */
947 struct sctp_chunk
*sctp_make_abort_user(const struct sctp_association
*asoc
,
948 const struct msghdr
*msg
,
951 struct sctp_chunk
*retval
;
952 void *payload
= NULL
;
955 retval
= sctp_make_abort(asoc
, NULL
, sizeof(sctp_errhdr_t
) + paylen
);
960 /* Put the msg_iov together into payload. */
961 payload
= kmalloc(paylen
, GFP_KERNEL
);
965 err
= memcpy_fromiovec(payload
, msg
->msg_iov
, paylen
);
970 sctp_init_cause(retval
, SCTP_ERROR_USER_ABORT
, paylen
);
971 sctp_addto_chunk(retval
, paylen
, payload
);
981 sctp_chunk_free(retval
);
987 /* Append bytes to the end of a parameter. Will panic if chunk is not big
990 static void *sctp_addto_param(struct sctp_chunk
*chunk
, int len
,
994 int chunklen
= ntohs(chunk
->chunk_hdr
->length
);
996 target
= skb_put(chunk
->skb
, len
);
999 memcpy(target
, data
, len
);
1001 memset(target
, 0, len
);
1003 /* Adjust the chunk length field. */
1004 chunk
->chunk_hdr
->length
= htons(chunklen
+ len
);
1005 chunk
->chunk_end
= skb_tail_pointer(chunk
->skb
);
1010 /* Make an ABORT chunk with a PROTOCOL VIOLATION cause code. */
1011 struct sctp_chunk
*sctp_make_abort_violation(
1012 const struct sctp_association
*asoc
,
1013 const struct sctp_chunk
*chunk
,
1014 const __u8
*payload
,
1015 const size_t paylen
)
1017 struct sctp_chunk
*retval
;
1018 struct sctp_paramhdr phdr
;
1020 retval
= sctp_make_abort(asoc
, chunk
, sizeof(sctp_errhdr_t
) + paylen
1021 + sizeof(sctp_paramhdr_t
));
1025 sctp_init_cause(retval
, SCTP_ERROR_PROTO_VIOLATION
, paylen
1026 + sizeof(sctp_paramhdr_t
));
1028 phdr
.type
= htons(chunk
->chunk_hdr
->type
);
1029 phdr
.length
= chunk
->chunk_hdr
->length
;
1030 sctp_addto_chunk(retval
, paylen
, payload
);
1031 sctp_addto_param(retval
, sizeof(sctp_paramhdr_t
), &phdr
);
1037 struct sctp_chunk
*sctp_make_violation_paramlen(
1038 const struct sctp_association
*asoc
,
1039 const struct sctp_chunk
*chunk
,
1040 struct sctp_paramhdr
*param
)
1042 struct sctp_chunk
*retval
;
1043 static const char error
[] = "The following parameter had invalid length:";
1044 size_t payload_len
= sizeof(error
) + sizeof(sctp_errhdr_t
) +
1045 sizeof(sctp_paramhdr_t
);
1047 retval
= sctp_make_abort(asoc
, chunk
, payload_len
);
1051 sctp_init_cause(retval
, SCTP_ERROR_PROTO_VIOLATION
,
1052 sizeof(error
) + sizeof(sctp_paramhdr_t
));
1053 sctp_addto_chunk(retval
, sizeof(error
), error
);
1054 sctp_addto_param(retval
, sizeof(sctp_paramhdr_t
), param
);
1060 /* Make a HEARTBEAT chunk. */
1061 struct sctp_chunk
*sctp_make_heartbeat(const struct sctp_association
*asoc
,
1062 const struct sctp_transport
*transport
,
1063 const void *payload
, const size_t paylen
)
1065 struct sctp_chunk
*retval
= sctp_make_chunk(asoc
, SCTP_CID_HEARTBEAT
,
1071 /* Cast away the 'const', as this is just telling the chunk
1072 * what transport it belongs to.
1074 retval
->transport
= (struct sctp_transport
*) transport
;
1075 retval
->subh
.hbs_hdr
= sctp_addto_chunk(retval
, paylen
, payload
);
1081 struct sctp_chunk
*sctp_make_heartbeat_ack(const struct sctp_association
*asoc
,
1082 const struct sctp_chunk
*chunk
,
1083 const void *payload
, const size_t paylen
)
1085 struct sctp_chunk
*retval
;
1087 retval
= sctp_make_chunk(asoc
, SCTP_CID_HEARTBEAT_ACK
, 0, paylen
);
1091 retval
->subh
.hbs_hdr
= sctp_addto_chunk(retval
, paylen
, payload
);
1093 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
1095 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
1096 * HEARTBEAT ACK, * etc.) to the same destination transport
1097 * address from which it * received the DATA or control chunk
1098 * to which it is replying.
1100 * [HBACK back to where the HEARTBEAT came from.]
1103 retval
->transport
= chunk
->transport
;
1109 /* Create an Operation Error chunk with the specified space reserved.
1110 * This routine can be used for containing multiple causes in the chunk.
1112 static struct sctp_chunk
*sctp_make_op_error_space(
1113 const struct sctp_association
*asoc
,
1114 const struct sctp_chunk
*chunk
,
1117 struct sctp_chunk
*retval
;
1119 retval
= sctp_make_chunk(asoc
, SCTP_CID_ERROR
, 0,
1120 sizeof(sctp_errhdr_t
) + size
);
1124 /* RFC 2960 6.4 Multi-homed SCTP Endpoints
1126 * An endpoint SHOULD transmit reply chunks (e.g., SACK,
1127 * HEARTBEAT ACK, etc.) to the same destination transport
1128 * address from which it received the DATA or control chunk
1129 * to which it is replying.
1133 retval
->transport
= chunk
->transport
;
1139 /* Create an Operation Error chunk of a fixed size,
1140 * specifically, max(asoc->pathmtu, SCTP_DEFAULT_MAXSEGMENT)
1141 * This is a helper function to allocate an error chunk for
1142 * for those invalid parameter codes in which we may not want
1143 * to report all the errors, if the incomming chunk is large
1145 static inline struct sctp_chunk
*sctp_make_op_error_fixed(
1146 const struct sctp_association
*asoc
,
1147 const struct sctp_chunk
*chunk
)
1149 size_t size
= asoc
? asoc
->pathmtu
: 0;
1152 size
= SCTP_DEFAULT_MAXSEGMENT
;
1154 return sctp_make_op_error_space(asoc
, chunk
, size
);
1157 /* Create an Operation Error chunk. */
1158 struct sctp_chunk
*sctp_make_op_error(const struct sctp_association
*asoc
,
1159 const struct sctp_chunk
*chunk
,
1160 __be16 cause_code
, const void *payload
,
1161 size_t paylen
, size_t reserve_tail
)
1163 struct sctp_chunk
*retval
;
1165 retval
= sctp_make_op_error_space(asoc
, chunk
, paylen
+ reserve_tail
);
1169 sctp_init_cause(retval
, cause_code
, paylen
+ reserve_tail
);
1170 sctp_addto_chunk(retval
, paylen
, payload
);
1172 sctp_addto_param(retval
, reserve_tail
, NULL
);
1178 struct sctp_chunk
*sctp_make_auth(const struct sctp_association
*asoc
)
1180 struct sctp_chunk
*retval
;
1181 struct sctp_hmac
*hmac_desc
;
1182 struct sctp_authhdr auth_hdr
;
1185 /* Get the first hmac that the peer told us to use */
1186 hmac_desc
= sctp_auth_asoc_get_hmac(asoc
);
1187 if (unlikely(!hmac_desc
))
1190 retval
= sctp_make_chunk(asoc
, SCTP_CID_AUTH
, 0,
1191 hmac_desc
->hmac_len
+ sizeof(sctp_authhdr_t
));
1195 auth_hdr
.hmac_id
= htons(hmac_desc
->hmac_id
);
1196 auth_hdr
.shkey_id
= htons(asoc
->active_key_id
);
1198 retval
->subh
.auth_hdr
= sctp_addto_chunk(retval
, sizeof(sctp_authhdr_t
),
1201 hmac
= skb_put(retval
->skb
, hmac_desc
->hmac_len
);
1202 memset(hmac
, 0, hmac_desc
->hmac_len
);
1204 /* Adjust the chunk header to include the empty MAC */
1205 retval
->chunk_hdr
->length
=
1206 htons(ntohs(retval
->chunk_hdr
->length
) + hmac_desc
->hmac_len
);
1207 retval
->chunk_end
= skb_tail_pointer(retval
->skb
);
1213 /********************************************************************
1214 * 2nd Level Abstractions
1215 ********************************************************************/
1217 struct sctp_chunk
*sctp_chunkify(struct sk_buff
*skb
,
1218 const struct sctp_association
*asoc
,
1221 struct sctp_chunk
*retval
;
1223 retval
= kmem_cache_zalloc(sctp_chunk_cachep
, GFP_ATOMIC
);
1229 SCTP_DEBUG_PRINTK("chunkifying skb %p w/o an sk\n", skb
);
1232 INIT_LIST_HEAD(&retval
->list
);
1234 retval
->asoc
= (struct sctp_association
*)asoc
;
1235 retval
->has_tsn
= 0;
1236 retval
->has_ssn
= 0;
1237 retval
->rtt_in_progress
= 0;
1238 retval
->sent_at
= 0;
1239 retval
->singleton
= 1;
1240 retval
->end_of_packet
= 0;
1241 retval
->ecn_ce_done
= 0;
1242 retval
->pdiscard
= 0;
1244 /* sctpimpguide-05.txt Section 2.8.2
1245 * M1) Each time a new DATA chunk is transmitted
1246 * set the 'TSN.Missing.Report' count for that TSN to 0. The
1247 * 'TSN.Missing.Report' count will be used to determine missing chunks
1248 * and when to fast retransmit.
1250 retval
->tsn_missing_report
= 0;
1251 retval
->tsn_gap_acked
= 0;
1252 retval
->fast_retransmit
= SCTP_CAN_FRTX
;
1254 /* If this is a fragmented message, track all fragments
1255 * of the message (for SEND_FAILED).
