Added disgusting kludge to get rid of compiler warning until 'handle'
[unix-history] / sys / netns / spp_usrreq.c
CommitLineData
15637ed4
RG
1/*
2 * Copyright (c) 1984, 1985, 1986, 1987 Regents of the University of California.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
136b31f1 33 * from: @(#)spp_usrreq.c 7.15 (Berkeley) 6/27/91
4c45483e 34 * $Id: spp_usrreq.c,v 1.3 1993/11/07 17:50:39 wollman Exp $
15637ed4
RG
35 */
36
37#include "param.h"
38#include "systm.h"
39#include "malloc.h"
40#include "mbuf.h"
41#include "protosw.h"
42#include "socket.h"
43#include "socketvar.h"
44#include "errno.h"
45
46#include "../net/if.h"
47#include "../net/route.h"
48#include "../netinet/tcp_fsm.h"
49
50#include "ns.h"
51#include "ns_pcb.h"
52#include "idp.h"
53#include "idp_var.h"
54#include "ns_error.h"
55#include "sp.h"
56#include "spidp.h"
57#include "spp_timer.h"
58#include "spp_var.h"
59#include "spp_debug.h"
60
4c45483e
GW
61static void spp_quench(struct nspcb *);
62static void spp_abort(struct nspcb *);
63static void spp_setpersist(struct sppcb *);
64static void spp_template(struct sppcb *);
65
8ace4366
GW
66struct spp_istat spp_istat;
67u_short spp_iss;
68
15637ed4
RG
69/*
70 * SP protocol implementation.
71 */
4c45483e 72void
15637ed4
RG
73spp_init()
74{
75
76 spp_iss = 1; /* WRONG !! should fish it out of TODR */
77}
78struct spidp spp_savesi;
79int traceallspps = 0;
80extern int sppconsdebug;
81int spp_hardnosed;
82int spp_use_delack = 0;
83u_short spp_newchecks[50];
84
85/*ARGSUSED*/
4c45483e 86void
15637ed4
RG
87spp_input(m, nsp)
88 register struct mbuf *m;
89 register struct nspcb *nsp;
90{
91 register struct sppcb *cb;
92 register struct spidp *si = mtod(m, struct spidp *);
93 register struct socket *so;
4c45483e 94 short ostate = 0;
15637ed4
RG
95 int dropsocket = 0;
96
97
98 sppstat.spps_rcvtotal++;
99 if (nsp == 0) {
100 panic("No nspcb in spp_input\n");
101 return;
102 }
103
104 cb = nstosppcb(nsp);
105 if (cb == 0) goto bad;
106
107 if (m->m_len < sizeof(*si)) {
108 if ((m = m_pullup(m, sizeof(*si))) == 0) {
109 sppstat.spps_rcvshort++;
110 return;
111 }
112 si = mtod(m, struct spidp *);
113 }
114 si->si_seq = ntohs(si->si_seq);
115 si->si_ack = ntohs(si->si_ack);
116 si->si_alo = ntohs(si->si_alo);
117
118 so = nsp->nsp_socket;
119 if (so->so_options & SO_DEBUG || traceallspps) {
120 ostate = cb->s_state;
121 spp_savesi = *si;
122 }
123 if (so->so_options & SO_ACCEPTCONN) {
124 struct sppcb *ocb = cb;
125
126 so = sonewconn(so, 0);
127 if (so == 0) {
128 goto drop;
129 }
130 /*
131 * This is ugly, but ....
132 *
133 * Mark socket as temporary until we're
134 * committed to keeping it. The code at
135 * ``drop'' and ``dropwithreset'' check the
136 * flag dropsocket to see if the temporary
137 * socket created here should be discarded.
138 * We mark the socket as discardable until
139 * we're committed to it below in TCPS_LISTEN.
140 */
141 dropsocket++;
142 nsp = (struct nspcb *)so->so_pcb;
143 nsp->nsp_laddr = si->si_dna;
144 cb = nstosppcb(nsp);
145 cb->s_mtu = ocb->s_mtu; /* preserve sockopts */
146 cb->s_flags = ocb->s_flags; /* preserve sockopts */
147 cb->s_flags2 = ocb->s_flags2; /* preserve sockopts */
148 cb->s_state = TCPS_LISTEN;
149 }
150
151 /*
152 * Packet received on connection.
153 * reset idle time and keep-alive timer;
154 */
155 cb->s_idle = 0;
156 cb->s_timer[SPPT_KEEP] = SPPTV_KEEP;
157
158 switch (cb->s_state) {
159
160 case TCPS_LISTEN:{
161 struct mbuf *am;
162 register struct sockaddr_ns *sns;
163 struct ns_addr laddr;
164
165 /*
166 * If somebody here was carying on a conversation
167 * and went away, and his pen pal thinks he can
168 * still talk, we get the misdirected packet.
169 */
170 if (spp_hardnosed && (si->si_did != 0 || si->si_seq != 0)) {
171 spp_istat.gonawy++;
172 goto dropwithreset;
173 }
174 am = m_get(M_DONTWAIT, MT_SONAME);
175 if (am == NULL)
176 goto drop;
177 am->m_len = sizeof (struct sockaddr_ns);
178 sns = mtod(am, struct sockaddr_ns *);
179 sns->sns_len = sizeof(*sns);
180 sns->sns_family = AF_NS;
181 sns->sns_addr = si->si_sna;
182 laddr = nsp->nsp_laddr;
183 if (ns_nullhost(laddr))
184 nsp->nsp_laddr = si->si_dna;
185 if (ns_pcbconnect(nsp, am)) {
186 nsp->nsp_laddr = laddr;
187 (void) m_free(am);
188 spp_istat.noconn++;
189 goto drop;
190 }
191 (void) m_free(am);
192 spp_template(cb);
193 dropsocket = 0; /* committed to socket */
194 cb->s_did = si->si_sid;
195 cb->s_rack = si->si_ack;
196 cb->s_ralo = si->si_alo;
197#define THREEWAYSHAKE
198#ifdef THREEWAYSHAKE
199 cb->s_state = TCPS_SYN_RECEIVED;
200 cb->s_force = 1 + SPPT_KEEP;
201 sppstat.spps_accepts++;
202 cb->s_timer[SPPT_KEEP] = SPPTV_KEEP;
203 }
204 break;
205 /*
206 * This state means that we have heard a response
207 * to our acceptance of their connection
208 * It is probably logically unnecessary in this
209 * implementation.
210 */
211 case TCPS_SYN_RECEIVED: {
212 if (si->si_did!=cb->s_sid) {
213 spp_istat.wrncon++;
214 goto drop;
215 }
216#endif
217 nsp->nsp_fport = si->si_sport;
218 cb->s_timer[SPPT_REXMT] = 0;
219 cb->s_timer[SPPT_KEEP] = SPPTV_KEEP;
220 soisconnected(so);
221 cb->s_state = TCPS_ESTABLISHED;
222 sppstat.spps_accepts++;
223 }
224 break;
225
226 /*
227 * This state means that we have gotten a response
228 * to our attempt to establish a connection.
229 * We fill in the data from the other side,
230 * telling us which port to respond to, instead of the well-
231 * known one we might have sent to in the first place.
232 * We also require that this is a response to our
233 * connection id.
