tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1 | /*- |
tuexen | 829d1a7 | 2012-05-23 09:39:05 +0000 | [diff] [blame] | 2 | * Copyright (c) 2009-2010 Brad Penoff |
| 3 | * Copyright (c) 2009-2010 Humaira Kamal |
| 4 | * Copyright (c) 2011-2012 Irene Ruengeler |
| 5 | * Copyright (c) 2011-2012 Michael Tuexen |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 6 | * All rights reserved. |
| 7 | * |
| 8 | * Redistribution and use in source and binary forms, with or without |
| 9 | * modification, are permitted provided that the following conditions |
| 10 | * are met: |
| 11 | * 1. Redistributions of source code must retain the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer. |
| 13 | * 2. Redistributions in binary form must reproduce the above copyright |
| 14 | * notice, this list of conditions and the following disclaimer in the |
| 15 | * documentation and/or other materials provided with the distribution. |
| 16 | * |
| 17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND |
| 18 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 19 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 20 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
| 21 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 22 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 23 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 24 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 25 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 26 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 27 | * SUCH DAMAGE. |
| 28 | * |
| 29 | */ |
| 30 | |
tuexen | a4fb576 | 2012-07-15 21:03:56 +0000 | [diff] [blame] | 31 | #if defined(INET) || defined(INET6) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 32 | #include <sys/types.h> |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 33 | #if !defined(__Userspace_os_Windows) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 34 | #include <sys/socket.h> |
t00fcxen | 2356c9c | 2012-09-04 20:21:12 +0000 | [diff] [blame] | 35 | #include <netinet/in.h> |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 36 | #include <unistd.h> |
| 37 | #include <pthread.h> |
t00fcxen | 22a33a1 | 2013-12-27 19:21:25 +0000 | [diff] [blame] | 38 | #if !defined(__Userspace_os_DragonFly) && !defined(__Userspace_os_FreeBSD) && !defined(__Userspace_os_NetBSD) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 39 | #include <sys/uio.h> |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 40 | #else |
| 41 | #include <user_ip6_var.h> |
tuexen | ebe0062 | 2011-12-15 21:26:11 +0000 | [diff] [blame] | 42 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 43 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 44 | #include <netinet/sctp_os.h> |
| 45 | #include <netinet/sctp_var.h> |
| 46 | #include <netinet/sctp_pcb.h> |
t00fcxen | 968138a | 2012-09-05 07:17:28 +0000 | [diff] [blame] | 47 | #include <netinet/sctp_input.h> |
t00fcxen | 7943a5e | 2012-09-04 20:32:11 +0000 | [diff] [blame] | 48 | #if 0 |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 49 | #if defined(__Userspace_os_Linux) |
| 50 | #include <linux/netlink.h> |
t00fcxen | 2356c9c | 2012-09-04 20:21:12 +0000 | [diff] [blame] | 51 | #ifdef HAVE_LINUX_IF_ADDR_H |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 52 | #include <linux/if_addr.h> |
| 53 | #endif |
t00fcxen | 2356c9c | 2012-09-04 20:21:12 +0000 | [diff] [blame] | 54 | #ifdef HAVE_LINUX_RTNETLINK_H |
| 55 | #include <linux/rtnetlink.h> |
| 56 | #endif |
| 57 | #endif |
t00fcxen | 7943a5e | 2012-09-04 20:32:11 +0000 | [diff] [blame] | 58 | #endif |
t00fcxen | 22a33a1 | 2013-12-27 19:21:25 +0000 | [diff] [blame] | 59 | #if defined(__Userspace_os_Darwin) || defined(__Userspace_os_DragonFly) || defined(__Userspace_os_FreeBSD) |
t00fcxen | 2356c9c | 2012-09-04 20:21:12 +0000 | [diff] [blame] | 60 | #include <net/route.h> |
| 61 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 62 | /* local macros and datatypes used to get IP addresses system independently */ |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 63 | #if !defined(IP_PKTINFO ) && ! defined(IP_RECVDSTADDR) |
| 64 | # error "Can't determine socket option to use to get UDP IP" |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 65 | #endif |
| 66 | |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 67 | void recv_thread_destroy(void); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 68 | #define MAXLEN_MBUF_CHAIN 32 /* What should this value be? */ |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 69 | #define ROUNDUP(a, size) (((a) & ((size)-1)) ? (1 + ((a) | ((size)-1))) : (a)) |
t00fcxen | 22a33a1 | 2013-12-27 19:21:25 +0000 | [diff] [blame] | 70 | #if defined(__Userspace_os_Darwin) || defined(__Userspace_os_DragonFly) || defined(__Userspace_os_FreeBSD) |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 71 | #define NEXT_SA(ap) ap = (struct sockaddr *) \ |
| 72 | ((caddr_t) ap + (ap->sa_len ? ROUNDUP(ap->sa_len, sizeof (uint32_t)) : sizeof(uint32_t))) |
| 73 | #endif |
| 74 | |
t00fcxen | 22a33a1 | 2013-12-27 19:21:25 +0000 | [diff] [blame] | 75 | #if defined(__Userspace_os_Darwin) || defined(__Userspace_os_DragonFly) || defined(__Userspace_os_FreeBSD) |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 76 | static void |
| 77 | sctp_get_rtaddrs(int addrs, struct sockaddr *sa, struct sockaddr **rti_info) |
| 78 | { |
| 79 | int i; |
| 80 | |
| 81 | for (i = 0; i < RTAX_MAX; i++) { |
| 82 | if (addrs & (1 << i)) { |
| 83 | rti_info[i] = sa; |
| 84 | NEXT_SA(sa); |
| 85 | } else { |
| 86 | rti_info[i] = NULL; |
| 87 | } |
| 88 | } |
| 89 | } |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 90 | |
| 91 | static void |
| 92 | sctp_handle_ifamsg(unsigned char type, unsigned short index, struct sockaddr *sa) |
| 93 | { |
| 94 | int rc; |
| 95 | struct ifaddrs *ifa, *found_ifa = NULL; |
| 96 | |
| 97 | /* handle only the types we want */ |
| 98 | if ((type != RTM_NEWADDR) && (type != RTM_DELADDR)) { |
| 99 | return; |
| 100 | } |
| 101 | |
| 102 | rc = getifaddrs(&g_interfaces); |
| 103 | if (rc != 0) { |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 104 | return; |
| 105 | } |
| 106 | for (ifa = g_interfaces; ifa; ifa = ifa->ifa_next) { |
| 107 | if (index == if_nametoindex(ifa->ifa_name)) { |
| 108 | found_ifa = ifa; |
| 109 | break; |
| 110 | } |
| 111 | } |
| 112 | if (found_ifa == NULL) { |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 113 | return; |
| 114 | } |
| 115 | |
| 116 | switch (sa->sa_family) { |
| 117 | #ifdef INET |
| 118 | case AF_INET: |
| 119 | ifa->ifa_addr = (struct sockaddr *)malloc(sizeof(struct sockaddr_in)); |
| 120 | memcpy(ifa->ifa_addr, sa, sizeof(struct sockaddr_in)); |
| 121 | break; |
| 122 | #endif |
| 123 | #ifdef INET6 |
| 124 | case AF_INET6: |
| 125 | ifa->ifa_addr = (struct sockaddr *)malloc(sizeof(struct sockaddr_in6)); |
| 126 | memcpy(ifa->ifa_addr, sa, sizeof(struct sockaddr_in6)); |
| 127 | break; |
| 128 | #endif |
| 129 | default: |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 130 | SCTPDBG(SCTP_DEBUG_USR, "Address family %d not supported.\n", sa->sa_family); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 131 | } |
| 132 | |
| 133 | /* relay the appropriate address change to the base code */ |
| 134 | if (type == RTM_NEWADDR) { |
| 135 | (void)sctp_add_addr_to_vrf(SCTP_DEFAULT_VRFID, ifa, if_nametoindex(ifa->ifa_name), |
| 136 | 0, |
| 137 | ifa->ifa_name, |
| 138 | (void *)ifa, |
| 139 | ifa->ifa_addr, |
| 140 | 0, |
| 141 | 1); |
| 142 | } else { |
| 143 | sctp_del_addr_from_vrf(SCTP_DEFAULT_VRFID, ifa->ifa_addr, |
| 144 | if_nametoindex(ifa->ifa_name), |
| 145 | ifa->ifa_name); |
| 146 | } |
| 147 | } |
| 148 | |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 149 | static void * |
| 150 | recv_function_route(void *arg) |
| 151 | { |
| 152 | ssize_t ret; |
| 153 | struct ifa_msghdr *ifa; |
| 154 | char rt_buffer[1024]; |
| 155 | struct sockaddr *sa, *rti_info[RTAX_MAX]; |
| 156 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 157 | while (1) { |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 158 | bzero(rt_buffer, sizeof(rt_buffer)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 159 | ret = recv(SCTP_BASE_VAR(userspace_route), rt_buffer, sizeof(rt_buffer), 0); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 160 | |
| 161 | if (ret > 0) { |
| 162 | ifa = (struct ifa_msghdr *) rt_buffer; |
| 163 | if (ifa->ifam_type != RTM_DELADDR && ifa->ifam_type != RTM_NEWADDR) { |
| 164 | continue; |
| 165 | } |
| 166 | sa = (struct sockaddr *) (ifa + 1); |
| 167 | sctp_get_rtaddrs(ifa->ifam_addrs, sa, rti_info); |
| 168 | switch (ifa->ifam_type) { |
| 169 | case RTM_DELADDR: |
| 170 | case RTM_NEWADDR: |
| 171 | sctp_handle_ifamsg(ifa->ifam_type, ifa->ifam_index, rti_info[RTAX_IFA]); |
| 172 | break; |
| 173 | default: |
| 174 | /* ignore this routing event */ |
| 175 | break; |
| 176 | } |
| 177 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 178 | if (ret < 0) { |
| 179 | if (errno == EAGAIN) { |
| 180 | continue; |
| 181 | } else { |
| 182 | break; |
| 183 | } |
| 184 | } |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 185 | } |
t00fcxen | 90c82b7 | 2013-11-14 20:51:33 +0000 | [diff] [blame] | 186 | return (NULL); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 187 | } |
t00fcxen | 7943a5e | 2012-09-04 20:32:11 +0000 | [diff] [blame] | 188 | #endif |
| 189 | |
| 190 | #if 0 |
| 191 | /* This does not yet work on Linux */ |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 192 | static void * |
| 193 | recv_function_route(void *arg) |
| 194 | { |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 195 | int len; |
| 196 | char buf[4096]; |
| 197 | struct iovec iov = { buf, sizeof(buf) }; |
| 198 | struct msghdr msg; |
| 199 | struct nlmsghdr *nh; |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 200 | struct ifaddrmsg *rtmsg; |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 201 | struct rtattr *rtatp; |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 202 | struct in_addr *inp; |
tuexen | a29d53b | 2012-04-28 17:55:57 +0000 | [diff] [blame] | 203 | struct sockaddr_nl sanl; |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 204 | #ifdef INET |
| 205 | struct sockaddr_in *sa; |
| 206 | #endif |
| 207 | #ifdef INET6 |
| 208 | struct sockaddr_in6 *sa6; |
| 209 | #endif |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 210 | |
tuexen | a29d53b | 2012-04-28 17:55:57 +0000 | [diff] [blame] | 211 | for (;;) { |
| 212 | memset(&sanl, 0, sizeof(sanl)); |
| 213 | sanl.nl_family = AF_NETLINK; |
| 214 | sanl.nl_groups = RTMGRP_IPV6_IFADDR | RTMGRP_IPV4_IFADDR; |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 215 | memset(&msg, 0, sizeof(struct msghdr)); |
| 216 | msg.msg_name = (void *)&sanl; |
| 217 | msg.msg_namelen = sizeof(sanl); |
| 218 | msg.msg_iov = &iov; |
| 219 | msg.msg_iovlen = 1; |
| 220 | msg.msg_control = NULL; |
| 221 | msg.msg_controllen = 0; |
| 222 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 223 | len = recvmsg(SCTP_BASE_VAR(userspace_route), &msg, 0); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 224 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 225 | if (len < 0) { |
| 226 | if (errno == EAGAIN) { |
| 227 | continue; |
| 228 | } else { |
| 229 | break; |
| 230 | } |
| 231 | } |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 232 | for (nh = (struct nlmsghdr *) buf; NLMSG_OK (nh, len); |
| 233 | nh = NLMSG_NEXT (nh, len)) { |
| 234 | if (nh->nlmsg_type == NLMSG_DONE) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 235 | break; |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 236 | |
| 237 | if (nh->nlmsg_type == RTM_NEWADDR || nh->nlmsg_type == RTM_DELADDR) { |
| 238 | rtmsg = (struct ifaddrmsg *)NLMSG_DATA(nh); |