1259 /* Polish the bead hole. */
1260 INIT_LIST_HEAD(&retval
->transmitted_list
);
1261 INIT_LIST_HEAD(&retval
->frag_list
);
1262 SCTP_DBG_OBJCNT_INC(chunk
);
1263 atomic_set(&retval
->refcnt
, 1);
1269 /* Set chunk->source and dest based on the IP header in chunk->skb. */
1270 void sctp_init_addrs(struct sctp_chunk
*chunk
, union sctp_addr
*src
,
1271 union sctp_addr
*dest
)
1273 memcpy(&chunk
->source
, src
, sizeof(union sctp_addr
));
1274 memcpy(&chunk
->dest
, dest
, sizeof(union sctp_addr
));
1277 /* Extract the source address from a chunk. */
1278 const union sctp_addr
*sctp_source(const struct sctp_chunk
*chunk
)
1280 /* If we have a known transport, use that. */
1281 if (chunk
->transport
) {
1282 return &chunk
->transport
->ipaddr
;
1284 /* Otherwise, extract it from the IP header. */
1285 return &chunk
->source
;
1289 /* Create a new chunk, setting the type and flags headers from the
1290 * arguments, reserving enough space for a 'paylen' byte payload.
1293 struct sctp_chunk
*sctp_make_chunk(const struct sctp_association
*asoc
,
1294 __u8 type
, __u8 flags
, int paylen
)
1296 struct sctp_chunk
*retval
;
1297 sctp_chunkhdr_t
*chunk_hdr
;
1298 struct sk_buff
*skb
;
1301 /* No need to allocate LL here, as this is only a chunk. */
1302 skb
= alloc_skb(WORD_ROUND(sizeof(sctp_chunkhdr_t
) + paylen
),
1307 /* Make room for the chunk header. */
1308 chunk_hdr
= (sctp_chunkhdr_t
*)skb_put(skb
, sizeof(sctp_chunkhdr_t
));
1309 chunk_hdr
->type
= type
;
1310 chunk_hdr
->flags
= flags
;
1311 chunk_hdr
->length
= htons(sizeof(sctp_chunkhdr_t
));
1313 sk
= asoc
? asoc
->base
.sk
: NULL
;
1314 retval
= sctp_chunkify(skb
, asoc
, sk
);
1320 retval
->chunk_hdr
= chunk_hdr
;
1321 retval
->chunk_end
= ((__u8
*)chunk_hdr
) + sizeof(struct sctp_chunkhdr
);
1323 /* Determine if the chunk needs to be authenticated */
1324 if (sctp_auth_send_cid(type
, asoc
))
1327 /* Set the skb to the belonging sock for accounting. */
1336 /* Release the memory occupied by a chunk. */
1337 static void sctp_chunk_destroy(struct sctp_chunk
*chunk
)
1339 BUG_ON(!list_empty(&chunk
->list
));
1340 list_del_init(&chunk
->transmitted_list
);
1342 /* Free the chunk skb data and the SCTP_chunk stub itself. */
1343 dev_kfree_skb(chunk
->skb
);
1345 SCTP_DBG_OBJCNT_DEC(chunk
);
1346 kmem_cache_free(sctp_chunk_cachep
, chunk
);
1349 /* Possibly, free the chunk. */
1350 void sctp_chunk_free(struct sctp_chunk
*chunk
)
1352 /* Release our reference on the message tracker. */
1354 sctp_datamsg_put(chunk
->msg
);
1356 sctp_chunk_put(chunk
);
1359 /* Grab a reference to the chunk. */
1360 void sctp_chunk_hold(struct sctp_chunk
*ch
)
1362 atomic_inc(&ch
->refcnt
);
1365 /* Release a reference to the chunk. */
1366 void sctp_chunk_put(struct sctp_chunk
*ch
)
1368 if (atomic_dec_and_test(&ch
->refcnt
))
1369 sctp_chunk_destroy(ch
);
1372 /* Append bytes to the end of a chunk. Will panic if chunk is not big
1375 void *sctp_addto_chunk(struct sctp_chunk
*chunk
, int len
, const void *data
)
1379 int chunklen
= ntohs(chunk
->chunk_hdr
->length
);
1380 int padlen
= WORD_ROUND(chunklen
) - chunklen
;
1382 padding
= skb_put(chunk
->skb
, padlen
);
1383 target
= skb_put(chunk
->skb
, len
);
1385 memset(padding
, 0, padlen
);
1386 memcpy(target
, data
, len
);
1388 /* Adjust the chunk length field. */
1389 chunk
->chunk_hdr
->length
= htons(chunklen
+ padlen
+ len
);
1390 chunk
->chunk_end
= skb_tail_pointer(chunk
->skb
);
1395 /* Append bytes to the end of a chunk. Returns NULL if there isn't sufficient
1396 * space in the chunk
1398 void *sctp_addto_chunk_fixed(struct sctp_chunk
*chunk
,
1399 int len
, const void *data
)
1401 if (skb_tailroom(chunk
->skb
) >= len
)
1402 return sctp_addto_chunk(chunk
, len
, data
);
1407 /* Append bytes from user space to the end of a chunk. Will panic if
1408 * chunk is not big enough.
1409 * Returns a kernel err value.
1411 int sctp_user_addto_chunk(struct sctp_chunk
*chunk
, int off
, int len
,
1417 /* Make room in chunk for data. */
1418 target
= skb_put(chunk
->skb
, len
);
1420 /* Copy data (whole iovec) into chunk */
1421 if ((err
= memcpy_fromiovecend(target
, data
, off
, len
)))
1424 /* Adjust the chunk length field. */
1425 chunk
->chunk_hdr
->length
=
1426 htons(ntohs(chunk
->chunk_hdr
->length
) + len
);
1427 chunk
->chunk_end
= skb_tail_pointer(chunk
->skb
);
1433 /* Helper function to assign a TSN if needed. This assumes that both
1434 * the data_hdr and association have already been assigned.
1436 void sctp_chunk_assign_ssn(struct sctp_chunk
*chunk
)
1438 struct sctp_datamsg
*msg
;
1439 struct sctp_chunk
*lchunk
;
1440 struct sctp_stream
*stream
;
1447 /* All fragments will be on the same stream */
1448 sid
= ntohs(chunk
->subh
.data_hdr
->stream
);
1449 stream
= &chunk
->asoc
->ssnmap
->out
;
1451 /* Now assign the sequence number to the entire message.
1452 * All fragments must have the same stream sequence number.
1455 list_for_each_entry(lchunk
, &msg
->chunks
, frag_list
) {
1456 if (lchunk
->chunk_hdr
->flags
& SCTP_DATA_UNORDERED
) {
1459 if (lchunk
->chunk_hdr
->flags
& SCTP_DATA_LAST_FRAG
)
1460 ssn
= sctp_ssn_next(stream
, sid
);
1462 ssn
= sctp_ssn_peek(stream
, sid
);
1465 lchunk
->subh
.data_hdr
->ssn
= htons(ssn
);
1466 lchunk
->has_ssn
= 1;
1470 /* Helper function to assign a TSN if needed. This assumes that both
1471 * the data_hdr and association have already been assigned.
1473 void sctp_chunk_assign_tsn(struct sctp_chunk
*chunk
)
1475 if (!chunk
->has_tsn
) {
1476 /* This is the last possible instant to
1479 chunk
->subh
.data_hdr
->tsn
=
1480 htonl(sctp_association_get_next_tsn(chunk
->asoc
));
1485 /* Create a CLOSED association to use with an incoming packet. */
1486 struct sctp_association
*sctp_make_temp_asoc(const struct sctp_endpoint
*ep
,
1487 struct sctp_chunk
*chunk
,
1490 struct sctp_association
*asoc
;
1491 struct sk_buff
*skb
;
1495 /* Create the bare association. */
1496 scope
= sctp_scope(sctp_source(chunk
));
1497 asoc
= sctp_association_new(ep
, ep
->base
.sk
, scope
, gfp
);
1502 /* Create an entry for the source address of the packet. */
1503 af
= sctp_get_af_specific(ipver2af(ip_hdr(skb
)->version
));
1506 af
->from_skb(&asoc
->c
.peer_addr
, skb
, 1);
1511 sctp_association_free(asoc
);
1515 /* Build a cookie representing asoc.
1516 * This INCLUDES the param header needed to put the cookie in the INIT ACK.
1518 static sctp_cookie_param_t
*sctp_pack_cookie(const struct sctp_endpoint
*ep
,
1519 const struct sctp_association
*asoc
,
1520 const struct sctp_chunk
*init_chunk
,
1522 const __u8
*raw_addrs
, int addrs_len
)
1524 sctp_cookie_param_t
*retval
;
1525 struct sctp_signed_cookie
*cookie
;
1526 struct scatterlist sg
;
1527 int headersize
, bodysize
;
1528 unsigned int keylen
;
1531 /* Header size is static data prior to the actual cookie, including
1534 headersize
= sizeof(sctp_paramhdr_t
) +
1535 (sizeof(struct sctp_signed_cookie
) -
1536 sizeof(struct sctp_cookie
));
1537 bodysize
= sizeof(struct sctp_cookie
)
1538 + ntohs(init_chunk
->chunk_hdr
->length
) + addrs_len
;
1540 /* Pad out the cookie to a multiple to make the signature
1541 * functions simpler to write.
1543 if (bodysize
% SCTP_COOKIE_MULTIPLE
)
1544 bodysize
+= SCTP_COOKIE_MULTIPLE
1545 - (bodysize
% SCTP_COOKIE_MULTIPLE
);
1546 *cookie_len
= headersize
+ bodysize
;
1548 /* Clear this memory since we are sending this data structure
1549 * out on the network.