234 */
235 case TCPS_SYN_SENT:
236 if (si->si_did!=cb->s_sid) {
237 spp_istat.notme++;
238 goto drop;
239 }
240 sppstat.spps_connects++;
241 cb->s_did = si->si_sid;
242 cb->s_rack = si->si_ack;
243 cb->s_ralo = si->si_alo;
244 cb->s_dport = nsp->nsp_fport = si->si_sport;
245 cb->s_timer[SPPT_REXMT] = 0;
246 cb->s_flags |= SF_ACKNOW;
247 soisconnected(so);
248 cb->s_state = TCPS_ESTABLISHED;
249 /* Use roundtrip time of connection request for initial rtt */
250 if (cb->s_rtt) {
251 cb->s_srtt = cb->s_rtt << 3;
252 cb->s_rttvar = cb->s_rtt << 1;
253 SPPT_RANGESET(cb->s_rxtcur,
254 ((cb->s_srtt >> 2) + cb->s_rttvar) >> 1,
255 SPPTV_MIN, SPPTV_REXMTMAX);
256 cb->s_rtt = 0;
257 }
258 }
259 if (so->so_options & SO_DEBUG || traceallspps)
260 spp_trace(SA_INPUT, (u_char)ostate, cb, &spp_savesi, 0);
261
262 m->m_len -= sizeof (struct idp);
263 m->m_pkthdr.len -= sizeof (struct idp);
264 m->m_data += sizeof (struct idp);
265
266 if (spp_reass(cb, si)) {
267 (void) m_freem(m);
268 }
269 if (cb->s_force || (cb->s_flags & (SF_ACKNOW|SF_WIN|SF_RXT)))
270 (void) spp_output(cb, (struct mbuf *)0);
271 cb->s_flags &= ~(SF_WIN|SF_RXT);
272 return;
273
274dropwithreset:
275 if (dropsocket)
276 (void) soabort(so);
277 si->si_seq = ntohs(si->si_seq);
278 si->si_ack = ntohs(si->si_ack);
279 si->si_alo = ntohs(si->si_alo);
280 ns_error(dtom(si), NS_ERR_NOSOCK, 0);
281 if (cb->s_nspcb->nsp_socket->so_options & SO_DEBUG || traceallspps)
282 spp_trace(SA_DROP, (u_char)ostate, cb, &spp_savesi, 0);
283 return;
284
285drop:
286bad:
287 if (cb == 0 || cb->s_nspcb->nsp_socket->so_options & SO_DEBUG ||
288 traceallspps)
289 spp_trace(SA_DROP, (u_char)ostate, cb, &spp_savesi, 0);
290 m_freem(m);
291}
292
293int spprexmtthresh = 3;
294
295/*
296 * This is structurally similar to the tcp reassembly routine
297 * but its function is somewhat different: It merely queues
298 * packets up, and suppresses duplicates.
299 */
4c45483e 300int
15637ed4
RG
301spp_reass(cb, si)
302register struct sppcb *cb;
303register struct spidp *si;
304{
305 register struct spidp_q *q;
306 register struct mbuf *m;
307 register struct socket *so = cb->s_nspcb->nsp_socket;
308 char packetp = cb->s_flags & SF_HI;
309 int incr;
310 char wakeup = 0;
311
312 if (si == SI(0))
313 goto present;
314 /*
315 * Update our news from them.
316 */
317 if (si->si_cc & SP_SA)
318 cb->s_flags |= (spp_use_delack ? SF_DELACK : SF_ACKNOW);
319 if (SSEQ_GT(si->si_alo, cb->s_ralo))
320 cb->s_flags |= SF_WIN;
321 if (SSEQ_LEQ(si->si_ack, cb->s_rack)) {
322 if ((si->si_cc & SP_SP) && cb->s_rack != (cb->s_smax + 1)) {
323 sppstat.spps_rcvdupack++;
324 /*
325 * If this is a completely duplicate ack
326 * and other conditions hold, we assume
327 * a packet has been dropped and retransmit
328 * it exactly as in tcp_input().
329 */
330 if (si->si_ack != cb->s_rack ||
331 si->si_alo != cb->s_ralo)
332 cb->s_dupacks = 0;
333 else if (++cb->s_dupacks == spprexmtthresh) {
334 u_short onxt = cb->s_snxt;
335 int cwnd = cb->s_cwnd;
336
337 cb->s_snxt = si->si_ack;
338 cb->s_cwnd = CUNIT;
339 cb->s_force = 1 + SPPT_REXMT;
340 (void) spp_output(cb, (struct mbuf *)0);
341 cb->s_timer[SPPT_REXMT] = cb->s_rxtcur;
342 cb->s_rtt = 0;
343 if (cwnd >= 4 * CUNIT)
344 cb->s_cwnd = cwnd / 2;
345 if (SSEQ_GT(onxt, cb->s_snxt))
346 cb->s_snxt = onxt;
347 return (1);
348 }
349 } else
350 cb->s_dupacks = 0;
351 goto update_window;
352 }
353 cb->s_dupacks = 0;
354 /*
355 * If our correspondent acknowledges data we haven't sent
356 * TCP would drop the packet after acking. We'll be a little
357 * more permissive
358 */
359 if (SSEQ_GT(si->si_ack, (cb->s_smax + 1))) {
360 sppstat.spps_rcvacktoomuch++;
361 si->si_ack = cb->s_smax + 1;
362 }
363 sppstat.spps_rcvackpack++;
364 /*
365 * If transmit timer is running and timed sequence
366 * number was acked, update smoothed round trip time.
367 * See discussion of algorithm in tcp_input.c
368 */
369 if (cb->s_rtt && SSEQ_GT(si->si_ack, cb->s_rtseq)) {
370 sppstat.spps_rttupdated++;
371 if (cb->s_srtt != 0) {
372 register short delta;
373 delta = cb->s_rtt - (cb->s_srtt >> 3);
374 if ((cb->s_srtt += delta) <= 0)
375 cb->s_srtt = 1;
376 if (delta < 0)
377 delta = -delta;
378 delta -= (cb->s_rttvar >> 2);
379 if ((cb->s_rttvar += delta) <= 0)
380 cb->s_rttvar = 1;
381 } else {
382 /*
383 * No rtt measurement yet
384 */
385 cb->s_srtt = cb->s_rtt << 3;
386 cb->s_rttvar = cb->s_rtt << 1;
387 }
388 cb->s_rtt = 0;
389 cb->s_rxtshift = 0;
390 SPPT_RANGESET(cb->s_rxtcur,
391 ((cb->s_srtt >> 2) + cb->s_rttvar) >> 1,
392 SPPTV_MIN, SPPTV_REXMTMAX);
393 }
394 /*
395 * If all outstanding data is acked, stop retransmit
396 * timer and remember to restart (more output or persist).
397 * If there is more data to be acked, restart retransmit
398 * timer, using current (possibly backed-off) value;
399 */
400 if (si->si_ack == cb->s_smax + 1) {
401 cb->s_timer[SPPT_REXMT] = 0;
402 cb->s_flags |= SF_RXT;
403 } else if (cb->s_timer[SPPT_PERSIST] == 0)
404 cb->s_timer[SPPT_REXMT] = cb->s_rxtcur;
405 /*
406 * When new data is acked, open the congestion window.
407 * If the window gives us less than ssthresh packets
408 * in flight, open exponentially (maxseg at a time).
409 * Otherwise open linearly (maxseg^2 / cwnd at a time).
410 */
411 incr = CUNIT;
412 if (cb->s_cwnd > cb->s_ssthresh)
413 incr = max(incr * incr / cb->s_cwnd, 1);
414 cb->s_cwnd = min(cb->s_cwnd + incr, cb->s_cwmx);
415 /*
416 * Trim Acked data from output queue.
