Giulio Grassi | 624f6c6 | 2014-02-18 19:42:14 +0100 | [diff] [blame] | 1 | /* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */ |
| 2 | /** |
Alexander Afanasyev | 9bcbc7c | 2014-04-06 19:37:37 -0700 | [diff] [blame] | 3 | * Copyright (c) 2014 Regents of the University of California, |
| 4 | * Arizona Board of Regents, |
| 5 | * Colorado State University, |
| 6 | * University Pierre & Marie Curie, Sorbonne University, |
| 7 | * Washington University in St. Louis, |
| 8 | * Beijing Institute of Technology |
| 9 | * |
| 10 | * This file is part of NFD (Named Data Networking Forwarding Daemon). |
| 11 | * See AUTHORS.md for complete list of NFD authors and contributors. |
| 12 | * |
| 13 | * NFD is free software: you can redistribute it and/or modify it under the terms |
| 14 | * of the GNU General Public License as published by the Free Software Foundation, |
| 15 | * either version 3 of the License, or (at your option) any later version. |
| 16 | * |
| 17 | * NFD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; |
| 18 | * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR |
| 19 | * PURPOSE. See the GNU General Public License for more details. |
| 20 | * |
| 21 | * You should have received a copy of the GNU General Public License along with |
| 22 | * NFD, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>. |
| 23 | **/ |
Giulio Grassi | 624f6c6 | 2014-02-18 19:42:14 +0100 | [diff] [blame] | 24 | |
| 25 | #include "udp-face.hpp" |
| 26 | |
Davide Pesavento | 0e76f62 | 2014-06-25 09:58:20 +0200 | [diff] [blame] | 27 | #ifdef __linux__ |
| 28 | #include <netinet/in.h> // for IP_MTU_DISCOVER and IP_PMTUDISC_DONT |
| 29 | #include <sys/socket.h> // for setsockopt() |
| 30 | #endif |
| 31 | |
Giulio Grassi | 624f6c6 | 2014-02-18 19:42:14 +0100 | [diff] [blame] | 32 | namespace nfd { |
| 33 | |
| 34 | NFD_LOG_INCLASS_TEMPLATE_SPECIALIZATION_DEFINE(DatagramFace, UdpFace::protocol, "UdpFace"); |
| 35 | |
Davide Pesavento | d8d4d98 | 2014-03-21 18:47:58 +0100 | [diff] [blame] | 36 | UdpFace::UdpFace(const shared_ptr<UdpFace::protocol::socket>& socket, bool isOnDemand) |
Junxiao Shi | 7949416 | 2014-04-02 18:25:11 -0700 | [diff] [blame] | 37 | : DatagramFace<protocol>(FaceUri(socket->remote_endpoint()), |
| 38 | FaceUri(socket->local_endpoint()), |
| 39 | socket, isOnDemand) |
Giulio Grassi | 624f6c6 | 2014-02-18 19:42:14 +0100 | [diff] [blame] | 40 | { |
Davide Pesavento | 0e76f62 | 2014-06-25 09:58:20 +0200 | [diff] [blame] | 41 | #ifdef __linux__ |
| 42 | // |
| 43 | // By default, Linux does path MTU discovery on IPv4 sockets, |
| 44 | // and sets the DF (Don't Fragment) flag on datagrams smaller |
| 45 | // than the interface MTU. However this does not work for us, |
| 46 | // because we cannot properly respond to ICMP "packet too big" |
| 47 | // messages by fragmenting the packet at the application level, |
| 48 | // since we want to rely on IP for fragmentation and reassembly. |
| 49 | // |
| 50 | // Therefore, we disable PMTU discovery, which prevents the kernel |
| 51 | // from setting the DF flag on outgoing datagrams, and thus allows |
| 52 | // routers along the path to perform fragmentation as needed. |
| 53 | // |
| 54 | const int value = IP_PMTUDISC_DONT; |
| 55 | if (::setsockopt(socket->native_handle(), IPPROTO_IP, |
| 56 | IP_MTU_DISCOVER, &value, sizeof(value)) < 0) |
| 57 | { |
| 58 | NFD_LOG_WARN("[id:" << this->getId() |
| 59 | << ",endpoint:" << m_socket->local_endpoint() |
| 60 | << "] Failed to disable path MTU discovery"); |
| 61 | } |
| 62 | #endif |
Giulio Grassi | 624f6c6 | 2014-02-18 19:42:14 +0100 | [diff] [blame] | 63 | } |
| 64 | |
| 65 | void |
| 66 | UdpFace::handleFirstReceive(const uint8_t* buffer, |
| 67 | std::size_t nBytesReceived, |
| 68 | const boost::system::error_code& error) |
| 69 | { |
Davide Pesavento | d8d4d98 | 2014-03-21 18:47:58 +0100 | [diff] [blame] | 70 | NFD_LOG_TRACE("handleFirstReceive"); |
| 71 | |
| 72 | // Checking if the received message size is too big. |
| 73 | // This check is redundant, since in the actual implementation |
| 74 | // a packet cannot be larger than MAX_NDN_PACKET_SIZE. |
Giulio Grassi | 624f6c6 | 2014-02-18 19:42:14 +0100 | [diff] [blame] | 75 | if (!error && (nBytesReceived > MAX_NDN_PACKET_SIZE)) |
| 76 | { |
| 77 | NFD_LOG_WARN("[id:" << this->getId() |
| 78 | << ",endpoint:" << m_socket->local_endpoint() |
| 79 | << "] Received message too big. Maximum size is " |
| 80 | << MAX_NDN_PACKET_SIZE ); |
| 81 | return; |
| 82 | } |
Davide Pesavento | d8d4d98 | 2014-03-21 18:47:58 +0100 | [diff] [blame] | 83 | |
Giulio Grassi | 624f6c6 | 2014-02-18 19:42:14 +0100 | [diff] [blame] | 84 | receiveDatagram(buffer, nBytesReceived, error); |
| 85 | } |
| 86 | |
Giulio Grassi | 624f6c6 | 2014-02-18 19:42:14 +0100 | [diff] [blame] | 87 | } // namespace nfd |