From patchwork Fri Dec 11 00:15:26 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Samuel Thibault X-Patchwork-Id: 555429 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.gnu.org (lists.gnu.org [IPv6:2001:4830:134:3::11]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 5664A140281 for ; Fri, 11 Dec 2015 11:24:58 +1100 (AEDT) Received: from localhost ([::1]:45177 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1a7BW4-00005T-0u for incoming@patchwork.ozlabs.org; Thu, 10 Dec 2015 19:24:56 -0500 Received: from eggs.gnu.org ([2001:4830:134:3::10]:37364) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1a7BNi-0002C0-Hd for qemu-devel@nongnu.org; Thu, 10 Dec 2015 19:16:20 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1a7BNg-0007m0-2w for qemu-devel@nongnu.org; Thu, 10 Dec 2015 19:16:18 -0500 Received: from domu-toccata.ens-lyon.fr ([140.77.166.138]:52846 helo=sonata.ens-lyon.org) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1a7BNf-0007lI-C8 for qemu-devel@nongnu.org; Thu, 10 Dec 2015 19:16:15 -0500 Received: from localhost (localhost [127.0.0.1]) by sonata.ens-lyon.org (Postfix) with ESMTP id B902D200DC; Fri, 11 Dec 2015 01:16:14 +0100 (CET) Received: from sonata.ens-lyon.org ([127.0.0.1]) by localhost (sonata.ens-lyon.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c5lEP4eRH0ob; Fri, 11 Dec 2015 01:16:14 +0100 (CET) Received: from var.ipv6 (ABordeaux-655-1-21-73.w86-222.abo.wanadoo.fr [86.222.244.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by sonata.ens-lyon.org (Postfix) with ESMTPSA id 589CA200E1; Fri, 11 Dec 2015 01:16:14 +0100 (CET) Received: from samy by var.ipv6 with local (Exim 4.86) (envelope-from ) id 1a7BMy-00077i-JN; Fri, 11 Dec 2015 01:15:32 +0100 From: Samuel Thibault To: qemu-devel@nongnu.org Date: Fri, 11 Dec 2015 01:15:26 +0100 Message-Id: <1449792930-27293-14-git-send-email-samuel.thibault@ens-lyon.org> X-Mailer: git-send-email 2.6.2 In-Reply-To: <1449792930-27293-1-git-send-email-samuel.thibault@ens-lyon.org> References: <20151211001505.GV2905@var.home> <1449792930-27293-1-git-send-email-samuel.thibault@ens-lyon.org> X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 140.77.166.138 Cc: Thomas Huth , zhanghailiang , Li Zhijian , Stefan Hajnoczi , Jason Wang , Dave Gilbert , Vasiliy Tolstov , Huangpeng , Gonglei , Jan Kiszka , Samuel Thibault , Yang Hongyang , Guillaume Subiron Subject: [Qemu-devel] [PATCH 14/18] slirp: Generalizing and neutralizing various TCP functions before adding IPv6 stuff X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org From: Guillaume Subiron Basically, this patch adds some switch in various TCP functions to prepare them for the IPv6 case. To have something to "switch" in tcp_input() and tcp_respond(), a new argument is used to give them the sa_family of the addresses they are working on. Signed-off-by: Guillaume Subiron Signed-off-by: Samuel Thibault --- slirp/ip_input.c | 2 +- slirp/slirp.c | 6 ++++-- slirp/slirp.h | 5 +++-- slirp/tcp_input.c | 53 +++++++++++++++++++++++++++++++++++++++++++++-------- slirp/tcp_output.c | 14 +++++++++++--- slirp/tcp_subr.c | 40 ++++++++++++++++++++++++++++++++-------- slirp/tcp_timer.c | 3 ++- 7 files changed, 98 insertions(+), 25 deletions(-) diff --git a/slirp/ip_input.c b/slirp/ip_input.c index fb5b169..471909e 100644 --- a/slirp/ip_input.c +++ b/slirp/ip_input.c @@ -199,7 +199,7 @@ ip_input(struct mbuf *m) */ switch (ip->ip_p) { case IPPROTO_TCP: - tcp_input(m, hlen, (struct socket *)NULL); + tcp_input(m, hlen, (struct socket *)NULL, AF_INET); break; case IPPROTO_UDP: udp_input(m, hlen); diff --git a/slirp/slirp.c b/slirp/slirp.c index 94df13d..d8a4de0 100644 --- a/slirp/slirp.c +++ b/slirp/slirp.c @@ -574,7 +574,8 @@ void slirp_pollfds_poll(GArray *pollfds, int select_error) /* * Continue tcp_input */ - tcp_input((struct mbuf *)NULL, sizeof(struct ip), so); + tcp_input((struct mbuf *)NULL, sizeof(struct ip), so, + so->so_ffamily); /* continue; */ } else { ret = sowrite(so); @@ -623,7 +624,8 @@ void slirp_pollfds_poll(GArray *pollfds, int select_error) } } - tcp_input((struct mbuf *)NULL, sizeof(struct ip), so); + tcp_input((struct mbuf *)NULL, sizeof(struct ip), so, + so->so_ffamily); } /* SS_ISFCONNECTING */ #endif } diff --git a/slirp/slirp.h b/slirp/slirp.h index ce93cd8..1c3acb5 100644 --- a/slirp/slirp.h +++ b/slirp/slirp.h @@ -352,7 +352,7 @@ void ip6_input(struct mbuf *); int ip6_output(struct socket *, struct mbuf *, int fast); /* tcp_input.c */ -void tcp_input(register struct mbuf *, int, struct socket *); +void tcp_input(register struct mbuf *, int, struct socket *, sa_family_t af); int tcp_mss(register struct tcpcb *, u_int); /* tcp_output.c */ @@ -363,7 +363,8 @@ void tcp_setpersist(register struct tcpcb *); void tcp_init(Slirp *); void tcp_cleanup(Slirp *); void tcp_template(struct tcpcb *); -void tcp_respond(struct tcpcb *, register struct tcpiphdr *, register struct mbuf *, tcp_seq, tcp_seq, int); +void tcp_respond(struct tcpcb *, register struct tcpiphdr *, + register struct mbuf *, tcp_seq, tcp_seq, int, sa_family_t); struct tcpcb * tcp_newtcpcb(struct socket *); struct tcpcb * tcp_close(register struct tcpcb *); void tcp_sockclosed(struct tcpcb *); diff --git a/slirp/tcp_input.c b/slirp/tcp_input.c index b2b1791..d2c48b7 100644 --- a/slirp/tcp_input.c +++ b/slirp/tcp_input.c @@ -213,7 +213,7 @@ present: * protocol specification dated September, 1981 very closely. */ void -tcp_input(struct mbuf *m, int iphlen, struct socket *inso) +tcp_input(struct mbuf *m, int iphlen, struct socket *inso, sa_family_t af) { struct ip save_ip, *ip; register struct tcpiphdr *ti; @@ -254,6 +254,8 @@ tcp_input(struct mbuf *m, int iphlen, struct socket *inso) } slirp = m->slirp; + switch (af) { + case AF_INET: if (iphlen > sizeof(struct ip )) { ip_stripoptions(m, (struct mbuf *)0); iphlen=sizeof(struct ip ); @@ -295,6 +297,11 @@ tcp_input(struct mbuf *m, int iphlen, struct socket *inso) if(cksum(m, len)) { goto drop; } + break; + + default: + goto drop; + } /* * Check that TCP offset makes sense, @@ -330,12 +337,18 @@ tcp_input(struct mbuf *m, int iphlen, struct socket *inso) * Locate pcb for segment. */ findso: - lhost.ss_family = AF_INET; + lhost.ss_family = af; + fhost.ss_family = af; + switch (af) { + case AF_INET: ((struct sockaddr_in *)&lhost)->sin_addr = ti->ti_src; ((struct sockaddr_in *)&lhost)->sin_port = ti->ti_sport; - fhost.ss_family = AF_INET; ((struct sockaddr_in *)&fhost)->sin_addr = ti->ti_dst; ((struct sockaddr_in *)&fhost)->sin_port = ti->ti_dport; + break; + default: + goto drop; + } so = solookup(&slirp->tcp_last_so, &slirp->tcb, &lhost, &fhost); @@ -385,8 +398,17 @@ findso: so->lhost.ss = lhost; so->fhost.ss = fhost; - if ((so->so_iptos = tcp_tos(so)) == 0) + so->so_iptos = tcp_tos(so); + if (so->so_iptos == 0) { + switch (af) { + case AF_INET: so->so_iptos = ((struct ip *)ti)->ip_tos; + break; + default: + goto drop; + break; + } + } tp = sototcpcb(so); tp->t_state = TCPS_LISTEN; @@ -565,7 +587,8 @@ findso: * If this is destined for the control address, then flag to * tcp_ctl once connected, otherwise connect */ - if ((so->so_faddr.s_addr & slirp->vnetwork_mask.s_addr) == + if (af == AF_INET && + (so->so_faddr.s_addr & slirp->vnetwork_mask.s_addr) == slirp->vnetwork_addr.s_addr) { if (so->so_faddr.s_addr != slirp->vhost_addr.s_addr && so->so_faddr.s_addr != slirp->vnameserver_addr.s_addr) { @@ -603,7 +626,7 @@ findso: if(errno == ECONNREFUSED) { /* ACK the SYN, send RST to refuse the connection */ tcp_respond(tp, ti, m, ti->ti_seq+1, (tcp_seq)0, - TH_RST|TH_ACK); + TH_RST|TH_ACK, af); } else { if(errno == EHOSTUNREACH) code=ICMP_UNREACH_HOST; HTONL(ti->ti_seq); /* restore tcp header */ @@ -612,7 +635,13 @@ findso: HTONS(ti->ti_urp); m->m_data -= sizeof(struct tcpiphdr)+off-sizeof(struct tcphdr); m->m_len += sizeof(struct tcpiphdr)+off-sizeof(struct tcphdr); + switch (af) { + case AF_INET: *ip=save_ip; + break; + default: + goto drop; + } icmp_send_error(m, ICMP_UNREACH, code, 0, strerror(errno)); } tcp_close(tp); @@ -1285,11 +1314,11 @@ dropafterack: dropwithreset: /* reuses m if m!=NULL, m_free() unnecessary */ if (tiflags & TH_ACK) - tcp_respond(tp, ti, m, (tcp_seq)0, ti->ti_ack, TH_RST); + tcp_respond(tp, ti, m, (tcp_seq)0, ti->ti_ack, TH_RST, af); else { if (tiflags & TH_SYN) ti->ti_len++; tcp_respond(tp, ti, m, ti->ti_seq+ti->ti_len, (tcp_seq)0, - TH_RST|TH_ACK); + TH_RST|TH_ACK, af); } return; @@ -1480,7 +1509,15 @@ tcp_mss(struct tcpcb *tp, u_int offer) DEBUG_ARG("tp = %p", tp); DEBUG_ARG("offer = %d", offer); + switch (so->so_ffamily) { + case AF_INET: mss = min(IF_MTU, IF_MRU) - sizeof(struct tcphdr) + sizeof(struct ip); + break; + default: + /* :TODO:maethor:130319: ??? */ + break; + } + if (offer) mss = min(mss, offer); mss = max(mss, 32); diff --git a/slirp/tcp_output.c b/slirp/tcp_output.c index 7913013..e52cf51 100644 --- a/slirp/tcp_output.c +++ b/slirp/tcp_output.c @@ -60,7 +60,8 @@ tcp_output(struct tcpcb *tp) register long len, win; int off, flags, error; register struct mbuf *m; - register struct tcpiphdr *ti; + register struct tcpiphdr *ti, tcpiph_save; + struct ip *ip; u_char opt[MAX_TCPOPTLEN]; unsigned optlen, hdrlen; int idle, sendalot; @@ -446,13 +447,15 @@ send: * the template, but need a way to checksum without them. */ m->m_len = hdrlen + len; /* XXX Needed? m_len should be correct */ + tcpiph_save = *(mtod(m, struct tcpiphdr *)); - struct tcpiphdr tcpiph_save = *(mtod(m, struct tcpiphdr *)); + switch (so->so_ffamily) { + case AF_INET: m->m_data += sizeof(struct tcpiphdr) - sizeof(struct tcphdr) - sizeof(struct ip); m->m_len -= sizeof(struct tcpiphdr) - sizeof(struct tcphdr) - sizeof(struct ip); - struct ip *ip = mtod(m, struct ip *); + ip = mtod(m, struct ip *); ip->ip_len = m->m_len; ip->ip_dst = tcpiph_save.ti_dst; @@ -463,6 +466,11 @@ send: ip->ip_tos = so->so_iptos; error = ip_output(so, m); + break; + + default: + goto out; + } if (error) { out: diff --git a/slirp/tcp_subr.c