417 */
418 while ((m = so->so_snd.sb_mb) != NULL) {
419 if (SSEQ_LT((mtod(m, struct spidp *))->si_seq, si->si_ack))
420 sbdroprecord(&so->so_snd);
421 else
422 break;
423 }
424 sowwakeup(so);
425 cb->s_rack = si->si_ack;
426update_window:
427 if (SSEQ_LT(cb->s_snxt, cb->s_rack))
428 cb->s_snxt = cb->s_rack;
429 if (SSEQ_LT(cb->s_swl1, si->si_seq) || cb->s_swl1 == si->si_seq &&
430 (SSEQ_LT(cb->s_swl2, si->si_ack) ||
431 cb->s_swl2 == si->si_ack && SSEQ_LT(cb->s_ralo, si->si_alo))) {
432 /* keep track of pure window updates */
433 if ((si->si_cc & SP_SP) && cb->s_swl2 == si->si_ack
434 && SSEQ_LT(cb->s_ralo, si->si_alo)) {
435 sppstat.spps_rcvwinupd++;
436 sppstat.spps_rcvdupack--;
437 }
438 cb->s_ralo = si->si_alo;
439 cb->s_swl1 = si->si_seq;
440 cb->s_swl2 = si->si_ack;
441 cb->s_swnd = (1 + si->si_alo - si->si_ack);
442 if (cb->s_swnd > cb->s_smxw)
443 cb->s_smxw = cb->s_swnd;
444 cb->s_flags |= SF_WIN;
445 }
446 /*
447 * If this packet number is higher than that which
448 * we have allocated refuse it, unless urgent
449 */
450 if (SSEQ_GT(si->si_seq, cb->s_alo)) {
451 if (si->si_cc & SP_SP) {
452 sppstat.spps_rcvwinprobe++;
453 return (1);
454 } else
455 sppstat.spps_rcvpackafterwin++;
456 if (si->si_cc & SP_OB) {
457 if (SSEQ_GT(si->si_seq, cb->s_alo + 60)) {
458 ns_error(dtom(si), NS_ERR_FULLUP, 0);
459 return (0);
460 } /* else queue this packet; */
461 } else {
462 /*register struct socket *so = cb->s_nspcb->nsp_socket;
463 if (so->so_state && SS_NOFDREF) {
464 ns_error(dtom(si), NS_ERR_NOSOCK, 0);
465 (void)spp_close(cb);
466 } else
467 would crash system*/
468 spp_istat.notyet++;
469 ns_error(dtom(si), NS_ERR_FULLUP, 0);
470 return (0);
471 }
472 }
473 /*
474 * If this is a system packet, we don't need to
475 * queue it up, and won't update acknowledge #
476 */
477 if (si->si_cc & SP_SP) {
478 return (1);
479 }
480 /*
481 * We have already seen this packet, so drop.
482 */
483 if (SSEQ_LT(si->si_seq, cb->s_ack)) {
484 spp_istat.bdreas++;
485 sppstat.spps_rcvduppack++;
486 if (si->si_seq == cb->s_ack - 1)
487 spp_istat.lstdup++;
488 return (1);
489 }
490 /*
491 * Loop through all packets queued up to insert in
492 * appropriate sequence.
493 */
494 for (q = cb->s_q.si_next; q!=&cb->s_q; q = q->si_next) {
495 if (si->si_seq == SI(q)->si_seq) {
496 sppstat.spps_rcvduppack++;
497 return (1);
498 }
499 if (SSEQ_LT(si->si_seq, SI(q)->si_seq)) {
500 sppstat.spps_rcvoopack++;
501 break;
502 }
503 }
504 insque(si, q->si_prev);
505 /*
506 * If this packet is urgent, inform process
507 */
508 if (si->si_cc & SP_OB) {
509 cb->s_iobc = ((char *)si)[1 + sizeof(*si)];
510 sohasoutofband(so);
511 cb->s_oobflags |= SF_IOOB;
512 }
513present:
514#define SPINC sizeof(struct sphdr)
515 /*
516 * Loop through all packets queued up to update acknowledge
517 * number, and present all acknowledged data to user;
518 * If in packet interface mode, show packet headers.
519 */
520 for (q = cb->s_q.si_next; q!=&cb->s_q; q = q->si_next) {
521 if (SI(q)->si_seq == cb->s_ack) {
522 cb->s_ack++;
523 m = dtom(q);
524 if (SI(q)->si_cc & SP_OB) {
525 cb->s_oobflags &= ~SF_IOOB;
526 if (so->so_rcv.sb_cc)
527 so->so_oobmark = so->so_rcv.sb_cc;
528 else
529 so->so_state |= SS_RCVATMARK;
530 }
531 q = q->si_prev;
532 remque(q->si_next);
533 wakeup = 1;
534 sppstat.spps_rcvpack++;
535#ifdef SF_NEWCALL
536 if (cb->s_flags2 & SF_NEWCALL) {
537 struct sphdr *sp = mtod(m, struct sphdr *);
538 u_char dt = sp->sp_dt;
539 spp_newchecks[4]++;
540 if (dt != cb->s_rhdr.sp_dt) {
541 struct mbuf *mm =
542 m_getclr(M_DONTWAIT, MT_CONTROL);
543 spp_newchecks[0]++;
544 if (mm != NULL) {
545 u_short *s =
546 mtod(mm, u_short *);
547 cb->s_rhdr.sp_dt = dt;
548 mm->m_len = 5; /*XXX*/
549 s[0] = 5;
550 s[1] = 1;
551 *(u_char *)(&s[2]) = dt;
552 sbappend(&so->so_rcv, mm);
553 }
554 }
555 if (sp->sp_cc & SP_OB) {
556 MCHTYPE(m, MT_OOBDATA);
557 spp_newchecks[1]++;
558 so->so_oobmark = 0;
559 so->so_state &= ~SS_RCVATMARK;
560 }
561 if (packetp == 0) {
562 m->m_data += SPINC;
563 m->m_len -= SPINC;
564 m->m_pkthdr.len -= SPINC;
565 }
566 if ((sp->sp_cc & SP_EM) || packetp) {
567 sbappendrecord(&so->so_rcv, m);
568 spp_newchecks[9]++;
569 } else
570 sbappend(&so->so_rcv, m);
571 } else
572#endif
573 if (packetp) {
574 sbappendrecord(&so->so_rcv, m);
575 } else {
576 cb->s_rhdr = *mtod(m, struct sphdr *);
577 m->m_data += SPINC;
578 m->m_len -= SPINC;
579 m->m_pkthdr.len -= SPINC;
580 sbappend(&so->so_rcv, m);
581 }
582 } else
583 break;
584 }
585 if (wakeup) sorwakeup(so);
586 return (0);
587}
588
4c45483e 589void
15637ed4
RG
590spp_ctlinput(cmd, arg)
591 int cmd;
592 caddr_t arg;
593{
594 struct ns_addr *na;
595 extern u_char nsctlerrmap[];
15637ed4 596 extern struct nspcb *idp_drop();
4c45483e 597 struct ns_errp *errp = 0;
15637ed4
RG
598 struct nspcb *nsp;
599 struct sockaddr_ns *sns;
600 int type;
601
602 if (cmd < 0 || cmd > PRC_NCMDS)
603 return;
604 type = NS_ERR_UNREACH_HOST;
605
606 switch (cmd) {
607
608 case PRC_ROUTEDEAD:
609 return;
610
611 case PRC_IFDOWN:
612 case PRC_HOSTDEAD:
613 case PRC_HOSTUNREACH:
614 sns = (struct sockaddr_ns *)arg;
615 if (sns->sns_family != AF_NS)
616 return;
617 na = &sns->sns_addr;
618 break;
619
620 default:
621 errp = (struct ns_errp *)arg;
622 na = &errp->ns_err_idp.idp_dna;
623 type = errp->ns_err_num;
624 type = ntohs((u_short)type);
625 }
626 switch (type) {
627
628 case NS_ERR_UNREACH_HOST:
629 ns_pcbnotify(na, (int)nsctlerrmap[cmd], spp_abort, (long) 0);
630 break;
631
632 case NS_ERR_TOO_BIG:
633 case NS_ERR_NOSOCK:
634 nsp = ns_pcblookup(na, errp->ns_err_idp.idp_sna.x_port,
635 NS_WILDCARD);
636 if (nsp) {
637 if(nsp->nsp_pcb)
638 (void) spp_drop((struct sppcb *)nsp->nsp_pcb,
639 (int)nsctlerrmap[cmd]);
640 else
641 (void) idp_drop(nsp, (int)nsctlerrmap[cmd]);
642 }
643 break;
644
645 case NS_ERR_FULLUP:
646 ns_pcbnotify(na, 0, spp_quench, (long) 0);
647 }
648}
649/*
650 * When a source quench is received, close congestion window
651 * to one packet. We will gradually open it again as we proceed.
652 */
4c45483e 653static void
15637ed4
RG
654spp_quench(nsp)
655 struct nspcb *nsp;
656{
657 struct sppcb *cb = nstosppcb(nsp);
658
659 if (cb)
660 cb->s_cwnd = CUNIT;
661}
662
663#ifdef notdef
664int
665spp_fixmtu(nsp)
666register struct nspcb *nsp;
667{
668 register struct sppcb *cb = (struct sppcb *)(nsp->nsp_pcb);
669 register struct mbuf *m;
670 register struct spidp *si;
671 struct ns_errp *ep;
672 struct sockbuf *sb;
673 int badseq, len;
674 struct mbuf *firstbad, *m0;
675
676 if (cb) {
677 /*
678 * The notification that we have sent
679 * too much is bad news -- we will
680 * have to go through queued up so far
681 * splitting ones which are too big and
682 * reassigning sequence numbers and checksums.
