The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/netinet/sctp_peeloff.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
    3  * Copyright (c) 2008-2011, by Randall Stewart. All rights reserved.
    4  * Copyright (c) 2008-2011, by Michael Tuexen. All rights reserved.
    5  *
    6  * Redistribution and use in source and binary forms, with or without
    7  * modification, are permitted provided that the following conditions are met:
    8  *
    9  * a) Redistributions of source code must retain the above copyright notice,
   10  *    this list of conditions and the following disclaimer.
   11  *
   12  * b) Redistributions in binary form must reproduce the above copyright
   13  *    notice, this list of conditions and the following disclaimer in
   14  *    the documentation and/or other materials provided with the distribution.
   15  *
   16  * c) Neither the name of Cisco Systems, Inc. nor the names of its
   17  *    contributors may be used to endorse or promote products derived
   18  *    from this software without specific prior written permission.
   19  *
   20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
   21  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
   22  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
   24  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
   25  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
   26  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
   27  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
   28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
   29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
   30  * THE POSSIBILITY OF SUCH DAMAGE.
   31  */
   32 
   33 
   34 /* $KAME: sctp_peeloff.c,v 1.13 2005/03/06 16:04:18 itojun Exp $         */
   35 
   36 #include <sys/cdefs.h>
   37 __FBSDID("$FreeBSD: releng/8.3/sys/netinet/sctp_peeloff.c 233270 2012-03-21 08:08:23Z tuexen $");
   38 #include <netinet/sctp_os.h>
   39 #include <netinet/sctp_pcb.h>
   40 #include <netinet/sctputil.h>
   41 #include <netinet/sctp_var.h>
   42 #include <netinet/sctp_var.h>
   43 #include <netinet/sctp_sysctl.h>
   44 #include <netinet/sctp.h>
   45 #include <netinet/sctp_uio.h>
   46 #include <netinet/sctp_peeloff.h>
   47 #include <netinet/sctputil.h>
   48 #include <netinet/sctp_auth.h>
   49 
   50 
   51 int
   52 sctp_can_peel_off(struct socket *head, sctp_assoc_t assoc_id)
   53 {
   54         struct sctp_inpcb *inp;
   55         struct sctp_tcb *stcb;
   56         uint32_t state;
   57 
   58         if (head == NULL) {
   59                 SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EBADF);
   60                 return (EBADF);
   61         }
   62         inp = (struct sctp_inpcb *)head->so_pcb;
   63         if (inp == NULL) {
   64                 SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EFAULT);
   65                 return (EFAULT);
   66         }
   67         if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
   68             (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
   69                 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EOPNOTSUPP);
   70                 return (EOPNOTSUPP);
   71         }
   72         stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1);
   73         if (stcb == NULL) {
   74                 SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_PEELOFF, ENOENT);
   75                 return (ENOENT);
   76         }
   77         state = SCTP_GET_STATE((&stcb->asoc));
   78         if ((state == SCTP_STATE_EMPTY) ||
   79             (state == SCTP_STATE_INUSE) ||
   80             (state == SCTP_STATE_COOKIE_WAIT) ||
   81             (state == SCTP_STATE_COOKIE_ECHOED)) {
   82                 SCTP_TCB_UNLOCK(stcb);
   83                 SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
   84                 return (ENOTCONN);
   85         }
   86         SCTP_TCB_UNLOCK(stcb);