b/slirp/tcp_subr.c index 42bd146..f6184b5 100644 --- a/slirp/tcp_subr.c +++ b/slirp/tcp_subr.c @@ -77,12 +77,20 @@ tcp_template(struct tcpcb *tp) n->ti_mbuf = NULL; memset(&n->ti, 0, sizeof(n->ti)); n->ti_x0 = 0; + switch (so->so_ffamily) { + case AF_INET: n->ti_pr = IPPROTO_TCP; n->ti_len = htons(sizeof(struct tcphdr)); n->ti_src = so->so_faddr; n->ti_dst = so->so_laddr; n->ti_sport = so->so_fport; n->ti_dport = so->so_lport; + break; + + default: + /* :TODO:maethor:130321: ? */ + break; + } n->ti_seq = 0; n->ti_ack = 0; @@ -109,7 +117,7 @@ tcp_template(struct tcpcb *tp) */ void tcp_respond(struct tcpcb *tp, struct tcpiphdr *ti, struct mbuf *m, - tcp_seq ack, tcp_seq seq, int flags) + tcp_seq ack, tcp_seq seq, int flags, sa_family_t af) { register int tlen; int win = 0; @@ -143,8 +151,15 @@ tcp_respond(struct tcpcb *tp, struct tcpiphdr *ti, struct mbuf *m, m->m_len = sizeof (struct tcpiphdr); tlen = 0; #define xchg(a,b,type) { type t; t=a; a=b; b=t; } + switch (af) { + case AF_INET: xchg(ti->ti_dst.s_addr, ti->ti_src.s_addr, uint32_t); xchg(ti->ti_dport, ti->ti_sport, uint16_t); + break; + default: + /* :TODO:maethor:130321: ? */ + break; + } #undef xchg } ti->ti_len = htons((u_short)(sizeof (struct tcphdr) + tlen)); @@ -167,11 +182,15 @@ tcp_respond(struct tcpcb *tp, struct tcpiphdr *ti, struct mbuf *m, ti->ti_sum = cksum(m, tlen); struct tcpiphdr tcpiph_save = *(mtod(m, struct tcpiphdr *)); + struct ip *ip; + + switch (af) { + case AF_INET: m->m_data += sizeof(struct tcpiphdr) - sizeof(struct tcphdr) - sizeof(struct ip); m->m_len -= sizeof(struct tcpiphdr) - sizeof(struct tcphdr) - sizeof(struct ip); - struct ip *ip = mtod(m, struct ip *); + ip = mtod(m, struct ip *); ip->ip_len = tlen; ip->ip_dst = tcpiph_save.ti_dst; ip->ip_src = tcpiph_save.ti_src; @@ -184,6 +203,12 @@ tcp_respond(struct tcpcb *tp, struct tcpiphdr *ti, struct mbuf *m, } (void) ip_output((struct socket *)0, m); + break; + + default: + /* :TODO:maethor:130321: ? */ + break; + } } /* @@ -387,8 +412,8 @@ void tcp_connect(struct socket *inso) { Slirp *slirp = inso->slirp; struct socket *so; - struct sockaddr_in addr; - socklen_t addrlen = sizeof(struct sockaddr_in); + struct sockaddr_storage addr; + socklen_t addrlen = sizeof(struct sockaddr_storage); struct tcpcb *tp; int s, opt; @@ -413,9 +438,8 @@ void tcp_connect(struct socket *inso) free(so); /* NOT sofree */ return; } - so->so_lfamily = AF_INET; - so->so_laddr = inso->so_laddr; - so->so_lport = inso->so_lport; + so->lhost = inso->lhost; + so->so_ffamily = inso->so_ffamily; } tcp_mss(sototcpcb(so), 0); @@ -431,7 +455,7 @@ void tcp_connect(struct socket *inso) qemu_setsockopt(s, SOL_SOCKET, SO_OOBINLINE, &opt, sizeof(int)); socket_set_nodelay(s); - so->fhost.sin = addr; + so->fhost.ss = addr; sotranslate_accept(so); /* Close the accept() socket, set right state */ diff --git a/slirp/tcp_timer.c b/slirp/tcp_timer.c index 6c5bb11..42c6e7e 100644 --- a/slirp/tcp_timer.c +++ b/slirp/tcp_timer.c @@ -277,7 +277,8 @@ tcp_timers(register struct tcpcb *tp, int timer) * correspondent TCP to respond. */ tcp_respond(tp, &tp->t_template, (struct mbuf *)NULL, - tp->rcv_nxt, tp->snd_una - 1, 0); + tp->rcv_nxt, tp->snd_una - 1, 0, + tp->t_socket->so_ffamily); tp->t_timer[TCPT_KEEP] = TCPTV_KEEPINTVL; } else tp->t_timer[TCPT_KEEP] = TCPTV_KEEP_IDLE;