683 * we should then retransmit all packets from
684 * one above the offending packet to the last one
685 * we had sent (or our allocation)
686 * then the offending one so that the any queued
687 * data at our destination will be discarded.
688 */
689 ep = (struct ns_errp *)nsp->nsp_notify_param;
690 sb = &nsp->nsp_socket->so_snd;
691 cb->s_mtu = ep->ns_err_param;
692 badseq = SI(&ep->ns_err_idp)->si_seq;
693 for (m = sb->sb_mb; m; m = m->m_act) {
694 si = mtod(m, struct spidp *);
695 if (si->si_seq == badseq)
696 break;
697 }
698 if (m == 0) return;
699 firstbad = m;
700 /*for (;;) {*/
701 /* calculate length */
702 for (m0 = m, len = 0; m ; m = m->m_next)
703 len += m->m_len;
704 if (len > cb->s_mtu) {
705 }
706 /* FINISH THIS
707 } */
708 }
709}
710#endif
711
4c45483e 712int
15637ed4
RG
713spp_output(cb, m0)
714 register struct sppcb *cb;
715 struct mbuf *m0;
716{
717 struct socket *so = cb->s_nspcb->nsp_socket;
718 register struct mbuf *m;
719 register struct spidp *si = (struct spidp *) 0;
720 register struct sockbuf *sb = &so->so_snd;
721 int len = 0, win, rcv_win;
722 short span, off, recordp = 0;
723 u_short alo;
724 int error = 0, sendalot;
725#ifdef notdef
726 int idle;
727#endif
728 struct mbuf *mprev;
729 extern int idpcksum;
730
731 if (m0) {
732 int mtu = cb->s_mtu;
733 int datalen;
734 /*
735 * Make sure that packet isn't too big.
736 */
737 for (m = m0; m ; m = m->m_next) {
738 mprev = m;
739 len += m->m_len;
740 if (m->m_flags & M_EOR)
741 recordp = 1;
742 }
743 datalen = (cb->s_flags & SF_HO) ?
744 len - sizeof (struct sphdr) : len;
745 if (datalen > mtu) {
746 if (cb->s_flags & SF_PI) {
747 m_freem(m0);
748 return (EMSGSIZE);
749 } else {
750 int oldEM = cb->s_cc & SP_EM;
751
752 cb->s_cc &= ~SP_EM;
753 while (len > mtu) {
754 /*
755 * Here we are only being called
756 * from usrreq(), so it is OK to
757 * block.
758 */
759 m = m_copym(m0, 0, mtu, M_WAIT);
760 if (cb->s_flags & SF_NEWCALL) {
761 struct mbuf *mm = m;
762 spp_newchecks[7]++;
763 while (mm) {
764 mm->m_flags &= ~M_EOR;
765 mm = mm->m_next;
766 }
767 }
768 error = spp_output(cb, m);
769 if (error) {
770 cb->s_cc |= oldEM;
771 m_freem(m0);
772 return(error);
773 }
774 m_adj(m0, mtu);
775 len -= mtu;
776 }
777 cb->s_cc |= oldEM;
778 }
779 }
780 /*
781 * Force length even, by adding a "garbage byte" if
782 * necessary.
783 */
784 if (len & 1) {
785 m = mprev;
786 if (M_TRAILINGSPACE(m) >= 1)
787 m->m_len++;
788 else {
789 struct mbuf *m1 = m_get(M_DONTWAIT, MT_DATA);
790
791 if (m1 == 0) {
792 m_freem(m0);
793 return (ENOBUFS);
794 }
795 m1->m_len = 1;
796 *(mtod(m1, u_char *)) = 0;
797 m->m_next = m1;
798 }
799 }
800 m = m_gethdr(M_DONTWAIT, MT_HEADER);
801 if (m == 0) {
802 m_freem(m0);
803 return (ENOBUFS);
804 }
805 /*
806 * Fill in mbuf with extended SP header
807 * and addresses and length put into network format.
808 */
809 MH_ALIGN(m, sizeof (struct spidp));
810 m->m_len = sizeof (struct spidp);
811 m->m_next = m0;
812 si = mtod(m, struct spidp *);
813 si->si_i = *cb->s_idp;
814 si->si_s = cb->s_shdr;
815 if ((cb->s_flags & SF_PI) && (cb->s_flags & SF_HO)) {
816 register struct sphdr *sh;
817 if (m0->m_len < sizeof (*sh)) {
818 if((m0 = m_pullup(m0, sizeof(*sh))) == NULL) {
819 (void) m_free(m);
820 m_freem(m0);
821 return (EINVAL);
822 }
823 m->m_next = m0;
824 }
825 sh = mtod(m0, struct sphdr *);
826 si->si_dt = sh->sp_dt;
827 si->si_cc |= sh->sp_cc & SP_EM;
828 m0->m_len -= sizeof (*sh);
829 m0->m_data += sizeof (*sh);
830 len -= sizeof (*sh);
831 }
832 len += sizeof(*si);
833 if ((cb->s_flags2 & SF_NEWCALL) && recordp) {
834 si->si_cc |= SP_EM;
835 spp_newchecks[8]++;
836 }
837 if (cb->s_oobflags & SF_SOOB) {
838 /*
839 * Per jqj@cornell:
840 * make sure OB packets convey exactly 1 byte.
841 * If the packet is 1 byte or larger, we
842 * have already guaranted there to be at least
843 * one garbage byte for the checksum, and
844 * extra bytes shouldn't hurt!
845 */
846 if (len > sizeof(*si)) {
847 si->si_cc |= SP_OB;
848 len = (1 + sizeof(*si));
849 }
850 }
851 si->si_len = htons((u_short)len);
852 m->m_pkthdr.len = ((len - 1) | 1) + 1;
853 /*
854 * queue stuff up for output
855 */
856 sbappendrecord(sb, m);
857 cb->s_seq++;
858 }
859#ifdef notdef
860 idle = (cb->s_smax == (cb->s_rack - 1));
861#endif
862again:
863 sendalot = 0;
864 off = cb->s_snxt - cb->s_rack;
865 win = min(cb->s_swnd, (cb->s_cwnd/CUNIT));
866
867 /*
868 * If in persist timeout with window of 0, send a probe.
869 * Otherwise, if window is small but nonzero
870 * and timer expired, send what we can and go into
871 * transmit state.
872 */
873 if (cb->s_force == 1 + SPPT_PERSIST) {
874 if (win != 0) {
875 cb->s_timer[SPPT_PERSIST] = 0;
876 cb->s_rxtshift = 0;
877 }
878 }
879 span = cb->s_seq - cb->s_rack;
880 len = min(span, win) - off;
881
882 if (len < 0) {
883 /*
884 * Window shrank after we went into it.
885 * If window shrank to 0, cancel pending
886 * restransmission and pull s_snxt back
887 * to (closed) window. We will enter persist
888 * state below. If the widndow didn't close completely,
889 * just wait for an ACK.
890 */
891 len = 0;
892 if (win == 0) {
893 cb->s_timer[SPPT_REXMT] = 0;
894 cb->s_snxt = cb->s_rack;
895 }
896 }
897 if (len > 1)
898 sendalot = 1;
899 rcv_win = sbspace(&so->so_rcv);
900
901 /*
902 * Send if we owe peer an ACK.
903 */
904 if (cb->s_oobflags & SF_SOOB) {
905 /*
906 * must transmit this out of band packet
907 */
908 cb->s_oobflags &= ~ SF_SOOB;
909 sendalot = 1;
910 sppstat.spps_sndurg++;
911 goto found;
912 }
913 if (cb->s_flags & SF_ACKNOW)
914 goto send;
915 if (cb->s_state < TCPS_ESTABLISHED)
916 goto send;
917 /*
918 * Silly window can't happen in spp.
919 * Code from tcp deleted.
920 */
921 if (len)
922 goto send;
923 /*
924 * Compare available window to amount of window
925 * known to peer (as advertised window less
926 * next expected input.) If the difference is at least two
927 * packets or at least 35% of the mximum possible window,
928 * then want to send a window update to peer.
