1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 #include <sys/types.h> 28 #include <sys/systm.h> 29 #include <sys/stream.h> 30 #include <sys/cmn_err.h> 31 #define _SUN_TPI_VERSION 2 32 #include <sys/tihdr.h> 33 #include <sys/socket.h> 34 #include <sys/stropts.h> 35 #include <sys/strsun.h> 36 #include <sys/strsubr.h> 37 #include <sys/socketvar.h> 38 #include <inet/common.h> 39 #include <inet/mi.h> 40 #include <inet/ip.h> 41 #include <inet/ip_ire.h> 42 #include <inet/ip6.h> 43 #include <inet/sctp_ip.h> 44 #include <inet/ipclassifier.h> 45 46 /* 47 * PR-SCTP comments. 48 * 49 * A message can expire before it gets to the transmit list (i.e. it is still 50 * in the unsent list - unchunked), after it gets to the transmit list, but 51 * before transmission has actually started, or after transmission has begun. 52 * Accordingly, we check for the status of a message in sctp_chunkify() when 53 * the message is being transferred from the unsent list to the transmit list; 54 * in sctp_get_msg_to_send(), when we get the next chunk from the transmit 55 * list and in sctp_rexmit() when we get the next chunk to be (re)transmitted. 56 * When we nuke a message in sctp_chunkify(), all we need to do is take it 57 * out of the unsent list and update sctp_unsent; when a message is deemed 58 * timed-out in sctp_get_msg_to_send() we can just take it out of the transmit 59 * list, update sctp_unsent IFF transmission for the message has not yet begun 60 * (i.e. !SCTP_CHUNK_ISSENT(meta->b_cont)). However, if transmission for the 61 * message has started, then we cannot just take it out of the list, we need 62 * to send Forward TSN chunk to the peer so that the peer can clear its 63 * fragment list for this message. However, we cannot just send the Forward 64 * TSN in sctp_get_msg_to_send() because there might be unacked chunks for 65 * messages preceeding this abandoned message. So, we send a Forward TSN 66 * IFF all messages prior to this abandoned message has been SACKd, if not 67 * we defer sending the Forward TSN to sctp_cumack(), which will check for 68 * this condition and send the Forward TSN via sctp_check_abandoned_msg(). In 69 * sctp_rexmit() when we check for retransmissions, we need to determine if 70 * the advanced peer ack point can be moved ahead, and if so, send a Forward 71 * TSN to the peer instead of retransmitting the chunk. Note that when 72 * we send a Forward TSN for a message, there may be yet unsent chunks for 73 * this message; we need to mark all such chunks as abandoned, so that 74 * sctp_cumack() can take the message out of the transmit list, additionally 75 * sctp_unsent need to be adjusted. Whenever sctp_unsent is updated (i.e. 76 * decremented when a message/chunk is deemed abandoned), sockfs needs to 77 * be notified so that it can adjust its idea of the queued message. 78 */ 79 80 #include "sctp_impl.h" 81 82 static struct kmem_cache *sctp_kmem_ftsn_set_cache; 83 static mblk_t *sctp_chunkify(sctp_t *, int, int, int); 84 85 #ifdef DEBUG 86 static boolean_t sctp_verify_chain(mblk_t *, mblk_t *); 87 #endif 88 89 /* 90 * Called to allocate a header mblk when sending data to SCTP. 91 * Data will follow in b_cont of this mblk. 92 */ 93 mblk_t * 94 sctp_alloc_hdr(const char *name, int nlen, const char *control, int clen, 95 int flags) 96 { 97 mblk_t *mp; 98 struct T_unitdata_req *tudr; 99 size_t size; 100 int error; 101 102 size = sizeof (*tudr) + _TPI_ALIGN_TOPT(nlen) + clen; 103 size = MAX(size, sizeof (sctp_msg_hdr_t)); 104 if (flags & SCTP_CAN_BLOCK) { 105 mp = allocb_wait(size, BPRI_MED, 0, &error); 106 } else { 107 mp = allocb(size, BPRI_MED); 108 } 109 if (mp) { 110 tudr = (struct T_unitdata_req *)mp->b_rptr; 111 tudr->PRIM_type = T_UNITDATA_REQ; 112 tudr->DEST_length = nlen; 113 tudr->DEST_offset = sizeof (*tudr); 114 tudr->OPT_length = clen; 115 tudr->OPT_offset = (t_scalar_t)(sizeof (*tudr) + 116 _TPI_ALIGN_TOPT(nlen)); 117 if (nlen > 0) 118 bcopy(name, tudr + 1, nlen); 119 if (clen > 0) 120 bcopy(control, (char *)tudr + tudr->OPT_offset, clen); 121 mp->b_wptr += (tudr ->OPT_offset + clen); 122 mp->b_datap->db_type = M_PROTO; 123 } 124 return (mp); 125 } 126 127 /*ARGSUSED2*/ 128 int 129 sctp_sendmsg(sctp_t *sctp, mblk_t *mp, int flags) 130 { 131 sctp_faddr_t *fp = NULL; 132 struct T_unitdata_req *tudr; 133 int error = 0; 134 mblk_t *mproto = mp; 135 in6_addr_t *addr; 136 in6_addr_t tmpaddr; 137 uint16_t sid = sctp->sctp_def_stream; 138 uint32_t ppid = sctp->sctp_def_ppid; 139 uint32_t context = sctp->sctp_def_context; 140 uint16_t msg_flags = sctp->sctp_def_flags; 141 sctp_msg_hdr_t *sctp_msg_hdr; 142 uint32_t msg_len = 0; 143 uint32_t timetolive = sctp->sctp_def_timetolive; 144 conn_t *connp = sctp->sctp_connp; 145 146 ASSERT(DB_TYPE(mproto) == M_PROTO); 147 148 mp = mp->b_cont; 149 ASSERT(mp == NULL || DB_TYPE(mp) == M_DATA); 150 151 tudr = (struct T_unitdata_req *)mproto->b_rptr; 152 ASSERT(tudr->PRIM_type == T_UNITDATA_REQ); 153 154 /* Get destination address, if specified */ 155 if (tudr->DEST_length > 0) { 156 sin_t *sin; 157 sin6_t *sin6; 158 159 sin = (struct sockaddr_in *) 160 (mproto->b_rptr + tudr->DEST_offset); 161 switch (sin->sin_family) { 162 case AF_INET: 163 if (tudr->DEST_length < sizeof (*sin)) { 164 return (EINVAL); 165 } 166 IN6_IPADDR_TO_V4MAPPED(sin->sin_addr.s_addr, &tmpaddr); 167 addr = &tmpaddr; 168 break; 169 case AF_INET6: 170 if (tudr->DEST_length < sizeof (*sin6)) { 171 return (EINVAL); 172 } 173 sin6 = (struct sockaddr_in6 *) 174 (mproto->b_rptr + tudr->DEST_offset); 175 addr = &sin6->sin6_addr; 176 break; 177 default: 178 return (EAFNOSUPPORT); 179 } 180 fp = sctp_lookup_faddr(sctp, addr); 181 if (fp == NULL) { 182 return (EINVAL); 183 } 184 } 185 /* Ancillary Data? */ 186 if (tudr->OPT_length > 0) { 187 struct cmsghdr *cmsg; 188 char *cend; 189 struct sctp_sndrcvinfo *sndrcv; 190 191 cmsg = (struct cmsghdr *)(mproto->b_rptr + tudr->OPT_offset); 192 cend = ((char *)cmsg + tudr->OPT_length); 193 ASSERT(cend <= (char *)mproto->b_wptr); 194 195 for (;;) { 196 if ((char *)(cmsg + 1) > cend || 197 ((char *)cmsg + cmsg->cmsg_len) > cend) { 198 break; 199 } 200 if ((cmsg->cmsg_level == IPPROTO_SCTP) && 201 (cmsg->cmsg_type == SCTP_SNDRCV)) { 202 if (cmsg->cmsg_len < 203 (sizeof (*sndrcv) + sizeof (*cmsg))) { 204 return (EINVAL); 205 } 206 sndrcv = (struct sctp_sndrcvinfo *)(cmsg + 1); 207 sid = sndrcv->sinfo_stream; 208 msg_flags = sndrcv->sinfo_flags; 209 ppid = sndrcv->sinfo_ppid; 210 context = sndrcv->sinfo_context; 211 timetolive = sndrcv->sinfo_timetolive; 212 break; 213 } 214 if (cmsg->cmsg_len > 0) 215 cmsg = CMSG_NEXT(cmsg); 216 else 217 break; 218 } 219 } 220 if (msg_flags & MSG_ABORT) { 221 if (mp && mp->b_cont) { 222 mblk_t *pump = msgpullup(mp, -1); 223 if (!pump) { 224 return (ENOMEM); 225 } 226 freemsg(mp); 227 mp = pump; 228 mproto->b_cont = mp; 229 } 230 RUN_SCTP(sctp); 231 sctp_user_abort(sctp, mp); 232 freemsg(mproto); 233 goto done2; 234 } 235 if (mp == NULL) 236 goto done; 237 238 RUN_SCTP(sctp); 239 240 /* Reject any new data requests if we are shutting down */ 241 if (sctp->sctp_state > SCTPS_ESTABLISHED || 242 (sctp->sctp_connp->conn_state_flags & CONN_CLOSING)) { 243 error = EPIPE; 244 goto unlock_done; 245 } 246 247 /* Re-use the mproto to store relevant info. */ 248 ASSERT(MBLKSIZE(mproto) >= sizeof (*sctp_msg_hdr)); 249 250 mproto->b_rptr = mproto->b_datap->db_base; 251 mproto->b_wptr = mproto->b_rptr + sizeof (*sctp_msg_hdr); 252 253 sctp_msg_hdr = (sctp_msg_hdr_t *)mproto->b_rptr; 254 bzero(sctp_msg_hdr, sizeof (*sctp_msg_hdr)); 255 sctp_msg_hdr->smh_context = context; 256 sctp_msg_hdr->smh_sid = sid; 257 sctp_msg_hdr->smh_ppid = ppid; 258 sctp_msg_hdr->smh_flags = msg_flags; 259 sctp_msg_hdr->smh_ttl = MSEC_TO_TICK(timetolive); 260 sctp_msg_hdr->smh_tob = ddi_get_lbolt64(); 261 for (; mp != NULL; mp = mp->b_cont) 262 msg_len += MBLKL(mp); 263 sctp_msg_hdr->smh_msglen = msg_len; 264 265 /* User requested specific destination */ 266 SCTP_SET_CHUNK_DEST(mproto, fp); 267 268 if (sctp->sctp_state >= SCTPS_COOKIE_ECHOED && 269 sid >= sctp->sctp_num_ostr) { 270 /* Send sendfail event */ 271 sctp_sendfail_event(sctp, dupmsg(mproto), SCTP_ERR_BAD_SID, 272 B_FALSE); 273 error = EINVAL; 274 goto unlock_done; 275 } 276 277 /* no data */ 278 if (msg_len == 0) { 279 sctp_sendfail_event(sctp, dupmsg(mproto), 280 SCTP_ERR_NO_USR_DATA, B_FALSE); 281 error = EINVAL; 282 goto unlock_done; 283 } 284 285 /* Add it to the unsent list */ 286 if (sctp->sctp_xmit_unsent == NULL) { 287 sctp->sctp_xmit_unsent = sctp->sctp_xmit_unsent_tail = mproto; 288 } else { 289 sctp->sctp_xmit_unsent_tail->b_next = mproto; 290 sctp->sctp_xmit_unsent_tail = mproto; 291 } 292 sctp->sctp_unsent += msg_len; 293 BUMP_LOCAL(sctp->sctp_msgcount); 294 /* 295 * Notify sockfs if the tx queue is full. 296 */ 297 if (SCTP_TXQ_LEN(sctp) >= connp->conn_sndbuf) { 298 sctp->sctp_txq_full = 1; 299 sctp->sctp_ulp_xmitted(sctp->sctp_ulpd, B_TRUE); 300 } 301 if (sctp->sctp_state == SCTPS_ESTABLISHED) 302 sctp_output(sctp, UINT_MAX); 303 done2: 304 WAKE_SCTP(sctp); 305 return (0); 306 unlock_done: 307 WAKE_SCTP(sctp); 308 done: 309 return (error); 310 } 311 312 /* 313 * While there are messages on sctp_xmit_unsent, detach each one. For each: 314 * allocate space for the chunk header, fill in the data chunk, and fill in 315 * the chunk header. Then append it to sctp_xmit_tail. 316 * Return after appending as many bytes as required (bytes_to_send). 