| 239 | rtatp = (struct rtattr *)IFA_RTA(rtmsg); |
| 240 | if(rtatp->rta_type == IFA_ADDRESS) { |
| 241 | inp = (struct in_addr *)RTA_DATA(rtatp); |
| 242 | switch (rtmsg->ifa_family) { |
| 243 | #ifdef INET |
| 244 | case AF_INET: |
| 245 | sa = (struct sockaddr_in *)malloc(sizeof(struct sockaddr_in)); |
| 246 | sa->sin_family = rtmsg->ifa_family; |
| 247 | sa->sin_port = 0; |
| 248 | memcpy(&sa->sin_addr, inp, sizeof(struct in_addr)); |
| 249 | sctp_handle_ifamsg(nh->nlmsg_type, rtmsg->ifa_index, (struct sockaddr *)sa); |
| 250 | break; |
| 251 | #endif |
| 252 | #ifdef INET6 |
| 253 | case AF_INET6: |
| 254 | sa6 = (struct sockaddr_in6 *)malloc(sizeof(struct sockaddr_in6)); |
| 255 | sa6->sin6_family = rtmsg->ifa_family; |
| 256 | sa6->sin6_port = 0; |
| 257 | memcpy(&sa6->sin6_addr, inp, sizeof(struct in6_addr)); |
| 258 | sctp_handle_ifamsg(nh->nlmsg_type, rtmsg->ifa_index, (struct sockaddr *)sa6); |
| 259 | break; |
| 260 | #endif |
| 261 | default: |
ruengeler | 08da49d | 2012-05-21 08:17:29 +0000 | [diff] [blame] | 262 | SCTPDBG(SCTP_DEBUG_USR, "Address family %d not supported.\n", rtmsg->ifa_family); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 263 | break; |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 264 | } |
| 265 | } |
| 266 | } |
| 267 | } |
| 268 | } |
t00fcxen | 90c82b7 | 2013-11-14 20:51:33 +0000 | [diff] [blame] | 269 | return (NULL); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 270 | } |
| 271 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 272 | |
tuexen | 656fe4c | 2012-06-28 16:54:10 +0000 | [diff] [blame] | 273 | #ifdef INET |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 274 | static void * |
| 275 | recv_function_raw(void *arg) |
| 276 | { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 277 | struct mbuf **recvmbuf; |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 278 | struct ip *iphdr; |
| 279 | struct sctphdr *sh; |
| 280 | uint16_t port; |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 281 | int offset, ecn = 0; |
| 282 | #if !defined(SCTP_WITH_NO_CSUM) |
| 283 | int compute_crc = 1; |
| 284 | #endif |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 285 | struct sctp_chunkhdr *ch; |
| 286 | struct sockaddr_in src, dst; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 287 | #if !defined(__Userspace_os_Windows) |
t00fcxen | b21b4a1 | 2012-09-14 18:03:34 +0000 | [diff] [blame] | 288 | struct msghdr msg; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 289 | struct iovec recv_iovec[MAXLEN_MBUF_CHAIN]; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 290 | #else |
| 291 | WSABUF recv_iovec[MAXLEN_MBUF_CHAIN]; |
| 292 | int nResult, m_ErrorCode; |
| 293 | DWORD flags; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 294 | struct sockaddr_in from; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 295 | int fromlen; |
| 296 | #endif |
| 297 | |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 298 | /*Initially the entire set of mbufs is to be allocated. |
| 299 | to_fill indicates this amount. */ |
| 300 | int to_fill = MAXLEN_MBUF_CHAIN; |
| 301 | /* iovlen is the size of each mbuf in the chain */ |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 302 | int i, n, ncounter = 0; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 303 | int iovlen = MCLBYTES; |
| 304 | int want_ext = (iovlen > MLEN)? 1 : 0; |
| 305 | int want_header = 0; |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 306 | |
| 307 | bzero((void *)&src, sizeof(struct sockaddr_in)); |
| 308 | bzero((void *)&dst, sizeof(struct sockaddr_in)); |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 309 | |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 310 | recvmbuf = malloc(sizeof(struct mbuf *) * MAXLEN_MBUF_CHAIN); |
| 311 | |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 312 | while (1) { |
| 313 | for (i = 0; i < to_fill; i++) { |
| 314 | /* Not getting the packet header. Tests with chain of one run |
| 315 | as usual without having the packet header. |
| 316 | Have tried both sending and receiving |
| 317 | */ |
t00fcxen | 218d5d0 | 2012-12-10 20:28:19 +0000 | [diff] [blame] | 318 | recvmbuf[i] = sctp_get_mbuf_for_msg(iovlen, want_header, M_NOWAIT, want_ext, MT_DATA); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 319 | #if !defined(__Userspace_os_Windows) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 320 | recv_iovec[i].iov_base = (caddr_t)recvmbuf[i]->m_data; |
| 321 | recv_iovec[i].iov_len = iovlen; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 322 | #else |
| 323 | recv_iovec[i].buf = (caddr_t)recvmbuf[i]->m_data; |
| 324 | recv_iovec[i].len = iovlen; |
| 325 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 326 | } |
| 327 | to_fill = 0; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 328 | #if defined(__Userspace_os_Windows) |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 329 | flags = 0; |
| 330 | ncounter = 0; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 331 | fromlen = sizeof(struct sockaddr_in); |
| 332 | bzero((void *)&from, sizeof(struct sockaddr_in)); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 333 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 334 | nResult = WSARecvFrom(SCTP_BASE_VAR(userspace_rawsctp), recv_iovec, MAXLEN_MBUF_CHAIN, (LPDWORD)&ncounter, (LPDWORD)&flags, (struct sockaddr*)&from, &fromlen, NULL, NULL); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 335 | if (nResult != 0) { |
| 336 | m_ErrorCode = WSAGetLastError(); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 337 | if (m_ErrorCode == WSAETIMEDOUT) { |
| 338 | continue; |
| 339 | } |
| 340 | if ((m_ErrorCode == WSAENOTSOCK) || (m_ErrorCode == WSAEINTR)) { |
| 341 | break; |
| 342 | } |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 343 | } |
tuexen | 3ab67fe | 2011-12-15 19:42:29 +0000 | [diff] [blame] | 344 | n = ncounter; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 345 | #else |
t00fcxen | b21b4a1 | 2012-09-14 18:03:34 +0000 | [diff] [blame] | 346 | bzero((void *)&msg, sizeof(struct msghdr)); |
| 347 | msg.msg_name = NULL; |
| 348 | msg.msg_namelen = 0; |
| 349 | msg.msg_iov = recv_iovec; |
| 350 | msg.msg_iovlen = MAXLEN_MBUF_CHAIN; |
| 351 | msg.msg_control = NULL; |
| 352 | msg.msg_controllen = 0; |
| 353 | ncounter = n = recvmsg(SCTP_BASE_VAR(userspace_rawsctp), &msg, 0); |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 354 | if (n < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 355 | if (errno == EAGAIN) { |
| 356 | continue; |
| 357 | } else { |
| 358 | break; |
| 359 | } |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 360 | } |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 361 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 362 | SCTP_HEADER_LEN(recvmbuf[0]) = n; /* length of total packet */ |
t00fcxen | 6b5474d | 2013-08-03 13:14:37 +0000 | [diff] [blame] | 363 | SCTP_STAT_INCR(sctps_recvpackets); |
| 364 | SCTP_STAT_INCR_COUNTER64(sctps_inpackets); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 365 | |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 366 | if (n <= iovlen) { |
| 367 | SCTP_BUF_LEN(recvmbuf[0]) = n; |
| 368 | (to_fill)++; |
| 369 | } else { |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 370 | i = 0; |
| 371 | SCTP_BUF_LEN(recvmbuf[0]) = iovlen; |
| 372 | |
| 373 | ncounter -= iovlen; |
| 374 | (to_fill)++; |
| 375 | do { |
| 376 | recvmbuf[i]->m_next = recvmbuf[i+1]; |
| 377 | SCTP_BUF_LEN(recvmbuf[i]->m_next) = min(ncounter, iovlen); |
| 378 | i++; |
| 379 | ncounter -= iovlen; |
| 380 | (to_fill)++; |
| 381 | } while (ncounter > 0); |
| 382 | } |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 383 | |
| 384 | iphdr = mtod(recvmbuf[0], struct ip *); |
| 385 | sh = (struct sctphdr *)((caddr_t)iphdr + sizeof(struct ip)); |
| 386 | ch = (struct sctp_chunkhdr *)((caddr_t)sh + sizeof(struct sctphdr)); |
| 387 | offset = sizeof(struct ip) + sizeof(struct sctphdr); |
| 388 | |
| 389 | if (iphdr->ip_tos != 0) { |
| 390 | ecn = iphdr->ip_tos & 0x02; |
| 391 | } |
| 392 | |
| 393 | dst.sin_family = AF_INET; |
| 394 | #ifdef HAVE_SIN_LEN |
| 395 | dst.sin_len = sizeof(struct sockaddr_in); |
| 396 | #endif |
| 397 | dst.sin_addr = iphdr->ip_dst; |
| 398 | dst.sin_port = sh->dest_port; |
| 399 | |
| 400 | src.sin_family = AF_INET; |
| 401 | #ifdef HAVE_SIN_LEN |
| 402 | src.sin_len = sizeof(struct sockaddr_in); |
| 403 | #endif |
| 404 | src.sin_addr = iphdr->ip_src; |
| 405 | src.sin_port = sh->src_port; |
| 406 | |
| 407 | /* SCTP does not allow broadcasts or multicasts */ |
| 408 | if (IN_MULTICAST(ntohl(dst.sin_addr.s_addr))) { |
t00fcxen | 90c82b7 | 2013-11-14 20:51:33 +0000 | [diff] [blame] | 409 | return (NULL); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 410 | } |
| 411 | if (SCTP_IS_IT_BROADCAST(dst.sin_addr, recvmbuf[0])) { |
t00fcxen | 90c82b7 | 2013-11-14 20:51:33 +0000 | [diff] [blame] | 412 | return (NULL); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 413 | } |
| 414 | |
| 415 | port = 0; |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 416 | |
t00fcxen | a84e47f | 2013-10-29 21:06:25 +0000 | [diff] [blame] | 417 | #if defined(SCTP_WITH_NO_CSUM) |
| 418 | SCTP_STAT_INCR(sctps_recvnocrc); |
| 419 | #else |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 420 | if (src.sin_addr.s_addr == dst.sin_addr.s_addr) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 421 | compute_crc = 0; |
t00fcxen | a84e47f | 2013-10-29 21:06:25 +0000 | [diff] [blame] | 422 | SCTP_STAT_INCR(sctps_recvnocrc); |
| 423 | } else { |
| 424 | SCTP_STAT_INCR(sctps_recvswcrc); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 425 | } |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 426 | #endif |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 427 | SCTPDBG(SCTP_DEBUG_USR, "%s: Received %d bytes.", __func__, n); |
t00fcxen | 2356c9c | 2012-09-04 20:21:12 +0000 | [diff] [blame] | 428 | SCTPDBG(SCTP_DEBUG_USR, " - calling sctp_common_input_processing with off=%d\n", offset); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 429 | sctp_common_input_processing(&recvmbuf[0], sizeof(struct ip), offset, n, |
| 430 | (struct sockaddr *)&src, |
| 431 | (struct sockaddr *)&dst, |
| 432 | sh, ch, |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 433 | #if !defined(SCTP_WITH_NO_CSUM) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 434 | compute_crc, |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 435 | #endif |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 436 | ecn, |
| 437 | SCTP_DEFAULT_VRFID, port); |
t00fcxen | efdae36 | 2013-11-14 18:30:47 +0000 | [diff] [blame] | 438 | if (recvmbuf[0]) { |
| 439 | m_freem(recvmbuf[0]); |
| 440 | } |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 441 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 442 | for (i = 0; i < MAXLEN_MBUF_CHAIN; i++) { |
| 443 | m_free(recvmbuf[i]); |
| 444 | } |
| 445 | /* free the array itself */ |
| 446 | free(recvmbuf); |
t00fcxen | f2c34c3 | 2013-02-10 20:35:51 +0000 | [diff] [blame] | 447 | return (NULL); |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 448 | } |
tuexen | 656fe4c | 2012-06-28 16:54:10 +0000 | [diff] [blame] | 449 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 450 | |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 451 | #if defined(INET6) |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 452 | static void * |
| 453 | recv_function_raw6(void *arg) |
| 454 | { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 455 | struct mbuf **recvmbuf6; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 456 | #if !defined(__Userspace_os_Windows) |
| 457 | struct iovec recv_iovec[MAXLEN_MBUF_CHAIN]; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 458 | struct msghdr msg; |