1551 retval
= kzalloc(*cookie_len
, GFP_ATOMIC
);
1555 cookie
= (struct sctp_signed_cookie
*) retval
->body
;
1557 /* Set up the parameter header. */
1558 retval
->p
.type
= SCTP_PARAM_STATE_COOKIE
;
1559 retval
->p
.length
= htons(*cookie_len
);
1561 /* Copy the cookie part of the association itself. */
1562 cookie
->c
= asoc
->c
;
1563 /* Save the raw address list length in the cookie. */
1564 cookie
->c
.raw_addr_list_len
= addrs_len
;
1566 /* Remember PR-SCTP capability. */
1567 cookie
->c
.prsctp_capable
= asoc
->peer
.prsctp_capable
;
1569 /* Save adaptation indication in the cookie. */
1570 cookie
->c
.adaptation_ind
= asoc
->peer
.adaptation_ind
;
1572 /* Set an expiration time for the cookie. */
1573 do_gettimeofday(&cookie
->c
.expiration
);
1574 TIMEVAL_ADD(asoc
->cookie_life
, cookie
->c
.expiration
);
1576 /* Copy the peer's init packet. */
1577 memcpy(&cookie
->c
.peer_init
[0], init_chunk
->chunk_hdr
,
1578 ntohs(init_chunk
->chunk_hdr
->length
));
1580 /* Copy the raw local address list of the association. */
1581 memcpy((__u8
*)&cookie
->c
.peer_init
[0] +
1582 ntohs(init_chunk
->chunk_hdr
->length
), raw_addrs
, addrs_len
);
1584 if (sctp_sk(ep
->base
.sk
)->hmac
) {
1585 struct hash_desc desc
;
1587 /* Sign the message. */
1588 sg_init_one(&sg
, &cookie
->c
, bodysize
);
1589 keylen
= SCTP_SECRET_SIZE
;
1590 key
= (char *)ep
->secret_key
[ep
->current_key
];
1591 desc
.tfm
= sctp_sk(ep
->base
.sk
)->hmac
;
1594 if (crypto_hash_setkey(desc
.tfm
, key
, keylen
) ||
1595 crypto_hash_digest(&desc
, &sg
, bodysize
, cookie
->signature
))
1608 /* Unpack the cookie from COOKIE ECHO chunk, recreating the association. */
1609 struct sctp_association
*sctp_unpack_cookie(
1610 const struct sctp_endpoint
*ep
,
1611 const struct sctp_association
*asoc
,
1612 struct sctp_chunk
*chunk
, gfp_t gfp
,
1613 int *error
, struct sctp_chunk
**errp
)
1615 struct sctp_association
*retval
= NULL
;
1616 struct sctp_signed_cookie
*cookie
;
1617 struct sctp_cookie
*bear_cookie
;
1618 int headersize
, bodysize
, fixed_size
;
1619 __u8
*digest
= ep
->digest
;
1620 struct scatterlist sg
;
1621 unsigned int keylen
, len
;
1624 struct sk_buff
*skb
= chunk
->skb
;
1626 struct hash_desc desc
;
1628 /* Header size is static data prior to the actual cookie, including
1631 headersize
= sizeof(sctp_chunkhdr_t
) +
1632 (sizeof(struct sctp_signed_cookie
) -
1633 sizeof(struct sctp_cookie
));
1634 bodysize
= ntohs(chunk
->chunk_hdr
->length
) - headersize
;
1635 fixed_size
= headersize
+ sizeof(struct sctp_cookie
);
1637 /* Verify that the chunk looks like it even has a cookie.
1638 * There must be enough room for our cookie and our peer's
1641 len
= ntohs(chunk
->chunk_hdr
->length
);
1642 if (len
< fixed_size
+ sizeof(struct sctp_chunkhdr
))
1645 /* Verify that the cookie has been padded out. */
1646 if (bodysize
% SCTP_COOKIE_MULTIPLE
)
1649 /* Process the cookie. */
1650 cookie
= chunk
->subh
.cookie_hdr
;
1651 bear_cookie
= &cookie
->c
;
1653 if (!sctp_sk(ep
->base
.sk
)->hmac
)
1656 /* Check the signature. */
1657 keylen
= SCTP_SECRET_SIZE
;
1658 sg_init_one(&sg
, bear_cookie
, bodysize
);
1659 key
= (char *)ep
->secret_key
[ep
->current_key
];
1660 desc
.tfm
= sctp_sk(ep
->base
.sk
)->hmac
;
1663 memset(digest
, 0x00, SCTP_SIGNATURE_SIZE
);
1664 if (crypto_hash_setkey(desc
.tfm
, key
, keylen
) ||
1665 crypto_hash_digest(&desc
, &sg
, bodysize
, digest
)) {
1666 *error
= -SCTP_IERROR_NOMEM
;
1670 if (memcmp(digest
, cookie
->signature
, SCTP_SIGNATURE_SIZE
)) {
1671 /* Try the previous key. */
1672 key
= (char *)ep
->secret_key
[ep
->last_key
];
1673 memset(digest
, 0x00, SCTP_SIGNATURE_SIZE
);
1674 if (crypto_hash_setkey(desc
.tfm
, key
, keylen
) ||
1675 crypto_hash_digest(&desc
, &sg
, bodysize
, digest
)) {
1676 *error
= -SCTP_IERROR_NOMEM
;
1680 if (memcmp(digest
, cookie
->signature
, SCTP_SIGNATURE_SIZE
)) {
1681 /* Yikes! Still bad signature! */
1682 *error
= -SCTP_IERROR_BAD_SIG
;
1688 /* IG Section 2.35.2:
1689 * 3) Compare the port numbers and the verification tag contained
1690 * within the COOKIE ECHO chunk to the actual port numbers and the
1691 * verification tag within the SCTP common header of the received
1692 * packet. If these values do not match the packet MUST be silently
1695 if (ntohl(chunk
->sctp_hdr
->vtag
) != bear_cookie
->my_vtag
) {
1696 *error
= -SCTP_IERROR_BAD_TAG
;
1700 if (chunk
->sctp_hdr
->source
!= bear_cookie
->peer_addr
.v4
.sin_port
||
1701 ntohs(chunk
->sctp_hdr
->dest
) != bear_cookie
->my_port
) {
1702 *error
= -SCTP_IERROR_BAD_PORTS
;
1706 /* Check to see if the cookie is stale. If there is already
1707 * an association, there is no need to check cookie's expiration
1708 * for init collision case of lost COOKIE ACK.
1709 * If skb has been timestamped, then use the stamp, otherwise
1710 * use current time. This introduces a small possibility that
1711 * that a cookie may be considered expired, but his would only slow
1712 * down the new association establishment instead of every packet.
1714 if (sock_flag(ep
->base
.sk
, SOCK_TIMESTAMP
))
1715 skb_get_timestamp(skb
, &tv
);
1717 do_gettimeofday(&tv
);
1719 if (!asoc
&& tv_lt(bear_cookie
->expiration
, tv
)) {
1721 * Section 3.3.10.3 Stale Cookie Error (3)
1725 * Stale Cookie Error: Indicates the receipt of a valid State
1726 * Cookie that has expired.
1728 len
= ntohs(chunk
->chunk_hdr
->length
);
1729 *errp
= sctp_make_op_error_space(asoc
, chunk
, len
);
1731 suseconds_t usecs
= (tv
.tv_sec
-
1732 bear_cookie
->expiration
.tv_sec
) * 1000000L +
1733 tv
.tv_usec
- bear_cookie
->expiration
.tv_usec
;
1734 __be32 n
= htonl(usecs
);
1736 sctp_init_cause(*errp
, SCTP_ERROR_STALE_COOKIE
,
1738 sctp_addto_chunk(*errp
, sizeof(n
), &n
);
1739 *error
= -SCTP_IERROR_STALE_COOKIE
;
1741 *error
= -SCTP_IERROR_NOMEM
;
1746 /* Make a new base association. */
1747 scope
= sctp_scope(sctp_source(chunk
));
1748 retval
= sctp_association_new(ep
, ep
->base
.sk
, scope
, gfp
);
1750 *error
= -SCTP_IERROR_NOMEM
;
1754 /* Set up our peer's port number. */
1755 retval
->peer
.port
= ntohs(chunk
->sctp_hdr
->source
);
1757 /* Populate the association from the cookie. */
1758 memcpy(&retval
->c
, bear_cookie
, sizeof(*bear_cookie
));
1760 if (sctp_assoc_set_bind_addr_from_cookie(retval
, bear_cookie
,
1762 *error
= -SCTP_IERROR_NOMEM
;
1766 /* Also, add the destination address. */
1767 if (list_empty(&retval
->base
.bind_addr
.address_list
)) {
1768 sctp_add_bind_addr(&retval
->base
.bind_addr
, &chunk
->dest
,
1769 SCTP_ADDR_SRC
, GFP_ATOMIC
);
1772 retval
->next_tsn
= retval
->c
.initial_tsn
;
1773 retval
->ctsn_ack_point
= retval
->next_tsn
- 1;
1774 retval
->addip_serial
= retval
->c
.initial_tsn
;
1775 retval
->adv_peer_ack_point
= retval
->ctsn_ack_point
;
1776 retval
->peer
.prsctp_capable
= retval
->c
.prsctp_capable
;
1777 retval
->peer
.adaptation_ind
= retval
->c
.adaptation_ind
;
1779 /* The INIT stuff will be done by the side effects. */
1784 sctp_association_free(retval
);
1789 /* Yikes! The packet is either corrupt or deliberately
1792 *error
= -SCTP_IERROR_MALFORMED
;
1796 /********************************************************************
1797 * 3rd Level Abstractions
1798 ********************************************************************/
1800 struct __sctp_missing
{
1806 * Report a missing mandatory parameter.
1808 static int sctp_process_missing_param(const struct sctp_association
*asoc
,
1809 sctp_param_t paramtype
,
1810 struct sctp_chunk
*chunk
,
1811 struct sctp_chunk
**errp
)
1813 struct __sctp_missing report
;
1816 len
= WORD_ROUND(sizeof(report
));
1818 /* Make an ERROR chunk, preparing enough room for
1819 * returning multiple unknown parameters.
1822 *errp
= sctp_make_op_error_space(asoc
, chunk
, len
);
1825 report
.num_missing
= htonl(1);
1826 report
.type
= paramtype
;
1827 sctp_init_cause(*errp
, SCTP_ERROR_MISS_PARAM
,
1829 sctp_addto_chunk(*errp
, sizeof(report
), &report
);
1832 /* Stop processing this chunk. */
1836 /* Report an Invalid Mandatory Parameter. */
1837 static int sctp_process_inv_mandatory(const struct sctp_association
*asoc
,
1838 struct sctp_chunk
*chunk
,
1839 struct sctp_chunk
**errp
)
1841 /* Invalid Mandatory Parameter Error has no payload. */
1844 *errp
= sctp_make_op_error_space(asoc
, chunk
, 0);
1847 sctp_init_cause(*errp
, SCTP_ERROR_INV_PARAM
, 0);
1849 /* Stop processing this chunk. */
1853 static int sctp_process_inv_paramlength(const struct sctp_association
*asoc
,
1854 struct sctp_paramhdr
*param
,
1855 const struct sctp_chunk
*chunk
,
1856 struct sctp_chunk
**errp
)
1858 /* This is a fatal error. Any accumulated non-fatal errors are
1862 sctp_chunk_free(*errp
);
1864 /* Create an error chunk and fill it in with our payload. */
1865 *errp
= sctp_make_violation_paramlen(asoc
, chunk
, param
);
1871 /* Do not attempt to handle the HOST_NAME parm. However, do
1872 * send back an indicator to the peer.