317 * We also return if we've appended one or more chunks, and find a subsequent 318 * unsent message is too big to fit in the segment. 319 */ 320 mblk_t * 321 sctp_chunkify(sctp_t *sctp, int mss, int firstseg_len, int bytes_to_send) 322 { 323 mblk_t *mp; 324 mblk_t *chunk_mp; 325 mblk_t *chunk_head; 326 mblk_t *chunk_hdr; 327 mblk_t *chunk_tail = NULL; 328 int count; 329 int chunksize; 330 sctp_data_hdr_t *sdc; 331 mblk_t *mdblk = sctp->sctp_xmit_unsent; 332 sctp_faddr_t *fp; 333 sctp_faddr_t *fp1; 334 size_t xtralen; 335 sctp_msg_hdr_t *msg_hdr; 336 sctp_stack_t *sctps = sctp->sctp_sctps; 337 sctp_msg_hdr_t *next_msg_hdr; 338 size_t nextlen; 339 int remaining_len = mss - firstseg_len; 340 341 ASSERT(remaining_len >= 0); 342 343 fp = SCTP_CHUNK_DEST(mdblk); 344 if (fp == NULL) 345 fp = sctp->sctp_current; 346 if (fp->isv4) 347 xtralen = sctp->sctp_hdr_len + sctps->sctps_wroff_xtra + 348 sizeof (*sdc); 349 else 350 xtralen = sctp->sctp_hdr6_len + sctps->sctps_wroff_xtra + 351 sizeof (*sdc); 352 count = chunksize = remaining_len - sizeof (*sdc); 353 nextmsg: 354 next_msg_hdr = (sctp_msg_hdr_t *)sctp->sctp_xmit_unsent->b_rptr; 355 nextlen = next_msg_hdr->smh_msglen; 356 /* 357 * Will the entire next message fit in the current packet ? 358 * if not, leave it on the unsent list. 359 */ 360 if ((firstseg_len != 0) && (nextlen > remaining_len)) 361 return (NULL); 362 363 chunk_mp = mdblk->b_cont; 364 365 /* 366 * If this partially chunked, we ignore the next one for now and 367 * use the one already present. For the unchunked bits, we use the 368 * length of the last chunk. 369 */ 370 if (SCTP_IS_MSG_CHUNKED(mdblk)) { 371 int chunk_len; 372 373 ASSERT(chunk_mp->b_next != NULL); 374 mdblk->b_cont = chunk_mp->b_next; 375 chunk_mp->b_next = NULL; 376 SCTP_MSG_CLEAR_CHUNKED(mdblk); 377 mp = mdblk->b_cont; 378 while (mp->b_next != NULL) 379 mp = mp->b_next; 380 chunk_len = ntohs(((sctp_data_hdr_t *)mp->b_rptr)->sdh_len); 381 if (fp->sfa_pmss - chunk_len > sizeof (*sdc)) 382 count = chunksize = fp->sfa_pmss - chunk_len; 383 else 384 count = chunksize = fp->sfa_pmss; 385 count = chunksize = count - sizeof (*sdc); 386 } else { 387 msg_hdr = (sctp_msg_hdr_t *)mdblk->b_rptr; 388 if (SCTP_MSG_TO_BE_ABANDONED(mdblk, msg_hdr, sctp)) { 389 sctp->sctp_xmit_unsent = mdblk->b_next; 390 if (sctp->sctp_xmit_unsent == NULL) 391 sctp->sctp_xmit_unsent_tail = NULL; 392 ASSERT(sctp->sctp_unsent >= msg_hdr->smh_msglen); 393 sctp->sctp_unsent -= msg_hdr->smh_msglen; 394 mdblk->b_next = NULL; 395 BUMP_LOCAL(sctp->sctp_prsctpdrop); 396 /* 397 * Update ULP the amount of queued data, which is 398 * sent-unack'ed + unsent. 399 */ 400 if (!SCTP_IS_DETACHED(sctp)) 401 SCTP_TXQ_UPDATE(sctp); 402 sctp_sendfail_event(sctp, mdblk, 0, B_FALSE); 403 goto try_next; 404 } 405 mdblk->b_cont = NULL; 406 } 407 msg_hdr = (sctp_msg_hdr_t *)mdblk->b_rptr; 408 nextchunk: 409 chunk_head = chunk_mp; 410 chunk_tail = NULL; 411 412 /* Skip as many mblk's as we need */ 413 while (chunk_mp != NULL && ((count - MBLKL(chunk_mp)) >= 0)) { 414 count -= MBLKL(chunk_mp); 415 chunk_tail = chunk_mp; 416 chunk_mp = chunk_mp->b_cont; 417 } 418 /* Split the chain, if needed */ 419 if (chunk_mp != NULL) { 420 if (count > 0) { 421 mblk_t *split_mp = dupb(chunk_mp); 422 423 if (split_mp == NULL) { 424 if (mdblk->b_cont == NULL) { 425 mdblk->b_cont = chunk_head; 426 } else { 427 SCTP_MSG_SET_CHUNKED(mdblk); 428 ASSERT(chunk_head->b_next == NULL); 429 chunk_head->b_next = mdblk->b_cont; 430 mdblk->b_cont = chunk_head; 431 } 432 return (sctp->sctp_xmit_tail); 433 } 434 if (chunk_tail != NULL) { 435 chunk_tail->b_cont = split_mp; 436 chunk_tail = chunk_tail->b_cont; 437 } else { 438 chunk_head = chunk_tail = split_mp; 439 } 440 chunk_tail->b_wptr = chunk_tail->b_rptr + count; 441 chunk_mp->b_rptr = chunk_tail->b_wptr; 442 count = 0; 443 } else if (chunk_tail == NULL) { 444 goto next; 445 } else { 446 chunk_tail->b_cont = NULL; 447 } 448 } 449 /* Alloc chunk hdr, if needed */ 450 if (DB_REF(chunk_head) > 1 || 451 ((intptr_t)chunk_head->b_rptr) & (SCTP_ALIGN - 1) || 452 MBLKHEAD(chunk_head) < sizeof (*sdc)) { 453 if ((chunk_hdr = allocb(xtralen, BPRI_MED)) == NULL) { 454 if (mdblk->b_cont == NULL) { 455 if (chunk_mp != NULL) 456 linkb(chunk_head, chunk_mp); 457 mdblk->b_cont = chunk_head; 458 } else { 459 SCTP_MSG_SET_CHUNKED(mdblk); 460 if (chunk_mp != NULL) 461 linkb(chunk_head, chunk_mp); 462 ASSERT(chunk_head->b_next == NULL); 463 chunk_head->b_next = mdblk->b_cont; 464 mdblk->b_cont = chunk_head; 465 } 466 return (sctp->sctp_xmit_tail); 467 } 468 chunk_hdr->b_rptr += xtralen - sizeof (*sdc); 469 chunk_hdr->b_wptr = chunk_hdr->b_rptr + sizeof (*sdc); 470 chunk_hdr->b_cont = chunk_head; 471 } else { 472 chunk_hdr = chunk_head; 473 chunk_hdr->b_rptr -= sizeof (*sdc); 474 } 475 ASSERT(chunk_hdr->b_datap->db_ref == 1); 476 sdc = (sctp_data_hdr_t *)chunk_hdr->b_rptr; 477 sdc->sdh_id = CHUNK_DATA; 478 sdc->sdh_flags = 0; 479 sdc->sdh_len = htons(sizeof (*sdc) + chunksize - count); 480 ASSERT(sdc->sdh_len); 481 sdc->sdh_sid = htons(msg_hdr->smh_sid); 482 /* 483 * We defer assigning the SSN just before sending the chunk, else 484 * if we drop the chunk in sctp_get_msg_to_send(), we would need 485 * to send a Forward TSN to let the peer know. Some more comments 486 * about this in sctp_impl.h for SCTP_CHUNK_SENT. 487 */ 488 sdc->sdh_payload_id = msg_hdr->smh_ppid; 489 490 if (mdblk->b_cont == NULL) { 491 mdblk->b_cont = chunk_hdr; 492 SCTP_DATA_SET_BBIT(sdc); 493 } else { 494 mp = mdblk->b_cont; 495 while (mp->b_next != NULL) 496 mp = mp->b_next; 497 mp->b_next = chunk_hdr; 498 } 499 500 bytes_to_send -= (chunksize - count); 501 if (chunk_mp != NULL) { 502 next: 503 count = chunksize = fp->sfa_pmss - sizeof (*sdc); 504 goto nextchunk; 505 } 506 SCTP_DATA_SET_EBIT(sdc); 507 sctp->sctp_xmit_unsent = mdblk->b_next; 508 if (mdblk->b_next == NULL) { 509 sctp->sctp_xmit_unsent_tail = NULL; 510 } 511 mdblk->b_next = NULL; 512 513 if (sctp->sctp_xmit_tail == NULL) { 514 sctp->sctp_xmit_head = sctp->sctp_xmit_tail = mdblk; 515 } else { 516 mp = sctp->sctp_xmit_tail; 517 while (mp->b_next != NULL) 518 mp = mp->b_next; 519 mp->b_next = mdblk; 520 mdblk->b_prev = mp; 521 } 522 try_next: 523 if (bytes_to_send > 0 && sctp->sctp_xmit_unsent != NULL) { 524 mdblk = sctp->sctp_xmit_unsent; 525 fp1 = SCTP_CHUNK_DEST(mdblk); 526 if (fp1 == NULL) 527 fp1 = sctp->sctp_current; 528 if (fp == fp1) { 529 size_t len = MBLKL(mdblk->b_cont); 530 if ((count > 0) && 531 ((len > fp->sfa_pmss - sizeof (*sdc)) || 532 (len <= count))) { 533 count -= sizeof (*sdc); 534 count = chunksize = count - (count & 0x3); 535 } else { 536 count = chunksize = fp->sfa_pmss - 537 sizeof (*sdc); 538 } 539 } else { 540 if (fp1->isv4) 541 xtralen = sctp->sctp_hdr_len; 542 else 543 xtralen = sctp->sctp_hdr6_len; 544 xtralen += sctps->sctps_wroff_xtra + sizeof (*sdc); 545 count = chunksize = fp1->sfa_pmss - sizeof (*sdc); 546 fp = fp1; 547 } 548 goto nextmsg; 549 } 550 return (sctp->sctp_xmit_tail); 551 } 552 553 void 554 sctp_free_msg(mblk_t *ump) 555 { 556 mblk_t *mp, *nmp; 557 558 for (mp = ump->b_cont; mp; mp = nmp) { 559 nmp = mp->b_next; 560 mp->b_next = mp->b_prev = NULL; 561 freemsg(mp); 562 } 563 ASSERT(!ump->b_prev); 564 ump->b_next = NULL; 565 freeb(ump); 566 } 567 568 mblk_t * 569 sctp_add_proto_hdr(sctp_t *sctp, sctp_faddr_t *fp, mblk_t *mp, int sacklen, 570 int *error) 571 { 572 int hdrlen; 573 uchar_t *hdr; 574 int isv4 = fp->isv4; 575 sctp_stack_t *sctps = sctp->sctp_sctps; 576 577 if (error != NULL) 578 *error = 0; 579 580 if (isv4) { 581 hdrlen = sctp->sctp_hdr_len; 582 hdr = sctp->sctp_iphc; 583 } else { 584 hdrlen = sctp->sctp_hdr6_len; 585 hdr = sctp->sctp_iphc6; 586 } 587 /* 588 * A reject|blackhole could mean that the address is 'down'. Similarly, 589 * it is possible that the address went down, we tried to send an 590 * heartbeat and ended up setting fp->saddr as unspec because we 591 * didn't have any usable source address. In either case 592 * sctp_get_dest() will try find an IRE, if available, and set 593 * the source address, if needed. If we still don't have any 594 * usable source address, fp->state will be SCTP_FADDRS_UNREACH and 595 * we return EHOSTUNREACH. 