929 */
930 if (rcv_win > 0) {
931 u_short delta = 1 + cb->s_alo - cb->s_ack;
932 int adv = rcv_win - (delta * cb->s_mtu);
933
934 if ((so->so_rcv.sb_cc == 0 && adv >= (2 * cb->s_mtu)) ||
935 (100 * adv / so->so_rcv.sb_hiwat >= 35)) {
936 sppstat.spps_sndwinup++;
937 cb->s_flags |= SF_ACKNOW;
938 goto send;
939 }
940
941 }
942 /*
943 * Many comments from tcp_output.c are appropriate here
944 * including . . .
945 * If send window is too small, there is data to transmit, and no
946 * retransmit or persist is pending, then go to persist state.
947 * If nothing happens soon, send when timer expires:
948 * if window is nonzero, transmit what we can,
949 * otherwise send a probe.
950 */
951 if (so->so_snd.sb_cc && cb->s_timer[SPPT_REXMT] == 0 &&
952 cb->s_timer[SPPT_PERSIST] == 0) {
953 cb->s_rxtshift = 0;
954 spp_setpersist(cb);
955 }
956 /*
957 * No reason to send a packet, just return.
958 */
959 cb->s_outx = 1;
960 return (0);
961
962send:
963 /*
964 * Find requested packet.
965 */
966 si = 0;
967 if (len > 0) {
968 cb->s_want = cb->s_snxt;
969 for (m = sb->sb_mb; m; m = m->m_act) {
970 si = mtod(m, struct spidp *);
971 if (SSEQ_LEQ(cb->s_snxt, si->si_seq))
972 break;
973 }
974 found:
975 if (si) {
976 if (si->si_seq == cb->s_snxt)
977 cb->s_snxt++;
978 else
979 sppstat.spps_sndvoid++, si = 0;
980 }
981 }
982 /*
983 * update window
984 */
985 if (rcv_win < 0)
986 rcv_win = 0;
987 alo = cb->s_ack - 1 + (rcv_win / ((short)cb->s_mtu));
988 if (SSEQ_LT(alo, cb->s_alo))
989 alo = cb->s_alo;
990
991 if (si) {
992 /*
993 * must make a copy of this packet for
994 * idp_output to monkey with
995 */
996 m = m_copy(dtom(si), 0, (int)M_COPYALL);
997 if (m == NULL) {
998 return (ENOBUFS);
999 }
1000 si = mtod(m, struct spidp *);
1001 if (SSEQ_LT(si->si_seq, cb->s_smax))
1002 sppstat.spps_sndrexmitpack++;
1003 else
1004 sppstat.spps_sndpack++;
1005 } else if (cb->s_force || cb->s_flags & SF_ACKNOW) {
1006 /*
1007 * Must send an acknowledgement or a probe
1008 */
1009 if (cb->s_force)
1010 sppstat.spps_sndprobe++;
1011 if (cb->s_flags & SF_ACKNOW)
1012 sppstat.spps_sndacks++;
1013 m = m_gethdr(M_DONTWAIT, MT_HEADER);
1014 if (m == 0)
1015 return (ENOBUFS);
1016 /*
1017 * Fill in mbuf with extended SP header
1018 * and addresses and length put into network format.
1019 */
1020 MH_ALIGN(m, sizeof (struct spidp));
1021 m->m_len = sizeof (*si);
1022 m->m_pkthdr.len = sizeof (*si);
1023 si = mtod(m, struct spidp *);
1024 si->si_i = *cb->s_idp;
1025 si->si_s = cb->s_shdr;
1026 si->si_seq = cb->s_smax + 1;
1027 si->si_len = htons(sizeof (*si));
1028 si->si_cc |= SP_SP;
1029 } else {
1030 cb->s_outx = 3;
1031 if (so->so_options & SO_DEBUG || traceallspps)
1032 spp_trace(SA_OUTPUT, cb->s_state, cb, si, 0);
1033 return (0);
1034 }
1035 /*
1036 * Stuff checksum and output datagram.
1037 */
1038 if ((si->si_cc & SP_SP) == 0) {
1039 if (cb->s_force != (1 + SPPT_PERSIST) ||
1040 cb->s_timer[SPPT_PERSIST] == 0) {
1041 /*
1042 * If this is a new packet and we are not currently
1043 * timing anything, time this one.
1044 */
1045 if (SSEQ_LT(cb->s_smax, si->si_seq)) {
1046 cb->s_smax = si->si_seq;
1047 if (cb->s_rtt == 0) {
1048 sppstat.spps_segstimed++;
1049 cb->s_rtseq = si->si_seq;
1050 cb->s_rtt = 1;
1051 }
1052 }
1053 /*
1054 * Set rexmt timer if not currently set,
1055 * Initial value for retransmit timer is smoothed
1056 * round-trip time + 2 * round-trip time variance.
1057 * Initialize shift counter which is used for backoff
1058 * of retransmit time.
1059 */
1060 if (cb->s_timer[SPPT_REXMT] == 0 &&
1061 cb->s_snxt != cb->s_rack) {
1062 cb->s_timer[SPPT_REXMT] = cb->s_rxtcur;
1063 if (cb->s_timer[SPPT_PERSIST]) {
1064 cb->s_timer[SPPT_PERSIST] = 0;
1065 cb->s_rxtshift = 0;
1066 }
1067 }
1068 } else if (SSEQ_LT(cb->s_smax, si->si_seq)) {
1069 cb->s_smax = si->si_seq;
1070 }
1071 } else if (cb->s_state < TCPS_ESTABLISHED) {
1072 if (cb->s_rtt == 0)
1073 cb->s_rtt = 1; /* Time initial handshake */
1074 if (cb->s_timer[SPPT_REXMT] == 0)
1075 cb->s_timer[SPPT_REXMT] = cb->s_rxtcur;
1076 }
1077 {
1078 /*
1079 * Do not request acks when we ack their data packets or
1080 * when we do a gratuitous window update.
1081 */
1082 if (((si->si_cc & SP_SP) == 0) || cb->s_force)
1083 si->si_cc |= SP_SA;
1084 si->si_seq = htons(si->si_seq);
1085 si->si_alo = htons(alo);
1086 si->si_ack = htons(cb->s_ack);
1087
1088 if (idpcksum) {
1089 si->si_sum = 0;
1090 len = ntohs(si->si_len);
1091 if (len & 1)
1092 len++;
1093 si->si_sum = ns_cksum(m, len);
1094 } else
1095 si->si_sum = 0xffff;
1096
1097 cb->s_outx = 4;
1098 if (so->so_options & SO_DEBUG || traceallspps)
1099 spp_trace(SA_OUTPUT, cb->s_state, cb, si, 0);
1100
1101 if (so->so_options & SO_DONTROUTE)
1102 error = ns_output(m, (struct route *)0, NS_ROUTETOIF);
1103 else
1104 error = ns_output(m, &cb->s_nspcb->nsp_route, 0);
1105 }
1106 if (error) {
1107 return (error);
1108 }
1109 sppstat.spps_sndtotal++;
1110 /*
1111 * Data sent (as far as we can tell).
1112 * If this advertises a larger window than any other segment,
1113 * then remember the size of the advertized window.
1114 * Any pending ACK has now been sent.
1115 */
1116 cb->s_force = 0;
1117 cb->s_flags &= ~(SF_ACKNOW|SF_DELACK);
1118 if (SSEQ_GT(alo, cb->s_alo))
1119 cb->s_alo = alo;
1120 if (sendalot)
1121 goto again;
1122 cb->s_outx = 5;
1123 return (0);
1124}
1125
1126int spp_do_persist_panics = 0;
1127
4c45483e 1128static void
15637ed4
RG
1129spp_setpersist(cb)
1130 register struct sppcb *cb;
1131{
1132 register t = ((cb->s_srtt >> 2) + cb->s_rttvar) >> 1;
1133 extern int spp_backoff[];
1134
1135 if (cb->s_timer[SPPT_REXMT] && spp_do_persist_panics)
1136 panic("spp_output REXMT");
1137 /*
1138 * Start/restart persistance timer.
