The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/netsmb/smb_trantcp.c

Version: -  FREEBSD  -  FREEBSD11  -  FREEBSD10  -  FREEBSD9  -  FREEBSD92  -  FREEBSD91  -  FREEBSD90  -  FREEBSD8  -  FREEBSD82  -  FREEBSD81  -  FREEBSD80  -  FREEBSD7  -  FREEBSD74  -  FREEBSD73  -  FREEBSD72  -  FREEBSD71  -  FREEBSD70  -  FREEBSD6  -  FREEBSD64  -  FREEBSD63  -  FREEBSD62  -  FREEBSD61  -  FREEBSD60  -  FREEBSD5  -  FREEBSD55  -  FREEBSD54  -  FREEBSD53  -  FREEBSD52  -  FREEBSD51  -  FREEBSD50  -  FREEBSD4  -  FREEBSD3  -  FREEBSD22  -  linux-2.6  -  linux-2.4.22  -  MK83  -  MK84  -  PLAN9  -  DFBSD  -  NETBSD  -  NETBSD5  -  NETBSD4  -  NETBSD3  -  NETBSD20  -  OPENBSD  -  xnu-517  -  xnu-792  -  xnu-792.6.70  -  xnu-1228  -  xnu-1456.1.26  -  xnu-1699.24.8  -  xnu-2050.18.24  -  OPENSOLARIS  -  minix-3-1-1 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2000-2001 Boris Popov
    3  * All rights reserved.
    4  *
    5  * Redistribution and use in source and binary forms, with or without
    6  * modification, are permitted provided that the following conditions
    7  * are met:
    8  * 1. Redistributions of source code must retain the above copyright
    9  *    notice, this list of conditions and the following disclaimer.
   10  * 2. Redistributions in binary form must reproduce the above copyright
   11  *    notice, this list of conditions and the following disclaimer in the
   12  *    documentation and/or other materials provided with the distribution.
   13  *
   14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   24  * SUCH DAMAGE.
   25  */
   26 
   27 #include <sys/cdefs.h>
   28 __FBSDID("$FreeBSD: stable/9/sys/netsmb/smb_trantcp.c 264425 2014-04-13 22:00:50Z dteske $");
   29 
   30 #include <sys/param.h>
   31 #include <sys/condvar.h>
   32 #include <sys/kernel.h>
   33 #include <sys/lock.h>
   34 #include <sys/malloc.h>
   35 #include <sys/mbuf.h>
   36 #include <sys/poll.h>
   37 #include <sys/proc.h>
   38 #include <sys/protosw.h>
   39 #include <sys/signalvar.h>
   40 #include <sys/socket.h>
   41 #include <sys/socketvar.h>
   42 #include <sys/sx.h>
   43 #include <sys/sysctl.h>
   44 #include <sys/systm.h>
   45 #include <sys/uio.h>
   46 
   47 #include <net/if.h>
   48 #include <net/route.h>
   49 #include <net/vnet.h>
   50 
   51 #include <netinet/in.h>
   52 #include <netinet/tcp.h>
   53 
   54 #include <sys/mchain.h>
   55 
   56 #include <netsmb/netbios.h>
   57 
   58 #include <netsmb/smb.h>
   59 #include <netsmb/smb_conn.h>
   60 #include <netsmb/smb_tran.h>
   61 #include <netsmb/smb_trantcp.h>
   62 #include <netsmb/smb_subr.h>
   63 
   64 #define M_NBDATA        M_PCB
   65 
   66 static int smb_tcpsndbuf = NB_SNDQ - 1;
   67 static int smb_tcprcvbuf = NB_RCVQ - 1;
   68 
   69 SYSCTL_DECL(_net_smb);
   70 SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
   71 SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
   72 
   73 #define nb_sosend(so,m,flags,td) sosend(so, NULL, 0, m, 0, flags, td)
   74 
   75 static int  nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
   76         u_int8_t *rpcodep, struct thread *td);
   77 static int  smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
   78 
   79 static int
   80 nb_setsockopt_int(struct socket *so, int level, int name, int val)
   81 {
   82         struct sockopt sopt;
   83         int error;
   84 
   85         bzero(&sopt, sizeof(sopt));
   86         sopt.sopt_level = level;
   87         sopt.sopt_name = name;
   88         sopt.sopt_val = &val;
   89         sopt.sopt_valsize = sizeof(val);
   90         CURVNET_SET(so->so_vnet);
   91         error = sosetopt(so, &sopt);
   92         CURVNET_RESTORE();
   93         return error;
   94 }
   95 
   96 static int
   97 nb_intr(struct nbpcb *nbp, struct proc *p)
   98 {
   99         return 0;
  100 }
  101 
  102 static int
  103 nb_upcall(struct socket *so, void *arg, int waitflag)
  104 {
  105         struct nbpcb *nbp = arg;
  106 
  107         if (arg == NULL || nbp->nbp_selectid == NULL)
  108                 return (SU_OK);