1874 static int sctp_process_hn_param(const struct sctp_association
*asoc
,
1875 union sctp_params param
,
1876 struct sctp_chunk
*chunk
,
1877 struct sctp_chunk
**errp
)
1879 __u16 len
= ntohs(param
.p
->length
);
1881 /* Processing of the HOST_NAME parameter will generate an
1882 * ABORT. If we've accumulated any non-fatal errors, they
1883 * would be unrecognized parameters and we should not include
1884 * them in the ABORT.
1887 sctp_chunk_free(*errp
);
1889 *errp
= sctp_make_op_error_space(asoc
, chunk
, len
);
1892 sctp_init_cause(*errp
, SCTP_ERROR_DNS_FAILED
, len
);
1893 sctp_addto_chunk(*errp
, len
, param
.v
);
1896 /* Stop processing this chunk. */
1900 static int sctp_verify_ext_param(union sctp_params param
)
1902 __u16 num_ext
= ntohs(param
.p
->length
) - sizeof(sctp_paramhdr_t
);
1904 int have_asconf
= 0;
1907 for (i
= 0; i
< num_ext
; i
++) {
1908 switch (param
.ext
->chunks
[i
]) {
1912 case SCTP_CID_ASCONF
:
1913 case SCTP_CID_ASCONF_ACK
:
1919 /* ADD-IP Security: The draft requires us to ABORT or ignore the
1920 * INIT/INIT-ACK if ADD-IP is listed, but AUTH is not. Do this
1921 * only if ADD-IP is turned on and we are not backward-compatible
1924 if (sctp_addip_noauth
)
1927 if (sctp_addip_enable
&& !have_auth
&& have_asconf
)
1933 static void sctp_process_ext_param(struct sctp_association
*asoc
,
1934 union sctp_params param
)
1936 __u16 num_ext
= ntohs(param
.p
->length
) - sizeof(sctp_paramhdr_t
);
1939 for (i
= 0; i
< num_ext
; i
++) {
1940 switch (param
.ext
->chunks
[i
]) {
1941 case SCTP_CID_FWD_TSN
:
1942 if (sctp_prsctp_enable
&&
1943 !asoc
->peer
.prsctp_capable
)
1944 asoc
->peer
.prsctp_capable
= 1;
1947 /* if the peer reports AUTH, assume that he
1950 if (sctp_auth_enable
)
1951 asoc
->peer
.auth_capable
= 1;
1953 case SCTP_CID_ASCONF
:
1954 case SCTP_CID_ASCONF_ACK
:
1955 if (sctp_addip_enable
)
1956 asoc
->peer
.asconf_capable
= 1;
1964 /* RFC 3.2.1 & the Implementers Guide 2.2.
1966 * The Parameter Types are encoded such that the
1967 * highest-order two bits specify the action that must be
1968 * taken if the processing endpoint does not recognize the
1971 * 00 - Stop processing this parameter; do not process any further
1972 * parameters within this chunk
1974 * 01 - Stop processing this parameter, do not process any further
1975 * parameters within this chunk, and report the unrecognized
1976 * parameter in an 'Unrecognized Parameter' ERROR chunk.
1978 * 10 - Skip this parameter and continue processing.
1980 * 11 - Skip this parameter and continue processing but
1981 * report the unrecognized parameter in an
1982 * 'Unrecognized Parameter' ERROR chunk.
1985 * SCTP_IERROR_NO_ERROR - continue with the chunk
1986 * SCTP_IERROR_ERROR - stop and report an error.
1987 * SCTP_IERROR_NOMEME - out of memory.
1989 static sctp_ierror_t
sctp_process_unk_param(const struct sctp_association
*asoc
,
1990 union sctp_params param
,
1991 struct sctp_chunk
*chunk
,
1992 struct sctp_chunk
**errp
)
1994 int retval
= SCTP_IERROR_NO_ERROR
;
1996 switch (param
.p
->type
& SCTP_PARAM_ACTION_MASK
) {
1997 case SCTP_PARAM_ACTION_DISCARD
:
1998 retval
= SCTP_IERROR_ERROR
;
2000 case SCTP_PARAM_ACTION_SKIP
:
2002 case SCTP_PARAM_ACTION_DISCARD_ERR
:
2003 retval
= SCTP_IERROR_ERROR
;
2005 case SCTP_PARAM_ACTION_SKIP_ERR
:
2006 /* Make an ERROR chunk, preparing enough room for
2007 * returning multiple unknown parameters.
2010 *errp
= sctp_make_op_error_fixed(asoc
, chunk
);
2013 sctp_init_cause_fixed(*errp
, SCTP_ERROR_UNKNOWN_PARAM
,
2014 WORD_ROUND(ntohs(param
.p
->length
)));
2015 sctp_addto_chunk_fixed(*errp
,
2016 WORD_ROUND(ntohs(param
.p
->length
)),
2019 /* If there is no memory for generating the ERROR
2020 * report as specified, an ABORT will be triggered
2021 * to the peer and the association won't be
2024 retval
= SCTP_IERROR_NOMEM
;
2034 /* Verify variable length parameters
2036 * SCTP_IERROR_ABORT - trigger an ABORT
2037 * SCTP_IERROR_NOMEM - out of memory (abort)
2038 * SCTP_IERROR_ERROR - stop processing, trigger an ERROR
2039 * SCTP_IERROR_NO_ERROR - continue with the chunk
2041 static sctp_ierror_t
sctp_verify_param(const struct sctp_association
*asoc
,
2042 union sctp_params param
,
2044 struct sctp_chunk
*chunk
,
2045 struct sctp_chunk
**err_chunk
)
2047 struct sctp_hmac_algo_param
*hmacs
;
2048 int retval
= SCTP_IERROR_NO_ERROR
;
2049 __u16 n_elt
, id
= 0;
2053 switch (param
.p
->type
) {
2054 case SCTP_PARAM_IPV4_ADDRESS
:
2055 case SCTP_PARAM_IPV6_ADDRESS
:
2056 case SCTP_PARAM_COOKIE_PRESERVATIVE
:
2057 case SCTP_PARAM_SUPPORTED_ADDRESS_TYPES
:
2058 case SCTP_PARAM_STATE_COOKIE
:
2059 case SCTP_PARAM_HEARTBEAT_INFO
:
2060 case SCTP_PARAM_UNRECOGNIZED_PARAMETERS
:
2061 case SCTP_PARAM_ECN_CAPABLE
:
2062 case SCTP_PARAM_ADAPTATION_LAYER_IND
:
2065 case SCTP_PARAM_SUPPORTED_EXT
:
2066 if (!sctp_verify_ext_param(param
))
2067 return SCTP_IERROR_ABORT
;
2070 case SCTP_PARAM_SET_PRIMARY
:
2071 if (sctp_addip_enable
)
2075 case SCTP_PARAM_HOST_NAME_ADDRESS
:
2076 /* Tell the peer, we won't support this param. */
2077 sctp_process_hn_param(asoc
, param
, chunk
, err_chunk
);
2078 retval
= SCTP_IERROR_ABORT
;
2081 case SCTP_PARAM_FWD_TSN_SUPPORT
:
2082 if (sctp_prsctp_enable
)
2086 case SCTP_PARAM_RANDOM
:
2087 if (!sctp_auth_enable
)
2090 /* SCTP-AUTH: Secion 6.1
2091 * If the random number is not 32 byte long the association
2092 * MUST be aborted. The ABORT chunk SHOULD contain the error
2093 * cause 'Protocol Violation'.
2095 if (SCTP_AUTH_RANDOM_LENGTH
!=
2096 ntohs(param
.p
->length
) - sizeof(sctp_paramhdr_t
)) {
2097 sctp_process_inv_paramlength(asoc
, param
.p
,
2099 retval
= SCTP_IERROR_ABORT
;
2103 case SCTP_PARAM_CHUNKS
:
2104 if (!sctp_auth_enable
)
2107 /* SCTP-AUTH: Section 3.2
2108 * The CHUNKS parameter MUST be included once in the INIT or
2109 * INIT-ACK chunk if the sender wants to receive authenticated
2110 * chunks. Its maximum length is 260 bytes.
2112 if (260 < ntohs(param
.p
->length
)) {
2113 sctp_process_inv_paramlength(asoc
, param
.p
,
2115 retval
= SCTP_IERROR_ABORT
;
2119 case SCTP_PARAM_HMAC_ALGO
:
2120 if (!sctp_auth_enable
)
2123 hmacs
= (struct sctp_hmac_algo_param
*)param
.p
;
2124 n_elt
= (ntohs(param
.p
->length
) - sizeof(sctp_paramhdr_t
)) >> 1;
2126 /* SCTP-AUTH: Section 6.1
2127 * The HMAC algorithm based on SHA-1 MUST be supported and
2128 * included in the HMAC-ALGO parameter.
2130 for (i
= 0; i
< n_elt
; i
++) {
2131 id
= ntohs(hmacs
->hmac_ids
[i
]);
2133 if (id
== SCTP_AUTH_HMAC_ID_SHA1
)
2137 if (id
!= SCTP_AUTH_HMAC_ID_SHA1
) {
2138 sctp_process_inv_paramlength(asoc
, param
.p
, chunk
,
2140 retval
= SCTP_IERROR_ABORT
;
2145 SCTP_DEBUG_PRINTK("Unrecognized param: %d for chunk %d.\n",
2146 ntohs(param
.p
->type
), cid
);
2147 retval
= sctp_process_unk_param(asoc
, param
, chunk
, err_chunk
);
2153 /* Verify the INIT packet before we process it. */
2154 int sctp_verify_init(const struct sctp_association
*asoc
,
2156 sctp_init_chunk_t
*peer_init
,
2157 struct sctp_chunk
*chunk
,
2158 struct sctp_chunk
**errp
)
2160 union sctp_params param
;
2164 /* Verify stream values are non-zero. */
2165 if ((0 == peer_init
->init_hdr
.num_outbound_streams
) ||
2166 (0 == peer_init
->init_hdr
.num_inbound_streams
) ||
2167 (0 == peer_init
->init_hdr
.init_tag
) ||
2168 (SCTP_DEFAULT_MINWINDOW
> ntohl(peer_init
->init_hdr
.a_rwnd
))) {
2170 return sctp_process_inv_mandatory(asoc
, chunk
, errp
);
2173 /* Check for missing mandatory parameters. */
2174 sctp_walk_params(param
, peer_init
, init_hdr
.params
) {
2176 if (SCTP_PARAM_STATE_COOKIE
== param
.p
->type
)
2179 } /* for (loop through all parameters) */
2181 /* There is a possibility that a parameter length was bad and
2182 * in that case we would have stoped walking the parameters.
