aboutsummaryrefslogtreecommitdiffstats
path: root/net/dccp/ipv6.c
diff options
context:
space:
mode:
authorGerrit Renker <gerrit@erg.abdn.ac.uk>2007-09-26 13:35:19 -0400
committerDavid S. Miller <davem@sunset.davemloft.net>2007-10-10 19:52:44 -0400
commite356d37a096a990ea1a74c44c15640122e56110b (patch)
tree174fea2bce6bbd6d6001c7ea1b0bb914053571d0 /net/dccp/ipv6.c
parent9bf55cda9b2487fa7316dad3880acb0031ad3c0f (diff)
[DCCP]: Factor out common code for generating Resets
This factors code common to dccp_v{4,6}_ctl_send_reset into a separate function, and adds support for filling in the Data 1 ... Data 3 fields from RFC 4340, 5.6. It is useful to have this separate, since the following Reset codes will always be generated from the control socket rather than via dccp_send_reset: * Code 3, "No Connection", cf. 8.3.1; * Code 4, "Packet Error" (identification for Data 1 added); * Code 5, "Option Error" (identification for Data 1..3 added, will be used later); * Code 6, "Mandatory Error" (same as Option Error); * Code 7, "Connection Refused" (what on Earth is the difference to "No Connection"?); * Code 8, "Bad Service Code"; * Code 9, "Too Busy"; * Code 10, "Bad Init Cookie" (not used). Code 0 is not recommended by the RFC, the following codes would be used in dccp_send_reset() instead, since they all relate to an established DCCP connection: * Code 1, "Closed"; * Code 2, "Aborted"; * Code 11, "Aggression Penalty" (12.3). Signed-off-by: Gerrit Renker <gerrit@erg.abdn.ac.uk> Signed-off-by: Arnaldo Carvalho de Melo <acme@ghostprotocols.net>
Diffstat (limited to 'net/dccp/ipv6.c')
-rw-r--r--net/dccp/ipv6.c39
1 files changed, 6 insertions, 33 deletions
diff --git a/net/dccp/ipv6.c b/net/dccp/ipv6.c
index d954e8319dbd..b7c0f66e2834 100644
--- a/net/dccp/ipv6.c
+++ b/net/dccp/ipv6.c
@@ -301,50 +301,23 @@ static void dccp_v6_reqsk_destructor(struct request_sock *req)
301 301
302static void dccp_v6_ctl_send_reset(struct sock *sk, struct sk_buff *rxskb) 302static void dccp_v6_ctl_send_reset(struct sock *sk, struct sk_buff *rxskb)
303{ 303{
304 struct dccp_hdr *rxdh = dccp_hdr(rxskb), *dh;
305 struct ipv6hdr *rxip6h; 304 struct ipv6hdr *rxip6h;
306 const u32 dccp_hdr_reset_len = sizeof(struct dccp_hdr) +
307 sizeof(struct dccp_hdr_ext) +
308 sizeof(struct dccp_hdr_reset);
309 struct sk_buff *skb; 305 struct sk_buff *skb;
310 struct flowi fl; 306 struct flowi fl;
311 u64 seqno = 0;
312 307
313 if (rxdh->dccph_type == DCCP_PKT_RESET) 308 if (dccp_hdr(rxskb)->dccph_type == DCCP_PKT_RESET)
314 return; 309 return;
315 310
316 if (!ipv6_unicast_destination(rxskb)) 311 if (!ipv6_unicast_destination(rxskb))
317 return; 312 return;
318 313
319 skb = alloc_skb(dccp_v6_ctl_socket->sk->sk_prot->max_header, 314 skb = dccp_ctl_make_reset(dccp_v6_ctl_socket, rxskb);
320 GFP_ATOMIC);
321 if (skb == NULL) 315 if (skb == NULL)
322 return; 316 return;
323 317
324 skb_reserve(skb, dccp_v6_ctl_socket->sk->sk_prot->max_header);
325
326 dh = dccp_zeroed_hdr(skb, dccp_hdr_reset_len);
327
328 /* Swap the send and the receive. */
329 dh->dccph_type = DCCP_PKT_RESET;
330 dh->dccph_sport = rxdh->dccph_dport;
331 dh->dccph_dport = rxdh->dccph_sport;
332 dh->dccph_doff = dccp_hdr_reset_len / 4;
333 dh->dccph_x = 1;
334 dccp_hdr_reset(skb)->dccph_reset_code =
335 DCCP_SKB_CB(rxskb)->dccpd_reset_code;
336
337 /* See "8.3.1. Abnormal Termination" in RFC 4340 */
338 if (DCCP_SKB_CB(rxskb)->dccpd_ack_seq != DCCP_PKT_WITHOUT_ACK_SEQ)
339 seqno = ADD48(DCCP_SKB_CB(rxskb)->dccpd_ack_seq, 1);
340
341 dccp_hdr_set_seq(dh, seqno);
342 dccp_hdr_set_ack(dccp_hdr_ack_bits(skb), DCCP_SKB_CB(rxskb)->dccpd_seq);
343
344 dccp_csum_outgoing(skb);
345 rxip6h = ipv6_hdr(rxskb); 318 rxip6h = ipv6_hdr(rxskb);
346 dh->dccph_checksum = dccp_v6_csum_finish(skb, &rxip6h->saddr, 319 dccp_hdr(skb)->dccph_checksum = dccp_v6_csum_finish(skb, &rxip6h->saddr,
347 &rxip6h->daddr); 320 &rxip6h->daddr);
348 321
349 memset(&fl, 0, sizeof(fl)); 322 memset(&fl, 0, sizeof(fl));
350 ipv6_addr_copy(&fl.fl6_dst, &rxip6h->saddr); 323 ipv6_addr_copy(&fl.fl6_dst, &rxip6h->saddr);
@@ -352,8 +325,8 @@ static void dccp_v6_ctl_send_reset(struct sock *sk, struct sk_buff *rxskb)
352 325
353 fl.proto = IPPROTO_DCCP; 326 fl.proto = IPPROTO_DCCP;
354 fl.oif = inet6_iif(rxskb); 327 fl.oif = inet6_iif(rxskb);
355 fl.fl_ip_dport = dh->dccph_dport; 328 fl.fl_ip_dport = dccp_hdr(skb)->dccph_dport;
356 fl.fl_ip_sport = dh->dccph_sport; 329 fl.fl_ip_sport = dccp_hdr(skb)->dccph_sport;
357 security_skb_classify_flow(rxskb, &fl); 330 security_skb_classify_flow(rxskb, &fl);
358 331
359 /* sk = NULL, but it is safe for now. RST socket required. */ 332 /* sk = NULL, but it is safe for now. RST socket required. */