  109         wakeup(nbp->nbp_selectid);
  110         return (SU_OK);
  111 }
  112 
  113 static int
  114 nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
  115 {
  116         u_int32_t *p = mtod(m, u_int32_t *);
  117 
  118         *p = htonl((len & 0x1FFFF) | (type << 24));
  119         return 0;
  120 }
  121 
  122 static int
  123 nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
  124 {
  125         int error;
  126         u_char seglen, *cp;
  127 
  128         cp = snb->snb_name;
  129         if (*cp == 0)
  130                 return EINVAL;
  131         NBDEBUG("[%s]\n", cp);
  132         for (;;) {
  133                 seglen = (*cp) + 1;
  134                 error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
  135                 if (error)
  136                         return error;
  137                 if (seglen == 1)
  138                         break;
  139                 cp += seglen;
  140         }
  141         return 0;
  142 }
  143 
  144 static int
  145 nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
  146 {
  147         struct socket *so;
  148         int error, s;
  149 
  150         error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
  151             td->td_ucred, td);
  152         if (error)
  153                 return error;
  154         nbp->nbp_tso = so;
  155         SOCKBUF_LOCK(&so->so_rcv);
  156         soupcall_set(so, SO_RCV, nb_upcall, nbp);
  157         SOCKBUF_UNLOCK(&so->so_rcv);
  158         so->so_rcv.sb_timeo = (5 * hz);
  159         so->so_snd.sb_timeo = (5 * hz);
  160         error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
  161         if (error)
  162                 goto bad;
  163         nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
  164         nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
  165         SOCKBUF_LOCK(&so->so_rcv);
  166         so->so_rcv.sb_flags &= ~SB_NOINTR;
  167         SOCKBUF_UNLOCK(&so->so_rcv);
  168         SOCKBUF_LOCK(&so->so_snd);
  169         so->so_snd.sb_flags &= ~SB_NOINTR;
  170         SOCKBUF_UNLOCK(&so->so_snd);
  171         error = soconnect(so, (struct sockaddr*)to, td);
  172         if (error)
  173                 goto bad;
  174         s = splnet();
  175         while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
  176                 tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
  177                 if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
  178                         (error = nb_intr(nbp, td->td_proc)) != 0) {
  179                         so->so_state &= ~SS_ISCONNECTING;
  180                         splx(s);
  181                         goto bad;
  182                 }
  183         }
  184         if (so->so_error) {
  185                 error = so->so_error;
  186                 so->so_error = 0;
  187                 splx(s);
  188                 goto bad;
  189         }
  190         splx(s);
  191         return 0;
  192 bad:
  193         smb_nbst_disconnect(nbp->nbp_vc, td);
  194         return error;
  195 }
  196 
  197 static int
  198 nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
  199 {
  200         struct mbchain mb, *mbp = &mb;
  201         struct mdchain md, *mdp = &md;
  202         struct mbuf *m0;
  203         struct timeval tv;
  204         struct sockaddr_in sin;
  205         u_short port;
  206         u_int8_t rpcode;
  207         int error, rplen;
  208 
  209         error = mb_init(mbp);
  210         if (error)
  211                 return error;
  212         mb_put_uint32le(mbp, 0);
  213         nb_put_name(mbp, nbp->nbp_paddr);
  214         nb_put_name(mbp, nbp->nbp_laddr);
  215         nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
  216         error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
  217         if (!error) {
  218                 nbp->nbp_state = NBST_RQSENT;
  219         }
  220         mb_detach(mbp);
  221         mb_done(mbp);
  222         if (error)
  223                 return error;
  224         TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