| 459 | struct cmsghdr *cmsgptr; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 460 | char cmsgbuf[CMSG_SPACE(sizeof (struct in6_pktinfo))]; |
| 461 | #else |
| 462 | WSABUF recv_iovec[MAXLEN_MBUF_CHAIN]; |
| 463 | int nResult, m_ErrorCode; |
| 464 | DWORD flags; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 465 | struct sockaddr_in6 from; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 466 | int fromlen; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 467 | GUID WSARecvMsg_GUID = WSAID_WSARECVMSG; |
| 468 | LPFN_WSARECVMSG WSARecvMsg; |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 469 | WSACMSGHDR *cmsgptr; |
| 470 | WSAMSG msg; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 471 | char ControlBuffer[1024]; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 472 | #endif |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 473 | struct sockaddr_in6 src, dst; |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 474 | struct sctphdr *sh; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 475 | int offset; |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 476 | struct sctp_chunkhdr *ch; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 477 | |
| 478 | /*Initially the entire set of mbufs is to be allocated. |
| 479 | to_fill indicates this amount. */ |
| 480 | int to_fill = MAXLEN_MBUF_CHAIN; |
| 481 | /* iovlen is the size of each mbuf in the chain */ |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 482 | int i, n, ncounter = 0; |
| 483 | #if !defined(SCTP_WITH_NO_CSUM) |
| 484 | int compute_crc = 1; |
| 485 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 486 | int iovlen = MCLBYTES; |
| 487 | int want_ext = (iovlen > MLEN)? 1 : 0; |
| 488 | int want_header = 0; |
| 489 | |
| 490 | recvmbuf6 = malloc(sizeof(struct mbuf *) * MAXLEN_MBUF_CHAIN); |
| 491 | |
| 492 | for (;;) { |
| 493 | for (i = 0; i < to_fill; i++) { |
| 494 | /* Not getting the packet header. Tests with chain of one run |
| 495 | as usual without having the packet header. |
| 496 | Have tried both sending and receiving |
| 497 | */ |
t00fcxen | 218d5d0 | 2012-12-10 20:28:19 +0000 | [diff] [blame] | 498 | recvmbuf6[i] = sctp_get_mbuf_for_msg(iovlen, want_header, M_NOWAIT, want_ext, MT_DATA); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 499 | #if !defined(__Userspace_os_Windows) |
| 500 | recv_iovec[i].iov_base = (caddr_t)recvmbuf6[i]->m_data; |
| 501 | recv_iovec[i].iov_len = iovlen; |
| 502 | #else |
| 503 | recv_iovec[i].buf = (caddr_t)recvmbuf6[i]->m_data; |
| 504 | recv_iovec[i].len = iovlen; |
| 505 | #endif |
| 506 | } |
| 507 | to_fill = 0; |
| 508 | #if defined(__Userspace_os_Windows) |
| 509 | flags = 0; |
| 510 | ncounter = 0; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 511 | fromlen = sizeof(struct sockaddr_in6); |
| 512 | bzero((void *)&from, sizeof(struct sockaddr_in6)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 513 | nResult = WSAIoctl(SCTP_BASE_VAR(userspace_rawsctp6), SIO_GET_EXTENSION_FUNCTION_POINTER, |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 514 | &WSARecvMsg_GUID, sizeof WSARecvMsg_GUID, |
| 515 | &WSARecvMsg, sizeof WSARecvMsg, |
| 516 | &ncounter, NULL, NULL); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 517 | if (nResult == 0) { |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 518 | msg.name = (void *)&src; |
| 519 | msg.namelen = sizeof(struct sockaddr_in6); |
| 520 | msg.lpBuffers = recv_iovec; |
| 521 | msg.dwBufferCount = MAXLEN_MBUF_CHAIN; |
| 522 | msg.Control.len = sizeof ControlBuffer; |
| 523 | msg.Control.buf = ControlBuffer; |
| 524 | msg.dwFlags = 0; |
| 525 | nResult = WSARecvMsg(SCTP_BASE_VAR(userspace_rawsctp6), &msg, &ncounter, NULL, NULL); |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 526 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 527 | if (nResult != 0) { |
| 528 | m_ErrorCode = WSAGetLastError(); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 529 | if (m_ErrorCode == WSAETIMEDOUT) |
| 530 | continue; |
| 531 | if (m_ErrorCode == WSAENOTSOCK || m_ErrorCode == WSAEINTR) |
| 532 | break; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 533 | } |
| 534 | n = ncounter; |
| 535 | #else |
| 536 | bzero((void *)&msg, sizeof(struct msghdr)); |
| 537 | bzero((void *)&src, sizeof(struct sockaddr_in6)); |
| 538 | bzero((void *)&dst, sizeof(struct sockaddr_in6)); |
| 539 | bzero((void *)cmsgbuf, CMSG_SPACE(sizeof (struct in6_pktinfo))); |
| 540 | msg.msg_name = (void *)&src; |
| 541 | msg.msg_namelen = sizeof(struct sockaddr_in6); |
| 542 | msg.msg_iov = recv_iovec; |
| 543 | msg.msg_iovlen = MAXLEN_MBUF_CHAIN; |
| 544 | msg.msg_control = (void *)cmsgbuf; |
| 545 | msg.msg_controllen = (socklen_t)CMSG_LEN(sizeof (struct in6_pktinfo)); |
| 546 | msg.msg_flags = 0; |
| 547 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 548 | ncounter = n = recvmsg(SCTP_BASE_VAR(userspace_rawsctp6), &msg, 0); |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 549 | if (n < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 550 | if (errno == EAGAIN) { |
| 551 | continue; |
| 552 | } else { |
| 553 | break; |
| 554 | } |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 555 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 556 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 557 | SCTP_HEADER_LEN(recvmbuf6[0]) = n; /* length of total packet */ |
t00fcxen | 6b5474d | 2013-08-03 13:14:37 +0000 | [diff] [blame] | 558 | SCTP_STAT_INCR(sctps_recvpackets); |
| 559 | SCTP_STAT_INCR_COUNTER64(sctps_inpackets); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 560 | |
| 561 | if (n <= iovlen) { |
| 562 | SCTP_BUF_LEN(recvmbuf6[0]) = n; |
| 563 | (to_fill)++; |
| 564 | } else { |
| 565 | i = 0; |
| 566 | SCTP_BUF_LEN(recvmbuf6[0]) = iovlen; |
| 567 | |
| 568 | ncounter -= iovlen; |
| 569 | (to_fill)++; |
| 570 | do { |
| 571 | recvmbuf6[i]->m_next = recvmbuf6[i+1]; |
| 572 | SCTP_BUF_LEN(recvmbuf6[i]->m_next) = min(ncounter, iovlen); |
| 573 | i++; |
| 574 | ncounter -= iovlen; |
| 575 | (to_fill)++; |
| 576 | } while (ncounter > 0); |
| 577 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 578 | |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 579 | for (cmsgptr = CMSG_FIRSTHDR(&msg); cmsgptr != NULL; cmsgptr = CMSG_NXTHDR(&msg, cmsgptr)) { |
| 580 | if ((cmsgptr->cmsg_level == IPPROTO_IPV6) && (cmsgptr->cmsg_type == IPV6_PKTINFO)) { |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 581 | struct in6_pktinfo * info; |
| 582 | |
| 583 | info = (struct in6_pktinfo *)CMSG_DATA(cmsgptr); |
| 584 | memcpy((void *)&dst.sin6_addr, (const void *) &(info->ipi6_addr), sizeof(struct in6_addr)); |
| 585 | break; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 586 | } |
| 587 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 588 | |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 589 | sh = mtod(recvmbuf6[0], struct sctphdr *); |
| 590 | ch = (struct sctp_chunkhdr *)((caddr_t)sh + sizeof(struct sctphdr)); |
| 591 | offset = sizeof(struct sctphdr); |
| 592 | |
| 593 | dst.sin6_family = AF_INET6; |
t00fcxen | 7b0ab5c | 2012-09-04 16:41:39 +0000 | [diff] [blame] | 594 | #ifdef HAVE_SIN6_LEN |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 595 | dst.sin6_len = sizeof(struct sockaddr_in6); |
| 596 | #endif |
| 597 | dst.sin6_port = sh->dest_port; |
| 598 | |
| 599 | src.sin6_family = AF_INET6; |
t00fcxen | 7b0ab5c | 2012-09-04 16:41:39 +0000 | [diff] [blame] | 600 | #ifdef HAVE_SIN6_LEN |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 601 | src.sin6_len = sizeof(struct sockaddr_in6); |
| 602 | #endif |
| 603 | src.sin6_port = sh->src_port; |
t00fcxen | a84e47f | 2013-10-29 21:06:25 +0000 | [diff] [blame] | 604 | #if defined(SCTP_WITH_NO_CSUM) |
| 605 | SCTP_STAT_INCR(sctps_recvnocrc); |
| 606 | #else |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 607 | if (memcmp(&src.sin6_addr, &dst.sin6_addr, sizeof(struct in6_addr)) == 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 608 | compute_crc = 0; |
t00fcxen | a84e47f | 2013-10-29 21:06:25 +0000 | [diff] [blame] | 609 | SCTP_STAT_INCR(sctps_recvnocrc); |
| 610 | } else { |
| 611 | SCTP_STAT_INCR(sctps_recvswcrc); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 612 | } |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 613 | #endif |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 614 | SCTPDBG(SCTP_DEBUG_USR, "%s: Received %d bytes.", __func__, n); |
t00fcxen | 2356c9c | 2012-09-04 20:21:12 +0000 | [diff] [blame] | 615 | SCTPDBG(SCTP_DEBUG_USR, " - calling sctp_common_input_processing with off=%d\n", offset); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 616 | sctp_common_input_processing(&recvmbuf6[0], 0, offset, n, |
| 617 | (struct sockaddr *)&src, |
| 618 | (struct sockaddr *)&dst, |
| 619 | sh, ch, |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 620 | #if !defined(SCTP_WITH_NO_CSUM) |
| 621 | compute_crc, |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 622 | #endif |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 623 | 0, |
| 624 | SCTP_DEFAULT_VRFID, 0); |
t00fcxen | efdae36 | 2013-11-14 18:30:47 +0000 | [diff] [blame] | 625 | if (recvmbuf6[0]) { |
| 626 | m_freem(recvmbuf6[0]); |
| 627 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 628 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 629 | for (i = 0; i < MAXLEN_MBUF_CHAIN; i++) { |
| 630 | m_free(recvmbuf6[i]); |
| 631 | } |
| 632 | /* free the array itself */ |
| 633 | free(recvmbuf6); |
t00fcxen | f2c34c3 | 2013-02-10 20:35:51 +0000 | [diff] [blame] | 634 | return (NULL); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 635 | } |
| 636 | #endif |
| 637 | |
tuexen | 656fe4c | 2012-06-28 16:54:10 +0000 | [diff] [blame] | 638 | #ifdef INET |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 639 | static void * |
| 640 | recv_function_udp(void *arg) |
| 641 | { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 642 | struct mbuf **udprecvmbuf; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 643 | /*Initially the entire set of mbufs is to be allocated. |
| 644 | to_fill indicates this amount. */ |
| 645 | int to_fill = MAXLEN_MBUF_CHAIN; |
| 646 | /* iovlen is the size of each mbuf in the chain */ |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 647 | int i, n, ncounter, offset; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 648 | int iovlen = MCLBYTES; |
| 649 | int want_ext = (iovlen > MLEN)? 1 : 0; |
| 650 | int want_header = 0; |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 651 | struct sctphdr *sh; |
| 652 | uint16_t port; |
| 653 | struct sctp_chunkhdr *ch; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 654 | struct sockaddr_in src, dst; |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 655 | #if defined(IP_PKTINFO) |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 656 | char cmsgbuf[CMSG_SPACE(sizeof(struct in_pktinfo))]; |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 657 | #else |
| 658 | char cmsgbuf[CMSG_SPACE(sizeof(struct in_addr))]; |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 659 | #endif |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 660 | #if !defined(SCTP_WITH_NO_CSUM) |
| 661 | int compute_crc = 1; |
| 662 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 663 | #if !defined(__Userspace_os_Windows) |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 664 | struct iovec iov[MAXLEN_MBUF_CHAIN]; |
| 665 | struct msghdr msg; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 666 | struct cmsghdr *cmsgptr; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 667 | #else |
| 668 | GUID WSARecvMsg_GUID = WSAID_WSARECVMSG; |
| 669 | LPFN_WSARECVMSG WSARecvMsg; |
| 670 | char ControlBuffer[1024]; |