2183 * The current param.p would point at the bad one.
2184 * Current consensus on the mailing list is to generate a PROTOCOL
2185 * VIOLATION error. We build the ERROR chunk here and let the normal
2186 * error handling code build and send the packet.
2188 if (param
.v
!= (void*)chunk
->chunk_end
)
2189 return sctp_process_inv_paramlength(asoc
, param
.p
, chunk
, errp
);
2191 /* The only missing mandatory param possible today is
2192 * the state cookie for an INIT-ACK chunk.
2194 if ((SCTP_CID_INIT_ACK
== cid
) && !has_cookie
)
2195 return sctp_process_missing_param(asoc
, SCTP_PARAM_STATE_COOKIE
,
2198 /* Verify all the variable length parameters */
2199 sctp_walk_params(param
, peer_init
, init_hdr
.params
) {
2201 result
= sctp_verify_param(asoc
, param
, cid
, chunk
, errp
);
2203 case SCTP_IERROR_ABORT
:
2204 case SCTP_IERROR_NOMEM
:
2206 case SCTP_IERROR_ERROR
:
2208 case SCTP_IERROR_NO_ERROR
:
2213 } /* for (loop through all parameters) */
2218 int sctp_process_init(struct sctp_association
*asoc
, sctp_cid_t cid
,
2219 const union sctp_addr
*peer_addr
,
2220 sctp_init_chunk_t
*peer_init
, gfp_t gfp
)
2222 union sctp_params param
;
2223 struct sctp_transport
*transport
;
2224 struct list_head
*pos
, *temp
;
2227 /* We must include the address that the INIT packet came from.
2228 * This is the only address that matters for an INIT packet.
2229 * When processing a COOKIE ECHO, we retrieve the from address
2230 * of the INIT from the cookie.
2233 /* This implementation defaults to making the first transport
2234 * added as the primary transport. The source address seems to
2235 * be a a better choice than any of the embedded addresses.
2238 if(!sctp_assoc_add_peer(asoc
, peer_addr
, gfp
, SCTP_ACTIVE
))
2242 /* Process the initialization parameters. */
2243 sctp_walk_params(param
, peer_init
, init_hdr
.params
) {
2245 if (!sctp_process_param(asoc
, param
, peer_addr
, gfp
))
2249 /* AUTH: After processing the parameters, make sure that we
2250 * have all the required info to potentially do authentications.
2252 if (asoc
->peer
.auth_capable
&& (!asoc
->peer
.peer_random
||
2253 !asoc
->peer
.peer_hmacs
))
2254 asoc
->peer
.auth_capable
= 0;
2256 /* In a non-backward compatible mode, if the peer claims
2257 * support for ADD-IP but not AUTH, the ADD-IP spec states
2258 * that we MUST ABORT the association. Section 6. The section
2259 * also give us an option to silently ignore the packet, which
2260 * is what we'll do here.
2262 if (!sctp_addip_noauth
&&
2263 (asoc
->peer
.asconf_capable
&& !asoc
->peer
.auth_capable
)) {
2264 asoc
->peer
.addip_disabled_mask
|= (SCTP_PARAM_ADD_IP
|
2266 SCTP_PARAM_SET_PRIMARY
);
2267 asoc
->peer
.asconf_capable
= 0;
2271 /* Walk list of transports, removing transports in the UNKNOWN state. */
2272 list_for_each_safe(pos
, temp
, &asoc
->peer
.transport_addr_list
) {
2273 transport
= list_entry(pos
, struct sctp_transport
, transports
);
2274 if (transport
->state
== SCTP_UNKNOWN
) {
2275 sctp_assoc_rm_peer(asoc
, transport
);
2279 /* The fixed INIT headers are always in network byte
2282 asoc
->peer
.i
.init_tag
=
2283 ntohl(peer_init
->init_hdr
.init_tag
);
2284 asoc
->peer
.i
.a_rwnd
=
2285 ntohl(peer_init
->init_hdr
.a_rwnd
);
2286 asoc
->peer
.i
.num_outbound_streams
=
2287 ntohs(peer_init
->init_hdr
.num_outbound_streams
);
2288 asoc
->peer
.i
.num_inbound_streams
=
2289 ntohs(peer_init
->init_hdr
.num_inbound_streams
);
2290 asoc
->peer
.i
.initial_tsn
=
2291 ntohl(peer_init
->init_hdr
.initial_tsn
);
2293 /* Apply the upper bounds for output streams based on peer's
2294 * number of inbound streams.
2296 if (asoc
->c
.sinit_num_ostreams
>
2297 ntohs(peer_init
->init_hdr
.num_inbound_streams
)) {
2298 asoc
->c
.sinit_num_ostreams
=
2299 ntohs(peer_init
->init_hdr
.num_inbound_streams
);
2302 if (asoc
->c
.sinit_max_instreams
>
2303 ntohs(peer_init
->init_hdr
.num_outbound_streams
)) {
2304 asoc
->c
.sinit_max_instreams
=
2305 ntohs(peer_init
->init_hdr
.num_outbound_streams
);
2308 /* Copy Initiation tag from INIT to VT_peer in cookie. */
2309 asoc
->c
.peer_vtag
= asoc
->peer
.i
.init_tag
;
2311 /* Peer Rwnd : Current calculated value of the peer's rwnd. */
2312 asoc
->peer
.rwnd
= asoc
->peer
.i
.a_rwnd
;
2314 /* Copy cookie in case we need to resend COOKIE-ECHO. */
2315 cookie
= asoc
->peer
.cookie
;
2317 asoc
->peer
.cookie
= kmemdup(cookie
, asoc
->peer
.cookie_len
, gfp
);
2318 if (!asoc
->peer
.cookie
)
2322 /* RFC 2960 7.2.1 The initial value of ssthresh MAY be arbitrarily
2323 * high (for example, implementations MAY use the size of the receiver
2324 * advertised window).
2326 list_for_each_entry(transport
, &asoc
->peer
.transport_addr_list
,
2328 transport
->ssthresh
= asoc
->peer
.i
.a_rwnd
;
2331 /* Set up the TSN tracking pieces. */
2332 if (!sctp_tsnmap_init(&asoc
->peer
.tsn_map
, SCTP_TSN_MAP_INITIAL
,
2333 asoc
->peer
.i
.initial_tsn
, gfp
))
2336 /* RFC 2960 6.5 Stream Identifier and Stream Sequence Number
2338 * The stream sequence number in all the streams shall start
2339 * from 0 when the association is established. Also, when the
2340 * stream sequence number reaches the value 65535 the next
2341 * stream sequence number shall be set to 0.
2344 /* Allocate storage for the negotiated streams if it is not a temporary
2350 asoc
->ssnmap
= sctp_ssnmap_new(asoc
->c
.sinit_max_instreams
,
2351 asoc
->c
.sinit_num_ostreams
, gfp
);
2355 error
= sctp_assoc_set_id(asoc
, gfp
);
2360 /* ADDIP Section 4.1 ASCONF Chunk Procedures
2362 * When an endpoint has an ASCONF signaled change to be sent to the
2363 * remote endpoint it should do the following:
2365 * A2) A serial number should be assigned to the Chunk. The serial
2366 * number should be a monotonically increasing number. All serial
2367 * numbers are defined to be initialized at the start of the
2368 * association to the same value as the Initial TSN.
2370 asoc
->peer
.addip_serial
= asoc
->peer
.i
.initial_tsn
- 1;
2374 /* Release the transport structures. */
2375 list_for_each_safe(pos
, temp
, &asoc
->peer
.transport_addr_list
) {
2376 transport
= list_entry(pos
, struct sctp_transport
, transports
);
2377 if (transport
->state
!= SCTP_ACTIVE
)
2378 sctp_assoc_rm_peer(asoc
, transport
);
2386 /* Update asoc with the option described in param.
2388 * RFC2960 3.3.2.1 Optional/Variable Length Parameters in INIT
2390 * asoc is the association to update.
2391 * param is the variable length parameter to use for update.
2392 * cid tells us if this is an INIT, INIT ACK or COOKIE ECHO.
2393 * If the current packet is an INIT we want to minimize the amount of
2394 * work we do. In particular, we should not build transport
2395 * structures for the addresses.
2397 static int sctp_process_param(struct sctp_association
*asoc
,
2398 union sctp_params param
,
2399 const union sctp_addr
*peer_addr
,
2402 union sctp_addr addr
;
2409 union sctp_addr_param
*addr_param
;
2410 struct sctp_transport
*t
;
2412 /* We maintain all INIT parameters in network byte order all the
2413 * time. This allows us to not worry about whether the parameters
2414 * came from a fresh INIT, and INIT ACK, or were stored in a cookie.
2416 switch (param
.p
->type
) {
2417 case SCTP_PARAM_IPV6_ADDRESS
:
2418 if (PF_INET6
!= asoc
->base
.sk
->sk_family
)
2422 case SCTP_PARAM_IPV4_ADDRESS
:
2423 /* v4 addresses are not allowed on v6-only socket */
2424 if (ipv6_only_sock(asoc
->base
.sk
))
2427 af
= sctp_get_af_specific(param_type2af(param
.p
->type
));
2428 af
->from_addr_param(&addr
, param
.addr
, htons(asoc
->peer
.port
), 0);
2429 scope
= sctp_scope(peer_addr
);
2430 if (sctp_in_scope(&addr
, scope
))
2431 if (!sctp_assoc_add_peer(asoc
, &addr
, gfp
, SCTP_UNCONFIRMED
))
2435 case SCTP_PARAM_COOKIE_PRESERVATIVE
:
2436 if (!sctp_cookie_preserve_enable
)
2439 stale
= ntohl(param
.life
->lifespan_increment
);
2441 /* Suggested Cookie Life span increment's unit is msec,
2444 asoc
->cookie_life
.tv_sec
+= stale
/ 1000;
2445 asoc
->cookie_life
.tv_usec
+= (stale
% 1000) * 1000;
2448 case SCTP_PARAM_HOST_NAME_ADDRESS
:
2449 SCTP_DEBUG_PRINTK("unimplemented SCTP_HOST_NAME_ADDRESS\n");
2452 case SCTP_PARAM_SUPPORTED_ADDRESS_TYPES
:
2453 /* Turn off the default values first so we'll know which
2454 * ones are really set by the peer.