596 */ 597 ASSERT(fp->ixa->ixa_ire != NULL); 598 if ((fp->ixa->ixa_ire->ire_flags & (RTF_REJECT|RTF_BLACKHOLE)) || 599 SCTP_IS_ADDR_UNSPEC(fp->isv4, fp->saddr)) { 600 sctp_get_dest(sctp, fp); 601 if (fp->state == SCTP_FADDRS_UNREACH) { 602 if (error != NULL) 603 *error = EHOSTUNREACH; 604 return (NULL); 605 } 606 } 607 /* Copy in IP header. */ 608 if ((mp->b_rptr - mp->b_datap->db_base) < 609 (sctps->sctps_wroff_xtra + hdrlen + sacklen) || DB_REF(mp) > 2) { 610 mblk_t *nmp; 611 612 /* 613 * This can happen if IP headers are adjusted after 614 * data was moved into chunks, or during retransmission, 615 * or things like snoop is running. 616 */ 617 nmp = allocb(sctps->sctps_wroff_xtra + hdrlen + sacklen, 618 BPRI_MED); 619 if (nmp == NULL) { 620 if (error != NULL) 621 *error = ENOMEM; 622 return (NULL); 623 } 624 nmp->b_rptr += sctps->sctps_wroff_xtra; 625 nmp->b_wptr = nmp->b_rptr + hdrlen + sacklen; 626 nmp->b_cont = mp; 627 mp = nmp; 628 } else { 629 mp->b_rptr -= (hdrlen + sacklen); 630 } 631 bcopy(hdr, mp->b_rptr, hdrlen); 632 if (sacklen) { 633 sctp_fill_sack(sctp, mp->b_rptr + hdrlen, sacklen); 634 } 635 if (fp != sctp->sctp_current) { 636 /* change addresses in header */ 637 if (isv4) { 638 ipha_t *iph = (ipha_t *)mp->b_rptr; 639 640 IN6_V4MAPPED_TO_IPADDR(&fp->faddr, iph->ipha_dst); 641 if (!IN6_IS_ADDR_V4MAPPED_ANY(&fp->saddr)) { 642 IN6_V4MAPPED_TO_IPADDR(&fp->saddr, 643 iph->ipha_src); 644 } else if (sctp->sctp_bound_to_all) { 645 iph->ipha_src = INADDR_ANY; 646 } 647 } else { 648 ip6_t *ip6h = (ip6_t *)mp->b_rptr; 649 650 ip6h->ip6_dst = fp->faddr; 651 if (!IN6_IS_ADDR_UNSPECIFIED(&fp->saddr)) { 652 ip6h->ip6_src = fp->saddr; 653 } else if (sctp->sctp_bound_to_all) { 654 ip6h->ip6_src = ipv6_all_zeros; 655 } 656 } 657 } 658 return (mp); 659 } 660 661 /* 662 * SCTP requires every chunk to be padded so that the total length 663 * is a multiple of SCTP_ALIGN. This function returns a mblk with 664 * the specified pad length. 665 */ 666 static mblk_t * 667 sctp_get_padding(sctp_t *sctp, int pad) 668 { 669 mblk_t *fill; 670 671 ASSERT(pad < SCTP_ALIGN); 672 ASSERT(sctp->sctp_pad_mp != NULL); 673 if ((fill = dupb(sctp->sctp_pad_mp)) != NULL) { 674 fill->b_wptr += pad; 675 return (fill); 676 } 677 678 /* 679 * The memory saving path of reusing the sctp_pad_mp 680 * fails may be because it has been dupb() too 681 * many times (DBLK_REFMAX). Use the memory consuming 682 * path of allocating the pad mblk. 683 */ 684 if ((fill = allocb(SCTP_ALIGN, BPRI_MED)) != NULL) { 685 /* Zero it out. SCTP_ALIGN is sizeof (int32_t) */ 686 *(int32_t *)fill->b_rptr = 0; 687 fill->b_wptr += pad; 688 } 689 return (fill); 690 } 691 692 static mblk_t * 693 sctp_find_fast_rexmit_mblks(sctp_t *sctp, int *total, sctp_faddr_t **fp) 694 { 695 mblk_t *meta; 696 mblk_t *start_mp = NULL; 697 mblk_t *end_mp = NULL; 698 mblk_t *mp, *nmp; 699 mblk_t *fill; 700 sctp_data_hdr_t *sdh; 701 int msglen; 702 int extra; 703 sctp_msg_hdr_t *msg_hdr; 704 sctp_faddr_t *old_fp = NULL; 705 sctp_faddr_t *chunk_fp; 706 sctp_stack_t *sctps = sctp->sctp_sctps; 707 708 for (meta = sctp->sctp_xmit_head; meta != NULL; meta = meta->b_next) { 709 msg_hdr = (sctp_msg_hdr_t *)meta->b_rptr; 710 if (SCTP_IS_MSG_ABANDONED(meta) || 711 SCTP_MSG_TO_BE_ABANDONED(meta, msg_hdr, sctp)) { 712 continue; 713 } 714 for (mp = meta->b_cont; mp != NULL; mp = mp->b_next) { 715 if (SCTP_CHUNK_WANT_REXMIT(mp)) { 716 /* 717 * Use the same peer address to do fast 718 * retransmission. If the original peer 719 * address is dead, switch to the current 720 * one. Record the old one so that we 721 * will pick the chunks sent to the old 722 * one for fast retransmission. 723 */ 724 chunk_fp = SCTP_CHUNK_DEST(mp); 725 if (*fp == NULL) { 726 *fp = chunk_fp; 727 if ((*fp)->state != SCTP_FADDRS_ALIVE) { 728 old_fp = *fp; 729 *fp = sctp->sctp_current; 730 } 731 } else if (old_fp == NULL && *fp != chunk_fp) { 732 continue; 733 } else if (old_fp != NULL && 734 old_fp != chunk_fp) { 735 continue; 736 } 737 738 sdh = (sctp_data_hdr_t *)mp->b_rptr; 739 msglen = ntohs(sdh->sdh_len); 740 if ((extra = msglen & (SCTP_ALIGN - 1)) != 0) { 741 extra = SCTP_ALIGN - extra; 742 } 743 744 /* 745 * We still return at least the first message 746 * even if that message cannot fit in as 747 * PMTU may have changed. 748 */ 749 if (*total + msglen + extra > 750 (*fp)->sfa_pmss && start_mp != NULL) { 751 return (start_mp); 752 } 753 if ((nmp = dupmsg(mp)) == NULL) 754 return (start_mp); 755 if (extra > 0) { 756 fill = sctp_get_padding(sctp, extra); 757 if (fill != NULL) { 758 linkb(nmp, fill); 759 } else { 760 return (start_mp); 761 } 762 } 763 BUMP_MIB(&sctps->sctps_mib, sctpOutFastRetrans); 764 BUMP_LOCAL(sctp->sctp_rxtchunks); 765 SCTP_CHUNK_CLEAR_REXMIT(mp); 766 if (start_mp == NULL) { 767 start_mp = nmp; 768 } else { 769 linkb(end_mp, nmp); 770 } 771 end_mp = nmp; 772 *total += msglen + extra; 773 dprint(2, ("sctp_find_fast_rexmit_mblks: " 774 "tsn %x\n", sdh->sdh_tsn)); 775 } 776 } 777 } 778 /* Clear the flag as there is no more message to be fast rexmitted. */ 779 sctp->sctp_chk_fast_rexmit = B_FALSE; 780 return (start_mp); 781 } 782 783 /* A debug function just to make sure that a mblk chain is not broken */ 784 #ifdef DEBUG 785 static boolean_t 786 sctp_verify_chain(mblk_t *head, mblk_t *tail) 787 { 788 mblk_t *mp = head; 789 790 if (head == NULL || tail == NULL) 791 return (B_TRUE); 792 while (mp != NULL) { 793 if (mp == tail) 794 return (B_TRUE); 795 mp = mp->b_next; 796 } 797 return (B_FALSE); 798 } 799 #endif 800 801 /* 802 * Gets the next unsent chunk to transmit. Messages that are abandoned are 803 * skipped. A message can be abandoned if it has a non-zero timetolive and 804 * transmission has not yet started or if it is a partially reliable 805 * message and its time is up (assuming we are PR-SCTP aware). 806 * We only return a chunk if it will fit entirely in the current packet. 807 * 'cansend' is used to determine if need to try and chunkify messages from 808 * the unsent list, if any, and also as an input to sctp_chunkify() if so. 809 * 810 * firstseg_len indicates the space already used, cansend represents remaining 811 * space in the window, ((sfa_pmss - firstseg_len) can therefore reasonably 812 * be used to compute the cansend arg). 813 */ 814 mblk_t * 815 sctp_get_msg_to_send(sctp_t *sctp, mblk_t **mp, mblk_t *meta, int *error, 816 int32_t firstseg_len, uint32_t cansend, sctp_faddr_t *fp) 817 { 818 mblk_t *mp1; 819 sctp_msg_hdr_t *msg_hdr; 820 mblk_t *tmp_meta; 821 sctp_faddr_t *fp1; 822 823 ASSERT(error != NULL && mp != NULL); 824 *error = 0; 825 826 ASSERT(sctp->sctp_current != NULL); 827 828 chunkified: 829 while (meta != NULL) { 830 tmp_meta = meta->b_next; 831 msg_hdr = (sctp_msg_hdr_t *)meta->b_rptr; 832 mp1 = meta->b_cont; 833 if (SCTP_IS_MSG_ABANDONED(meta)) 834 goto next_msg; 835 if (!SCTP_MSG_TO_BE_ABANDONED(meta, msg_hdr, sctp)) { 836 while (mp1 != NULL) { 837 if (SCTP_CHUNK_CANSEND(mp1)) { 838 *mp = mp1; 839 #ifdef DEBUG 840 ASSERT(sctp_verify_chain( 841 sctp->sctp_xmit_head, meta)); 842 #endif 843 return (meta); 844 } 845 mp1 = mp1->b_next; 846 } 847 goto next_msg; 848 } 849 /* 850 * If we come here and the first chunk is sent, then we 851 * we are PR-SCTP aware, in which case if the cumulative 852 * TSN has moved upto or beyond the first chunk (which 853 * means all the previous messages have been cumulative 854 * SACK'd), then we send a Forward TSN with the last 855 * chunk that was sent in this message. If we can't send 856 * a Forward TSN because previous non-abandoned messages 857 * have not been acked then we will defer the Forward TSN 858 * to sctp_rexmit() or sctp_cumack(). 859 */ 860 if (SCTP_CHUNK_ISSENT(mp1)) { 861 *error = sctp_check_abandoned_msg(sctp, meta); 862 if (*error != 0) { 863 #ifdef DEBUG 864 ASSERT(sctp_verify_chain(sctp->sctp_xmit_head, 865 sctp->sctp_xmit_tail)); 866 #endif 867 return (NULL); 868 } 869 goto next_msg; 870 } 871 BUMP_LOCAL(sctp->sctp_prsctpdrop); 872 ASSERT(sctp->sctp_unsent >= msg_hdr->smh_msglen); 873 if (meta->b_prev == NULL) { 874 ASSERT(sctp->sctp_xmit_head == meta); 875 sctp->sctp_xmit_head = tmp_meta; 876 if (sctp->sctp_xmit_tail == meta) 877 sctp->sctp_xmit_tail = tmp_meta; 878 meta->b_next = NULL; 879 if (tmp_meta != NULL) 880 tmp_meta->b_prev = NULL; 881 } else if (meta->b_next == NULL) { 882 if (sctp->sctp_xmit_tail == meta) 883 sctp->sctp_xmit_tail = meta->b_prev; 884 meta->b_prev->b_next = NULL; 885 meta->b_prev = NULL; 886 } else { 887 meta->b_prev->b_next = tmp_meta; 888 tmp_meta->b_prev = meta->b_prev; 889 if (sctp->sctp_xmit_tail == meta) 890 sctp->sctp_xmit_tail = tmp_meta; 891 meta->b_prev = NULL; 892 meta->b_next = NULL; 893 } 894 sctp->sctp_unsent -= msg_hdr->smh_msglen; 895 /* 896 * Update ULP the amount of queued data, which is 897 * sent-unack'ed + unsent. 