  225         error = selsocket(nbp->nbp_tso, POLLIN, &tv, td);
  226         if (error == EWOULDBLOCK) {     /* Timeout */
  227                 NBDEBUG("initial request timeout\n");
  228                 return ETIMEDOUT;
  229         }
  230         if (error)                      /* restart or interrupt */
  231                 return error;
  232         error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
  233         if (error) {
  234                 NBDEBUG("recv() error %d\n", error);
  235                 return error;
  236         }
  237         /*
  238          * Process NETBIOS reply
  239          */
  240         if (m0)
  241                 md_initm(mdp, m0);
  242         error = 0;
  243         do {
  244                 if (rpcode == NB_SSN_POSRESP) {
  245                         nbp->nbp_state = NBST_SESSION;
  246                         nbp->nbp_flags |= NBF_CONNECTED;
  247                         break;
  248                 }
  249                 if (rpcode != NB_SSN_RTGRESP) {
  250                         error = ECONNABORTED;
  251                         break;
  252                 }
  253                 if (rplen != 6) {
  254                         error = ECONNABORTED;
  255                         break;
  256                 }
  257                 md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
  258                 md_get_uint16(mdp, &port);
  259                 sin.sin_port = port;
  260                 nbp->nbp_state = NBST_RETARGET;
  261                 smb_nbst_disconnect(nbp->nbp_vc, td);
  262                 error = nb_connect_in(nbp, &sin, td);
  263                 if (!error)
  264                         error = nbssn_rq_request(nbp, td);
  265                 if (error) {
  266                         smb_nbst_disconnect(nbp->nbp_vc, td);
  267                         break;
  268                 }
  269         } while(0);
  270         if (m0)
  271                 md_done(mdp);
  272         return error;
  273 }
  274 
  275 static int
  276 nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
  277         u_int8_t *rpcodep, int flags, struct thread *td)
  278 {
  279         struct socket *so = nbp->nbp_tso;
  280         struct uio auio;
  281         struct iovec aio;
  282         u_int32_t len;
  283         int error;
  284 
  285         aio.iov_base = (caddr_t)&len;
  286         aio.iov_len = sizeof(len);
  287         auio.uio_iov = &aio;
  288         auio.uio_iovcnt = 1;
  289         auio.uio_segflg = UIO_SYSSPACE;
  290         auio.uio_rw = UIO_READ;
  291         auio.uio_offset = 0;
  292         auio.uio_resid = sizeof(len);
  293         auio.uio_td = td;
  294         CURVNET_SET(so->so_vnet);
  295         error = soreceive(so, (struct sockaddr **)NULL, &auio,
  296             (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
  297         CURVNET_RESTORE();
  298         if (error)
  299                 return error;
  300         if (auio.uio_resid > 0) {
  301                 SMBSDEBUG("short reply\n");
  302                 return EPIPE;
  303         }
  304         len = ntohl(len);
  305         *rpcodep = (len >> 24) & 0xFF;
  306         len &= 0x1ffff;
  307         if (len > SMB_MAXPKTLEN) {
  308                 SMBERROR("packet too long (%d)\n", len);
  309                 return EFBIG;
  310         }
  311         *lenp = len;
  312         return 0;
  313 }
  314 
  315 static int
  316 nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
  317         u_int8_t *rpcodep, struct thread *td)
  318 {
  319         struct socket *so = nbp->nbp_tso;
  320         struct uio auio;
  321         struct mbuf *m, *tm, *im;
  322         u_int8_t rpcode;
  323         int len, resid;
  324         int error, rcvflg;
  325 
  326         if (so == NULL)
  327                 return ENOTCONN;
  328 
  329         if (mpp)
  330                 *mpp = NULL;
  331         m = NULL;
  332         for(;;) {
  333                 /*
  334                  * Poll for a response header.