   87         /* We are clear to peel this one off */
   88         return (0);
   89 }
   90 
   91 int
   92 sctp_do_peeloff(struct socket *head, struct socket *so, sctp_assoc_t assoc_id)
   93 {
   94         struct sctp_inpcb *inp, *n_inp;
   95         struct sctp_tcb *stcb;
   96         uint32_t state;
   97 
   98         inp = (struct sctp_inpcb *)head->so_pcb;
   99         if (inp == NULL) {
  100                 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EFAULT);
  101                 return (EFAULT);
  102         }
  103         stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1);
  104         if (stcb == NULL) {
  105                 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
  106                 return (ENOTCONN);
  107         }
  108         state = SCTP_GET_STATE((&stcb->asoc));
  109         if ((state == SCTP_STATE_EMPTY) ||
  110             (state == SCTP_STATE_INUSE) ||
  111             (state == SCTP_STATE_COOKIE_WAIT) ||
  112             (state == SCTP_STATE_COOKIE_ECHOED)) {
  113                 SCTP_TCB_UNLOCK(stcb);
  114                 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
  115                 return (ENOTCONN);
  116         }
  117         n_inp = (struct sctp_inpcb *)so->so_pcb;
  118         n_inp->sctp_flags = (SCTP_PCB_FLAGS_UDPTYPE |
  119             SCTP_PCB_FLAGS_CONNECTED |
  120             SCTP_PCB_FLAGS_IN_TCPPOOL | /* Turn on Blocking IO */
  121             (SCTP_PCB_COPY_FLAGS & inp->sctp_flags));
  122         n_inp->sctp_socket = so;
  123         n_inp->sctp_features = inp->sctp_features;
  124         n_inp->sctp_mobility_features = inp->sctp_mobility_features;
  125         n_inp->sctp_frag_point = inp->sctp_frag_point;
  126         n_inp->sctp_cmt_on_off = inp->sctp_cmt_on_off;
  127         n_inp->sctp_ecn_enable = inp->sctp_ecn_enable;
  128         n_inp->partial_delivery_point = inp->partial_delivery_point;
  129         n_inp->sctp_context = inp->sctp_context;
  130         n_inp->inp_starting_point_for_iterator = NULL;
  131         /* copy in the authentication parameters from the original endpoint */
  132         if (n_inp->sctp_ep.local_hmacs)
  133                 sctp_free_hmaclist(n_inp->sctp_ep.local_hmacs);
  134         n_inp->sctp_ep.local_hmacs =
  135             sctp_copy_hmaclist(inp->sctp_ep.local_hmacs);
  136         if (n_inp->sctp_ep.local_auth_chunks)
  137                 sctp_free_chunklist(n_inp->sctp_ep.local_auth_chunks);
  138         n_inp->sctp_ep.local_auth_chunks =
  139             sctp_copy_chunklist(inp->sctp_ep.local_auth_chunks);
  140         (void)sctp_copy_skeylist(&inp->sctp_ep.shared_keys,
  141             &n_inp->sctp_ep.shared_keys);
  142         /*
  143          * Now we must move it from one hash table to another and get the
  144          * stcb in the right place.
  145          */
  146         sctp_move_pcb_and_assoc(inp, n_inp, stcb);
  147         atomic_add_int(&stcb->asoc.refcnt, 1);
  148         SCTP_TCB_UNLOCK(stcb);
  149 
  150         sctp_pull_off_control_to_new_inp(inp, n_inp, stcb, SBL_WAIT);
  151         atomic_subtract_int(&stcb->asoc.refcnt, 1);
  152 
  153         return (0);
  154 }
  155 
  156 
  157 struct socket *
  158 sctp_get_peeloff(struct socket *head, sctp_assoc_t assoc_id, int *error)
  159 {
  160         struct socket *newso;
  161         struct sctp_inpcb *inp, *n_inp;
  162         struct sctp_tcb *stcb;
  163 
  164         SCTPDBG(SCTP_DEBUG_PEEL1, "SCTP peel-off called\n");
  165         inp = (struct sctp_inpcb *)head->so_pcb;
  166         if (inp == NULL) {
  167                 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EFAULT);
  168                 *error = EFAULT;
  169                 return (NULL);
  170         }
  171         stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1);
  172         if (stcb == NULL) {
  173                 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