2456 asoc
->peer
.ipv4_address
= 0;
2457 asoc
->peer
.ipv6_address
= 0;
2459 /* Assume that peer supports the address family
2460 * by which it sends a packet.
2462 if (peer_addr
->sa
.sa_family
== AF_INET6
)
2463 asoc
->peer
.ipv6_address
= 1;
2464 else if (peer_addr
->sa
.sa_family
== AF_INET
)
2465 asoc
->peer
.ipv4_address
= 1;
2467 /* Cycle through address types; avoid divide by 0. */
2468 sat
= ntohs(param
.p
->length
) - sizeof(sctp_paramhdr_t
);
2470 sat
/= sizeof(__u16
);
2472 for (i
= 0; i
< sat
; ++i
) {
2473 switch (param
.sat
->types
[i
]) {
2474 case SCTP_PARAM_IPV4_ADDRESS
:
2475 asoc
->peer
.ipv4_address
= 1;
2478 case SCTP_PARAM_IPV6_ADDRESS
:
2479 if (PF_INET6
== asoc
->base
.sk
->sk_family
)
2480 asoc
->peer
.ipv6_address
= 1;
2483 case SCTP_PARAM_HOST_NAME_ADDRESS
:
2484 asoc
->peer
.hostname_address
= 1;
2487 default: /* Just ignore anything else. */
2493 case SCTP_PARAM_STATE_COOKIE
:
2494 asoc
->peer
.cookie_len
=
2495 ntohs(param
.p
->length
) - sizeof(sctp_paramhdr_t
);
2496 asoc
->peer
.cookie
= param
.cookie
->body
;
2499 case SCTP_PARAM_HEARTBEAT_INFO
:
2500 /* Would be odd to receive, but it causes no problems. */
2503 case SCTP_PARAM_UNRECOGNIZED_PARAMETERS
:
2504 /* Rejected during verify stage. */
2507 case SCTP_PARAM_ECN_CAPABLE
:
2508 asoc
->peer
.ecn_capable
= 1;
2511 case SCTP_PARAM_ADAPTATION_LAYER_IND
:
2512 asoc
->peer
.adaptation_ind
= ntohl(param
.aind
->adaptation_ind
);
2515 case SCTP_PARAM_SET_PRIMARY
:
2516 if (!sctp_addip_enable
)
2519 addr_param
= param
.v
+ sizeof(sctp_addip_param_t
);
2521 af
= sctp_get_af_specific(param_type2af(param
.p
->type
));
2522 af
->from_addr_param(&addr
, addr_param
,
2523 htons(asoc
->peer
.port
), 0);
2525 if (!af
->addr_valid(&addr
, NULL
, NULL
))
2528 t
= sctp_assoc_lookup_paddr(asoc
, &addr
);
2532 sctp_assoc_set_primary(asoc
, t
);
2535 case SCTP_PARAM_SUPPORTED_EXT
:
2536 sctp_process_ext_param(asoc
, param
);
2539 case SCTP_PARAM_FWD_TSN_SUPPORT
:
2540 if (sctp_prsctp_enable
) {
2541 asoc
->peer
.prsctp_capable
= 1;
2547 case SCTP_PARAM_RANDOM
:
2548 if (!sctp_auth_enable
)
2551 /* Save peer's random parameter */
2552 asoc
->peer
.peer_random
= kmemdup(param
.p
,
2553 ntohs(param
.p
->length
), gfp
);
2554 if (!asoc
->peer
.peer_random
) {
2560 case SCTP_PARAM_HMAC_ALGO
:
2561 if (!sctp_auth_enable
)
2564 /* Save peer's HMAC list */
2565 asoc
->peer
.peer_hmacs
= kmemdup(param
.p
,
2566 ntohs(param
.p
->length
), gfp
);
2567 if (!asoc
->peer
.peer_hmacs
) {
2572 /* Set the default HMAC the peer requested*/
2573 sctp_auth_asoc_set_default_hmac(asoc
, param
.hmac_algo
);
2576 case SCTP_PARAM_CHUNKS
:
2577 if (!sctp_auth_enable
)
2580 asoc
->peer
.peer_chunks
= kmemdup(param
.p
,
2581 ntohs(param
.p
->length
), gfp
);
2582 if (!asoc
->peer
.peer_chunks
)
2587 /* Any unrecognized parameters should have been caught
2588 * and handled by sctp_verify_param() which should be
2589 * called prior to this routine. Simply log the error
2592 SCTP_DEBUG_PRINTK("Ignoring param: %d for association %p.\n",
2593 ntohs(param
.p
->type
), asoc
);
2600 /* Select a new verification tag. */
2601 __u32
sctp_generate_tag(const struct sctp_endpoint
*ep
)
2603 /* I believe that this random number generator complies with RFC1750.
2604 * A tag of 0 is reserved for special cases (e.g. INIT).
2609 get_random_bytes(&x
, sizeof(__u32
));
2615 /* Select an initial TSN to send during startup. */
2616 __u32
sctp_generate_tsn(const struct sctp_endpoint
*ep
)
2620 get_random_bytes(&retval
, sizeof(__u32
));
2625 * ADDIP 3.1.1 Address Configuration Change Chunk (ASCONF)
2627 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
2628 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2629 * | Type = 0xC1 | Chunk Flags | Chunk Length |
2630 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2632 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2633 * | Address Parameter |
2634 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2635 * | ASCONF Parameter #1 |
2636 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2640 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2641 * | ASCONF Parameter #N |
2642 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2644 * Address Parameter and other parameter will not be wrapped in this function
2646 static struct sctp_chunk
*sctp_make_asconf(struct sctp_association
*asoc
,
2647 union sctp_addr
*addr
,
2650 sctp_addiphdr_t asconf
;
2651 struct sctp_chunk
*retval
;
2652 int length
= sizeof(asconf
) + vparam_len
;
2653 union sctp_addr_param addrparam
;
2655 struct sctp_af
*af
= sctp_get_af_specific(addr
->v4
.sin_family
);
2657 addrlen
= af
->to_addr_param(addr
, &addrparam
);
2662 /* Create the chunk. */
2663 retval
= sctp_make_chunk(asoc
, SCTP_CID_ASCONF
, 0, length
);
2667 asconf
.serial
= htonl(asoc
->addip_serial
++);
2669 retval
->subh
.addip_hdr
=
2670 sctp_addto_chunk(retval
, sizeof(asconf
), &asconf
);
2671 retval
->param_hdr
.v
=
2672 sctp_addto_chunk(retval
, addrlen
, &addrparam
);
2678 * 3.2.1 Add IP Address
2680 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
2681 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2682 * | Type = 0xC001 | Length = Variable |
2683 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2684 * | ASCONF-Request Correlation ID |
2685 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2686 * | Address Parameter |
2687 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2689 * 3.2.2 Delete IP Address
2691 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
2692 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2693 * | Type = 0xC002 | Length = Variable |
2694 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2695 * | ASCONF-Request Correlation ID |
2696 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2697 * | Address Parameter |
2698 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2701 struct sctp_chunk
*sctp_make_asconf_update_ip(struct sctp_association
*asoc
,
2702 union sctp_addr
*laddr
,
2703 struct sockaddr
*addrs
,
2707 sctp_addip_param_t param
;
2708 struct sctp_chunk
*retval
;
2709 union sctp_addr_param addr_param
;
2710 union sctp_addr
*addr
;
2713 int paramlen
= sizeof(param
);
2714 int addr_param_len
= 0;
2718 /* Get total length of all the address parameters. */
2720 for (i
= 0; i
< addrcnt
; i
++) {
2721 addr
= (union sctp_addr
*)addr_buf
;
2722 af
= sctp_get_af_specific(addr
->v4
.sin_family
);
2723 addr_param_len
= af
->to_addr_param(addr
, &addr_param
);
2725 totallen
+= paramlen
;
2726 totallen
+= addr_param_len
;
2728 addr_buf
+= af
->sockaddr_len
;
2731 /* Create an asconf chunk with the required length. */
2732 retval
= sctp_make_asconf(asoc
, laddr
, totallen
);
2736 /* Add the address parameters to the asconf chunk. */
2738 for (i
= 0; i
< addrcnt
; i
++) {
2739 addr
= (union sctp_addr
*)addr_buf
;
2740 af
= sctp_get_af_specific(addr
->v4
.sin_family
);
2741 addr_param_len
= af
->to_addr_param(addr
, &addr_param
);
2742 param
.param_hdr
.type
= flags
;
2743 param
.param_hdr
.length
= htons(paramlen
+ addr_param_len
);
2746 sctp_addto_chunk(retval
, paramlen
, ¶m
);
2747 sctp_addto_chunk(retval
, addr_param_len
, &addr_param
);
2749 addr_buf
+= af
->sockaddr_len
;
2755 * 3.2.4 Set Primary IP Address
2757 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
2758 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2759 * | Type =0xC004 | Length = Variable |
2760 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2761 * | ASCONF-Request Correlation ID |
2762 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2763 * | Address Parameter |
2764 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2766 * Create an ASCONF chunk with Set Primary IP address parameter.
2768 struct sctp_chunk
*sctp_make_asconf_set_prim(struct sctp_association
*asoc
,
2769 union sctp_addr
*addr
)
2771 sctp_addip_param_t param
;
2772 struct sctp_chunk
*retval
;
2773 int len
= sizeof(param
);
2774 union sctp_addr_param addrparam
;
2776 struct sctp_af
*af
= sctp_get_af_specific(addr
->v4
.sin_family
);
2778 addrlen
= af
->to_addr_param(addr
, &addrparam
);
2783 /* Create the chunk and make asconf header. */
2784 retval
= sctp_make_asconf(asoc
, addr
, len
);
2788 param
.param_hdr
.type
= SCTP_PARAM_SET_PRIMARY
;
2789 param
.param_hdr
.length
= htons(len
);
2792 sctp_addto_chunk(retval
, sizeof(param
), ¶m
);
2793 sctp_addto_chunk(retval
, addrlen
, &addrparam
);
2798 /* ADDIP 3.1.2 Address Configuration Acknowledgement Chunk (ASCONF-ACK)
2800 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
2801 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2802 * | Type = 0x80 | Chunk Flags | Chunk Length |
2803 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2805 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2806 * | ASCONF Parameter Response#1 |
2807 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2811 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2812 * | ASCONF Parameter Response#N |
2813 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2815 * Create an ASCONF_ACK chunk with enough space for the parameter responses.