  335                  * If we don't have one waiting, return.
  336                  */
  337                 len = 0;
  338                 rpcode = 0;
  339                 error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
  340                 if ((so->so_state & (SS_ISDISCONNECTING | SS_ISDISCONNECTED)) ||
  341                     (so->so_rcv.sb_state & SBS_CANTRCVMORE)) {
  342                         nbp->nbp_state = NBST_CLOSED;
  343                         NBDEBUG("session closed by peer\n");
  344                         return ECONNRESET;
  345                 }
  346                 if (error)
  347                         return error;
  348                 if (len == 0 && nbp->nbp_state != NBST_SESSION)
  349                         break;
  350                 /* no data, try again */
  351                 if (rpcode == NB_SSN_KEEPALIVE)
  352                         continue;
  353 
  354                 /*
  355                  * Loop, blocking, for data following the response header.
  356                  *
  357                  * Note that we can't simply block here with MSG_WAITALL for the
  358                  * entire response size, as it may be larger than the TCP
  359                  * slow-start window that the sender employs.  This will result
  360                  * in the sender stalling until the delayed ACK is sent, then
  361                  * resuming slow-start, resulting in very poor performance.
  362                  *
  363                  * Instead, we never request more than NB_SORECEIVE_CHUNK
  364                  * bytes at a time, resulting in an ack being pushed by
  365                  * the TCP code at the completion of each call.
  366                  */
  367                 resid = len;
  368                 while (resid > 0) {
  369                         tm = NULL;
  370                         rcvflg = MSG_WAITALL;
  371                         bzero(&auio, sizeof(auio));
  372                         auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
  373                         auio.uio_td = td;
  374                         resid -= auio.uio_resid;
  375                         /*
  376                          * Spin until we have collected everything in
  377                          * this chunk.
  378                          */
  379                         do {
  380                                 rcvflg = MSG_WAITALL;
  381                                 CURVNET_SET(so->so_vnet);
  382                                 error = soreceive(so, (struct sockaddr **)NULL,
  383                                     &auio, &tm, (struct mbuf **)NULL, &rcvflg);
  384                                 CURVNET_RESTORE();
  385                         } while (error == EWOULDBLOCK || error == EINTR ||
  386                                  error == ERESTART);
  387                         if (error)
  388                                 goto out;
  389                         /* short return guarantees unhappiness */
  390                         if (auio.uio_resid > 0) {
  391                                 SMBERROR("packet is shorter than expected\n");
  392                                 error = EPIPE;
  393                                 goto out;
  394                         }
  395                         /* append received chunk to previous chunk(s) */
  396                         if (m == NULL) {
  397                                 m = tm;
  398                         } else {
  399                                 /*
  400                                  * Just glue the new chain on the end.
  401                                  * Consumer will pullup as required.