| 671 | WSABUF iov[MAXLEN_MBUF_CHAIN]; |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 672 | WSAMSG msg; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 673 | int nResult, m_ErrorCode; |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 674 | WSACMSGHDR *cmsgptr; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 675 | #endif |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 676 | |
| 677 | udprecvmbuf = malloc(sizeof(struct mbuf *) * MAXLEN_MBUF_CHAIN); |
| 678 | |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 679 | while (1) { |
| 680 | for (i = 0; i < to_fill; i++) { |
| 681 | /* Not getting the packet header. Tests with chain of one run |
| 682 | as usual without having the packet header. |
| 683 | Have tried both sending and receiving |
| 684 | */ |
t00fcxen | 218d5d0 | 2012-12-10 20:28:19 +0000 | [diff] [blame] | 685 | udprecvmbuf[i] = sctp_get_mbuf_for_msg(iovlen, want_header, M_NOWAIT, want_ext, MT_DATA); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 686 | #if !defined(__Userspace_os_Windows) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 687 | iov[i].iov_base = (caddr_t)udprecvmbuf[i]->m_data; |
| 688 | iov[i].iov_len = iovlen; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 689 | #else |
| 690 | iov[i].buf = (caddr_t)udprecvmbuf[i]->m_data; |
| 691 | iov[i].len = iovlen; |
| 692 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 693 | } |
| 694 | to_fill = 0; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 695 | #if !defined(__Userspace_os_Windows) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 696 | bzero((void *)&msg, sizeof(struct msghdr)); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 697 | #else |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 698 | bzero((void *)&msg, sizeof(WSAMSG)); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 699 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 700 | bzero((void *)&src, sizeof(struct sockaddr_in)); |
| 701 | bzero((void *)&dst, sizeof(struct sockaddr_in)); |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 702 | bzero((void *)cmsgbuf, sizeof(cmsgbuf)); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 703 | |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 704 | #if !defined(__Userspace_os_Windows) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 705 | msg.msg_name = (void *)&src; |
| 706 | msg.msg_namelen = sizeof(struct sockaddr_in); |
| 707 | msg.msg_iov = iov; |
| 708 | msg.msg_iovlen = MAXLEN_MBUF_CHAIN; |
| 709 | msg.msg_control = (void *)cmsgbuf; |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 710 | msg.msg_controllen = sizeof(cmsgbuf); |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 711 | msg.msg_flags = 0; |
| 712 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 713 | ncounter = n = recvmsg(SCTP_BASE_VAR(userspace_udpsctp), &msg, 0); |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 714 | if (n < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 715 | if (errno == EAGAIN) { |
| 716 | continue; |
| 717 | } else { |
| 718 | break; |
| 719 | } |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 720 | } |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 721 | #else |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 722 | nResult = WSAIoctl(SCTP_BASE_VAR(userspace_udpsctp), SIO_GET_EXTENSION_FUNCTION_POINTER, |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 723 | &WSARecvMsg_GUID, sizeof WSARecvMsg_GUID, |
| 724 | &WSARecvMsg, sizeof WSARecvMsg, |
| 725 | &ncounter, NULL, NULL); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 726 | if (nResult == 0) { |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 727 | msg.name = (void *)&src; |
| 728 | msg.namelen = sizeof(struct sockaddr_in); |
| 729 | msg.lpBuffers = iov; |
| 730 | msg.dwBufferCount = MAXLEN_MBUF_CHAIN; |
| 731 | msg.Control.len = sizeof ControlBuffer; |
| 732 | msg.Control.buf = ControlBuffer; |
| 733 | msg.dwFlags = 0; |
| 734 | nResult = WSARecvMsg(SCTP_BASE_VAR(userspace_udpsctp), &msg, &ncounter, NULL, NULL); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 735 | } |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 736 | if (nResult != 0) { |
| 737 | m_ErrorCode = WSAGetLastError(); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 738 | if (m_ErrorCode == WSAETIMEDOUT) { |
| 739 | continue; |
| 740 | } |
| 741 | if ((m_ErrorCode == WSAENOTSOCK) || (m_ErrorCode == WSAEINTR)) { |
| 742 | break; |
| 743 | } |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 744 | } |
| 745 | n = ncounter; |
| 746 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 747 | SCTP_HEADER_LEN(udprecvmbuf[0]) = n; /* length of total packet */ |
t00fcxen | 6b5474d | 2013-08-03 13:14:37 +0000 | [diff] [blame] | 748 | SCTP_STAT_INCR(sctps_recvpackets); |
| 749 | SCTP_STAT_INCR_COUNTER64(sctps_inpackets); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 750 | |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 751 | if (n <= iovlen) { |
| 752 | SCTP_BUF_LEN(udprecvmbuf[0]) = n; |
| 753 | (to_fill)++; |
| 754 | } else { |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 755 | i = 0; |
| 756 | SCTP_BUF_LEN(udprecvmbuf[0]) = iovlen; |
| 757 | |
| 758 | ncounter -= iovlen; |
| 759 | (to_fill)++; |
| 760 | do { |
| 761 | udprecvmbuf[i]->m_next = udprecvmbuf[i+1]; |
| 762 | SCTP_BUF_LEN(udprecvmbuf[i]->m_next) = min(ncounter, iovlen); |
| 763 | i++; |
| 764 | ncounter -= iovlen; |
| 765 | (to_fill)++; |
| 766 | } while (ncounter > 0); |
| 767 | } |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 768 | |
| 769 | for (cmsgptr = CMSG_FIRSTHDR(&msg); cmsgptr != NULL; cmsgptr = CMSG_NXTHDR(&msg, cmsgptr)) { |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 770 | #if defined(IP_PKTINFO) |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 771 | if ((cmsgptr->cmsg_level == IPPROTO_IP) && (cmsgptr->cmsg_type == IP_PKTINFO)) { |
| 772 | struct in_pktinfo *info; |
| 773 | |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 774 | dst.sin_family = AF_INET; |
| 775 | #ifdef HAVE_SIN_LEN |
| 776 | dst.sin_len = sizeof(struct sockaddr_in); |
| 777 | #endif |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 778 | info = (struct in_pktinfo *)CMSG_DATA(cmsgptr); |
| 779 | memcpy((void *)&dst.sin_addr, (const void *)&(info->ipi_addr), sizeof(struct in_addr)); |
| 780 | break; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 781 | } |
t00fcxen | 33bf9a0 | 2012-09-17 08:13:14 +0000 | [diff] [blame] | 782 | #else |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 783 | if ((cmsgptr->cmsg_level == IPPROTO_IP) && (cmsgptr->cmsg_type == IP_RECVDSTADDR)) { |
| 784 | struct in_addr *addr; |
| 785 | |
| 786 | dst.sin_family = AF_INET; |
| 787 | #ifdef HAVE_SIN_LEN |
| 788 | dst.sin_len = sizeof(struct sockaddr_in); |
| 789 | #endif |
| 790 | addr = (struct in_addr *)CMSG_DATA(cmsgptr); |
| 791 | memcpy((void *)&dst.sin_addr, (const void *)addr, sizeof(struct in_addr)); |
| 792 | break; |
| 793 | } |
| 794 | #endif |
| 795 | } |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 796 | |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 797 | /* SCTP does not allow broadcasts or multicasts */ |
| 798 | if (IN_MULTICAST(ntohl(dst.sin_addr.s_addr))) { |
t00fcxen | 90c82b7 | 2013-11-14 20:51:33 +0000 | [diff] [blame] | 799 | return (NULL); |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 800 | } |
| 801 | if (SCTP_IS_IT_BROADCAST(dst.sin_addr, udprecvmbuf[0])) { |
t00fcxen | 90c82b7 | 2013-11-14 20:51:33 +0000 | [diff] [blame] | 802 | return (NULL); |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 803 | } |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 804 | |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 805 | /*offset = sizeof(struct sctphdr) + sizeof(struct sctp_chunkhdr);*/ |
| 806 | sh = mtod(udprecvmbuf[0], struct sctphdr *); |
| 807 | ch = (struct sctp_chunkhdr *)((caddr_t)sh + sizeof(struct sctphdr)); |
| 808 | offset = sizeof(struct sctphdr); |
| 809 | port = src.sin_port; |
| 810 | src.sin_port = sh->src_port; |
| 811 | dst.sin_port = sh->dest_port; |
t00fcxen | a84e47f | 2013-10-29 21:06:25 +0000 | [diff] [blame] | 812 | #if defined(SCTP_WITH_NO_CSUM) |
| 813 | SCTP_STAT_INCR(sctps_recvnocrc); |
| 814 | #else |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 815 | if (src.sin_addr.s_addr == dst.sin_addr.s_addr) { |
| 816 | compute_crc = 0; |
t00fcxen | a84e47f | 2013-10-29 21:06:25 +0000 | [diff] [blame] | 817 | SCTP_STAT_INCR(sctps_recvnocrc); |
| 818 | } else { |
| 819 | SCTP_STAT_INCR(sctps_recvswcrc); |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 820 | } |
| 821 | #endif |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 822 | SCTPDBG(SCTP_DEBUG_USR, "%s: Received %d bytes.", __func__, n); |
t00fcxen | 2356c9c | 2012-09-04 20:21:12 +0000 | [diff] [blame] | 823 | SCTPDBG(SCTP_DEBUG_USR, " - calling sctp_common_input_processing with off=%d\n", offset); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 824 | sctp_common_input_processing(&udprecvmbuf[0], 0, offset, n, |
| 825 | (struct sockaddr *)&src, |
| 826 | (struct sockaddr *)&dst, |
| 827 | sh, ch, |
| 828 | #if !defined(SCTP_WITH_NO_CSUM) |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 829 | compute_crc, |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 830 | #endif |
| 831 | 0, |
| 832 | SCTP_DEFAULT_VRFID, port); |
t00fcxen | efdae36 | 2013-11-14 18:30:47 +0000 | [diff] [blame] | 833 | if (udprecvmbuf[0]) { |
| 834 | m_freem(udprecvmbuf[0]); |
| 835 | } |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 836 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 837 | for (i = 0; i < MAXLEN_MBUF_CHAIN; i++) { |
| 838 | m_free(udprecvmbuf[i]); |
| 839 | } |
| 840 | /* free the array itself */ |
| 841 | free(udprecvmbuf); |
t00fcxen | f2c34c3 | 2013-02-10 20:35:51 +0000 | [diff] [blame] | 842 | return (NULL); |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 843 | } |
tuexen | 656fe4c | 2012-06-28 16:54:10 +0000 | [diff] [blame] | 844 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 845 | |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 846 | #if defined(INET6) |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 847 | static void * |
| 848 | recv_function_udp6(void *arg) |
| 849 | { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 850 | struct mbuf **udprecvmbuf6; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 851 | /*Initially the entire set of mbufs is to be allocated. |
| 852 | to_fill indicates this amount. */ |
| 853 | int to_fill = MAXLEN_MBUF_CHAIN; |
| 854 | /* iovlen is the size of each mbuf in the chain */ |
| 855 | int i, n, ncounter, offset; |
| 856 | int iovlen = MCLBYTES; |
| 857 | int want_ext = (iovlen > MLEN)? 1 : 0; |
| 858 | int want_header = 0; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 859 | struct sockaddr_in6 src, dst; |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 860 | struct sctphdr *sh; |
| 861 | uint16_t port; |
| 862 | struct sctp_chunkhdr *ch; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 863 | char cmsgbuf[CMSG_SPACE(sizeof (struct in6_pktinfo))]; |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 864 | #if !defined(SCTP_WITH_NO_CSUM) |
| 865 | int compute_crc = 1; |
| 866 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 867 | #if !defined(__Userspace_os_Windows) |
| 868 | struct iovec iov[MAXLEN_MBUF_CHAIN]; |
| 869 | struct msghdr msg; |
| 870 | struct cmsghdr *cmsgptr; |
| 871 | #else |
| 872 | GUID WSARecvMsg_GUID = WSAID_WSARECVMSG; |
| 873 | LPFN_WSARECVMSG WSARecvMsg; |
| 874 | char ControlBuffer[1024]; |
| 875 | WSABUF iov[MAXLEN_MBUF_CHAIN]; |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 876 | WSAMSG msg; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 877 | int nResult, m_ErrorCode; |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 878 | WSACMSGHDR *cmsgptr; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 879 | #endif |