2817 static struct sctp_chunk
*sctp_make_asconf_ack(const struct sctp_association
*asoc
,
2818 __u32 serial
, int vparam_len
)
2820 sctp_addiphdr_t asconf
;
2821 struct sctp_chunk
*retval
;
2822 int length
= sizeof(asconf
) + vparam_len
;
2824 /* Create the chunk. */
2825 retval
= sctp_make_chunk(asoc
, SCTP_CID_ASCONF_ACK
, 0, length
);
2829 asconf
.serial
= htonl(serial
);
2831 retval
->subh
.addip_hdr
=
2832 sctp_addto_chunk(retval
, sizeof(asconf
), &asconf
);
2837 /* Add response parameters to an ASCONF_ACK chunk. */
2838 static void sctp_add_asconf_response(struct sctp_chunk
*chunk
, __be32 crr_id
,
2839 __be16 err_code
, sctp_addip_param_t
*asconf_param
)
2841 sctp_addip_param_t ack_param
;
2842 sctp_errhdr_t err_param
;
2843 int asconf_param_len
= 0;
2844 int err_param_len
= 0;
2845 __be16 response_type
;
2847 if (SCTP_ERROR_NO_ERROR
== err_code
) {
2848 response_type
= SCTP_PARAM_SUCCESS_REPORT
;
2850 response_type
= SCTP_PARAM_ERR_CAUSE
;
2851 err_param_len
= sizeof(err_param
);
2854 ntohs(asconf_param
->param_hdr
.length
);
2857 /* Add Success Indication or Error Cause Indication parameter. */
2858 ack_param
.param_hdr
.type
= response_type
;
2859 ack_param
.param_hdr
.length
= htons(sizeof(ack_param
) +
2862 ack_param
.crr_id
= crr_id
;
2863 sctp_addto_chunk(chunk
, sizeof(ack_param
), &ack_param
);
2865 if (SCTP_ERROR_NO_ERROR
== err_code
)
2868 /* Add Error Cause parameter. */
2869 err_param
.cause
= err_code
;
2870 err_param
.length
= htons(err_param_len
+ asconf_param_len
);
2871 sctp_addto_chunk(chunk
, err_param_len
, &err_param
);
2873 /* Add the failed TLV copied from ASCONF chunk. */
2875 sctp_addto_chunk(chunk
, asconf_param_len
, asconf_param
);
2878 /* Process a asconf parameter. */
2879 static __be16
sctp_process_asconf_param(struct sctp_association
*asoc
,
2880 struct sctp_chunk
*asconf
,
2881 sctp_addip_param_t
*asconf_param
)
2883 struct sctp_transport
*peer
;
2885 union sctp_addr addr
;
2886 union sctp_addr_param
*addr_param
;
2888 addr_param
= (union sctp_addr_param
*)
2889 ((void *)asconf_param
+ sizeof(sctp_addip_param_t
));
2891 if (asconf_param
->param_hdr
.type
!= SCTP_PARAM_ADD_IP
&&
2892 asconf_param
->param_hdr
.type
!= SCTP_PARAM_DEL_IP
&&
2893 asconf_param
->param_hdr
.type
!= SCTP_PARAM_SET_PRIMARY
)
2894 return SCTP_ERROR_UNKNOWN_PARAM
;
2896 switch (addr_param
->v4
.param_hdr
.type
) {
2897 case SCTP_PARAM_IPV6_ADDRESS
:
2898 if (!asoc
->peer
.ipv6_address
)
2899 return SCTP_ERROR_DNS_FAILED
;
2901 case SCTP_PARAM_IPV4_ADDRESS
:
2902 if (!asoc
->peer
.ipv4_address
)
2903 return SCTP_ERROR_DNS_FAILED
;
2906 return SCTP_ERROR_DNS_FAILED
;
2909 af
= sctp_get_af_specific(param_type2af(addr_param
->v4
.param_hdr
.type
));
2911 return SCTP_ERROR_DNS_FAILED
;
2913 af
->from_addr_param(&addr
, addr_param
, htons(asoc
->peer
.port
), 0);
2915 /* ADDIP 4.2.1 This parameter MUST NOT contain a broadcast
2916 * or multicast address.
2917 * (note: wildcard is permitted and requires special handling so
2918 * make sure we check for that)
2920 if (!af
->is_any(&addr
) && !af
->addr_valid(&addr
, NULL
, asconf
->skb
))
2921 return SCTP_ERROR_DNS_FAILED
;
2923 switch (asconf_param
->param_hdr
.type
) {
2924 case SCTP_PARAM_ADD_IP
:
2926 * If the address 0.0.0.0 or ::0 is provided, the source
2927 * address of the packet MUST be added.
2929 if (af
->is_any(&addr
))
2930 memcpy(&addr
, &asconf
->source
, sizeof(addr
));
2932 /* ADDIP 4.3 D9) If an endpoint receives an ADD IP address
2933 * request and does not have the local resources to add this
2934 * new address to the association, it MUST return an Error
2935 * Cause TLV set to the new error code 'Operation Refused
2936 * Due to Resource Shortage'.
2939 peer
= sctp_assoc_add_peer(asoc
, &addr
, GFP_ATOMIC
, SCTP_UNCONFIRMED
);
2941 return SCTP_ERROR_RSRC_LOW
;
2943 /* Start the heartbeat timer. */
2944 if (!mod_timer(&peer
->hb_timer
, sctp_transport_timeout(peer
)))
2945 sctp_transport_hold(peer
);
2947 case SCTP_PARAM_DEL_IP
:
2948 /* ADDIP 4.3 D7) If a request is received to delete the
2949 * last remaining IP address of a peer endpoint, the receiver
2950 * MUST send an Error Cause TLV with the error cause set to the
2951 * new error code 'Request to Delete Last Remaining IP Address'.
2953 if (asoc
->peer
.transport_count
== 1)
2954 return SCTP_ERROR_DEL_LAST_IP
;
2956 /* ADDIP 4.3 D8) If a request is received to delete an IP
2957 * address which is also the source address of the IP packet
2958 * which contained the ASCONF chunk, the receiver MUST reject
2959 * this request. To reject the request the receiver MUST send
2960 * an Error Cause TLV set to the new error code 'Request to
2961 * Delete Source IP Address'
2963 if (sctp_cmp_addr_exact(sctp_source(asconf
), &addr
))
2964 return SCTP_ERROR_DEL_SRC_IP
;
2967 * If the address 0.0.0.0 or ::0 is provided, all
2968 * addresses of the peer except the source address of the
2969 * packet MUST be deleted.
2971 if (af
->is_any(&addr
)) {
2972 sctp_assoc_set_primary(asoc
, asconf
->transport
);
2973 sctp_assoc_del_nonprimary_peers(asoc
,
2976 sctp_assoc_del_peer(asoc
, &addr
);
2978 case SCTP_PARAM_SET_PRIMARY
:
2979 /* ADDIP Section 4.2.4
2980 * If the address 0.0.0.0 or ::0 is provided, the receiver
2981 * MAY mark the source address of the packet as its
2984 if (af
->is_any(&addr
))
2985 memcpy(&addr
.v4
, sctp_source(asconf
), sizeof(addr
));
2987 peer
= sctp_assoc_lookup_paddr(asoc
, &addr
);
2989 return SCTP_ERROR_DNS_FAILED
;
2991 sctp_assoc_set_primary(asoc
, peer
);
2995 return SCTP_ERROR_NO_ERROR
;
2998 /* Verify the ASCONF packet before we process it. */
2999 int sctp_verify_asconf(const struct sctp_association
*asoc
,
3000 struct sctp_paramhdr
*param_hdr
, void *chunk_end
,
3001 struct sctp_paramhdr
**errp
) {
3002 sctp_addip_param_t
*asconf_param
;
3003 union sctp_params param
;
3006 param
.v
= (sctp_paramhdr_t
*) param_hdr
;
3007 while (param
.v
<= chunk_end
- sizeof(sctp_paramhdr_t
)) {
3008 length
= ntohs(param
.p
->length
);
3011 if (param
.v
> chunk_end
- length
||
3012 length
< sizeof(sctp_paramhdr_t
))
3015 switch (param
.p
->type
) {
3016 case SCTP_PARAM_ADD_IP
:
3017 case SCTP_PARAM_DEL_IP
:
3018 case SCTP_PARAM_SET_PRIMARY
:
3019 asconf_param
= (sctp_addip_param_t
*)param
.v
;
3020 plen
= ntohs(asconf_param
->param_hdr
.length
);
3021 if (plen
< sizeof(sctp_addip_param_t
) +
3022 sizeof(sctp_paramhdr_t
))
3025 case SCTP_PARAM_SUCCESS_REPORT
:
3026 case SCTP_PARAM_ADAPTATION_LAYER_IND
:
3027 if (length
!= sizeof(sctp_addip_param_t
))
3035 param
.v
+= WORD_ROUND(length
);
3038 if (param
.v
!= chunk_end
)
3044 /* Process an incoming ASCONF chunk with the next expected serial no. and
3045 * return an ASCONF_ACK chunk to be sent in response.
3047 struct sctp_chunk
*sctp_process_asconf(struct sctp_association
*asoc
,
3048 struct sctp_chunk
*asconf
)
3050 sctp_addiphdr_t
*hdr
;
3051 union sctp_addr_param
*addr_param
;
3052 sctp_addip_param_t
*asconf_param
;
3053 struct sctp_chunk
*asconf_ack
;
3059 int all_param_pass
= 1;
3061 chunk_len
= ntohs(asconf
->chunk_hdr
->length
) - sizeof(sctp_chunkhdr_t
);
3062 hdr
= (sctp_addiphdr_t
*)asconf
->skb
->data
;
3063 serial
= ntohl(hdr
->serial
);
3065 /* Skip the addiphdr and store a pointer to address parameter. */
3066 length
= sizeof(sctp_addiphdr_t
);
3067 addr_param
= (union sctp_addr_param
*)(asconf
->skb
->data
+ length
);
3068 chunk_len
-= length
;
3070 /* Skip the address parameter and store a pointer to the first
3073 length
= ntohs(addr_param
->v4
.param_hdr
.length
);
3074 asconf_param
= (sctp_addip_param_t
*)((void *)addr_param
+ length
);
3075 chunk_len
-= length
;
3077 /* create an ASCONF_ACK chunk.