898 */ 899 if (!SCTP_IS_DETACHED(sctp)) 900 SCTP_TXQ_UPDATE(sctp); 901 sctp_sendfail_event(sctp, meta, 0, B_TRUE); 902 next_msg: 903 meta = tmp_meta; 904 } 905 /* chunkify, if needed */ 906 if (cansend > 0 && sctp->sctp_xmit_unsent != NULL) { 907 ASSERT(sctp->sctp_unsent > 0); 908 if (fp == NULL) { 909 fp = SCTP_CHUNK_DEST(sctp->sctp_xmit_unsent); 910 if (fp == NULL || fp->state != SCTP_FADDRS_ALIVE) 911 fp = sctp->sctp_current; 912 } else { 913 /* 914 * If user specified destination, try to honor that. 915 */ 916 fp1 = SCTP_CHUNK_DEST(sctp->sctp_xmit_unsent); 917 if (fp1 != NULL && fp1->state == SCTP_FADDRS_ALIVE && 918 fp1 != fp) { 919 goto chunk_done; 920 } 921 } 922 meta = sctp_chunkify(sctp, fp->sfa_pmss, firstseg_len, cansend); 923 if (meta == NULL) 924 goto chunk_done; 925 /* 926 * sctp_chunkify() won't advance sctp_xmit_tail if it adds 927 * new chunk(s) to the tail, so we need to skip the 928 * sctp_xmit_tail, which would have already been processed. 929 * This could happen when there is unacked chunks, but 930 * nothing new to send. 931 * When sctp_chunkify() is called when the transmit queue 932 * is empty then we need to start from sctp_xmit_tail. 933 */ 934 if (SCTP_CHUNK_ISSENT(sctp->sctp_xmit_tail->b_cont)) { 935 #ifdef DEBUG 936 mp1 = sctp->sctp_xmit_tail->b_cont; 937 while (mp1 != NULL) { 938 ASSERT(!SCTP_CHUNK_CANSEND(mp1)); 939 mp1 = mp1->b_next; 940 } 941 #endif 942 if ((meta = sctp->sctp_xmit_tail->b_next) == NULL) 943 goto chunk_done; 944 } 945 goto chunkified; 946 } 947 chunk_done: 948 #ifdef DEBUG 949 ASSERT(sctp_verify_chain(sctp->sctp_xmit_head, sctp->sctp_xmit_tail)); 950 #endif 951 return (NULL); 952 } 953 954 void 955 sctp_fast_rexmit(sctp_t *sctp) 956 { 957 mblk_t *mp, *head; 958 int pktlen = 0; 959 sctp_faddr_t *fp = NULL; 960 sctp_stack_t *sctps = sctp->sctp_sctps; 961 962 ASSERT(sctp->sctp_xmit_head != NULL); 963 mp = sctp_find_fast_rexmit_mblks(sctp, &pktlen, &fp); 964 if (mp == NULL) { 965 SCTP_KSTAT(sctps, sctp_fr_not_found); 966 return; 967 } 968 if ((head = sctp_add_proto_hdr(sctp, fp, mp, 0, NULL)) == NULL) { 969 freemsg(mp); 970 SCTP_KSTAT(sctps, sctp_fr_add_hdr); 971 return; 972 } 973 if ((pktlen > fp->sfa_pmss) && fp->isv4) { 974 ipha_t *iph = (ipha_t *)head->b_rptr; 975 976 iph->ipha_fragment_offset_and_flags = 0; 977 } 978 979 sctp_set_iplen(sctp, head, fp->ixa); 980 (void) conn_ip_output(head, fp->ixa); 981 BUMP_LOCAL(sctp->sctp_opkts); 982 sctp->sctp_active = fp->lastactive = ddi_get_lbolt64(); 983 } 984 985 void 986 sctp_output(sctp_t *sctp, uint_t num_pkt) 987 { 988 mblk_t *mp = NULL; 989 mblk_t *nmp; 990 mblk_t *head; 991 mblk_t *meta = sctp->sctp_xmit_tail; 992 mblk_t *fill = NULL; 993 uint16_t chunklen; 994 uint32_t cansend; 995 int32_t seglen; 996 int32_t xtralen; 997 int32_t sacklen; 998 int32_t pad = 0; 999 int32_t pathmax; 1000 int extra; 1001 int64_t now = ddi_get_lbolt64(); 1002 sctp_faddr_t *fp; 1003 sctp_faddr_t *lfp; 1004 sctp_data_hdr_t *sdc; 1005 int error; 1006 boolean_t notsent = B_TRUE; 1007 sctp_stack_t *sctps = sctp->sctp_sctps; 1008 1009 if (sctp->sctp_ftsn == sctp->sctp_lastacked + 1) { 1010 sacklen = 0; 1011 } else { 1012 /* send a SACK chunk */ 1013 sacklen = sizeof (sctp_chunk_hdr_t) + 1014 sizeof (sctp_sack_chunk_t) + 1015 (sizeof (sctp_sack_frag_t) * sctp->sctp_sack_gaps); 1016 lfp = sctp->sctp_lastdata; 1017 ASSERT(lfp != NULL); 1018 if (lfp->state != SCTP_FADDRS_ALIVE) 1019 lfp = sctp->sctp_current; 1020 } 1021 1022 cansend = sctp->sctp_frwnd; 1023 if (sctp->sctp_unsent < cansend) 1024 cansend = sctp->sctp_unsent; 1025 1026 /* 1027 * Start persist timer if unable to send or when 1028 * trying to send into a zero window. This timer 1029 * ensures the blocked send attempt is retried. 1030 */ 1031 if ((cansend < sctp->sctp_current->sfa_pmss / 2) && 1032 (sctp->sctp_unacked != 0) && 1033 (sctp->sctp_unacked < sctp->sctp_current->sfa_pmss) && 1034 !sctp->sctp_ndelay || 1035 (cansend == 0 && sctp->sctp_unacked == 0 && 1036 sctp->sctp_unsent != 0)) { 1037 head = NULL; 1038 fp = sctp->sctp_current; 1039 goto unsent_data; 1040 } 1041 if (meta != NULL) 1042 mp = meta->b_cont; 1043 while (cansend > 0 && num_pkt-- != 0) { 1044 pad = 0; 1045 1046 /* 1047 * Find first segment eligible for transmit. 1048 */ 1049 while (mp != NULL) { 1050 if (SCTP_CHUNK_CANSEND(mp)) 1051 break; 1052 mp = mp->b_next; 1053 } 1054 if (mp == NULL) { 1055 meta = sctp_get_msg_to_send(sctp, &mp, 1056 meta == NULL ? NULL : meta->b_next, &error, sacklen, 1057 cansend, NULL); 1058 if (error != 0 || meta == NULL) { 1059 head = NULL; 1060 fp = sctp->sctp_current; 1061 goto unsent_data; 1062 } 1063 sctp->sctp_xmit_tail = meta; 1064 } 1065 1066 sdc = (sctp_data_hdr_t *)mp->b_rptr; 1067 seglen = ntohs(sdc->sdh_len); 1068 xtralen = sizeof (*sdc); 1069 chunklen = seglen - xtralen; 1070 1071 /* 1072 * Check rwnd. 1073 */ 1074 if (chunklen > cansend) { 1075 head = NULL; 1076 fp = SCTP_CHUNK_DEST(meta); 1077 if (fp == NULL || fp->state != SCTP_FADDRS_ALIVE) 1078 fp = sctp->sctp_current; 1079 goto unsent_data; 1080 } 1081 if ((extra = seglen & (SCTP_ALIGN - 1)) != 0) 1082 extra = SCTP_ALIGN - extra; 1083 1084 /* 1085 * Pick destination address, and check cwnd. 1086 */ 1087 if (sacklen > 0 && (seglen + extra <= lfp->cwnd - lfp->suna) && 1088 (seglen + sacklen + extra <= lfp->sfa_pmss)) { 1089 /* 1090 * Only include SACK chunk if it can be bundled 1091 * with a data chunk, and sent to sctp_lastdata. 1092 */ 1093 pathmax = lfp->cwnd - lfp->suna; 1094 1095 fp = lfp; 1096 if ((nmp = dupmsg(mp)) == NULL) { 1097 head = NULL; 1098 goto unsent_data; 1099 } 1100 SCTP_CHUNK_CLEAR_FLAGS(nmp); 1101 head = sctp_add_proto_hdr(sctp, fp, nmp, sacklen, 1102 &error); 1103 if (head == NULL) { 1104 /* 1105 * If none of the source addresses are 1106 * available (i.e error == EHOSTUNREACH), 1107 * pretend we have sent the data. We will 1108 * eventually time out trying to retramsmit 1109 * the data if the interface never comes up. 1110 * If we have already sent some stuff (i.e., 1111 * notsent is B_FALSE) then we are fine, else 1112 * just mark this packet as sent. 1113 */ 1114 if (notsent && error == EHOSTUNREACH) { 1115 SCTP_CHUNK_SENT(sctp, mp, sdc, 1116 fp, chunklen, meta); 1117 } 1118 freemsg(nmp); 1119 SCTP_KSTAT(sctps, sctp_output_failed); 1120 goto unsent_data; 1121 } 1122 seglen += sacklen; 1123 xtralen += sacklen; 1124 sacklen = 0; 1125 } else { 1126 fp = SCTP_CHUNK_DEST(meta); 1127 if (fp == NULL || fp->state != SCTP_FADDRS_ALIVE) 1128 fp = sctp->sctp_current; 1129 /* 1130 * If we haven't sent data to this destination for 1131 * a while, do slow start again. 1132 */ 1133 if (now - fp->lastactive > fp->rto) { 1134 SET_CWND(fp, fp->sfa_pmss, 1135 sctps->sctps_slow_start_after_idle); 1136 } 1137 1138 pathmax = fp->cwnd - fp->suna; 1139 if (seglen + extra > pathmax) { 1140 head = NULL; 1141 goto unsent_data; 1142 } 1143 if ((nmp = dupmsg(mp)) == NULL) { 1144 head = NULL; 1145 goto unsent_data; 1146 } 1147 SCTP_CHUNK_CLEAR_FLAGS(nmp); 1148 head = sctp_add_proto_hdr(sctp, fp, nmp, 0, &error); 1149 if (head == NULL) { 1150 /* 1151 * If none of the source addresses are 1152 * available (i.e error == EHOSTUNREACH), 1153 * pretend we have sent the data. We will 1154 * eventually time out trying to retramsmit 1155 * the data if the interface never comes up. 1156 * If we have already sent some stuff (i.e., 1157 * notsent is B_FALSE) then we are fine, else 1158 * just mark this packet as sent. 1159 */ 1160 if (notsent && error == EHOSTUNREACH) { 1161 SCTP_CHUNK_SENT(sctp, mp, sdc, 1162 fp, chunklen, meta); 1163 } 1164 freemsg(nmp); 1165 SCTP_KSTAT(sctps, sctp_output_failed); 1166 goto unsent_data; 1167 } 1168 } 1169 fp->lastactive = now; 1170 if (pathmax > fp->sfa_pmss) 1171 pathmax = fp->sfa_pmss; 1172 SCTP_CHUNK_SENT(sctp, mp, sdc, fp, chunklen, meta); 1173 mp = mp->b_next; 1174 1175 /* Use this chunk to measure RTT? */ 1176 if (sctp->sctp_out_time == 0) { 1177 sctp->sctp_out_time = now; 1178 sctp->sctp_rtt_tsn = sctp->sctp_ltsn - 1; 1179 ASSERT(sctp->sctp_rtt_tsn == ntohl(sdc->sdh_tsn)); 1180 } 1181 if (extra > 0) { 1182 fill = sctp_get_padding(sctp, extra); 1183 if (fill != NULL) { 1184 linkb(head, fill); 1185 pad = extra; 1186 seglen += extra; 1187 } else { 1188 goto unsent_data; 1189 } 1190 } 1191 /* 1192 * Bundle chunks. We linkb() the chunks together to send 1193 * downstream in a single packet. 