1 /*-
2 * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
3 * Copyright (c) 2008-2011, by Randall Stewart. All rights reserved.
4 * Copyright (c) 2008-2011, by Michael Tuexen. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are met:
8 *
9 * a) Redistributions of source code must retain the above copyright notice,
10 * this list of conditions and the following disclaimer.
11 *
12 * b) Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in
14 * the documentation and/or other materials provided with the distribution.
15 *
16 * c) Neither the name of Cisco Systems, Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived
18 * from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
30 * THE POSSIBILITY OF SUCH DAMAGE.
31 */
32
33
34 /* $KAME: sctp_peeloff.c,v 1.13 2005/03/06 16:04:18 itojun Exp $ */
35
36 #include <sys/cdefs.h>
37 __FBSDID("$FreeBSD: releng/8.3/sys/netinet/sctp_peeloff.c 233270 2012-03-21 08:08:23Z tuexen $");
38 #include <netinet/sctp_os.h>
39 #include <netinet/sctp_pcb.h>
40 #include <netinet/sctputil.h>
41 #include <netinet/sctp_var.h>
42 #include <netinet/sctp_var.h>
43 #include <netinet/sctp_sysctl.h>
44 #include <netinet/sctp.h>
45 #include <netinet/sctp_uio.h>
46 #include <netinet/sctp_peeloff.h>
47 #include <netinet/sctputil.h>
48 #include <netinet/sctp_auth.h>
49
50
51 int
52 sctp_can_peel_off(struct socket *head, sctp_assoc_t assoc_id)
53 {
54 struct sctp_inpcb *inp;
55 struct sctp_tcb *stcb;
56 uint32_t state;
57
58 if (head == NULL) {
59 SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EBADF);
60 return (EBADF);
61 }
62 inp = (struct sctp_inpcb *)head->so_pcb;
63 if (inp == NULL) {
64 SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EFAULT);
65 return (EFAULT);
66 }
67 if ((inp->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
68 (inp->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
69 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EOPNOTSUPP);
70 return (EOPNOTSUPP);
71 }
72 stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1);
73 if (stcb == NULL) {
74 SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_PEELOFF, ENOENT);
75 return (ENOENT);
76 }
77 state = SCTP_GET_STATE((&stcb->asoc));
78 if ((state == SCTP_STATE_EMPTY) ||
79 (state == SCTP_STATE_INUSE) ||
80 (state == SCTP_STATE_COOKIE_WAIT) ||
81 (state == SCTP_STATE_COOKIE_ECHOED)) {
82 SCTP_TCB_UNLOCK(stcb);
83 SCTP_LTRACE_ERR_RET(inp, stcb, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
84 return (ENOTCONN);
85 }
86 SCTP_TCB_UNLOCK(stcb);
87 /* We are clear to peel this one off */
88 return (0);
89 }
90
91 int
92 sctp_do_peeloff(struct socket *head, struct socket *so, sctp_assoc_t assoc_id)
93 {
94 struct sctp_inpcb *inp, *n_inp;
95 struct sctp_tcb *stcb;
96 uint32_t state;
97
98 inp = (struct sctp_inpcb *)head->so_pcb;
99 if (inp == NULL) {
100 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EFAULT);
101 return (EFAULT);
102 }
103 stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1);
104 if (stcb == NULL) {
105 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
106 return (ENOTCONN);
107 }
108 state = SCTP_GET_STATE((&stcb->asoc));
109 if ((state == SCTP_STATE_EMPTY) ||
110 (state == SCTP_STATE_INUSE) ||
111 (state == SCTP_STATE_COOKIE_WAIT) ||
112 (state == SCTP_STATE_COOKIE_ECHOED)) {
113 SCTP_TCB_UNLOCK(stcb);
114 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
115 return (ENOTCONN);
116 }
117 n_inp = (struct sctp_inpcb *)so->so_pcb;
118 n_inp->sctp_flags = (SCTP_PCB_FLAGS_UDPTYPE |
119 SCTP_PCB_FLAGS_CONNECTED |
120 SCTP_PCB_FLAGS_IN_TCPPOOL | /* Turn on Blocking IO */
121 (SCTP_PCB_COPY_FLAGS & inp->sctp_flags));
122 n_inp->sctp_socket = so;
123 n_inp->sctp_features = inp->sctp_features;
124 n_inp->sctp_mobility_features = inp->sctp_mobility_features;
125 n_inp->sctp_frag_point = inp->sctp_frag_point;
126 n_inp->sctp_cmt_on_off = inp->sctp_cmt_on_off;
127 n_inp->sctp_ecn_enable = inp->sctp_ecn_enable;
128 n_inp->partial_delivery_point = inp->partial_delivery_point;
129 n_inp->sctp_context = inp->sctp_context;
130 n_inp->inp_starting_point_for_iterator = NULL;
131 /* copy in the authentication parameters from the original endpoint */
132 if (n_inp->sctp_ep.local_hmacs)
133 sctp_free_hmaclist(n_inp->sctp_ep.local_hmacs);
134 n_inp->sctp_ep.local_hmacs =
135 sctp_copy_hmaclist(inp->sctp_ep.local_hmacs);
136 if (n_inp->sctp_ep.local_auth_chunks)
137 sctp_free_chunklist(n_inp->sctp_ep.local_auth_chunks);
138 n_inp->sctp_ep.local_auth_chunks =
139 sctp_copy_chunklist(inp->sctp_ep.local_auth_chunks);
140 (void)sctp_copy_skeylist(&inp->sctp_ep.shared_keys,
141 &n_inp->sctp_ep.shared_keys);
142 /*
143 * Now we must move it from one hash table to another and get the
144 * stcb in the right place.