| 880 | |
| 881 | udprecvmbuf6 = malloc(sizeof(struct mbuf *) * MAXLEN_MBUF_CHAIN); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 882 | while (1) { |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 883 | for (i = 0; i < to_fill; i++) { |
| 884 | /* Not getting the packet header. Tests with chain of one run |
| 885 | as usual without having the packet header. |
| 886 | Have tried both sending and receiving |
| 887 | */ |
t00fcxen | 218d5d0 | 2012-12-10 20:28:19 +0000 | [diff] [blame] | 888 | udprecvmbuf6[i] = sctp_get_mbuf_for_msg(iovlen, want_header, M_NOWAIT, want_ext, MT_DATA); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 889 | #if !defined(__Userspace_os_Windows) |
| 890 | iov[i].iov_base = (caddr_t)udprecvmbuf6[i]->m_data; |
| 891 | iov[i].iov_len = iovlen; |
| 892 | #else |
| 893 | iov[i].buf = (caddr_t)udprecvmbuf6[i]->m_data; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 894 | iov[i].len = iovlen; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 895 | #endif |
| 896 | } |
| 897 | to_fill = 0; |
| 898 | |
| 899 | #if !defined(__Userspace_os_Windows) |
| 900 | bzero((void *)&msg, sizeof(struct msghdr)); |
| 901 | #else |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 902 | bzero((void *)&msg, sizeof(WSAMSG)); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 903 | #endif |
| 904 | bzero((void *)&src, sizeof(struct sockaddr_in6)); |
| 905 | bzero((void *)&dst, sizeof(struct sockaddr_in6)); |
| 906 | bzero((void *)cmsgbuf, CMSG_SPACE(sizeof (struct in6_pktinfo))); |
| 907 | |
| 908 | #if !defined(__Userspace_os_Windows) |
| 909 | msg.msg_name = (void *)&src; |
| 910 | msg.msg_namelen = sizeof(struct sockaddr_in6); |
| 911 | msg.msg_iov = iov; |
| 912 | msg.msg_iovlen = MAXLEN_MBUF_CHAIN; |
| 913 | msg.msg_control = (void *)cmsgbuf; |
| 914 | msg.msg_controllen = (socklen_t)CMSG_LEN(sizeof (struct in6_pktinfo)); |
| 915 | msg.msg_flags = 0; |
| 916 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 917 | ncounter = n = recvmsg(SCTP_BASE_VAR(userspace_udpsctp6), &msg, 0); |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 918 | if (n < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 919 | if (errno == EAGAIN) { |
| 920 | continue; |
| 921 | } else { |
| 922 | break; |
| 923 | } |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 924 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 925 | #else |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 926 | nResult = WSAIoctl(SCTP_BASE_VAR(userspace_udpsctp6), SIO_GET_EXTENSION_FUNCTION_POINTER, |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 927 | &WSARecvMsg_GUID, sizeof WSARecvMsg_GUID, |
| 928 | &WSARecvMsg, sizeof WSARecvMsg, |
| 929 | &ncounter, NULL, NULL); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 930 | if (nResult == SOCKET_ERROR) { |
| 931 | m_ErrorCode = WSAGetLastError(); |
| 932 | WSARecvMsg = NULL; |
| 933 | } |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 934 | if (nResult == 0) { |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 935 | msg.name = (void *)&src; |
| 936 | msg.namelen = sizeof(struct sockaddr_in6); |
| 937 | msg.lpBuffers = iov; |
| 938 | msg.dwBufferCount = MAXLEN_MBUF_CHAIN; |
| 939 | msg.Control.len = sizeof ControlBuffer; |
| 940 | msg.Control.buf = ControlBuffer; |
| 941 | msg.dwFlags = 0; |
| 942 | nResult = WSARecvMsg(SCTP_BASE_VAR(userspace_udpsctp6), &msg, &ncounter, NULL, NULL); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 943 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 944 | if (nResult != 0) { |
| 945 | m_ErrorCode = WSAGetLastError(); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 946 | if (m_ErrorCode == WSAETIMEDOUT) { |
| 947 | continue; |
| 948 | } |
| 949 | if ((m_ErrorCode == WSAENOTSOCK) || (m_ErrorCode == WSAEINTR)) { |
| 950 | break; |
| 951 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 952 | } |
| 953 | n = ncounter; |
| 954 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 955 | SCTP_HEADER_LEN(udprecvmbuf6[0]) = n; /* length of total packet */ |
t00fcxen | 6b5474d | 2013-08-03 13:14:37 +0000 | [diff] [blame] | 956 | SCTP_STAT_INCR(sctps_recvpackets); |
| 957 | SCTP_STAT_INCR_COUNTER64(sctps_inpackets); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 958 | |
| 959 | if (n <= iovlen) { |
| 960 | SCTP_BUF_LEN(udprecvmbuf6[0]) = n; |
| 961 | (to_fill)++; |
| 962 | } else { |
| 963 | i = 0; |
| 964 | SCTP_BUF_LEN(udprecvmbuf6[0]) = iovlen; |
| 965 | |
| 966 | ncounter -= iovlen; |
| 967 | (to_fill)++; |
| 968 | do { |
| 969 | udprecvmbuf6[i]->m_next = udprecvmbuf6[i+1]; |
| 970 | SCTP_BUF_LEN(udprecvmbuf6[i]->m_next) = min(ncounter, iovlen); |
| 971 | i++; |
| 972 | ncounter -= iovlen; |
| 973 | (to_fill)++; |
| 974 | } while (ncounter > 0); |
| 975 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 976 | |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 977 | for (cmsgptr = CMSG_FIRSTHDR(&msg); cmsgptr != NULL; cmsgptr = CMSG_NXTHDR(&msg, cmsgptr)) { |
| 978 | if ((cmsgptr->cmsg_level == IPPROTO_IPV6) && (cmsgptr->cmsg_type == IPV6_PKTINFO)) { |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 979 | struct in6_pktinfo *info; |
| 980 | |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 981 | dst.sin6_family = AF_INET6; |
t00fcxen | 7b0ab5c | 2012-09-04 16:41:39 +0000 | [diff] [blame] | 982 | #ifdef HAVE_SIN6_LEN |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 983 | dst.sin6_len = sizeof(struct sockaddr_in6); |
| 984 | #endif |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 985 | info = (struct in6_pktinfo *)CMSG_DATA(cmsgptr); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 986 | /*dst.sin6_port = htons(SCTP_BASE_SYSCTL(sctp_udp_tunneling_port));*/ |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 987 | memcpy((void *)&dst.sin6_addr, (const void *)&(info->ipi6_addr), sizeof(struct in6_addr)); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 988 | } |
| 989 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 990 | |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 991 | /* SCTP does not allow broadcasts or multicasts */ |
| 992 | if (IN6_IS_ADDR_MULTICAST(&dst.sin6_addr)) { |
t00fcxen | 90c82b7 | 2013-11-14 20:51:33 +0000 | [diff] [blame] | 993 | return (NULL); |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 994 | } |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 995 | |
| 996 | sh = mtod(udprecvmbuf6[0], struct sctphdr *); |
| 997 | ch = (struct sctp_chunkhdr *)((caddr_t)sh + sizeof(struct sctphdr)); |
| 998 | offset = sizeof(struct sctphdr); |
| 999 | |
| 1000 | port = src.sin6_port; |
| 1001 | src.sin6_port = sh->src_port; |
| 1002 | dst.sin6_port = sh->dest_port; |
t00fcxen | a84e47f | 2013-10-29 21:06:25 +0000 | [diff] [blame] | 1003 | #if defined(SCTP_WITH_NO_CSUM) |
| 1004 | SCTP_STAT_INCR(sctps_recvnocrc); |
| 1005 | #else |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 1006 | if ((memcmp(&src.sin6_addr, &dst.sin6_addr, sizeof(struct in6_addr)) == 0)) { |
| 1007 | compute_crc = 0; |
t00fcxen | a84e47f | 2013-10-29 21:06:25 +0000 | [diff] [blame] | 1008 | SCTP_STAT_INCR(sctps_recvnocrc); |
| 1009 | } else { |
| 1010 | SCTP_STAT_INCR(sctps_recvswcrc); |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 1011 | } |
| 1012 | #endif |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1013 | SCTPDBG(SCTP_DEBUG_USR, "%s: Received %d bytes.", __func__, n); |
t00fcxen | 2356c9c | 2012-09-04 20:21:12 +0000 | [diff] [blame] | 1014 | SCTPDBG(SCTP_DEBUG_USR, " - calling sctp_common_input_processing with off=%d\n", (int)sizeof(struct sctphdr)); |
| 1015 | sctp_common_input_processing(&udprecvmbuf6[0], 0, offset, n, |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1016 | (struct sockaddr *)&src, |
| 1017 | (struct sockaddr *)&dst, |
| 1018 | sh, ch, |
| 1019 | #if !defined(SCTP_WITH_NO_CSUM) |
t00fcxen | 890e1a3 | 2012-09-14 14:30:39 +0000 | [diff] [blame] | 1020 | compute_crc, |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1021 | #endif |
| 1022 | 0, |
| 1023 | SCTP_DEFAULT_VRFID, port); |
t00fcxen | efdae36 | 2013-11-14 18:30:47 +0000 | [diff] [blame] | 1024 | if (udprecvmbuf6[0]) { |
| 1025 | m_freem(udprecvmbuf6[0]); |
| 1026 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1027 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1028 | for (i = 0; i < MAXLEN_MBUF_CHAIN; i++) { |
| 1029 | m_free(udprecvmbuf6[i]); |
| 1030 | } |
| 1031 | /* free the array itself */ |
| 1032 | free(udprecvmbuf6); |
t00fcxen | f2c34c3 | 2013-02-10 20:35:51 +0000 | [diff] [blame] | 1033 | return (NULL); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1034 | } |
| 1035 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1036 | |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1037 | static void |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1038 | setReceiveBufferSize(int sfd, int new_size) |
| 1039 | { |
| 1040 | int ch = new_size; |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1041 | |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1042 | if (setsockopt (sfd, SOL_SOCKET, SO_RCVBUF, (void*)&ch, sizeof(ch)) < 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1043 | #if defined (__Userspace_os_Windows) |
| 1044 | SCTPDBG(SCTP_DEBUG_USR, "Can't set recv-buffers size (errno = %d).\n", WSAGetLastError()); |
| 1045 | #else |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1046 | SCTPDBG(SCTP_DEBUG_USR, "Can't set recv-buffers size (errno = %d).\n", errno); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1047 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1048 | } |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1049 | return; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1050 | } |
| 1051 | |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1052 | static void |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1053 | setSendBufferSize(int sfd, int new_size) |
| 1054 | { |
| 1055 | int ch = new_size; |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1056 | |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1057 | if (setsockopt (sfd, SOL_SOCKET, SO_SNDBUF, (void*)&ch, sizeof(ch)) < 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1058 | #if defined (__Userspace_os_Windows) |
| 1059 | SCTPDBG(SCTP_DEBUG_USR, "Can't set send-buffers size (errno = %d).\n", WSAGetLastError()); |
| 1060 | #else |
| 1061 | SCTPDBG(SCTP_DEBUG_USR, "Can't set send-buffers size (errno = %d).\n", errno); |
| 1062 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1063 | } |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1064 | return; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1065 | } |
| 1066 | |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1067 | #define SOCKET_TIMEOUT 100 /* in ms */ |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1068 | void |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1069 | recv_thread_init(void) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1070 | { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1071 | #if defined(INET) |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1072 | struct sockaddr_in addr_ipv4; |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1073 | const int hdrincl = 1; |
| 1074 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1075 | #if defined(INET6) |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1076 | struct sockaddr_in6 addr_ipv6; |
| 1077 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1078 | #if defined(INET) || defined(INET6) |
| 1079 | const int on = 1; |
| 1080 | #endif |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1081 | #if !defined(__Userspace_os_Windows) |