  174                 *error = ENOTCONN;
  175                 return (NULL);
  176         }
  177         atomic_add_int(&stcb->asoc.refcnt, 1);
  178         SCTP_TCB_UNLOCK(stcb);
  179         CURVNET_SET(head->so_vnet);
  180         newso = sonewconn(head, SS_ISCONNECTED
  181             );
  182         CURVNET_RESTORE();
  183         if (newso == NULL) {
  184                 SCTPDBG(SCTP_DEBUG_PEEL1, "sctp_peeloff:sonewconn failed\n");
  185                 SCTP_LTRACE_ERR_RET(NULL, stcb, NULL, SCTP_FROM_SCTP_PEELOFF, ENOMEM);
  186                 *error = ENOMEM;
  187                 atomic_subtract_int(&stcb->asoc.refcnt, 1);
  188                 return (NULL);
  189 
  190         }
  191         SCTP_TCB_LOCK(stcb);
  192         atomic_subtract_int(&stcb->asoc.refcnt, 1);
  193         n_inp = (struct sctp_inpcb *)newso->so_pcb;
  194         SOCK_LOCK(head);
  195         n_inp->sctp_flags = (SCTP_PCB_FLAGS_UDPTYPE |
  196             SCTP_PCB_FLAGS_CONNECTED |
  197             SCTP_PCB_FLAGS_IN_TCPPOOL | /* Turn on Blocking IO */
  198             (SCTP_PCB_COPY_FLAGS & inp->sctp_flags));
  199         n_inp->sctp_features = inp->sctp_features;
  200         n_inp->sctp_frag_point = inp->sctp_frag_point;
  201         n_inp->sctp_cmt_on_off = inp->sctp_cmt_on_off;
  202         n_inp->sctp_ecn_enable = inp->sctp_ecn_enable;
  203         n_inp->partial_delivery_point = inp->partial_delivery_point;
  204         n_inp->sctp_context = inp->sctp_context;
  205         n_inp->inp_starting_point_for_iterator = NULL;
  206 
  207         /* copy in the authentication parameters from the original endpoint */
  208         if (n_inp->sctp_ep.local_hmacs)
  209                 sctp_free_hmaclist(n_inp->sctp_ep.local_hmacs);
  210         n_inp->sctp_ep.local_hmacs =
  211             sctp_copy_hmaclist(inp->sctp_ep.local_hmacs);
  212         if (n_inp->sctp_ep.local_auth_chunks)
  213                 sctp_free_chunklist(n_inp->sctp_ep.local_auth_chunks);
  214         n_inp->sctp_ep.local_auth_chunks =
  215             sctp_copy_chunklist(inp->sctp_ep.local_auth_chunks);
  216         (void)sctp_copy_skeylist(&inp->sctp_ep.shared_keys,
  217             &n_inp->sctp_ep.shared_keys);
  218 
  219         n_inp->sctp_socket = newso;
  220         if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTOCLOSE)) {
  221                 sctp_feature_off(n_inp, SCTP_PCB_FLAGS_AUTOCLOSE);
  222                 n_inp->sctp_ep.auto_close_time = 0;
  223                 sctp_timer_stop(SCTP_TIMER_TYPE_AUTOCLOSE, n_inp, stcb, NULL,
  224                     SCTP_FROM_SCTP_PEELOFF + SCTP_LOC_1);
  225         }
  226         /* Turn off any non-blocking semantic. */
  227         SCTP_CLEAR_SO_NBIO(newso);
  228         newso->so_state |= SS_ISCONNECTED;
  229         /* We remove it right away */
  230 
  231 #ifdef SCTP_LOCK_LOGGING
  232         if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_LOCK_LOGGING_ENABLE) {
  233                 sctp_log_lock(inp, (struct sctp_tcb *)NULL, SCTP_LOG_LOCK_SOCK);
  234         }
  235 #endif
  236         TAILQ_REMOVE(&head->so_comp, newso, so_list);
  237         head->so_qlen--;
  238         SOCK_UNLOCK(head);
  239         /*
  240          * Now we must move it from one hash table to another and get the
  241          * stcb in the right place.
  242          */
  243         sctp_move_pcb_and_assoc(inp, n_inp, stcb);
  244         atomic_add_int(&stcb->asoc.refcnt, 1);
  245         SCTP_TCB_UNLOCK(stcb);
  246         /*
  247          * And now the final hack. We move data in the pending side i.e.
  248          * head to the new socket buffer. Let the GRUBBING begin :-0
  249          */
  250         sctp_pull_off_control_to_new_inp(inp, n_inp, stcb, SBL_WAIT);
  251         atomic_subtract_int(&stcb->asoc.refcnt, 1);
  252         return (newso);
  253 }

Cache object: 5383d5645fcc9796c27ee03bde2f92d1


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.