145 */
146 sctp_move_pcb_and_assoc(inp, n_inp, stcb);
147 atomic_add_int(&stcb->asoc.refcnt, 1);
148 SCTP_TCB_UNLOCK(stcb);
149
150 sctp_pull_off_control_to_new_inp(inp, n_inp, stcb, SBL_WAIT);
151 atomic_subtract_int(&stcb->asoc.refcnt, 1);
152
153 return (0);
154 }
155
156
157 struct socket *
158 sctp_get_peeloff(struct socket *head, sctp_assoc_t assoc_id, int *error)
159 {
160 struct socket *newso;
161 struct sctp_inpcb *inp, *n_inp;
162 struct sctp_tcb *stcb;
163
164 SCTPDBG(SCTP_DEBUG_PEEL1, "SCTP peel-off called\n");
165 inp = (struct sctp_inpcb *)head->so_pcb;
166 if (inp == NULL) {
167 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, EFAULT);
168 *error = EFAULT;
169 return (NULL);
170 }
171 stcb = sctp_findassociation_ep_asocid(inp, assoc_id, 1);
172 if (stcb == NULL) {
173 SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_PEELOFF, ENOTCONN);
174 *error = ENOTCONN;
175 return (NULL);
176 }
177 atomic_add_int(&stcb->asoc.refcnt, 1);
178 SCTP_TCB_UNLOCK(stcb);
179 CURVNET_SET(head->so_vnet);
180 newso = sonewconn(head, SS_ISCONNECTED
181 );
182 CURVNET_RESTORE();
183 if (newso == NULL) {
184 SCTPDBG(SCTP_DEBUG_PEEL1, "sctp_peeloff:sonewconn failed\n");
185 SCTP_LTRACE_ERR_RET(NULL, stcb, NULL, SCTP_FROM_SCTP_PEELOFF, ENOMEM);
186 *error = ENOMEM;
187 atomic_subtract_int(&stcb->asoc.refcnt, 1);
188 return (NULL);
189
190 }
191 SCTP_TCB_LOCK(stcb);
192 atomic_subtract_int(&stcb->asoc.refcnt, 1);
193 n_inp = (struct sctp_inpcb *)newso->so_pcb;
194 SOCK_LOCK(head);
195 n_inp->sctp_flags = (SCTP_PCB_FLAGS_UDPTYPE |
196 SCTP_PCB_FLAGS_CONNECTED |
197 SCTP_PCB_FLAGS_IN_TCPPOOL | /* Turn on Blocking IO */
198 (SCTP_PCB_COPY_FLAGS & inp->sctp_flags));
199 n_inp->sctp_features = inp->sctp_features;
200 n_inp->sctp_frag_point = inp->sctp_frag_point;
201 n_inp->sctp_cmt_on_off = inp->sctp_cmt_on_off;
202 n_inp->sctp_ecn_enable = inp->sctp_ecn_enable;
203 n_inp->partial_delivery_point = inp->partial_delivery_point;
204 n_inp->sctp_context = inp->sctp_context;
205 n_inp->inp_starting_point_for_iterator = NULL;
206
207 /* copy in the authentication parameters from the original endpoint */
208 if (n_inp->sctp_ep.local_hmacs)
209 sctp_free_hmaclist(n_inp->sctp_ep.local_hmacs);
210 n_inp->sctp_ep.local_hmacs =
211 sctp_copy_hmaclist(inp->sctp_ep.local_hmacs);
212 if (n_inp->sctp_ep.local_auth_chunks)
213 sctp_free_chunklist(n_inp->sctp_ep.local_auth_chunks);
214 n_inp->sctp_ep.local_auth_chunks =
215 sctp_copy_chunklist(inp->sctp_ep.local_auth_chunks);
216 (void)sctp_copy_skeylist(&inp->sctp_ep.shared_keys,
217 &n_inp->sctp_ep.shared_keys);
218
219 n_inp->sctp_socket = newso;
220 if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_AUTOCLOSE)) {
221 sctp_feature_off(n_inp, SCTP_PCB_FLAGS_AUTOCLOSE);
222 n_inp->sctp_ep.auto_close_time = 0;
223 sctp_timer_stop(SCTP_TIMER_TYPE_AUTOCLOSE, n_inp, stcb, NULL,
224 SCTP_FROM_SCTP_PEELOFF + SCTP_LOC_1);
225 }
226 /* Turn off any non-blocking semantic. */
227 SCTP_CLEAR_SO_NBIO(newso);
228 newso->so_state |= SS_ISCONNECTED;
229 /* We remove it right away */
230
231 #ifdef SCTP_LOCK_LOGGING
232 if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_LOCK_LOGGING_ENABLE) {
233 sctp_log_lock(inp, (struct sctp_tcb *)NULL, SCTP_LOG_LOCK_SOCK);
234 }
235 #endif
236 TAILQ_REMOVE(&head->so_comp, newso, so_list);
237 head->so_qlen--;
238 SOCK_UNLOCK(head);
239 /*
240 * Now we must move it from one hash table to another and get the
241 * stcb in the right place.
242 */
243 sctp_move_pcb_and_assoc(inp, n_inp, stcb);
244 atomic_add_int(&stcb->asoc.refcnt, 1);
245 SCTP_TCB_UNLOCK(stcb);
246 /*
247 * And now the final hack. We move data in the pending side i.e.
248 * head to the new socket buffer. Let the GRUBBING begin :-0
249 */
250 sctp_pull_off_control_to_new_inp(inp, n_inp, stcb, SBL_WAIT);
251 atomic_subtract_int(&stcb->asoc.refcnt, 1);
252 return (newso);
253 }
Cache object: 5383d5645fcc9796c27ee03bde2f92d1
|