| 1082 | struct timeval timeout; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1083 | |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1084 | timeout.tv_sec = (SOCKET_TIMEOUT / 1000); |
| 1085 | timeout.tv_usec = (SOCKET_TIMEOUT % 1000) * 1000; |
| 1086 | #else |
| 1087 | unsigned int timeout = SOCKET_TIMEOUT; /* Timeout in milliseconds */ |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1088 | #endif |
t00fcxen | 22a33a1 | 2013-12-27 19:21:25 +0000 | [diff] [blame] | 1089 | #if defined(__Userspace_os_Darwin) || defined(__Userspace_os_DragonFly) || defined(__Userspace_os_FreeBSD) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1090 | if (SCTP_BASE_VAR(userspace_route) == -1) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1091 | if ((SCTP_BASE_VAR(userspace_route) = socket(AF_ROUTE, SOCK_RAW, 0)) < 0) { |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1092 | SCTPDBG(SCTP_DEBUG_USR, "Can't create routing socket (errno = %d).\n", errno); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1093 | } |
t00fcxen | c48387a | 2012-09-04 20:35:12 +0000 | [diff] [blame] | 1094 | #if 0 |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1095 | struct sockaddr_nl sanl; |
| 1096 | |
| 1097 | if ((SCTP_BASE_VAR(userspace_route) = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE)) < 0) { |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1098 | SCTPDBG(SCTP_DEBUG_USR, "Can't create routing socket (errno = %d.\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1099 | } |
| 1100 | memset(&sanl, 0, sizeof(sanl)); |
| 1101 | sanl.nl_family = AF_NETLINK; |
| 1102 | sanl.nl_groups = 0; |
| 1103 | #ifdef INET |
| 1104 | sanl.nl_groups |= RTMGRP_IPV4_IFADDR; |
| 1105 | #endif |
| 1106 | #ifdef INET6 |
| 1107 | sanl.nl_groups |= RTMGRP_IPV6_IFADDR; |
| 1108 | #endif |
| 1109 | if (bind(SCTP_BASE_VAR(userspace_route), (struct sockaddr *) &sanl, sizeof(sanl)) < 0) { |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1110 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind routing socket (errno = %d).\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1111 | close(SCTP_BASE_VAR(userspace_route)); |
| 1112 | SCTP_BASE_VAR(userspace_route) = -1; |
| 1113 | } |
| 1114 | #endif |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1115 | if (SCTP_BASE_VAR(userspace_route) != -1) { |
| 1116 | if (setsockopt(SCTP_BASE_VAR(userspace_route), SOL_SOCKET, SO_RCVTIMEO,(const void*)&timeout, sizeof(struct timeval)) < 0) { |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1117 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on routing socket (errno = %d).\n", errno); |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1118 | #if defined(__Userspace_os_Windows) |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1119 | closesocket(SCTP_BASE_VAR(userspace_route)); |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1120 | #else |
| 1121 | close(SCTP_BASE_VAR(userspace_route)); |
| 1122 | #endif |
| 1123 | SCTP_BASE_VAR(userspace_route) = -1; |
| 1124 | } |
| 1125 | } |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1126 | } |
| 1127 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1128 | #if defined(INET) |
| 1129 | if (SCTP_BASE_VAR(userspace_rawsctp) == -1) { |
| 1130 | if ((SCTP_BASE_VAR(userspace_rawsctp) = socket(AF_INET, SOCK_RAW, IPPROTO_SCTP)) < 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1131 | #if defined(__Userspace_os_Windows) |
| 1132 | SCTPDBG(SCTP_DEBUG_USR, "Can't create raw socket for IPv4 (errno = %d).\n", WSAGetLastError()); |
| 1133 | #else |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1134 | SCTPDBG(SCTP_DEBUG_USR, "Can't create raw socket for IPv4 (errno = %d).\n", errno); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1135 | #endif |
tuexen | e2c40ae | 2011-11-20 09:30:37 +0000 | [diff] [blame] | 1136 | } else { |
| 1137 | /* complete setting up the raw SCTP socket */ |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1138 | if (setsockopt(SCTP_BASE_VAR(userspace_rawsctp), IPPROTO_IP, IP_HDRINCL,(const void*)&hdrincl, sizeof(int)) < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1139 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1140 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IP_HDRINCL (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1141 | closesocket(SCTP_BASE_VAR(userspace_rawsctp)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1142 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1143 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IP_HDRINCL (errno = %d).\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1144 | close(SCTP_BASE_VAR(userspace_rawsctp)); |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1145 | #endif |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1146 | SCTP_BASE_VAR(userspace_rawsctp) = -1; |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1147 | } else if (setsockopt(SCTP_BASE_VAR(userspace_rawsctp), SOL_SOCKET, SO_RCVTIMEO, (const void *)&timeout, sizeof(timeout)) < 0) { |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1148 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1149 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on socket for SCTP/IPv4 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1150 | closesocket(SCTP_BASE_VAR(userspace_rawsctp)); |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1151 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1152 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on socket for SCTP/IPv4 (errno = %d).\n", errno); |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1153 | close(SCTP_BASE_VAR(userspace_rawsctp)); |
| 1154 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1155 | SCTP_BASE_VAR(userspace_rawsctp) = -1; |
| 1156 | } else { |
| 1157 | memset((void *)&addr_ipv4, 0, sizeof(struct sockaddr_in)); |
| 1158 | #ifdef HAVE_SIN_LEN |
| 1159 | addr_ipv4.sin_len = sizeof(struct sockaddr_in); |
| 1160 | #endif |
| 1161 | addr_ipv4.sin_family = AF_INET; |
| 1162 | addr_ipv4.sin_port = htons(0); |
| 1163 | addr_ipv4.sin_addr.s_addr = htonl(INADDR_ANY); |
| 1164 | if (bind(SCTP_BASE_VAR(userspace_rawsctp), (const struct sockaddr *)&addr_ipv4, sizeof(struct sockaddr_in)) < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1165 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1166 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind socket for SCTP/IPv4 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1167 | closesocket(SCTP_BASE_VAR(userspace_rawsctp)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1168 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1169 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind socket for SCTP/IPv4 (errno = %d).\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1170 | close(SCTP_BASE_VAR(userspace_rawsctp)); |
| 1171 | #endif |
| 1172 | SCTP_BASE_VAR(userspace_rawsctp) = -1; |
| 1173 | } else { |
| 1174 | setReceiveBufferSize(SCTP_BASE_VAR(userspace_rawsctp), SB_RAW); /* 128K */ |
| 1175 | setSendBufferSize(SCTP_BASE_VAR(userspace_rawsctp), SB_RAW); /* 128K Is this setting net.inet.raw.maxdgram value? Should it be set to 64K? */ |
| 1176 | } |
| 1177 | } |
tuexen | e2c40ae | 2011-11-20 09:30:37 +0000 | [diff] [blame] | 1178 | } |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1179 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1180 | if (SCTP_BASE_VAR(userspace_udpsctp) == -1) { |
| 1181 | if ((SCTP_BASE_VAR(userspace_udpsctp) = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1182 | #if defined(__Userspace_os_Windows) |
| 1183 | SCTPDBG(SCTP_DEBUG_USR, "Can't create socket for SCTP/UDP/IPv4 (errno = %d).\n", WSAGetLastError()); |
| 1184 | #else |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1185 | SCTPDBG(SCTP_DEBUG_USR, "Can't create socket for SCTP/UDP/IPv4 (errno = %d).\n", errno); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1186 | #endif |
tuexen | 67a1a08 | 2012-01-20 11:09:46 +0000 | [diff] [blame] | 1187 | } else { |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 1188 | #if defined(IP_PKTINFO) |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 1189 | if (setsockopt(SCTP_BASE_VAR(userspace_udpsctp), IPPROTO_IP, IP_PKTINFO, (const void *)&on, (int)sizeof(int)) < 0) { |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 1190 | #else |
| 1191 | if (setsockopt(SCTP_BASE_VAR(userspace_udpsctp), IPPROTO_IP, IP_RECVDSTADDR, (const void *)&on, (int)sizeof(int)) < 0) { |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 1192 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1193 | #if defined(__Userspace_os_Windows) |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 1194 | #if defined(IP_PKTINFO) |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 1195 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IP_PKTINFO on socket for SCTP/UDP/IPv4 (errno = %d).\n", WSAGetLastError()); |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 1196 | #else |
| 1197 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IP_RECVDSTADDR on socket for SCTP/UDP/IPv4 (errno = %d).\n", WSAGetLastError()); |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 1198 | #endif |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1199 | closesocket(SCTP_BASE_VAR(userspace_udpsctp)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1200 | #else |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 1201 | #if defined(IP_PKTINFO) |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 1202 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IP_PKTINFO on socket for SCTP/UDP/IPv4 (errno = %d).\n", errno); |
t00fcxen | 26dd10f | 2012-09-17 07:36:15 +0000 | [diff] [blame] | 1203 | #else |
| 1204 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IP_RECVDSTADDR on socket for SCTP/UDP/IPv4 (errno = %d).\n", errno); |
t00fcxen | 2e9986e | 2012-09-15 12:42:22 +0000 | [diff] [blame] | 1205 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1206 | close(SCTP_BASE_VAR(userspace_udpsctp)); |
| 1207 | #endif |
| 1208 | SCTP_BASE_VAR(userspace_udpsctp) = -1; |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1209 | } else if (setsockopt(SCTP_BASE_VAR(userspace_udpsctp), SOL_SOCKET, SO_RCVTIMEO, (const void *)&timeout, sizeof(timeout)) < 0) { |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1210 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1211 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on socket for SCTP/UDP/IPv4 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1212 | closesocket(SCTP_BASE_VAR(userspace_udpsctp)); |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1213 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1214 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on socket for SCTP/UDP/IPv4 (errno = %d).\n", errno); |
tuexen | 1b9c2d2 | 2012-05-06 18:48:47 +0000 | [diff] [blame] | 1215 | close(SCTP_BASE_VAR(userspace_udpsctp)); |
| 1216 | #endif |
| 1217 | SCTP_BASE_VAR(userspace_udpsctp) = -1; |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1218 | } else { |
| 1219 | memset((void *)&addr_ipv4, 0, sizeof(struct sockaddr_in)); |
| 1220 | #ifdef HAVE_SIN_LEN |
| 1221 | addr_ipv4.sin_len = sizeof(struct sockaddr_in); |
| 1222 | #endif |
| 1223 | addr_ipv4.sin_family = AF_INET; |
| 1224 | addr_ipv4.sin_port = htons(SCTP_BASE_SYSCTL(sctp_udp_tunneling_port)); |
| 1225 | addr_ipv4.sin_addr.s_addr = htonl(INADDR_ANY); |
| 1226 | if (bind(SCTP_BASE_VAR(userspace_udpsctp), (const struct sockaddr *)&addr_ipv4, sizeof(struct sockaddr_in)) < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1227 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1228 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind socket for SCTP/UDP/IPv4 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1229 | closesocket(SCTP_BASE_VAR(userspace_udpsctp)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1230 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1231 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind socket for SCTP/UDP/IPv4 (errno = %d).\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1232 | close(SCTP_BASE_VAR(userspace_udpsctp)); |