1194 * Partial chunks MUST NOT be bundled with full chunks, so we 1195 * rely on sctp_get_msg_to_send() to only return messages that 1196 * will fit entirely in the current packet. 1197 */ 1198 while (seglen < pathmax) { 1199 int32_t new_len; 1200 int32_t new_xtralen; 1201 1202 while (mp != NULL) { 1203 if (SCTP_CHUNK_CANSEND(mp)) 1204 break; 1205 mp = mp->b_next; 1206 } 1207 if (mp == NULL) { 1208 meta = sctp_get_msg_to_send(sctp, &mp, 1209 meta->b_next, &error, seglen, 1210 (seglen - xtralen) >= cansend ? 0 : 1211 cansend - seglen, fp); 1212 if (error != 0) 1213 break; 1214 /* If no more eligible chunks, cease bundling */ 1215 if (meta == NULL) 1216 break; 1217 sctp->sctp_xmit_tail = meta; 1218 } 1219 ASSERT(mp != NULL); 1220 if (!SCTP_CHUNK_ISSENT(mp) && SCTP_CHUNK_DEST(meta) && 1221 fp != SCTP_CHUNK_DEST(meta)) { 1222 break; 1223 } 1224 sdc = (sctp_data_hdr_t *)mp->b_rptr; 1225 chunklen = ntohs(sdc->sdh_len); 1226 if ((extra = chunklen & (SCTP_ALIGN - 1)) != 0) 1227 extra = SCTP_ALIGN - extra; 1228 1229 new_len = seglen + chunklen; 1230 new_xtralen = xtralen + sizeof (*sdc); 1231 chunklen -= sizeof (*sdc); 1232 1233 if (new_len - new_xtralen > cansend || 1234 new_len + extra > pathmax) { 1235 break; 1236 } 1237 if ((nmp = dupmsg(mp)) == NULL) 1238 break; 1239 if (extra > 0) { 1240 fill = sctp_get_padding(sctp, extra); 1241 if (fill != NULL) { 1242 pad += extra; 1243 new_len += extra; 1244 linkb(nmp, fill); 1245 } else { 1246 freemsg(nmp); 1247 break; 1248 } 1249 } 1250 seglen = new_len; 1251 xtralen = new_xtralen; 1252 SCTP_CHUNK_CLEAR_FLAGS(nmp); 1253 SCTP_CHUNK_SENT(sctp, mp, sdc, fp, chunklen, meta); 1254 linkb(head, nmp); 1255 mp = mp->b_next; 1256 } 1257 if ((seglen > fp->sfa_pmss) && fp->isv4) { 1258 ipha_t *iph = (ipha_t *)head->b_rptr; 1259 1260 /* 1261 * Path MTU is different from what we thought it would 1262 * be when we created chunks, or IP headers have grown. 1263 * Need to clear the DF bit. 1264 */ 1265 iph->ipha_fragment_offset_and_flags = 0; 1266 } 1267 /* xmit segment */ 1268 ASSERT(cansend >= seglen - pad - xtralen); 1269 cansend -= (seglen - pad - xtralen); 1270 dprint(2, ("sctp_output: Sending packet %d bytes, tsn %x " 1271 "ssn %d to %p (rwnd %d, cansend %d, lastack_rxd %x)\n", 1272 seglen - xtralen, ntohl(sdc->sdh_tsn), 1273 ntohs(sdc->sdh_ssn), (void *)fp, sctp->sctp_frwnd, 1274 cansend, sctp->sctp_lastack_rxd)); 1275 sctp_set_iplen(sctp, head, fp->ixa); 1276 (void) conn_ip_output(head, fp->ixa); 1277 BUMP_LOCAL(sctp->sctp_opkts); 1278 /* arm rto timer (if not set) */ 1279 if (!fp->timer_running) 1280 SCTP_FADDR_TIMER_RESTART(sctp, fp, fp->rto); 1281 notsent = B_FALSE; 1282 } 1283 sctp->sctp_active = now; 1284 return; 1285 unsent_data: 1286 /* arm persist timer (if rto timer not set) */ 1287 if (!fp->timer_running) 1288 SCTP_FADDR_TIMER_RESTART(sctp, fp, fp->rto); 1289 if (head != NULL) 1290 freemsg(head); 1291 } 1292 1293 /* 1294 * The following two functions initialize and destroy the cache 1295 * associated with the sets used for PR-SCTP. 1296 */ 1297 void 1298 sctp_ftsn_sets_init(void) 1299 { 1300 sctp_kmem_ftsn_set_cache = kmem_cache_create("sctp_ftsn_set_cache", 1301 sizeof (sctp_ftsn_set_t), 0, NULL, NULL, NULL, NULL, 1302 NULL, 0); 1303 } 1304 1305 void 1306 sctp_ftsn_sets_fini(void) 1307 { 1308 kmem_cache_destroy(sctp_kmem_ftsn_set_cache); 1309 } 1310 1311 1312 /* Free PR-SCTP sets */ 1313 void 1314 sctp_free_ftsn_set(sctp_ftsn_set_t *s) 1315 { 1316 sctp_ftsn_set_t *p; 1317 1318 while (s != NULL) { 1319 p = s->next; 1320 s->next = NULL; 1321 kmem_cache_free(sctp_kmem_ftsn_set_cache, s); 1322 s = p; 1323 } 1324 } 1325 1326 /* 1327 * Given a message meta block, meta, this routine creates or modifies 1328 * the set that will be used to generate a Forward TSN chunk. If the 1329 * entry for stream id, sid, for this message already exists, the 1330 * sequence number, ssn, is updated if it is greater than the existing 1331 * one. If an entry for this sid does not exist, one is created if 1332 * the size does not exceed fp->sfa_pmss. We return false in case 1333 * or an error. 1334 */ 1335 boolean_t 1336 sctp_add_ftsn_set(sctp_ftsn_set_t **s, sctp_faddr_t *fp, mblk_t *meta, 1337 uint_t *nsets, uint32_t *slen) 1338 { 1339 sctp_ftsn_set_t *p; 1340 sctp_msg_hdr_t *msg_hdr = (sctp_msg_hdr_t *)meta->b_rptr; 1341 uint16_t sid = htons(msg_hdr->smh_sid); 1342 /* msg_hdr->smh_ssn is already in NBO */ 1343 uint16_t ssn = msg_hdr->smh_ssn; 1344 1345 ASSERT(s != NULL && nsets != NULL); 1346 ASSERT((*nsets == 0 && *s == NULL) || (*nsets > 0 && *s != NULL)); 1347 1348 if (*s == NULL) { 1349 ASSERT((*slen + sizeof (uint32_t)) <= fp->sfa_pmss); 1350 *s = kmem_cache_alloc(sctp_kmem_ftsn_set_cache, KM_NOSLEEP); 1351 if (*s == NULL) 1352 return (B_FALSE); 1353 (*s)->ftsn_entries.ftsn_sid = sid; 1354 (*s)->ftsn_entries.ftsn_ssn = ssn; 1355 (*s)->next = NULL; 1356 *nsets = 1; 1357 *slen += sizeof (uint32_t); 1358 return (B_TRUE); 1359 } 1360 for (p = *s; p->next != NULL; p = p->next) { 1361 if (p->ftsn_entries.ftsn_sid == sid) { 1362 if (SSN_GT(ssn, p->ftsn_entries.ftsn_ssn)) 1363 p->ftsn_entries.ftsn_ssn = ssn; 1364 return (B_TRUE); 1365 } 1366 } 1367 /* the last one */ 1368 if (p->ftsn_entries.ftsn_sid == sid) { 1369 if (SSN_GT(ssn, p->ftsn_entries.ftsn_ssn)) 1370 p->ftsn_entries.ftsn_ssn = ssn; 1371 } else { 1372 if ((*slen + sizeof (uint32_t)) > fp->sfa_pmss) 1373 return (B_FALSE); 1374 p->next = kmem_cache_alloc(sctp_kmem_ftsn_set_cache, 1375 KM_NOSLEEP); 1376 if (p->next == NULL) 1377 return (B_FALSE); 1378 p = p->next; 1379 p->ftsn_entries.ftsn_sid = sid; 1380 p->ftsn_entries.ftsn_ssn = ssn; 1381 p->next = NULL; 1382 (*nsets)++; 1383 *slen += sizeof (uint32_t); 1384 } 1385 return (B_TRUE); 1386 } 1387 1388 /* 1389 * Given a set of stream id - sequence number pairs, this routing creates 1390 * a Forward TSN chunk. The cumulative TSN (advanced peer ack point) 1391 * for the chunk is obtained from sctp->sctp_adv_pap. The caller 1392 * will add the IP/SCTP header. 1393 */ 1394 mblk_t * 1395 sctp_make_ftsn_chunk(sctp_t *sctp, sctp_faddr_t *fp, sctp_ftsn_set_t *sets, 1396 uint_t nsets, uint32_t seglen) 1397 { 1398 mblk_t *ftsn_mp; 1399 sctp_chunk_hdr_t *ch_hdr; 1400 uint32_t *advtsn; 1401 uint16_t schlen; 1402 size_t xtralen; 1403 ftsn_entry_t *ftsn_entry; 1404 sctp_stack_t *sctps = sctp->sctp_sctps; 1405 1406 seglen += sizeof (sctp_chunk_hdr_t); 1407 if (fp->isv4) 1408 xtralen = sctp->sctp_hdr_len + sctps->sctps_wroff_xtra; 1409 else 1410 xtralen = sctp->sctp_hdr6_len + sctps->sctps_wroff_xtra; 1411 ftsn_mp = allocb(xtralen + seglen, BPRI_MED); 1412 if (ftsn_mp == NULL) 1413 return (NULL); 1414 ftsn_mp->b_rptr += xtralen; 1415 ftsn_mp->b_wptr = ftsn_mp->b_rptr + seglen; 1416 1417 ch_hdr = (sctp_chunk_hdr_t *)ftsn_mp->b_rptr; 1418 ch_hdr->sch_id = CHUNK_FORWARD_TSN; 1419 ch_hdr->sch_flags = 0; 1420 /* 1421 * The cast here should not be an issue since seglen is 1422 * the length of the Forward TSN chunk. 1423 */ 1424 schlen = (uint16_t)seglen; 1425 U16_TO_ABE16(schlen, &(ch_hdr->sch_len)); 1426 1427 advtsn = (uint32_t *)(ch_hdr + 1); 1428 U32_TO_ABE32(sctp->sctp_adv_pap, advtsn); 1429 ftsn_entry = (ftsn_entry_t *)(advtsn + 1); 1430 while (nsets > 0) { 1431 ASSERT((uchar_t *)&ftsn_entry[1] <= ftsn_mp->b_wptr); 1432 ftsn_entry->ftsn_sid = sets->ftsn_entries.ftsn_sid; 1433 ftsn_entry->ftsn_ssn = sets->ftsn_entries.ftsn_ssn; 1434 ftsn_entry++; 1435 sets = sets->next; 1436 nsets--; 1437 } 1438 return (ftsn_mp); 1439 } 1440 1441 /* 1442 * Given a starting message, the routine steps through all the 1443 * messages whose TSN is less than sctp->sctp_adv_pap and creates 1444 * ftsn sets. The ftsn sets is then used to create an Forward TSN 1445 * chunk. All the messages, that have chunks that are included in the 1446 * ftsn sets, are flagged abandonded. If a message is partially sent 1447 * and is deemed abandoned, all remaining unsent chunks are marked 1448 * abandoned and are deducted from sctp_unsent. 1449 */ 1450 void 1451 sctp_make_ftsns(sctp_t *sctp, mblk_t *meta, mblk_t *mp, mblk_t **nmp, 1452 sctp_faddr_t *fp, uint32_t *seglen) 1453 { 1454 mblk_t *mp1 = mp; 1455 mblk_t *mp_head = mp; 1456 mblk_t *meta_head = meta; 1457 mblk_t *head; 1458 sctp_ftsn_set_t *sets = NULL; 1459 uint_t nsets = 0; 1460 uint16_t clen; 1461 sctp_data_hdr_t *sdc; 1462 uint32_t sacklen; 1463 uint32_t adv_pap = sctp->sctp_adv_pap; 1464 uint32_t unsent = 0; 1465 boolean_t ubit; 1466 sctp_stack_t *sctps = sctp->sctp_sctps; 1467 1468 *seglen = sizeof (uint32_t); 1469 1470 sdc = (sctp_data_hdr_t *)mp1->b_rptr; 1471 while (meta != NULL && 1472 SEQ_GEQ(sctp->sctp_adv_pap, ntohl(sdc->sdh_tsn))) { 1473 /* 1474 * Skip adding FTSN sets for un-ordered messages as they do 1475 * not have SSNs. 1476 */ 1477 ubit = SCTP_DATA_GET_UBIT(sdc); 1478 if (!ubit && 1479 !sctp_add_ftsn_set(&sets, fp, meta, &nsets, seglen)) { 1480 meta = NULL; 1481 sctp->sctp_adv_pap = adv_pap; 1482 goto ftsn_done; 1483 } 1484 while (mp1 != NULL && SCTP_CHUNK_ISSENT(mp1)) { 1485 sdc = (sctp_data_hdr_t *)mp1->b_rptr; 1486 adv_pap = ntohl(sdc->sdh_tsn); 1487 mp1 = mp1->b_next; 1488 } 1489 meta = meta->b_next; 1490 if (meta != NULL) { 1491 mp1 = meta->b_cont; 1492 if (!SCTP_CHUNK_ISSENT(mp1)) 1493 break; 1494 sdc = (sctp_data_hdr_t *)mp1->b_rptr; 1495 } 1496 } 1497 ftsn_done: 1498 /* 1499 * Can't compare with sets == NULL, since we don't add any 1500 * sets for un-ordered messages. 