1139 */
1140 SPPT_RANGESET(cb->s_timer[SPPT_PERSIST],
1141 t*spp_backoff[cb->s_rxtshift],
1142 SPPTV_PERSMIN, SPPTV_PERSMAX);
1143 if (cb->s_rxtshift < SPP_MAXRXTSHIFT)
1144 cb->s_rxtshift++;
1145}
4c45483e 1146
15637ed4 1147/*ARGSUSED*/
4c45483e 1148int
15637ed4
RG
1149spp_ctloutput(req, so, level, name, value)
1150 int req;
1151 struct socket *so;
4c45483e 1152 int level;
15637ed4
RG
1153 int name;
1154 struct mbuf **value;
1155{
1156 register struct mbuf *m;
1157 struct nspcb *nsp = sotonspcb(so);
1158 register struct sppcb *cb;
1159 int mask, error = 0;
1160
1161 if (level != NSPROTO_SPP) {
1162 /* This will have to be changed when we do more general
1163 stacking of protocols */
1164 return (idp_ctloutput(req, so, level, name, value));
1165 }
1166 if (nsp == NULL) {
1167 error = EINVAL;
1168 goto release;
1169 } else
1170 cb = nstosppcb(nsp);
1171
1172 switch (req) {
1173
1174 case PRCO_GETOPT:
1175 if (value == NULL)
1176 return (EINVAL);
1177 m = m_get(M_DONTWAIT, MT_DATA);
1178 if (m == NULL)
1179 return (ENOBUFS);
1180 switch (name) {
1181
1182 case SO_HEADERS_ON_INPUT:
1183 mask = SF_HI;
1184 goto get_flags;
1185
1186 case SO_HEADERS_ON_OUTPUT:
1187 mask = SF_HO;
1188 get_flags:
1189 m->m_len = sizeof(short);
1190 *mtod(m, short *) = cb->s_flags & mask;
1191 break;
1192
1193 case SO_MTU:
1194 m->m_len = sizeof(u_short);
1195 *mtod(m, short *) = cb->s_mtu;
1196 break;
1197
1198 case SO_LAST_HEADER:
1199 m->m_len = sizeof(struct sphdr);
1200 *mtod(m, struct sphdr *) = cb->s_rhdr;
1201 break;
1202
1203 case SO_DEFAULT_HEADERS:
1204 m->m_len = sizeof(struct spidp);
1205 *mtod(m, struct sphdr *) = cb->s_shdr;
1206 break;
1207
1208 default:
1209 error = EINVAL;
1210 }
1211 *value = m;
1212 break;
1213
1214 case PRCO_SETOPT:
1215 if (value == 0 || *value == 0) {
1216 error = EINVAL;
1217 break;
1218 }
1219 switch (name) {
1220 int *ok;
1221
1222 case SO_HEADERS_ON_INPUT:
1223 mask = SF_HI;
1224 goto set_head;
1225
1226 case SO_HEADERS_ON_OUTPUT:
1227 mask = SF_HO;
1228 set_head:
1229 if (cb->s_flags & SF_PI) {
1230 ok = mtod(*value, int *);
1231 if (*ok)
1232 cb->s_flags |= mask;
1233 else
1234 cb->s_flags &= ~mask;
1235 } else error = EINVAL;
1236 break;
1237
1238 case SO_MTU:
1239 cb->s_mtu = *(mtod(*value, u_short *));
1240 break;
1241
1242#ifdef SF_NEWCALL
1243 case SO_NEWCALL:
1244 ok = mtod(*value, int *);
1245 if (*ok) {
1246 cb->s_flags2 |= SF_NEWCALL;
1247 spp_newchecks[5]++;
1248 } else {
1249 cb->s_flags2 &= ~SF_NEWCALL;
1250 spp_newchecks[6]++;
1251 }
1252 break;
1253#endif
1254
1255 case SO_DEFAULT_HEADERS:
1256 {
1257 register struct sphdr *sp
1258 = mtod(*value, struct sphdr *);
1259 cb->s_dt = sp->sp_dt;
1260 cb->s_cc = sp->sp_cc & SP_EM;
1261 }
1262 break;
1263
1264 default:
1265 error = EINVAL;
1266 }
1267 m_freem(*value);
1268 break;
1269 }
1270 release:
1271 return (error);
1272}
1273
1274/*ARGSUSED*/
4c45483e 1275int
15637ed4
RG
1276spp_usrreq(so, req, m, nam, controlp)
1277 struct socket *so;
1278 int req;
1279 struct mbuf *m, *nam, *controlp;
1280{
1281 struct nspcb *nsp = sotonspcb(so);
4c45483e 1282 register struct sppcb *cb = 0;
15637ed4
RG
1283 int s = splnet();
1284 int error = 0, ostate;
1285 struct mbuf *mm;
1286 register struct sockbuf *sb;
1287
1288 if (req == PRU_CONTROL)
1289 return (ns_control(so, (int)m, (caddr_t)nam,
1290 (struct ifnet *)controlp));
1291 if (nsp == NULL) {
1292 if (req != PRU_ATTACH) {
1293 error = EINVAL;
1294 goto release;
1295 }
1296 } else
1297 cb = nstosppcb(nsp);
1298
1299 ostate = cb ? cb->s_state : 0;
1300
1301 switch (req) {
1302
1303 case PRU_ATTACH:
1304 if (nsp != NULL) {
1305 error = EISCONN;
1306 break;
1307 }
1308 error = ns_pcballoc(so, &nspcb);
1309 if (error)
1310 break;
1311 if (so->so_snd.sb_hiwat == 0 || so->so_rcv.sb_hiwat == 0) {
1312 error = soreserve(so, (u_long) 3072, (u_long) 3072);
1313 if (error)
1314 break;
1315 }
1316 nsp = sotonspcb(so);
1317
1318 mm = m_getclr(M_DONTWAIT, MT_PCB);
1319 sb = &so->so_snd;
1320
1321 if (mm == NULL) {
1322 error = ENOBUFS;
1323 break;
1324 }
1325 cb = mtod(mm, struct sppcb *);
1326 mm = m_getclr(M_DONTWAIT, MT_HEADER);
1327 if (mm == NULL) {
1328 (void) m_free(dtom(m));
1329 error = ENOBUFS;
1330 break;
1331 }
1332 cb->s_idp = mtod(mm, struct idp *);
1333 cb->s_state = TCPS_LISTEN;
1334 cb->s_smax = -1;
1335 cb->s_swl1 = -1;
1336 cb->s_q.si_next = cb->s_q.si_prev = &cb->s_q;
1337 cb->s_nspcb = nsp;
1338 cb->s_mtu = 576 - sizeof (struct spidp);
1339 cb->s_cwnd = sbspace(sb) * CUNIT / cb->s_mtu;
1340 cb->s_ssthresh = cb->s_cwnd;
1341 cb->s_cwmx = sbspace(sb) * CUNIT /
1342 (2 * sizeof (struct spidp));
1343 /* Above is recomputed when connecting to account
1344 for changed buffering or mtu's */
1345 cb->s_rtt = SPPTV_SRTTBASE;
1346 cb->s_rttvar = SPPTV_SRTTDFLT << 2;
1347 SPPT_RANGESET(cb->s_rxtcur,
1348 ((SPPTV_SRTTBASE >> 2) + (SPPTV_SRTTDFLT << 2)) >> 1,
1349 SPPTV_MIN, SPPTV_REXMTMAX);
1350 nsp->nsp_pcb = (caddr_t) cb;
1351 break;
1352
1353 case PRU_DETACH:
1354 if (nsp == NULL) {
1355 error = ENOTCONN;
1356 break;
1357 }
1358 if (cb->s_state > TCPS_LISTEN)
1359 cb = spp_disconnect(cb);
1360 else
1361 cb = spp_close(cb);
1362 break;
1363
1364 case PRU_BIND:
1365 error = ns_pcbbind(nsp, nam);
1366 break;
1367
1368 case PRU_LISTEN:
1369 if (nsp->nsp_lport == 0)
1370 error = ns_pcbbind(nsp, (struct mbuf *)0);
1371 if (error == 0)
1372 cb->s_state = TCPS_LISTEN;
1373 break;
1374
1375 /*
1376 * Initiate connection to peer.