| 1233 | #endif |
| 1234 | SCTP_BASE_VAR(userspace_udpsctp) = -1; |
| 1235 | } else { |
| 1236 | setReceiveBufferSize(SCTP_BASE_VAR(userspace_udpsctp), SB_RAW); /* 128K */ |
| 1237 | setSendBufferSize(SCTP_BASE_VAR(userspace_udpsctp), SB_RAW); /* 128K Is this setting net.inet.raw.maxdgram value? Should it be set to 64K? */ |
| 1238 | } |
| 1239 | } |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1240 | } |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1241 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1242 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1243 | #if defined(INET6) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1244 | if (SCTP_BASE_VAR(userspace_rawsctp6) == -1) { |
| 1245 | if ((SCTP_BASE_VAR(userspace_rawsctp6) = socket(AF_INET6, SOCK_RAW, IPPROTO_SCTP)) < 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1246 | #if defined(__Userspace_os_Windows) |
| 1247 | SCTPDBG(SCTP_DEBUG_USR, "Can't create socket for SCTP/IPv6 (errno = %d).\n", WSAGetLastError()); |
| 1248 | #else |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1249 | SCTPDBG(SCTP_DEBUG_USR, "Can't create socket for SCTP/IPv6 (errno = %d).\n", errno); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1250 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1251 | } else { |
| 1252 | /* complete setting up the raw SCTP socket */ |
tuexen | 9cf61ba | 2012-01-16 10:17:41 +0000 | [diff] [blame] | 1253 | #if defined(IPV6_RECVPKTINFO) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1254 | if (setsockopt(SCTP_BASE_VAR(userspace_rawsctp6), IPPROTO_IPV6, IPV6_RECVPKTINFO, (const void *)&on, sizeof(on)) < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1255 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1256 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_RECVPKTINFO on socket for SCTP/IPv6 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1257 | closesocket(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1258 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1259 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_RECVPKTINFO on socket for SCTP/IPv6 (errno = %d).\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1260 | close(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1261 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1262 | SCTP_BASE_VAR(userspace_rawsctp6) = -1; |
| 1263 | } else { |
| 1264 | #else |
| 1265 | if (setsockopt(SCTP_BASE_VAR(userspace_rawsctp6), IPPROTO_IPV6, IPV6_PKTINFO,(const void*)&on, sizeof(on)) < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1266 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1267 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_PKTINFO on socket for SCTP/IPv6 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1268 | closesocket(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1269 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1270 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_PKTINFO on socket for SCTP/IPv6 (errno = %d).\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1271 | close(SCTP_BASE_VAR(userspace_rawsctp6)); |
| 1272 | #endif |
| 1273 | SCTP_BASE_VAR(userspace_rawsctp6) = -1; |
| 1274 | } else { |
| 1275 | #endif |
| 1276 | if (setsockopt(SCTP_BASE_VAR(userspace_rawsctp6), IPPROTO_IPV6, IPV6_V6ONLY, (const void*)&on, (socklen_t)sizeof(on)) < 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1277 | #if defined(__Userspace_os_Windows) |
| 1278 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_V6ONLY on socket for SCTP/IPv6 (errno = %d).\n", WSAGetLastError()); |
| 1279 | #else |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1280 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_V6ONLY on socket for SCTP/IPv6 (errno = %d).\n", errno); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1281 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1282 | } |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1283 | if (setsockopt(SCTP_BASE_VAR(userspace_rawsctp6), SOL_SOCKET, SO_RCVTIMEO, (const void *)&timeout, sizeof(timeout)) < 0) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1284 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1285 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on socket for SCTP/IPv6 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1286 | closesocket(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1287 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1288 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on socket for SCTP/IPv6 (errno = %d).\n", errno); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1289 | close(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1290 | #endif |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1291 | SCTP_BASE_VAR(userspace_rawsctp6) = -1; |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1292 | } else { |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1293 | memset((void *)&addr_ipv6, 0, sizeof(struct sockaddr_in6)); |
t00fcxen | 7b0ab5c | 2012-09-04 16:41:39 +0000 | [diff] [blame] | 1294 | #ifdef HAVE_SIN6_LEN |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1295 | addr_ipv6.sin6_len = sizeof(struct sockaddr_in6); |
| 1296 | #endif |
| 1297 | addr_ipv6.sin6_family = AF_INET6; |
| 1298 | addr_ipv6.sin6_port = htons(0); |
| 1299 | addr_ipv6.sin6_addr = in6addr_any; |
| 1300 | if (bind(SCTP_BASE_VAR(userspace_rawsctp6), (const struct sockaddr *)&addr_ipv6, sizeof(struct sockaddr_in6)) < 0) { |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1301 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1302 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind socket for SCTP/IPv6 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1303 | closesocket(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1304 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1305 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind socket for SCTP/IPv6 (errno = %d).\n", errno); |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1306 | close(SCTP_BASE_VAR(userspace_rawsctp6)); |
| 1307 | #endif |
| 1308 | SCTP_BASE_VAR(userspace_rawsctp6) = -1; |
| 1309 | } else { |
| 1310 | setReceiveBufferSize(SCTP_BASE_VAR(userspace_rawsctp6), SB_RAW); /* 128K */ |
| 1311 | setSendBufferSize(SCTP_BASE_VAR(userspace_rawsctp6), SB_RAW); /* 128K Is this setting net.inet.raw.maxdgram value? Should it be set to 64K? */ |
| 1312 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1313 | } |
| 1314 | } |
| 1315 | } |
| 1316 | } |
| 1317 | if (SCTP_BASE_VAR(userspace_udpsctp6) == -1) { |
| 1318 | if ((SCTP_BASE_VAR(userspace_udpsctp6) = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP)) < 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1319 | #if defined(__Userspace_os_Windows) |
| 1320 | SCTPDBG(SCTP_DEBUG_USR, "Can't create socket for SCTP/UDP/IPv6 (errno = %d).\n", WSAGetLastError()); |
| 1321 | #else |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1322 | SCTPDBG(SCTP_DEBUG_USR, "Can't create socket for SCTP/UDP/IPv6 (errno = %d).\n", errno); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1323 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1324 | } |
| 1325 | #if defined(IPV6_RECVPKTINFO) |
| 1326 | if (setsockopt(SCTP_BASE_VAR(userspace_udpsctp6), IPPROTO_IPV6, IPV6_RECVPKTINFO, (const void *)&on, (int)sizeof(int)) < 0) { |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1327 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1328 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_RECVPKTINFO on socket for SCTP/UDP/IPv6 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1329 | closesocket(SCTP_BASE_VAR(userspace_udpsctp6)); |
| 1330 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1331 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_RECVPKTINFO on socket for SCTP/UDP/IPv6 (errno = %d).\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1332 | close(SCTP_BASE_VAR(userspace_udpsctp6)); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1333 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1334 | SCTP_BASE_VAR(userspace_udpsctp6) = -1; |
| 1335 | } else { |
| 1336 | #else |
| 1337 | if (setsockopt(SCTP_BASE_VAR(userspace_udpsctp6), IPPROTO_IPV6, IPV6_PKTINFO, (const void *)&on, (int)sizeof(int)) < 0) { |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1338 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1339 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_PKTINFO on socket for SCTP/UDP/IPv6 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1340 | closesocket(SCTP_BASE_VAR(userspace_udpsctp6)); |
| 1341 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1342 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_PKTINFO on socket for SCTP/UDP/IPv6 (errno = %d).\n", errno); |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1343 | close(SCTP_BASE_VAR(userspace_udpsctp6)); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1344 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1345 | SCTP_BASE_VAR(userspace_udpsctp6) = -1; |
| 1346 | } else { |
| 1347 | #endif |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1348 | if (setsockopt(SCTP_BASE_VAR(userspace_udpsctp6), IPPROTO_IPV6, IPV6_V6ONLY, (const void *)&on, (socklen_t)sizeof(on)) < 0) { |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1349 | #if defined(__Userspace_os_Windows) |
| 1350 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_V6ONLY on socket for SCTP/UDP/IPv6 (errno = %d).\n", WSAGetLastError()); |
| 1351 | #else |
tuexen | 0622a9e | 2012-05-20 10:08:24 +0000 | [diff] [blame] | 1352 | SCTPDBG(SCTP_DEBUG_USR, "Can't set IPV6_V6ONLY on socket for SCTP/UDP/IPv6 (errno = %d).\n", errno); |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1353 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1354 | } |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1355 | if (setsockopt(SCTP_BASE_VAR(userspace_udpsctp6), SOL_SOCKET, SO_RCVTIMEO, (const void *)&timeout, sizeof(timeout)) < 0) { |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1356 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1357 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on socket for SCTP/UDP/IPv6 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1358 | closesocket(SCTP_BASE_VAR(userspace_udpsctp6)); |
| 1359 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1360 | SCTPDBG(SCTP_DEBUG_USR, "Can't set timeout on socket for SCTP/UDP/IPv6 (errno = %d).\n", errno); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1361 | close(SCTP_BASE_VAR(userspace_udpsctp6)); |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1362 | #endif |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1363 | SCTP_BASE_VAR(userspace_udpsctp6) = -1; |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1364 | } else { |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1365 | memset((void *)&addr_ipv6, 0, sizeof(struct sockaddr_in6)); |
t00fcxen | 7b0ab5c | 2012-09-04 16:41:39 +0000 | [diff] [blame] | 1366 | #ifdef HAVE_SIN6_LEN |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1367 | addr_ipv6.sin6_len = sizeof(struct sockaddr_in6); |
| 1368 | #endif |
| 1369 | addr_ipv6.sin6_family = AF_INET6; |
| 1370 | addr_ipv6.sin6_port = htons(SCTP_BASE_SYSCTL(sctp_udp_tunneling_port)); |