  402                                  */
  403                                 for (im = m; im->m_next != NULL; im = im->m_next)
  404                                         ;
  405                                 im->m_next = tm;
  406                         }
  407                 }
  408                 /* got a session/message packet? */
  409                 if (nbp->nbp_state == NBST_SESSION &&
  410                     rpcode == NB_SSN_MESSAGE)
  411                         break;
  412                 /* drop packet and try for another */
  413                 NBDEBUG("non-session packet %x\n", rpcode);
  414                 if (m) {
  415                         m_freem(m);
  416                         m = NULL;
  417                 }
  418         }
  419 
  420 out:
  421         if (error) {
  422                 if (m)
  423                         m_freem(m);
  424                 return error;
  425         }
  426         if (mpp)
  427                 *mpp = m;
  428         else
  429                 m_freem(m);
  430         *lenp = len;
  431         *rpcodep = rpcode;
  432         return 0;
  433 }
  434 
  435 /*
  436  * SMB transport interface
  437  */
  438 static int
  439 smb_nbst_create(struct smb_vc *vcp, struct thread *td)
  440 {
  441         struct nbpcb *nbp;
  442 
  443         nbp = malloc(sizeof *nbp, M_NBDATA, M_WAITOK);
  444         bzero(nbp, sizeof *nbp);
  445         nbp->nbp_timo.tv_sec = 15;      /* XXX: sysctl ? */
  446         nbp->nbp_state = NBST_CLOSED;
  447         nbp->nbp_vc = vcp;
  448         nbp->nbp_sndbuf = smb_tcpsndbuf;
  449         nbp->nbp_rcvbuf = smb_tcprcvbuf;
  450         vcp->vc_tdata = nbp;
  451         return 0;
  452 }
  453 
  454 static int
  455 smb_nbst_done(struct smb_vc *vcp, struct thread *td)
  456 {
  457         struct nbpcb *nbp = vcp->vc_tdata;
  458 
  459         if (nbp == NULL)
  460                 return ENOTCONN;
  461         smb_nbst_disconnect(vcp, td);
  462         if (nbp->nbp_laddr)
  463                 free(nbp->nbp_laddr, M_SONAME);
  464         if (nbp->nbp_paddr)
  465                 free(nbp->nbp_paddr, M_SONAME);
  466         free(nbp, M_NBDATA);
  467         return 0;
  468 }
  469 
  470 static int
  471 smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
  472 {
  473         struct nbpcb *nbp = vcp->vc_tdata;
  474         struct sockaddr_nb *snb;
  475         int error, slen;
  476 
  477         NBDEBUG("\n");
  478         error = EINVAL;
  479         do {
  480                 if (nbp->nbp_flags & NBF_LOCADDR)
  481                         break;
  482                 /*
  483                  * It is possible to create NETBIOS name in the kernel,
  484                  * but nothing prevents us to do it in the user space.
  485                  */
  486                 if (sap == NULL)
  487                         break;
  488                 slen = sap->sa_len;
  489                 if (slen < NB_MINSALEN)
  490                         break;
  491                 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
  492                 if (snb == NULL) {
  493                         error = ENOMEM;
  494                         break;
  495                 }
  496                 nbp->nbp_laddr = snb;
  497                 nbp->nbp_flags |= NBF_LOCADDR;
  498                 error = 0;
  499         } while(0);
  500         return error;
  501 }
  502 
  503 static int
  504 smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
  505 {
  506         struct nbpcb *nbp = vcp->vc_tdata;
  507         struct sockaddr_in sin;
  508         struct sockaddr_nb *snb;
  509         struct timespec ts1, ts2;
  510         int error, slen;
  511 
  512         NBDEBUG("\n");
  513         if (nbp->nbp_tso != NULL)
  514                 return EISCONN;
  515         if (nbp->nbp_laddr == NULL)
  516                 return EINVAL;
  517         slen = sap->sa_len;
  518         if (slen < NB_MINSALEN)
  519                 return EINVAL;
  520         if (nbp->nbp_paddr) {
  521                 free(nbp->nbp_paddr, M_SONAME);
  522                 nbp->nbp_paddr = NULL;
  523         }
  524         snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
  525         if (snb == NULL)
  526                 return ENOMEM;
  527         nbp->nbp_paddr = snb;
  528         sin = snb->snb_addrin;
  529         getnanotime(&ts1);
  530         error = nb_connect_in(nbp, &sin, td);
  531         if (error)
  532                 return error;