1377 * Enter SYN_SENT state, and mark socket as connecting.
1378 * Start keep-alive timer, setup prototype header,
1379 * Send initial system packet requesting connection.
1380 */
1381 case PRU_CONNECT:
1382 if (nsp->nsp_lport == 0) {
1383 error = ns_pcbbind(nsp, (struct mbuf *)0);
1384 if (error)
1385 break;
1386 }
1387 error = ns_pcbconnect(nsp, nam);
1388 if (error)
1389 break;
1390 soisconnecting(so);
1391 sppstat.spps_connattempt++;
1392 cb->s_state = TCPS_SYN_SENT;
1393 cb->s_did = 0;
1394 spp_template(cb);
1395 cb->s_timer[SPPT_KEEP] = SPPTV_KEEP;
1396 cb->s_force = 1 + SPPTV_KEEP;
1397 /*
1398 * Other party is required to respond to
1399 * the port I send from, but he is not
1400 * required to answer from where I am sending to,
1401 * so allow wildcarding.
1402 * original port I am sending to is still saved in
1403 * cb->s_dport.
1404 */
1405 nsp->nsp_fport = 0;
1406 error = spp_output(cb, (struct mbuf *) 0);
1407 break;
1408
1409 case PRU_CONNECT2:
1410 error = EOPNOTSUPP;
1411 break;
1412
1413 /*
1414 * We may decide later to implement connection closing
1415 * handshaking at the spp level optionally.
1416 * here is the hook to do it:
1417 */
1418 case PRU_DISCONNECT:
1419 cb = spp_disconnect(cb);
1420 break;
1421
1422 /*
1423 * Accept a connection. Essentially all the work is
1424 * done at higher levels; just return the address
1425 * of the peer, storing through addr.
1426 */
1427 case PRU_ACCEPT: {
1428 struct sockaddr_ns *sns = mtod(nam, struct sockaddr_ns *);
1429
1430 nam->m_len = sizeof (struct sockaddr_ns);
1431 sns->sns_family = AF_NS;
1432 sns->sns_addr = nsp->nsp_faddr;
1433 break;
1434 }
1435
1436 case PRU_SHUTDOWN:
1437 socantsendmore(so);
1438 cb = spp_usrclosed(cb);
1439 if (cb)
1440 error = spp_output(cb, (struct mbuf *) 0);
1441 break;
1442
1443 /*
1444 * After a receive, possibly send acknowledgment
1445 * updating allocation.
1446 */
1447 case PRU_RCVD:
1448 cb->s_flags |= SF_RVD;
1449 (void) spp_output(cb, (struct mbuf *) 0);
1450 cb->s_flags &= ~SF_RVD;
1451 break;
1452
1453 case PRU_ABORT:
1454 (void) spp_drop(cb, ECONNABORTED);
1455 break;
1456
1457 case PRU_SENSE:
1458 case PRU_CONTROL:
1459 m = NULL;
1460 error = EOPNOTSUPP;
1461 break;
1462
1463 case PRU_RCVOOB:
1464 if ((cb->s_oobflags & SF_IOOB) || so->so_oobmark ||
1465 (so->so_state & SS_RCVATMARK)) {
1466 m->m_len = 1;
1467 *mtod(m, caddr_t) = cb->s_iobc;
1468 break;
1469 }
1470 error = EINVAL;
1471 break;
1472
1473 case PRU_SENDOOB:
1474 if (sbspace(&so->so_snd) < -512) {
1475 error = ENOBUFS;
1476 break;
1477 }
1478 cb->s_oobflags |= SF_SOOB;
1479 /* fall into */
1480 case PRU_SEND:
1481 if (controlp) {
1482 u_short *p = mtod(controlp, u_short *);
1483 spp_newchecks[2]++;
1484 if ((p[0] == 5) && p[1] == 1) { /* XXXX, for testing */
1485 cb->s_shdr.sp_dt = *(u_char *)(&p[2]);
1486 spp_newchecks[3]++;
1487 }
1488 m_freem(controlp);
1489 }
1490 controlp = NULL;
1491 error = spp_output(cb, m);
1492 m = NULL;
1493 break;
1494
1495 case PRU_SOCKADDR:
1496 ns_setsockaddr(nsp, nam);
1497 break;
1498
1499 case PRU_PEERADDR:
1500 ns_setpeeraddr(nsp, nam);
1501 break;
1502
1503 case PRU_SLOWTIMO:
1504 cb = spp_timers(cb, (int)nam);
1505 req |= ((int)nam) << 8;
1506 break;
1507
1508 case PRU_FASTTIMO:
1509 case PRU_PROTORCV:
1510 case PRU_PROTOSEND:
1511 error = EOPNOTSUPP;
1512 break;
1513
1514 default:
1515 panic("sp_usrreq");
1516 }
1517 if (cb && (so->so_options & SO_DEBUG || traceallspps))
1518 spp_trace(SA_USER, (u_char)ostate, cb, (struct spidp *)0, req);
1519release:
1520 if (controlp != NULL)
1521 m_freem(controlp);
1522 if (m != NULL)
1523 m_freem(m);
1524 splx(s);
1525 return (error);
1526}
1527
4c45483e 1528int
15637ed4
RG
1529spp_usrreq_sp(so, req, m, nam, controlp)
1530 struct socket *so;
1531 int req;
1532 struct mbuf *m, *nam, *controlp;
1533{
1534 int error = spp_usrreq(so, req, m, nam, controlp);
1535
1536 if (req == PRU_ATTACH && error == 0) {
1537 struct nspcb *nsp = sotonspcb(so);
1538 ((struct sppcb *)nsp->nsp_pcb)->s_flags |=
1539 (SF_HI | SF_HO | SF_PI);
1540 }
1541 return (error);
1542}
1543
1544/*
1545 * Create template to be used to send spp packets on a connection.
1546 * Called after host entry created, fills
1547 * in a skeletal spp header (choosing connection id),
1548 * minimizing the amount of work necessary when the connection is used.
1549 */
4c45483e 1550static void
15637ed4
RG
1551spp_template(cb)
1552 register struct sppcb *cb;
1553{
1554 register struct nspcb *nsp = cb->s_nspcb;
1555 register struct idp *idp = cb->s_idp;
1556 register struct sockbuf *sb = &(nsp->nsp_socket->so_snd);
1557
1558 idp->idp_pt = NSPROTO_SPP;
1559 idp->idp_sna = nsp->nsp_laddr;
1560 idp->idp_dna = nsp->nsp_faddr;
1561 cb->s_sid = htons(spp_iss);
1562 spp_iss += SPP_ISSINCR/2;
1563 cb->s_alo = 1;
1564 cb->s_cwnd = (sbspace(sb) * CUNIT) / cb->s_mtu;
1565 cb->s_ssthresh = cb->s_cwnd; /* Try to expand fast to full complement
1566 of large packets */
1567 cb->s_cwmx = (sbspace(sb) * CUNIT) / (2 * sizeof(struct spidp));
1568 cb->s_cwmx = max(cb->s_cwmx, cb->s_cwnd);
1569 /* But allow for lots of little packets as well */
1570}
1571
1572/*
1573 * Close a SPIP control block:
1574 * discard spp control block itself
1575 * discard ns protocol control block
1576 * wake up any sleepers
1577 */
1578struct sppcb *
1579spp_close(cb)
1580 register struct sppcb *cb;
1581{
1582 register struct spidp_q *s;
1583 struct nspcb *nsp = cb->s_nspcb;
1584 struct socket *so = nsp->nsp_socket;
1585 register struct mbuf *m;
1586
1587 s = cb->s_q.si_next;
1588 while (s != &(cb->s_q)) {
1589 s = s->si_next;
1590 m = dtom(s->si_prev);
1591 remque(s->si_prev);
1592 m_freem(m);
1593 }
1594 (void) m_free(dtom(cb->s_idp));
1595 (void) m_free(dtom(cb));
1596 nsp->nsp_pcb = 0;
1597 soisdisconnected(so);
1598 ns_pcbdetach(nsp);
1599 sppstat.spps_closed++;
1600 return ((struct sppcb *)0);
1601}
1602/*
1603 * Someday we may do level 3 handshaking
1604 * to close a connection or send a xerox style error.