| 1371 | addr_ipv6.sin6_addr = in6addr_any; |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1372 | if (bind(SCTP_BASE_VAR(userspace_udpsctp6), (const struct sockaddr *)&addr_ipv6, sizeof(struct sockaddr_in6)) < 0) { |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1373 | #if defined(__Userspace_os_Windows) |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1374 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind socket for SCTP/UDP/IPv6 (errno = %d).\n", WSAGetLastError()); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1375 | closesocket(SCTP_BASE_VAR(userspace_udpsctp6)); |
| 1376 | #else |
ruengeler | 6fc7a71 | 2012-07-31 12:16:29 +0000 | [diff] [blame] | 1377 | SCTPDBG(SCTP_DEBUG_USR, "Can't bind socket for SCTP/UDP/IPv6 (errno = %d).\n", errno); |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1378 | close(SCTP_BASE_VAR(userspace_udpsctp6)); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1379 | #endif |
tuexen | ba1ce00 | 2012-05-06 18:56:26 +0000 | [diff] [blame] | 1380 | SCTP_BASE_VAR(userspace_udpsctp6) = -1; |
| 1381 | } else { |
| 1382 | setReceiveBufferSize(SCTP_BASE_VAR(userspace_udpsctp6), SB_RAW); /* 128K */ |
| 1383 | setSendBufferSize(SCTP_BASE_VAR(userspace_udpsctp6), SB_RAW); /* 128K Is this setting net.inet.raw.maxdgram value? Should it be set to 64K? */ |
| 1384 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1385 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1386 | } |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1387 | } |
| 1388 | #endif |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1389 | #if !defined(__Userspace_os_Windows) |
t00fcxen | 22a33a1 | 2013-12-27 19:21:25 +0000 | [diff] [blame] | 1390 | #if defined(__Userspace_os_Darwin) || defined(__Userspace_os_DragonFly) || defined(__Userspace_os_FreeBSD) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1391 | #if defined(INET) || defined(INET6) |
| 1392 | if (SCTP_BASE_VAR(userspace_route) != -1) { |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1393 | int rc; |
| 1394 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1395 | if ((rc = pthread_create(&SCTP_BASE_VAR(recvthreadroute), NULL, &recv_function_route, NULL))) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1396 | SCTPDBG(SCTP_DEBUG_USR, "Can't start routing thread (%d).\n", rc); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1397 | close(SCTP_BASE_VAR(userspace_route)); |
| 1398 | SCTP_BASE_VAR(userspace_route) = -1; |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1399 | } |
| 1400 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1401 | #endif |
t00fcxen | 7943a5e | 2012-09-04 20:32:11 +0000 | [diff] [blame] | 1402 | #endif |
tuexen | 085a505 | 2012-01-08 13:42:59 +0000 | [diff] [blame] | 1403 | #if defined(INET) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1404 | if (SCTP_BASE_VAR(userspace_rawsctp) != -1) { |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1405 | int rc; |
| 1406 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1407 | if ((rc = pthread_create(&SCTP_BASE_VAR(recvthreadraw), NULL, &recv_function_raw, NULL))) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1408 | SCTPDBG(SCTP_DEBUG_USR, "Can't start SCTP/IPv4 recv thread (%d).\n", rc); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1409 | close(SCTP_BASE_VAR(userspace_rawsctp)); |
| 1410 | SCTP_BASE_VAR(userspace_rawsctp) = -1; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1411 | } |
| 1412 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1413 | if (SCTP_BASE_VAR(userspace_udpsctp) != -1) { |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1414 | int rc; |
| 1415 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1416 | if ((rc = pthread_create(&SCTP_BASE_VAR(recvthreadudp), NULL, &recv_function_udp, NULL))) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1417 | SCTPDBG(SCTP_DEBUG_USR, "Can't start SCTP/UDP/IPv4 recv thread (%d).\n", rc); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1418 | close(SCTP_BASE_VAR(userspace_udpsctp)); |
| 1419 | SCTP_BASE_VAR(userspace_udpsctp) = -1; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1420 | } |
| 1421 | } |
tuexen | 085a505 | 2012-01-08 13:42:59 +0000 | [diff] [blame] | 1422 | #endif |
| 1423 | #if defined(INET6) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1424 | if (SCTP_BASE_VAR(userspace_rawsctp6) != -1) { |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1425 | int rc; |
| 1426 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1427 | if ((rc = pthread_create(&SCTP_BASE_VAR(recvthreadraw6), NULL, &recv_function_raw6, NULL))) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1428 | SCTPDBG(SCTP_DEBUG_USR, "Can't start SCTP/IPv6 recv thread (%d).\n", rc); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1429 | close(SCTP_BASE_VAR(userspace_rawsctp6)); |
| 1430 | SCTP_BASE_VAR(userspace_rawsctp6) = -1; |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1431 | } |
| 1432 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1433 | if (SCTP_BASE_VAR(userspace_udpsctp6) != -1) { |
tuexen | 07961c4 | 2011-12-23 15:39:36 +0000 | [diff] [blame] | 1434 | int rc; |
| 1435 | |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1436 | if ((rc = pthread_create(&SCTP_BASE_VAR(recvthreadudp6), NULL, &recv_function_udp6, NULL))) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1437 | SCTPDBG(SCTP_DEBUG_USR, "Can't start SCTP/UDP/IPv6 recv thread (%d).\n", rc); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1438 | close(SCTP_BASE_VAR(userspace_udpsctp6)); |
| 1439 | SCTP_BASE_VAR(userspace_udpsctp6) = -1; |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1440 | } |
| 1441 | } |
tuexen | 085a505 | 2012-01-08 13:42:59 +0000 | [diff] [blame] | 1442 | #endif |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1443 | #else |
tuexen | 085a505 | 2012-01-08 13:42:59 +0000 | [diff] [blame] | 1444 | #if defined(INET) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1445 | if (SCTP_BASE_VAR(userspace_rawsctp) != -1) { |
| 1446 | if ((SCTP_BASE_VAR(recvthreadraw) = CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE)&recv_function_raw, NULL, 0, NULL)) == NULL) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1447 | SCTPDBG(SCTP_DEBUG_USR, "Can't start SCTP/IPv4 recv thread.\n"); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1448 | closesocket(SCTP_BASE_VAR(userspace_rawsctp)); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1449 | SCTP_BASE_VAR(userspace_rawsctp) = -1; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1450 | } |
| 1451 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1452 | if (SCTP_BASE_VAR(userspace_udpsctp) != -1) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1453 | if ((SCTP_BASE_VAR(recvthreadudp) = CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE)&recv_function_udp, NULL, 0, NULL)) == NULL) { |
| 1454 | SCTPDBG(SCTP_DEBUG_USR, "Can't start SCTP/UDP/IPv4 recv thread.\n"); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1455 | closesocket(SCTP_BASE_VAR(userspace_udpsctp)); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1456 | SCTP_BASE_VAR(userspace_udpsctp) = -1; |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1457 | } |
| 1458 | } |
tuexen | 085a505 | 2012-01-08 13:42:59 +0000 | [diff] [blame] | 1459 | #endif |
| 1460 | #if defined(INET6) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1461 | if (SCTP_BASE_VAR(userspace_rawsctp6) != -1) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1462 | if ((SCTP_BASE_VAR(recvthreadraw6) = CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE)&recv_function_raw6, NULL, 0, NULL)) == NULL) { |
| 1463 | SCTPDBG(SCTP_DEBUG_USR, "Can't start SCTP/IPv6 recv thread.\n"); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1464 | closesocket(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1465 | SCTP_BASE_VAR(userspace_rawsctp6) = -1; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 1466 | } |
| 1467 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1468 | if (SCTP_BASE_VAR(userspace_udpsctp6) != -1) { |
tuexen | a1d7a85 | 2012-05-19 14:55:19 +0000 | [diff] [blame] | 1469 | if ((SCTP_BASE_VAR(recvthreadudp6) = CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE)&recv_function_udp6, NULL, 0, NULL)) == NULL) { |
| 1470 | SCTPDBG(SCTP_DEBUG_USR, "Can't start SCTP/UDP/IPv6 recv thread.\n"); |
tuexen | f83a7fa | 2012-05-18 05:44:04 +0000 | [diff] [blame] | 1471 | closesocket(SCTP_BASE_VAR(userspace_udpsctp6)); |
tuexen | d93dfec | 2012-04-28 18:04:13 +0000 | [diff] [blame] | 1472 | SCTP_BASE_VAR(userspace_udpsctp6) = -1; |
tuexen | 59caa50 | 2012-01-08 10:27:02 +0000 | [diff] [blame] | 1473 | } |
| 1474 | } |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1475 | #endif |
tuexen | 085a505 | 2012-01-08 13:42:59 +0000 | [diff] [blame] | 1476 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1477 | } |
| 1478 | |
| 1479 | void |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1480 | recv_thread_destroy(void) |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1481 | { |
t00fcxen | 22a33a1 | 2013-12-27 19:21:25 +0000 | [diff] [blame] | 1482 | #if defined(__Userspace_os_Darwin) || defined(__Userspace_os_DragonFly) || defined(__Userspace_os_FreeBSD) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1483 | #if defined(INET) || defined(INET6) |
| 1484 | if (SCTP_BASE_VAR(userspace_route) != -1) { |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1485 | close(SCTP_BASE_VAR(userspace_route)); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1486 | } |
tuexen | c5fa57e | 2012-01-10 14:51:23 +0000 | [diff] [blame] | 1487 | #endif |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1488 | #endif |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1489 | #if defined(INET) |
| 1490 | if (SCTP_BASE_VAR(userspace_rawsctp) != -1) { |
| 1491 | #if defined(__Userspace_os_Windows) |
| 1492 | closesocket(SCTP_BASE_VAR(userspace_rawsctp)); |
| 1493 | #else |
| 1494 | close(SCTP_BASE_VAR(userspace_rawsctp)); |
| 1495 | #endif |
tuexen | 587a0a6 | 2011-12-15 17:32:38 +0000 | [diff] [blame] | 1496 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1497 | if (SCTP_BASE_VAR(userspace_udpsctp) != -1) { |
| 1498 | #if defined(__Userspace_os_Windows) |
| 1499 | closesocket(SCTP_BASE_VAR(userspace_udpsctp)); |
| 1500 | #else |
| 1501 | close(SCTP_BASE_VAR(userspace_udpsctp)); |
| 1502 | #endif |
| 1503 | } |
| 1504 | #endif |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1505 | #if defined(INET6) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1506 | if (SCTP_BASE_VAR(userspace_rawsctp6) != -1) { |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1507 | #if defined(__Userspace_os_Windows) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1508 | closesocket(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1509 | #else |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1510 | close(SCTP_BASE_VAR(userspace_rawsctp6)); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1511 | #endif |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1512 | } |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1513 | if (SCTP_BASE_VAR(userspace_udpsctp6) != -1) { |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1514 | #if defined(__Userspace_os_Windows) |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1515 | closesocket(SCTP_BASE_VAR(userspace_udpsctp6)); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1516 | #else |
tuexen | b735c0f | 2012-04-28 16:43:56 +0000 | [diff] [blame] | 1517 | close(SCTP_BASE_VAR(userspace_udpsctp6)); |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1518 | #endif |
tuexen | 3a33bc9 | 2012-01-15 12:10:06 +0000 | [diff] [blame] | 1519 | } |
| 1520 | #endif |
tuexen | bca1dae | 2011-11-01 23:02:02 +0000 | [diff] [blame] | 1521 | } |
t00fcxen | 6b5474d | 2013-08-03 13:14:37 +0000 | [diff] [blame] | 1522 | #else |
| 1523 | int foo; |
tuexen | 00e1eea | 2012-07-15 15:48:48 +0000 | [diff] [blame] | 1524 | #endif |