1501 */ 1502 if (meta == meta_head) 1503 return; 1504 *nmp = sctp_make_ftsn_chunk(sctp, fp, sets, nsets, *seglen); 1505 sctp_free_ftsn_set(sets); 1506 if (*nmp == NULL) 1507 return; 1508 if (sctp->sctp_ftsn == sctp->sctp_lastacked + 1) { 1509 sacklen = 0; 1510 } else { 1511 sacklen = sizeof (sctp_chunk_hdr_t) + 1512 sizeof (sctp_sack_chunk_t) + 1513 (sizeof (sctp_sack_frag_t) * sctp->sctp_sack_gaps); 1514 if (*seglen + sacklen > sctp->sctp_lastdata->sfa_pmss) { 1515 /* piggybacked SACK doesn't fit */ 1516 sacklen = 0; 1517 } else { 1518 fp = sctp->sctp_lastdata; 1519 } 1520 } 1521 head = sctp_add_proto_hdr(sctp, fp, *nmp, sacklen, NULL); 1522 if (head == NULL) { 1523 freemsg(*nmp); 1524 *nmp = NULL; 1525 SCTP_KSTAT(sctps, sctp_send_ftsn_failed); 1526 return; 1527 } 1528 *seglen += sacklen; 1529 *nmp = head; 1530 1531 /* 1532 * XXXNeed to optimise this, the reason it is done here is so 1533 * that we don't have to undo in case of failure. 1534 */ 1535 mp1 = mp_head; 1536 sdc = (sctp_data_hdr_t *)mp1->b_rptr; 1537 while (meta_head != NULL && 1538 SEQ_GEQ(sctp->sctp_adv_pap, ntohl(sdc->sdh_tsn))) { 1539 if (!SCTP_IS_MSG_ABANDONED(meta_head)) 1540 SCTP_MSG_SET_ABANDONED(meta_head); 1541 while (mp1 != NULL && SCTP_CHUNK_ISSENT(mp1)) { 1542 sdc = (sctp_data_hdr_t *)mp1->b_rptr; 1543 if (!SCTP_CHUNK_ISACKED(mp1)) { 1544 clen = ntohs(sdc->sdh_len) - sizeof (*sdc); 1545 SCTP_CHUNK_SENT(sctp, mp1, sdc, fp, clen, 1546 meta_head); 1547 } 1548 mp1 = mp1->b_next; 1549 } 1550 while (mp1 != NULL) { 1551 sdc = (sctp_data_hdr_t *)mp1->b_rptr; 1552 if (!SCTP_CHUNK_ABANDONED(mp1)) { 1553 ASSERT(!SCTP_CHUNK_ISSENT(mp1)); 1554 unsent += ntohs(sdc->sdh_len) - sizeof (*sdc); 1555 SCTP_ABANDON_CHUNK(mp1); 1556 } 1557 mp1 = mp1->b_next; 1558 } 1559 meta_head = meta_head->b_next; 1560 if (meta_head != NULL) { 1561 mp1 = meta_head->b_cont; 1562 if (!SCTP_CHUNK_ISSENT(mp1)) 1563 break; 1564 sdc = (sctp_data_hdr_t *)mp1->b_rptr; 1565 } 1566 } 1567 if (unsent > 0) { 1568 ASSERT(sctp->sctp_unsent >= unsent); 1569 sctp->sctp_unsent -= unsent; 1570 /* 1571 * Update ULP the amount of queued data, which is 1572 * sent-unack'ed + unsent. 1573 */ 1574 if (!SCTP_IS_DETACHED(sctp)) 1575 SCTP_TXQ_UPDATE(sctp); 1576 } 1577 } 1578 1579 /* 1580 * This function steps through messages starting at meta and checks if 1581 * the message is abandoned. It stops when it hits an unsent chunk or 1582 * a message that has all its chunk acked. This is the only place 1583 * where the sctp_adv_pap is moved forward to indicated abandoned 1584 * messages. 1585 */ 1586 void 1587 sctp_check_adv_ack_pt(sctp_t *sctp, mblk_t *meta, mblk_t *mp) 1588 { 1589 uint32_t tsn = sctp->sctp_adv_pap; 1590 sctp_data_hdr_t *sdc; 1591 sctp_msg_hdr_t *msg_hdr; 1592 1593 ASSERT(mp != NULL); 1594 sdc = (sctp_data_hdr_t *)mp->b_rptr; 1595 ASSERT(SEQ_GT(ntohl(sdc->sdh_tsn), sctp->sctp_lastack_rxd)); 1596 msg_hdr = (sctp_msg_hdr_t *)meta->b_rptr; 1597 if (!SCTP_IS_MSG_ABANDONED(meta) && 1598 !SCTP_MSG_TO_BE_ABANDONED(meta, msg_hdr, sctp)) { 1599 return; 1600 } 1601 while (meta != NULL) { 1602 while (mp != NULL && SCTP_CHUNK_ISSENT(mp)) { 1603 sdc = (sctp_data_hdr_t *)mp->b_rptr; 1604 tsn = ntohl(sdc->sdh_tsn); 1605 mp = mp->b_next; 1606 } 1607 if (mp != NULL) 1608 break; 1609 /* 1610 * We continue checking for successive messages only if there 1611 * is a chunk marked for retransmission. Else, we might 1612 * end up sending FTSN prematurely for chunks that have been 1613 * sent, but not yet acked. 1614 */ 1615 if ((meta = meta->b_next) != NULL) { 1616 msg_hdr = (sctp_msg_hdr_t *)meta->b_rptr; 1617 if (!SCTP_IS_MSG_ABANDONED(meta) && 1618 !SCTP_MSG_TO_BE_ABANDONED(meta, msg_hdr, sctp)) { 1619 break; 1620 } 1621 for (mp = meta->b_cont; mp != NULL; mp = mp->b_next) { 1622 if (!SCTP_CHUNK_ISSENT(mp)) { 1623 sctp->sctp_adv_pap = tsn; 1624 return; 1625 } 1626 if (SCTP_CHUNK_WANT_REXMIT(mp)) 1627 break; 1628 } 1629 if (mp == NULL) 1630 break; 1631 } 1632 } 1633 sctp->sctp_adv_pap = tsn; 1634 } 1635 1636 1637 /* 1638 * Determine if we should bundle a data chunk with the chunk being 1639 * retransmitted. We bundle if 1640 * 1641 * - the chunk is sent to the same destination and unack'ed. 1642 * 1643 * OR 1644 * 1645 * - the chunk is unsent, i.e. new data. 1646 */ 1647 #define SCTP_CHUNK_RX_CANBUNDLE(mp, fp) \ 1648 (!SCTP_CHUNK_ABANDONED((mp)) && \ 1649 ((SCTP_CHUNK_ISSENT((mp)) && (SCTP_CHUNK_DEST(mp) == (fp) && \ 1650 !SCTP_CHUNK_ISACKED(mp))) || \ 1651 (((mp)->b_flag & (SCTP_CHUNK_FLAG_REXMIT|SCTP_CHUNK_FLAG_SENT)) != \ 1652 SCTP_CHUNK_FLAG_SENT))) 1653 1654 /* 1655 * Retransmit first segment which hasn't been acked with cumtsn or send 1656 * a Forward TSN chunk, if appropriate. 1657 */ 1658 void 1659 sctp_rexmit(sctp_t *sctp, sctp_faddr_t *oldfp) 1660 { 1661 mblk_t *mp; 1662 mblk_t *nmp = NULL; 1663 mblk_t *head; 1664 mblk_t *meta = sctp->sctp_xmit_head; 1665 mblk_t *fill; 1666 uint32_t seglen = 0; 1667 uint32_t sacklen; 1668 uint16_t chunklen; 1669 int extra; 1670 sctp_data_hdr_t *sdc; 1671 sctp_faddr_t *fp; 1672 uint32_t adv_pap = sctp->sctp_adv_pap; 1673 boolean_t do_ftsn = B_FALSE; 1674 boolean_t ftsn_check = B_TRUE; 1675 uint32_t first_ua_tsn; 1676 sctp_msg_hdr_t *mhdr; 1677 sctp_stack_t *sctps = sctp->sctp_sctps; 1678 int error; 1679 1680 while (meta != NULL) { 1681 for (mp = meta->b_cont; mp != NULL; mp = mp->b_next) { 1682 uint32_t tsn; 1683 1684 if (!SCTP_CHUNK_ISSENT(mp)) 1685 goto window_probe; 1686 /* 1687 * We break in the following cases - 1688 * 1689 * if the advanced peer ack point includes the next 1690 * chunk to be retransmited - possibly the Forward 1691 * TSN was lost. 1692 * 1693 * if we are PRSCTP aware and the next chunk to be 1694 * retransmitted is now abandoned 1695 * 1696 * if the next chunk to be retransmitted is for 1697 * the dest on which the timer went off. (this 1698 * message is not abandoned). 1699 * 1700 * We check for Forward TSN only for the first 1701 * eligible chunk to be retransmitted. The reason 1702 * being if the first eligible chunk is skipped (say 1703 * it was sent to a destination other than oldfp) 1704 * then we cannot advance the cum TSN via Forward 1705 * TSN chunk. 1706 * 1707 * Also, ftsn_check is B_TRUE only for the first 1708 * eligible chunk, it will be B_FALSE for all 1709 * subsequent candidate messages for retransmission. 1710 */ 1711 sdc = (sctp_data_hdr_t *)mp->b_rptr; 1712 tsn = ntohl(sdc->sdh_tsn); 1713 if (SEQ_GT(tsn, sctp->sctp_lastack_rxd)) { 1714 if (sctp->sctp_prsctp_aware && ftsn_check) { 1715 if (SEQ_GEQ(sctp->sctp_adv_pap, tsn)) { 1716 ASSERT(sctp->sctp_prsctp_aware); 1717 do_ftsn = B_TRUE; 1718 goto out; 1719 } else { 1720 sctp_check_adv_ack_pt(sctp, 1721 meta, mp); 1722 if (SEQ_GT(sctp->sctp_adv_pap, 1723 adv_pap)) { 1724 do_ftsn = B_TRUE; 1725 goto out; 1726 } 1727 } 1728 ftsn_check = B_FALSE; 1729 } 1730 if (SCTP_CHUNK_DEST(mp) == oldfp) 1731 goto out; 1732 } 1733 } 1734 meta = meta->b_next; 1735 if (meta != NULL && sctp->sctp_prsctp_aware) { 1736 mhdr = (sctp_msg_hdr_t *)meta->b_rptr; 1737 1738 while (meta != NULL && (SCTP_IS_MSG_ABANDONED(meta) || 1739 SCTP_MSG_TO_BE_ABANDONED(meta, mhdr, sctp))) { 1740 meta = meta->b_next; 1741 } 1742 } 1743 } 1744 window_probe: 1745 /* 1746 * Retransmit fired for a destination which didn't have 1747 * any unacked data pending. 1748 */ 1749 if (sctp->sctp_unacked == 0 && sctp->sctp_unsent != 0) { 1750 /* 1751 * Send a window probe. Inflate frwnd to allow 1752 * sending one segment. 1753 */ 1754 if (sctp->sctp_frwnd < (oldfp->sfa_pmss - sizeof (*sdc))) 1755 sctp->sctp_frwnd = oldfp->sfa_pmss - sizeof (*sdc); 1756 1757 /* next TSN to send */ 1758 sctp->sctp_rxt_nxttsn = sctp->sctp_ltsn; 1759 1760 /* 1761 * The above sctp_frwnd adjustment is coarse. The "changed" 1762 * sctp_frwnd may allow us to send more than 1 packet. So 1763 * tell sctp_output() to send only 1 packet. 1764 */ 1765 sctp_output(sctp, 1); 1766 1767 /* Last sent TSN */ 1768 sctp->sctp_rxt_maxtsn = sctp->sctp_ltsn - 1; 1769 ASSERT(sctp->sctp_rxt_maxtsn >= sctp->sctp_rxt_nxttsn); 1770 sctp->sctp_zero_win_probe = B_TRUE; 1771 BUMP_MIB(&sctps->sctps_mib, sctpOutWinProbe); 1772 } 1773 return; 1774 out: 1775 /* 1776 * After a time out, assume that everything has left the network. So 1777 * we can clear rxt_unacked for the original peer address. 