1605 * For now, just close.
1606 */
1607struct sppcb *
1608spp_usrclosed(cb)
1609 register struct sppcb *cb;
1610{
1611 return (spp_close(cb));
1612}
1613struct sppcb *
1614spp_disconnect(cb)
1615 register struct sppcb *cb;
1616{
1617 return (spp_close(cb));
1618}
1619/*
1620 * Drop connection, reporting
1621 * the specified error.
1622 */
1623struct sppcb *
1624spp_drop(cb, errno)
1625 register struct sppcb *cb;
1626 int errno;
1627{
1628 struct socket *so = cb->s_nspcb->nsp_socket;
1629
1630 /*
1631 * someday, in the xerox world
1632 * we will generate error protocol packets
1633 * announcing that the socket has gone away.
1634 */
1635 if (TCPS_HAVERCVDSYN(cb->s_state)) {
1636 sppstat.spps_drops++;
1637 cb->s_state = TCPS_CLOSED;
1638 /*(void) tcp_output(cb);*/
1639 } else
1640 sppstat.spps_conndrops++;
1641 so->so_error = errno;
1642 return (spp_close(cb));
1643}
1644
4c45483e 1645static void
15637ed4
RG
1646spp_abort(nsp)
1647 struct nspcb *nsp;
1648{
1649
1650 (void) spp_close((struct sppcb *)nsp->nsp_pcb);
1651}
1652
1653int spp_backoff[SPP_MAXRXTSHIFT+1] =
1654 { 1, 2, 4, 8, 16, 32, 64, 64, 64, 64, 64, 64, 64 };
1655/*
1656 * Fast timeout routine for processing delayed acks
1657 */
4c45483e 1658void
15637ed4
RG
1659spp_fasttimo()
1660{
1661 register struct nspcb *nsp;
1662 register struct sppcb *cb;
1663 int s = splnet();
1664
1665 nsp = nspcb.nsp_next;
1666 if (nsp)
1667 for (; nsp != &nspcb; nsp = nsp->nsp_next)
1668 if ((cb = (struct sppcb *)nsp->nsp_pcb) &&
1669 (cb->s_flags & SF_DELACK)) {
1670 cb->s_flags &= ~SF_DELACK;
1671 cb->s_flags |= SF_ACKNOW;
1672 sppstat.spps_delack++;
1673 (void) spp_output(cb, (struct mbuf *) 0);
1674 }
1675 splx(s);
1676}
1677
1678/*
1679 * spp protocol timeout routine called every 500 ms.
1680 * Updates the timers in all active pcb's and
1681 * causes finite state machine actions if timers expire.
1682 */
4c45483e 1683void
15637ed4
RG
1684spp_slowtimo()
1685{
1686 register struct nspcb *ip, *ipnxt;
1687 register struct sppcb *cb;
1688 int s = splnet();
1689 register int i;
1690
1691 /*
1692 * Search through tcb's and update active timers.
1693 */
1694 ip = nspcb.nsp_next;
1695 if (ip == 0) {
1696 splx(s);
1697 return;
1698 }
1699 while (ip != &nspcb) {
1700 cb = nstosppcb(ip);
1701 ipnxt = ip->nsp_next;
1702 if (cb == 0)
1703 goto tpgone;
1704 for (i = 0; i < SPPT_NTIMERS; i++) {
1705 if (cb->s_timer[i] && --cb->s_timer[i] == 0) {
1706 (void) spp_usrreq(cb->s_nspcb->nsp_socket,
1707 PRU_SLOWTIMO, (struct mbuf *)0,
1708 (struct mbuf *)i, (struct mbuf *)0,
1709 (struct mbuf *)0);
1710 if (ipnxt->nsp_prev != ip)
1711 goto tpgone;
1712 }
1713 }
1714 cb->s_idle++;
1715 if (cb->s_rtt)
1716 cb->s_rtt++;
1717tpgone:
1718 ip = ipnxt;
1719 }
1720 spp_iss += SPP_ISSINCR/PR_SLOWHZ; /* increment iss */
1721 splx(s);
1722}
1723/*
1724 * SPP timer processing.
1725 */
1726struct sppcb *
1727spp_timers(cb, timer)
1728 register struct sppcb *cb;
1729 int timer;
1730{
1731 long rexmt;
1732 int win;
1733
1734 cb->s_force = 1 + timer;
1735 switch (timer) {
1736
1737 /*
1738 * 2 MSL timeout in shutdown went off. TCP deletes connection
1739 * control block.
1740 */
1741 case SPPT_2MSL:
1742 printf("spp: SPPT_2MSL went off for no reason\n");
1743 cb->s_timer[timer] = 0;
1744 break;
1745
1746 /*
1747 * Retransmission timer went off. Message has not
1748 * been acked within retransmit interval. Back off
1749 * to a longer retransmit interval and retransmit one packet.
1750 */
1751 case SPPT_REXMT:
1752 if (++cb->s_rxtshift > SPP_MAXRXTSHIFT) {
1753 cb->s_rxtshift = SPP_MAXRXTSHIFT;
1754 sppstat.spps_timeoutdrop++;
1755 cb = spp_drop(cb, ETIMEDOUT);
1756 break;
1757 }
1758 sppstat.spps_rexmttimeo++;
1759 rexmt = ((cb->s_srtt >> 2) + cb->s_rttvar) >> 1;
1760 rexmt *= spp_backoff[cb->s_rxtshift];
1761 SPPT_RANGESET(cb->s_rxtcur, rexmt, SPPTV_MIN, SPPTV_REXMTMAX);
1762 cb->s_timer[SPPT_REXMT] = cb->s_rxtcur;
1763 /*
1764 * If we have backed off fairly far, our srtt
1765 * estimate is probably bogus. Clobber it
1766 * so we'll take the next rtt measurement as our srtt;
1767 * move the current srtt into rttvar to keep the current
1768 * retransmit times until then.
1769 */
1770 if (cb->s_rxtshift > SPP_MAXRXTSHIFT / 4 ) {
1771 cb->s_rttvar += (cb->s_srtt >> 2);
1772 cb->s_srtt = 0;
1773 }
1774 cb->s_snxt = cb->s_rack;
1775 /*
1776 * If timing a packet, stop the timer.
1777 */
1778 cb->s_rtt = 0;
1779 /*
1780 * See very long discussion in tcp_timer.c about congestion
1781 * window and sstrhesh
1782 */
1783 win = min(cb->s_swnd, (cb->s_cwnd/CUNIT)) / 2;
1784 if (win < 2)
1785 win = 2;
1786 cb->s_cwnd = CUNIT;
1787 cb->s_ssthresh = win * CUNIT;
1788 (void) spp_output(cb, (struct mbuf *) 0);
1789 break;
1790
1791 /*
1792 * Persistance timer into zero window.
1793 * Force a probe to be sent.
1794 */
1795 case SPPT_PERSIST:
1796 sppstat.spps_persisttimeo++;
1797 spp_setpersist(cb);
1798 (void) spp_output(cb, (struct mbuf *) 0);
1799 break;
1800
1801 /*
1802 * Keep-alive timer went off; send something
1803 * or drop connection if idle for too long.
1804 */
1805 case SPPT_KEEP:
1806 sppstat.spps_keeptimeo++;
1807 if (cb->s_state < TCPS_ESTABLISHED)
1808 goto dropit;
1809 if (cb->s_nspcb->nsp_socket->so_options & SO_KEEPALIVE) {
1810 if (cb->s_idle >= SPPTV_MAXIDLE)
1811 goto dropit;
1812 sppstat.spps_keepprobe++;
1813 (void) spp_output(cb, (struct mbuf *) 0);
1814 } else
1815 cb->s_idle = 0;
1816 cb->s_timer[SPPT_KEEP] = SPPTV_KEEP;
1817 break;
1818 dropit:
1819 sppstat.spps_keepdrops++;
1820 cb = spp_drop(cb, ETIMEDOUT);
1821 break;
1822 }
1823 return (cb);
1824}
1825#ifndef lint
1826int SppcbSize = sizeof (struct sppcb);
1827int NspcbSize = sizeof (struct nspcb);
1828#endif lint