  533         getnanotime(&ts2);
  534         timespecsub(&ts2, &ts1);
  535         if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
  536                 ts2.tv_sec = 1;
  537         nbp->nbp_timo = ts2;
  538         timespecadd(&nbp->nbp_timo, &ts2);
  539         timespecadd(&nbp->nbp_timo, &ts2);
  540         timespecadd(&nbp->nbp_timo, &ts2);      /*  * 4 */
  541         error = nbssn_rq_request(nbp, td);
  542         if (error)
  543                 smb_nbst_disconnect(vcp, td);
  544         return error;
  545 }
  546 
  547 static int
  548 smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
  549 {
  550         struct nbpcb *nbp = vcp->vc_tdata;
  551         struct socket *so;
  552 
  553         if (nbp == NULL || nbp->nbp_tso == NULL)
  554                 return ENOTCONN;
  555         if ((so = nbp->nbp_tso) != NULL) {
  556                 nbp->nbp_flags &= ~NBF_CONNECTED;
  557                 nbp->nbp_tso = (struct socket *)NULL;
  558                 soshutdown(so, 2);
  559                 soclose(so);
  560         }
  561         if (nbp->nbp_state != NBST_RETARGET) {
  562                 nbp->nbp_state = NBST_CLOSED;
  563         }
  564         return 0;
  565 }
  566 
  567 static int
  568 smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
  569 {
  570         struct nbpcb *nbp = vcp->vc_tdata;
  571         int error;
  572 
  573         if (nbp->nbp_state != NBST_SESSION) {
  574                 error = ENOTCONN;
  575                 goto abort;
  576         }
  577         M_PREPEND(m0, 4, M_WAIT);
  578         nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
  579         error = nb_sosend(nbp->nbp_tso, m0, 0, td);
  580         return error;
  581 abort:
  582         if (m0)
  583                 m_freem(m0);
  584         return error;
  585 }
  586 
  587 
  588 static int
  589 smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
  590 {
  591         struct nbpcb *nbp = vcp->vc_tdata;
  592         u_int8_t rpcode;
  593         int error, rplen;
  594 
  595         nbp->nbp_flags |= NBF_RECVLOCK;
  596         error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
  597         nbp->nbp_flags &= ~NBF_RECVLOCK;
  598         return error;
  599 }
  600 
  601 static void
  602 smb_nbst_timo(struct smb_vc *vcp)
  603 {
  604         return;
  605 }
  606 
  607 static void
  608 smb_nbst_intr(struct smb_vc *vcp)
  609 {
  610         struct nbpcb *nbp = vcp->vc_tdata;
  611 
  612         if (nbp == NULL || nbp->nbp_tso == NULL)
  613                 return;
  614         sorwakeup(nbp->nbp_tso);
  615         sowwakeup(nbp->nbp_tso);
  616 }
  617 
  618 static int
  619 smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
  620 {
  621         struct nbpcb *nbp = vcp->vc_tdata;
  622 
  623         switch (param) {
  624             case SMBTP_SNDSZ:
  625                 *(int*)data = nbp->nbp_sndbuf;
  626                 break;
  627             case SMBTP_RCVSZ:
  628                 *(int*)data = nbp->nbp_rcvbuf;
  629                 break;
  630             case SMBTP_TIMEOUT:
  631                 *(struct timespec*)data = nbp->nbp_timo;
  632                 break;
  633             default:
  634                 return EINVAL;
  635         }
  636         return 0;
  637 }
  638 
  639 static int
  640 smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
  641 {
  642         struct nbpcb *nbp = vcp->vc_tdata;
  643 
  644         switch (param) {
  645             case SMBTP_SELECTID:
  646                 nbp->nbp_selectid = data;
  647                 break;
  648             default:
  649                 return EINVAL;
  650         }
  651         return 0;
  652 }
  653 
  654 /*
  655  * Check for fatal errors
  656  */
  657 static int
  658 smb_nbst_fatal(struct smb_vc *vcp, int error)
  659 {
  660         switch (error) {
  661             case ENOTCONN:
  662             case ENETRESET:
  663             case ECONNABORTED:
  664                 return 1;
  665         }
  666         return 0;
  667 }
  668 
  669 
  670 struct smb_tran_desc smb_tran_nbtcp_desc = {
  671         SMBT_NBTCP,
  672         smb_nbst_create, smb_nbst_done,
  673         smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
  674         smb_nbst_send, smb_nbst_recv,
  675         smb_nbst_timo, smb_nbst_intr,
  676         smb_nbst_getparam, smb_nbst_setparam,
  677         smb_nbst_fatal
  678 };
  679 

Cache object: c4cfd1f6d883d1190ab8e3096bbb9562


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.