1778 */ 1779 oldfp->rxt_unacked = 0; 1780 1781 /* 1782 * If we were probing for zero window, don't adjust retransmission 1783 * variables, but the timer is still backed off. 1784 */ 1785 if (sctp->sctp_zero_win_probe) { 1786 mblk_t *pkt; 1787 uint_t pkt_len; 1788 1789 /* 1790 * Get the Zero Win Probe for retrasmission, sctp_rxt_nxttsn 1791 * and sctp_rxt_maxtsn will specify the ZWP packet. 1792 */ 1793 fp = oldfp; 1794 if (oldfp->state != SCTP_FADDRS_ALIVE) 1795 fp = sctp_rotate_faddr(sctp, oldfp); 1796 pkt = sctp_rexmit_packet(sctp, &meta, &mp, fp, &pkt_len); 1797 if (pkt != NULL) { 1798 ASSERT(pkt_len <= fp->sfa_pmss); 1799 sctp_set_iplen(sctp, pkt, fp->ixa); 1800 (void) conn_ip_output(pkt, fp->ixa); 1801 BUMP_LOCAL(sctp->sctp_opkts); 1802 } else { 1803 SCTP_KSTAT(sctps, sctp_ss_rexmit_failed); 1804 } 1805 1806 /* 1807 * The strikes will be clear by sctp_faddr_alive() when the 1808 * other side sends us an ack. 1809 */ 1810 oldfp->strikes++; 1811 sctp->sctp_strikes++; 1812 1813 SCTP_CALC_RXT(sctp, oldfp); 1814 if (oldfp != fp && oldfp->suna != 0) 1815 SCTP_FADDR_TIMER_RESTART(sctp, oldfp, fp->rto); 1816 SCTP_FADDR_TIMER_RESTART(sctp, fp, fp->rto); 1817 BUMP_MIB(&sctps->sctps_mib, sctpOutWinProbe); 1818 return; 1819 } 1820 1821 /* 1822 * Enter slowstart for this destination 1823 */ 1824 oldfp->ssthresh = oldfp->cwnd / 2; 1825 if (oldfp->ssthresh < 2 * oldfp->sfa_pmss) 1826 oldfp->ssthresh = 2 * oldfp->sfa_pmss; 1827 oldfp->cwnd = oldfp->sfa_pmss; 1828 oldfp->pba = 0; 1829 fp = sctp_rotate_faddr(sctp, oldfp); 1830 ASSERT(fp != NULL); 1831 sdc = (sctp_data_hdr_t *)mp->b_rptr; 1832 1833 first_ua_tsn = ntohl(sdc->sdh_tsn); 1834 if (do_ftsn) { 1835 sctp_make_ftsns(sctp, meta, mp, &nmp, fp, &seglen); 1836 if (nmp == NULL) { 1837 sctp->sctp_adv_pap = adv_pap; 1838 goto restart_timer; 1839 } 1840 head = nmp; 1841 /* 1842 * Move to the next unabandoned chunk. XXXCheck if meta will 1843 * always be marked abandoned. 1844 */ 1845 while (meta != NULL && SCTP_IS_MSG_ABANDONED(meta)) 1846 meta = meta->b_next; 1847 if (meta != NULL) 1848 mp = mp->b_cont; 1849 else 1850 mp = NULL; 1851 goto try_bundle; 1852 } 1853 seglen = ntohs(sdc->sdh_len); 1854 chunklen = seglen - sizeof (*sdc); 1855 if ((extra = seglen & (SCTP_ALIGN - 1)) != 0) 1856 extra = SCTP_ALIGN - extra; 1857 1858 /* Find out if we need to piggyback SACK. */ 1859 if (sctp->sctp_ftsn == sctp->sctp_lastacked + 1) { 1860 sacklen = 0; 1861 } else { 1862 sacklen = sizeof (sctp_chunk_hdr_t) + 1863 sizeof (sctp_sack_chunk_t) + 1864 (sizeof (sctp_sack_frag_t) * sctp->sctp_sack_gaps); 1865 if (seglen + sacklen > sctp->sctp_lastdata->sfa_pmss) { 1866 /* piggybacked SACK doesn't fit */ 1867 sacklen = 0; 1868 } else { 1869 /* 1870 * OK, we have room to send SACK back. But we 1871 * should send it back to the last fp where we 1872 * receive data from, unless sctp_lastdata equals 1873 * oldfp, then we should probably not send it 1874 * back to that fp. Also we should check that 1875 * the fp is alive. 1876 */ 1877 if (sctp->sctp_lastdata != oldfp && 1878 sctp->sctp_lastdata->state == SCTP_FADDRS_ALIVE) { 1879 fp = sctp->sctp_lastdata; 1880 } 1881 } 1882 } 1883 1884 /* 1885 * Cancel RTT measurement if the retransmitted TSN is before the 1886 * TSN used for timimg. 1887 */ 1888 if (sctp->sctp_out_time != 0 && 1889 SEQ_GEQ(sctp->sctp_rtt_tsn, sdc->sdh_tsn)) { 1890 sctp->sctp_out_time = 0; 1891 } 1892 /* Clear the counter as the RTT calculation may be off. */ 1893 fp->rtt_updates = 0; 1894 oldfp->rtt_updates = 0; 1895 1896 /* 1897 * After a timeout, we should change the current faddr so that 1898 * new chunks will be sent to the alternate address. 1899 */ 1900 sctp_set_faddr_current(sctp, fp); 1901 1902 nmp = dupmsg(mp); 1903 if (nmp == NULL) 1904 goto restart_timer; 1905 if (extra > 0) { 1906 fill = sctp_get_padding(sctp, extra); 1907 if (fill != NULL) { 1908 linkb(nmp, fill); 1909 seglen += extra; 1910 } else { 1911 freemsg(nmp); 1912 goto restart_timer; 1913 } 1914 } 1915 SCTP_CHUNK_CLEAR_FLAGS(nmp); 1916 head = sctp_add_proto_hdr(sctp, fp, nmp, sacklen, NULL); 1917 if (head == NULL) { 1918 freemsg(nmp); 1919 SCTP_KSTAT(sctps, sctp_rexmit_failed); 1920 goto restart_timer; 1921 } 1922 seglen += sacklen; 1923 1924 SCTP_CHUNK_SENT(sctp, mp, sdc, fp, chunklen, meta); 1925 1926 mp = mp->b_next; 1927 1928 try_bundle: 1929 /* We can at least and at most send 1 packet at timeout. */ 1930 while (seglen < fp->sfa_pmss) { 1931 int32_t new_len; 1932 1933 /* Go through the list to find more chunks to be bundled. */ 1934 while (mp != NULL) { 1935 /* Check if the chunk can be bundled. */ 1936 if (SCTP_CHUNK_RX_CANBUNDLE(mp, oldfp)) 1937 break; 1938 mp = mp->b_next; 1939 } 1940 /* Go to the next message. */ 1941 if (mp == NULL) { 1942 for (meta = meta->b_next; meta != NULL; 1943 meta = meta->b_next) { 1944 mhdr = (sctp_msg_hdr_t *)meta->b_rptr; 1945 1946 if (SCTP_IS_MSG_ABANDONED(meta) || 1947 SCTP_MSG_TO_BE_ABANDONED(meta, mhdr, 1948 sctp)) { 1949 continue; 1950 } 1951 1952 mp = meta->b_cont; 1953 goto try_bundle; 1954 } 1955 /* 1956 * Check if there is a new message which potentially 1957 * could be bundled with this retransmission. 1958 */ 1959 meta = sctp_get_msg_to_send(sctp, &mp, NULL, &error, 1960 seglen, fp->sfa_pmss - seglen, NULL); 1961 if (error != 0 || meta == NULL) { 1962 /* No more chunk to be bundled. */ 1963 break; 1964 } else { 1965 goto try_bundle; 1966 } 1967 } 1968 1969 sdc = (sctp_data_hdr_t *)mp->b_rptr; 1970 new_len = ntohs(sdc->sdh_len); 1971 chunklen = new_len - sizeof (*sdc); 1972 1973 if ((extra = new_len & (SCTP_ALIGN - 1)) != 0) 1974 extra = SCTP_ALIGN - extra; 1975 if ((new_len = seglen + new_len + extra) > fp->sfa_pmss) 1976 break; 1977 if ((nmp = dupmsg(mp)) == NULL) 1978 break; 1979 1980 if (extra > 0) { 1981 fill = sctp_get_padding(sctp, extra); 1982 if (fill != NULL) { 1983 linkb(nmp, fill); 1984 } else { 1985 freemsg(nmp); 1986 break; 1987 } 1988 } 1989 linkb(head, nmp); 1990 1991 SCTP_CHUNK_CLEAR_FLAGS(nmp); 1992 SCTP_CHUNK_SENT(sctp, mp, sdc, fp, chunklen, meta); 1993 1994 seglen = new_len; 1995 mp = mp->b_next; 1996 } 1997 done_bundle: 1998 if ((seglen > fp->sfa_pmss) && fp->isv4) { 1999 ipha_t *iph = (ipha_t *)head->b_rptr; 2000 2001 /* 2002 * Path MTU is different from path we thought it would 2003 * be when we created chunks, or IP headers have grown. 2004 * Need to clear the DF bit. 2005 */ 2006 iph->ipha_fragment_offset_and_flags = 0; 2007 } 2008 fp->rxt_unacked += seglen; 2009 2010 dprint(2, ("sctp_rexmit: Sending packet %d bytes, tsn %x " 2011 "ssn %d to %p (rwnd %d, lastack_rxd %x)\n", 2012 seglen, ntohl(sdc->sdh_tsn), ntohs(sdc->sdh_ssn), 2013 (void *)fp, sctp->sctp_frwnd, sctp->sctp_lastack_rxd)); 2014 2015 sctp->sctp_rexmitting = B_TRUE; 2016 sctp->sctp_rxt_nxttsn = first_ua_tsn; 2017 sctp->sctp_rxt_maxtsn = sctp->sctp_ltsn - 1; 2018 sctp_set_iplen(sctp, head, fp->ixa); 2019 (void) conn_ip_output(head, fp->ixa); 2020 BUMP_LOCAL(sctp->sctp_opkts); 2021 2022 /* 2023 * Restart the oldfp timer with exponential backoff and 2024 * the new fp timer for the retransmitted chunks. 2025 */ 2026 restart_timer: 2027 oldfp->strikes++; 2028 sctp->sctp_strikes++; 2029 SCTP_CALC_RXT(sctp, oldfp); 2030 /* 2031 * If there is still some data in the oldfp, restart the 2032 * retransmission timer. If there is no data, the heartbeat will 2033 * continue to run so it will do its job in checking the reachability 2034 * of the oldfp. 2035 */ 2036 if (oldfp != fp && oldfp->suna != 0) 2037 SCTP_FADDR_TIMER_RESTART(sctp, oldfp, oldfp->rto); 2038 2039 /* 2040 * Should we restart the timer of the new fp? If there is 2041 * outstanding data to the new fp, the timer should be 2042 * running already. So restarting it means that the timer 2043 * will fire later for those outstanding data. But if 2044 * we don't restart it, the timer will fire too early for the 2045 * just retransmitted chunks to the new fp. The reason is that we 2046 * don't keep a timestamp on when a chunk is retransmitted. 2047 * So when the timer fires, it will just search for the 2048 * chunk with the earliest TSN sent to new fp. This probably 2049 * is the chunk we just retransmitted. So for now, let's 2050 * be conservative and restart the timer of the new fp. 2051 */ 2052 SCTP_FADDR_TIMER_RESTART(sctp, fp, fp->rto); 2053 2054 sctp->sctp_active = ddi_get_lbolt64(); 2055 } 2056 2057 /* 2058 * This function is called by sctp_ss_rexmit() to create a packet 2059 * to be retransmitted to the given fp. The given meta and mp 2060 * parameters are respectively the sctp_msg_hdr_t and the mblk of the 2061 * first chunk to be retransmitted. This is also called when we want 2062 * to retransmit a zero window probe from sctp_rexmit() or when we 2063 * want to retransmit the zero window probe after the window has 2064 * opened from sctp_got_sack(). 