3078 * Based on the definitions of parameters, we know that the size of
3079 * ASCONF_ACK parameters are less than or equal to the twice of ASCONF
3082 asconf_ack
= sctp_make_asconf_ack(asoc
, serial
, chunk_len
* 2);
3086 /* Process the TLVs contained within the ASCONF chunk. */
3087 while (chunk_len
> 0) {
3088 err_code
= sctp_process_asconf_param(asoc
, asconf
,
3091 * If an error response is received for a TLV parameter,
3092 * all TLVs with no response before the failed TLV are
3093 * considered successful if not reported. All TLVs after
3094 * the failed response are considered unsuccessful unless
3095 * a specific success indication is present for the parameter.
3097 if (SCTP_ERROR_NO_ERROR
!= err_code
)
3100 if (!all_param_pass
)
3101 sctp_add_asconf_response(asconf_ack
,
3102 asconf_param
->crr_id
, err_code
,
3105 /* ADDIP 4.3 D11) When an endpoint receiving an ASCONF to add
3106 * an IP address sends an 'Out of Resource' in its response, it
3107 * MUST also fail any subsequent add or delete requests bundled
3110 if (SCTP_ERROR_RSRC_LOW
== err_code
)
3113 /* Move to the next ASCONF param. */
3114 length
= ntohs(asconf_param
->param_hdr
.length
);
3115 asconf_param
= (sctp_addip_param_t
*)((void *)asconf_param
+
3117 chunk_len
-= length
;
3121 asoc
->peer
.addip_serial
++;
3123 /* If we are sending a new ASCONF_ACK hold a reference to it in assoc
3124 * after freeing the reference to old asconf ack if any.
3127 sctp_chunk_hold(asconf_ack
);
3128 list_add_tail(&asconf_ack
->transmitted_list
,
3129 &asoc
->asconf_ack_list
);
3135 /* Process a asconf parameter that is successfully acked. */
3136 static void sctp_asconf_param_success(struct sctp_association
*asoc
,
3137 sctp_addip_param_t
*asconf_param
)
3140 union sctp_addr addr
;
3141 struct sctp_bind_addr
*bp
= &asoc
->base
.bind_addr
;
3142 union sctp_addr_param
*addr_param
;
3143 struct sctp_transport
*transport
;
3144 struct sctp_sockaddr_entry
*saddr
;
3146 addr_param
= (union sctp_addr_param
*)
3147 ((void *)asconf_param
+ sizeof(sctp_addip_param_t
));
3149 /* We have checked the packet before, so we do not check again. */
3150 af
= sctp_get_af_specific(param_type2af(addr_param
->v4
.param_hdr
.type
));
3151 af
->from_addr_param(&addr
, addr_param
, htons(bp
->port
), 0);
3153 switch (asconf_param
->param_hdr
.type
) {
3154 case SCTP_PARAM_ADD_IP
:
3155 /* This is always done in BH context with a socket lock
3156 * held, so the list can not change.
3159 list_for_each_entry(saddr
, &bp
->address_list
, list
) {
3160 if (sctp_cmp_addr_exact(&saddr
->a
, &addr
))
3161 saddr
->state
= SCTP_ADDR_SRC
;
3164 list_for_each_entry(transport
, &asoc
->peer
.transport_addr_list
,
3166 if (transport
->state
== SCTP_ACTIVE
)
3168 dst_release(transport
->dst
);
3169 sctp_transport_route(transport
, NULL
,
3170 sctp_sk(asoc
->base
.sk
));
3173 case SCTP_PARAM_DEL_IP
:
3175 sctp_del_bind_addr(bp
, &addr
);
3177 list_for_each_entry(transport
, &asoc
->peer
.transport_addr_list
,
3179 dst_release(transport
->dst
);
3180 sctp_transport_route(transport
, NULL
,
3181 sctp_sk(asoc
->base
.sk
));
3189 /* Get the corresponding ASCONF response error code from the ASCONF_ACK chunk
3190 * for the given asconf parameter. If there is no response for this parameter,
3191 * return the error code based on the third argument 'no_err'.
3193 * A7) If an error response is received for a TLV parameter, all TLVs with no
3194 * response before the failed TLV are considered successful if not reported.
3195 * All TLVs after the failed response are considered unsuccessful unless a
3196 * specific success indication is present for the parameter.
3198 static __be16
sctp_get_asconf_response(struct sctp_chunk
*asconf_ack
,
3199 sctp_addip_param_t
*asconf_param
,
3202 sctp_addip_param_t
*asconf_ack_param
;
3203 sctp_errhdr_t
*err_param
;
3209 err_code
= SCTP_ERROR_NO_ERROR
;
3211 err_code
= SCTP_ERROR_REQ_REFUSED
;
3213 asconf_ack_len
= ntohs(asconf_ack
->chunk_hdr
->length
) -
3214 sizeof(sctp_chunkhdr_t
);
3216 /* Skip the addiphdr from the asconf_ack chunk and store a pointer to
3217 * the first asconf_ack parameter.
3219 length
= sizeof(sctp_addiphdr_t
);
3220 asconf_ack_param
= (sctp_addip_param_t
*)(asconf_ack
->skb
->data
+
3222 asconf_ack_len
-= length
;
3224 while (asconf_ack_len
> 0) {
3225 if (asconf_ack_param
->crr_id
== asconf_param
->crr_id
) {
3226 switch(asconf_ack_param
->param_hdr
.type
) {
3227 case SCTP_PARAM_SUCCESS_REPORT
:
3228 return SCTP_ERROR_NO_ERROR
;
3229 case SCTP_PARAM_ERR_CAUSE
:
3230 length
= sizeof(sctp_addip_param_t
);
3231 err_param
= (sctp_errhdr_t
*)
3232 ((void *)asconf_ack_param
+ length
);
3233 asconf_ack_len
-= length
;
3234 if (asconf_ack_len
> 0)
3235 return err_param
->cause
;
3237 return SCTP_ERROR_INV_PARAM
;
3240 return SCTP_ERROR_INV_PARAM
;
3244 length
= ntohs(asconf_ack_param
->param_hdr
.length
);
3245 asconf_ack_param
= (sctp_addip_param_t
*)
3246 ((void *)asconf_ack_param
+ length
);
3247 asconf_ack_len
-= length
;
3253 /* Process an incoming ASCONF_ACK chunk against the cached last ASCONF chunk. */
3254 int sctp_process_asconf_ack(struct sctp_association
*asoc
,
3255 struct sctp_chunk
*asconf_ack
)
3257 struct sctp_chunk
*asconf
= asoc
->addip_last_asconf
;
3258 union sctp_addr_param
*addr_param
;
3259 sctp_addip_param_t
*asconf_param
;
3261 int asconf_len
= asconf
->skb
->len
;
3262 int all_param_pass
= 0;
3265 __be16 err_code
= SCTP_ERROR_NO_ERROR
;
3267 /* Skip the chunkhdr and addiphdr from the last asconf sent and store
3268 * a pointer to address parameter.
3270 length
= sizeof(sctp_addip_chunk_t
);
3271 addr_param
= (union sctp_addr_param
*)(asconf
->skb
->data
+ length
);
3272 asconf_len
-= length
;
3274 /* Skip the address parameter in the last asconf sent and store a
3275 * pointer to the first asconf parameter.
3277 length
= ntohs(addr_param
->v4
.param_hdr
.length
);
3278 asconf_param
= (sctp_addip_param_t
*)((void *)addr_param
+ length
);
3279 asconf_len
-= length
;
3282 * A8) If there is no response(s) to specific TLV parameter(s), and no
3283 * failures are indicated, then all request(s) are considered
3286 if (asconf_ack
->skb
->len
== sizeof(sctp_addiphdr_t
))
3289 /* Process the TLVs contained in the last sent ASCONF chunk. */
3290 while (asconf_len
> 0) {
3292 err_code
= SCTP_ERROR_NO_ERROR
;
3294 err_code
= sctp_get_asconf_response(asconf_ack
,
3297 if (no_err
&& (SCTP_ERROR_NO_ERROR
!= err_code
))
3302 case SCTP_ERROR_NO_ERROR
:
3303 sctp_asconf_param_success(asoc
, asconf_param
);
3306 case SCTP_ERROR_RSRC_LOW
:
3310 case SCTP_ERROR_UNKNOWN_PARAM
:
3311 /* Disable sending this type of asconf parameter in
3314 asoc
->peer
.addip_disabled_mask
|=
3315 asconf_param
->param_hdr
.type
;
3318 case SCTP_ERROR_REQ_REFUSED
:
3319 case SCTP_ERROR_DEL_LAST_IP
:
3320 case SCTP_ERROR_DEL_SRC_IP
:
3325 /* Skip the processed asconf parameter and move to the next
3328 length
= ntohs(asconf_param
->param_hdr
.length
);
3329 asconf_param
= (sctp_addip_param_t
*)((void *)asconf_param
+
3331 asconf_len
-= length
;
3334 /* Free the cached last sent asconf chunk. */
3335 list_del_init(&asconf
->transmitted_list
);
3336 sctp_chunk_free(asconf
);
3337 asoc
->addip_last_asconf
= NULL
;
3342 /* Make a FWD TSN chunk. */
3343 struct sctp_chunk
*sctp_make_fwdtsn(const struct sctp_association
*asoc
,
3344 __u32 new_cum_tsn
, size_t nstreams
,
3345 struct sctp_fwdtsn_skip
*skiplist
)
3347 struct sctp_chunk
*retval
= NULL
;
3348 struct sctp_fwdtsn_chunk
*ftsn_chunk
;
3349 struct sctp_fwdtsn_hdr ftsn_hdr
;
3350 struct sctp_fwdtsn_skip skip
;
3354 hint
= (nstreams
+ 1) * sizeof(__u32
);
3356 retval
= sctp_make_chunk(asoc
, SCTP_CID_FWD_TSN
, 0, hint
);
3361 ftsn_chunk
= (struct sctp_fwdtsn_chunk
*)retval
->subh
.fwdtsn_hdr
;
3363 ftsn_hdr
.new_cum_tsn
= htonl(new_cum_tsn
);
3364 retval
->subh
.fwdtsn_hdr
=
3365 sctp_addto_chunk(retval
, sizeof(ftsn_hdr
), &ftsn_hdr
);
3367 for (i
= 0; i
< nstreams
; i
++) {
3368 skip
.stream
= skiplist
[i
].stream
;
3369 skip
.ssn
= skiplist
[i
].ssn
;
3370 sctp_addto_chunk(retval
, sizeof(skip
), &skip
);