2065 */ 2066 mblk_t * 2067 sctp_rexmit_packet(sctp_t *sctp, mblk_t **meta, mblk_t **mp, sctp_faddr_t *fp, 2068 uint_t *packet_len) 2069 { 2070 uint32_t seglen = 0; 2071 uint16_t chunklen; 2072 int extra; 2073 mblk_t *nmp; 2074 mblk_t *head; 2075 mblk_t *fill; 2076 sctp_data_hdr_t *sdc; 2077 sctp_msg_hdr_t *mhdr; 2078 2079 sdc = (sctp_data_hdr_t *)(*mp)->b_rptr; 2080 seglen = ntohs(sdc->sdh_len); 2081 chunklen = seglen - sizeof (*sdc); 2082 if ((extra = seglen & (SCTP_ALIGN - 1)) != 0) 2083 extra = SCTP_ALIGN - extra; 2084 2085 nmp = dupmsg(*mp); 2086 if (nmp == NULL) 2087 return (NULL); 2088 if (extra > 0) { 2089 fill = sctp_get_padding(sctp, extra); 2090 if (fill != NULL) { 2091 linkb(nmp, fill); 2092 seglen += extra; 2093 } else { 2094 freemsg(nmp); 2095 return (NULL); 2096 } 2097 } 2098 SCTP_CHUNK_CLEAR_FLAGS(nmp); 2099 head = sctp_add_proto_hdr(sctp, fp, nmp, 0, NULL); 2100 if (head == NULL) { 2101 freemsg(nmp); 2102 return (NULL); 2103 } 2104 SCTP_CHUNK_SENT(sctp, *mp, sdc, fp, chunklen, *meta); 2105 /* 2106 * Don't update the TSN if we are doing a Zero Win Probe. 2107 */ 2108 if (!sctp->sctp_zero_win_probe) 2109 sctp->sctp_rxt_nxttsn = ntohl(sdc->sdh_tsn); 2110 *mp = (*mp)->b_next; 2111 2112 try_bundle: 2113 while (seglen < fp->sfa_pmss) { 2114 int32_t new_len; 2115 2116 /* 2117 * Go through the list to find more chunks to be bundled. 2118 * We should only retransmit sent by unack'ed chunks. Since 2119 * they were sent before, the peer's receive window should 2120 * be able to receive them. 2121 */ 2122 while (*mp != NULL) { 2123 /* Check if the chunk can be bundled. */ 2124 if (SCTP_CHUNK_ISSENT(*mp) && !SCTP_CHUNK_ISACKED(*mp)) 2125 break; 2126 *mp = (*mp)->b_next; 2127 } 2128 /* Go to the next message. */ 2129 if (*mp == NULL) { 2130 for (*meta = (*meta)->b_next; *meta != NULL; 2131 *meta = (*meta)->b_next) { 2132 mhdr = (sctp_msg_hdr_t *)(*meta)->b_rptr; 2133 2134 if (SCTP_IS_MSG_ABANDONED(*meta) || 2135 SCTP_MSG_TO_BE_ABANDONED(*meta, mhdr, 2136 sctp)) { 2137 continue; 2138 } 2139 2140 *mp = (*meta)->b_cont; 2141 goto try_bundle; 2142 } 2143 /* No more chunk to be bundled. */ 2144 break; 2145 } 2146 2147 sdc = (sctp_data_hdr_t *)(*mp)->b_rptr; 2148 /* Don't bundle chunks beyond sctp_rxt_maxtsn. */ 2149 if (SEQ_GT(ntohl(sdc->sdh_tsn), sctp->sctp_rxt_maxtsn)) 2150 break; 2151 new_len = ntohs(sdc->sdh_len); 2152 chunklen = new_len - sizeof (*sdc); 2153 2154 if ((extra = new_len & (SCTP_ALIGN - 1)) != 0) 2155 extra = SCTP_ALIGN - extra; 2156 if ((new_len = seglen + new_len + extra) > fp->sfa_pmss) 2157 break; 2158 if ((nmp = dupmsg(*mp)) == NULL) 2159 break; 2160 2161 if (extra > 0) { 2162 fill = sctp_get_padding(sctp, extra); 2163 if (fill != NULL) { 2164 linkb(nmp, fill); 2165 } else { 2166 freemsg(nmp); 2167 break; 2168 } 2169 } 2170 linkb(head, nmp); 2171 2172 SCTP_CHUNK_CLEAR_FLAGS(nmp); 2173 SCTP_CHUNK_SENT(sctp, *mp, sdc, fp, chunklen, *meta); 2174 /* 2175 * Don't update the TSN if we are doing a Zero Win Probe. 2176 */ 2177 if (!sctp->sctp_zero_win_probe) 2178 sctp->sctp_rxt_nxttsn = ntohl(sdc->sdh_tsn); 2179 2180 seglen = new_len; 2181 *mp = (*mp)->b_next; 2182 } 2183 *packet_len = seglen; 2184 fp->rxt_unacked += seglen; 2185 return (head); 2186 } 2187 2188 /* 2189 * sctp_ss_rexmit() is called when we get a SACK after a timeout which 2190 * advances the cum_tsn but the cum_tsn is still less than what we have sent 2191 * (sctp_rxt_maxtsn) at the time of the timeout. This SACK is a "partial" 2192 * SACK. We retransmit unacked chunks without having to wait for another 2193 * timeout. The rationale is that the SACK should not be "partial" if all the 2194 * lost chunks have been retransmitted. Since the SACK is "partial," 2195 * the chunks between the cum_tsn and the sctp_rxt_maxtsn should still 2196 * be missing. It is better for us to retransmit them now instead 2197 * of waiting for a timeout. 2198 */ 2199 void 2200 sctp_ss_rexmit(sctp_t *sctp) 2201 { 2202 mblk_t *meta; 2203 mblk_t *mp; 2204 mblk_t *pkt; 2205 sctp_faddr_t *fp; 2206 uint_t pkt_len; 2207 uint32_t tot_wnd; 2208 sctp_data_hdr_t *sdc; 2209 int burst; 2210 sctp_stack_t *sctps = sctp->sctp_sctps; 2211 2212 ASSERT(!sctp->sctp_zero_win_probe); 2213 2214 /* 2215 * If the last cum ack is smaller than what we have just 2216 * retransmitted, simply return. 2217 */ 2218 if (SEQ_GEQ(sctp->sctp_lastack_rxd, sctp->sctp_rxt_nxttsn)) 2219 sctp->sctp_rxt_nxttsn = sctp->sctp_lastack_rxd + 1; 2220 else 2221 return; 2222 ASSERT(SEQ_LEQ(sctp->sctp_rxt_nxttsn, sctp->sctp_rxt_maxtsn)); 2223 2224 /* 2225 * After a timer fires, sctp_current should be set to the new 2226 * fp where the retransmitted chunks are sent. 2227 */ 2228 fp = sctp->sctp_current; 2229 2230 /* 2231 * Since we are retransmitting, we only need to use cwnd to determine 2232 * how much we can send as we were allowed (by peer's receive window) 2233 * to send those retransmitted chunks previously when they are first 2234 * sent. If we record how much we have retransmitted but 2235 * unacknowledged using rxt_unacked, then the amount we can now send 2236 * is equal to cwnd minus rxt_unacked. 2237 * 2238 * The field rxt_unacked is incremented when we retransmit a packet 2239 * and decremented when we got a SACK acknowledging something. And 2240 * it is reset when the retransmission timer fires as we assume that 2241 * all packets have left the network after a timeout. If this 2242 * assumption is not true, it means that after a timeout, we can 2243 * get a SACK acknowledging more than rxt_unacked (its value only 2244 * contains what is retransmitted when the timer fires). So 2245 * rxt_unacked will become very big (it is an unsiged int so going 2246 * negative means that the value is huge). This is the reason we 2247 * always send at least 1 MSS bytes. 2248 * 2249 * The reason why we do not have an accurate count is that we 2250 * only know how many packets are outstanding (using the TSN numbers). 2251 * But we do not know how many bytes those packets contain. To 2252 * have an accurate count, we need to walk through the send list. 2253 * As it is not really important to have an accurate count during 2254 * retransmission, we skip this walk to save some time. This should 2255 * not make the retransmission too aggressive to cause congestion. 2256 */ 2257 if (fp->cwnd <= fp->rxt_unacked) 2258 tot_wnd = fp->sfa_pmss; 2259 else 2260 tot_wnd = fp->cwnd - fp->rxt_unacked; 2261 2262 /* Find the first unack'ed chunk */ 2263 for (meta = sctp->sctp_xmit_head; meta != NULL; meta = meta->b_next) { 2264 sctp_msg_hdr_t *mhdr = (sctp_msg_hdr_t *)meta->b_rptr; 2265 2266 if (SCTP_IS_MSG_ABANDONED(meta) || 2267 SCTP_MSG_TO_BE_ABANDONED(meta, mhdr, sctp)) { 2268 continue; 2269 } 2270 2271 for (mp = meta->b_cont; mp != NULL; mp = mp->b_next) { 2272 /* Again, this may not be possible */ 2273 if (!SCTP_CHUNK_ISSENT(mp)) 2274 return; 2275 sdc = (sctp_data_hdr_t *)mp->b_rptr; 2276 if (ntohl(sdc->sdh_tsn) == sctp->sctp_rxt_nxttsn) 2277 goto found_msg; 2278 } 2279 } 2280 2281 /* Everything is abandoned... */ 2282 return; 2283 2284 found_msg: 2285 if (!fp->timer_running) 2286 SCTP_FADDR_TIMER_RESTART(sctp, fp, fp->rto); 2287 pkt = sctp_rexmit_packet(sctp, &meta, &mp, fp, &pkt_len); 2288 if (pkt == NULL) { 2289 SCTP_KSTAT(sctps, sctp_ss_rexmit_failed); 2290 return; 2291 } 2292 if ((pkt_len > fp->sfa_pmss) && fp->isv4) { 2293 ipha_t *iph = (ipha_t *)pkt->b_rptr; 2294 2295 /* 2296 * Path MTU is different from path we thought it would 2297 * be when we created chunks, or IP headers have grown. 2298 * Need to clear the DF bit. 2299 */ 2300 iph->ipha_fragment_offset_and_flags = 0; 2301 } 2302 sctp_set_iplen(sctp, pkt, fp->ixa); 2303 (void) conn_ip_output(pkt, fp->ixa); 2304 BUMP_LOCAL(sctp->sctp_opkts); 2305 2306 /* Check and see if there is more chunk to be retransmitted. */ 2307 if (tot_wnd <= pkt_len || tot_wnd - pkt_len < fp->sfa_pmss || 2308 meta == NULL) 2309 return; 2310 if (mp == NULL) 2311 meta = meta->b_next; 2312 if (meta == NULL) 2313 return; 2314 2315 /* Retransmit another packet if the window allows. */ 2316 for (tot_wnd -= pkt_len, burst = sctps->sctps_maxburst - 1; 2317 meta != NULL && burst > 0; meta = meta->b_next, burst--) { 2318 if (mp == NULL) 2319 mp = meta->b_cont; 2320 for (; mp != NULL; mp = mp->b_next) { 2321 /* Again, this may not be possible */ 2322 if (!SCTP_CHUNK_ISSENT(mp)) 2323 return; 2324 if (!SCTP_CHUNK_ISACKED(mp)) 2325 goto found_msg; 2326 } 2327 } 2328 } 2329