The Design and Implementation of the FreeBSD Operating System, Second Edition
[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/netsmb/smb_trantcp.c

Version: -  FREEBSD  -  FREEBSD10  -  FREEBSD9  -  FREEBSD92  -  FREEBSD91  -  FREEBSD90  -  FREEBSD8  -  FREEBSD82  -  FREEBSD81  -  FREEBSD80  -  FREEBSD7  -  FREEBSD74  -  FREEBSD73  -  FREEBSD72  -  FREEBSD71  -  FREEBSD70  -  FREEBSD6  -  FREEBSD64  -  FREEBSD63  -  FREEBSD62  -  FREEBSD61  -  FREEBSD60  -  FREEBSD5  -  FREEBSD55  -  FREEBSD54  -  FREEBSD53  -  FREEBSD52  -  FREEBSD51  -  FREEBSD50  -  FREEBSD4  -  FREEBSD3  -  FREEBSD22  -  cheribsd  -  linux-2.6  -  linux-2.4.22  -  MK83  -  MK84  -  PLAN9  -  DFBSD  -  NETBSD  -  NETBSD5  -  NETBSD4  -  NETBSD3  -  NETBSD20  -  OPENBSD  -  xnu-517  -  xnu-792  -  xnu-792.6.70  -  xnu-1228  -  xnu-1456.1.26  -  xnu-1699.24.8  -  xnu-2050.18.24  -  OPENSOLARIS  -  minix-3-1-1  -  FREEBSD-LIBC  -  FREEBSD8-LIBC  -  FREEBSD7-LIBC  -  FREEBSD6-LIBC  -  GLIBC27 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2000-2001 Boris Popov
    3  * All rights reserved.
    4  *
    5  * Redistribution and use in source and binary forms, with or without
    6  * modification, are permitted provided that the following conditions
    7  * are met:
    8  * 1. Redistributions of source code must retain the above copyright
    9  *    notice, this list of conditions and the following disclaimer.
   10  * 2. Redistributions in binary form must reproduce the above copyright
   11  *    notice, this list of conditions and the following disclaimer in the
   12  *    documentation and/or other materials provided with the distribution.
   13  *
   14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   24  * SUCH DAMAGE.
   25  */
   26 
   27 #include <sys/cdefs.h>
   28 __FBSDID("$FreeBSD: stable/9/sys/netsmb/smb_trantcp.c 206361 2010-04-07 16:50:38Z joel $");
   29 
   30 #include <sys/param.h>
   31 #include <sys/condvar.h>
   32 #include <sys/kernel.h>
   33 #include <sys/lock.h>
   34 #include <sys/malloc.h>
   35 #include <sys/mbuf.h>
   36 #include <sys/poll.h>
   37 #include <sys/proc.h>
   38 #include <sys/protosw.h>
   39 #include <sys/signalvar.h>
   40 #include <sys/socket.h>
   41 #include <sys/socketvar.h>
   42 #include <sys/sx.h>
   43 #include <sys/sysctl.h>
   44 #include <sys/systm.h>
   45 #include <sys/uio.h>
   46 
   47 #include <net/if.h>
   48 #include <net/route.h>
   49 
   50 #include <netinet/in.h>
   51 #include <netinet/tcp.h>
   52 
   53 #include <sys/mchain.h>
   54 
   55 #include <netsmb/netbios.h>
   56 
   57 #include <netsmb/smb.h>
   58 #include <netsmb/smb_conn.h>
   59 #include <netsmb/smb_tran.h>
   60 #include <netsmb/smb_trantcp.h>
   61 #include <netsmb/smb_subr.h>
   62 
   63 #define M_NBDATA        M_PCB
   64 
   65 static int smb_tcpsndbuf = NB_SNDQ - 1;
   66 static int smb_tcprcvbuf = NB_RCVQ - 1;
   67 
   68 SYSCTL_DECL(_net_smb);
   69 SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
   70 SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
   71 
   72 #define nb_sosend(so,m,flags,td) sosend(so, NULL, 0, m, 0, flags, td)
   73 
   74 static int  nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
   75         u_int8_t *rpcodep, struct thread *td);
   76 static int  smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
   77 
   78 static int
   79 nb_setsockopt_int(struct socket *so, int level, int name, int val)
   80 {
   81         struct sockopt sopt;
   82 
   83         bzero(&sopt, sizeof(sopt));
   84         sopt.sopt_level = level;
   85         sopt.sopt_name = name;
   86         sopt.sopt_val = &val;
   87         sopt.sopt_valsize = sizeof(val);
   88         return sosetopt(so, &sopt);
   89 }
   90 
   91 static int
   92 nb_intr(struct nbpcb *nbp, struct proc *p)
   93 {
   94         return 0;
   95 }
   96 
   97 static int
   98 nb_upcall(struct socket *so, void *arg, int waitflag)
   99 {
  100         struct nbpcb *nbp = arg;
  101 
  102         if (arg == NULL || nbp->nbp_selectid == NULL)
  103                 return (SU_OK);
  104         wakeup(nbp->nbp_selectid);
  105         return (SU_OK);
  106 }
  107 
  108 static int
  109 nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
  110 {
  111         u_int32_t *p = mtod(m, u_int32_t *);
  112 
  113         *p = htonl((len & 0x1FFFF) | (type << 24));
  114         return 0;
  115 }
  116 
  117 static int
  118 nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
  119 {
  120         int error;
  121         u_char seglen, *cp;
  122 
  123         cp = snb->snb_name;
  124         if (*cp == 0)
  125                 return EINVAL;
  126         NBDEBUG("[%s]\n", cp);
  127         for (;;) {
  128                 seglen = (*cp) + 1;
  129                 error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
  130                 if (error)
  131                         return error;
  132                 if (seglen == 1)
  133                         break;
  134                 cp += seglen;
  135         }
  136         return 0;
  137 }
  138 
  139 static int
  140 nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
  141 {
  142         struct socket *so;
  143         int error, s;
  144 
  145         error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
  146             td->td_ucred, td);
  147         if (error)
  148                 return error;
  149         nbp->nbp_tso = so;
  150         SOCKBUF_LOCK(&so->so_rcv);
  151         soupcall_set(so, SO_RCV, nb_upcall, nbp);
  152         SOCKBUF_UNLOCK(&so->so_rcv);
  153         so->so_rcv.sb_timeo = (5 * hz);
  154         so->so_snd.sb_timeo = (5 * hz);
  155         error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
  156         if (error)
  157                 goto bad;
  158         nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
  159         nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
  160         SOCKBUF_LOCK(&so->so_rcv);
  161         so->so_rcv.sb_flags &= ~SB_NOINTR;
  162         SOCKBUF_UNLOCK(&so->so_rcv);
  163         SOCKBUF_LOCK(&so->so_snd);
  164         so->so_snd.sb_flags &= ~SB_NOINTR;
  165         SOCKBUF_UNLOCK(&so->so_snd);
  166         error = soconnect(so, (struct sockaddr*)to, td);
  167         if (error)
  168                 goto bad;
  169         s = splnet();
  170         while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
  171                 tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
  172                 if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
  173                         (error = nb_intr(nbp, td->td_proc)) != 0) {
  174                         so->so_state &= ~SS_ISCONNECTING;
  175                         splx(s);
  176                         goto bad;
  177                 }
  178         }
  179         if (so->so_error) {
  180                 error = so->so_error;
  181                 so->so_error = 0;
  182                 splx(s);
  183                 goto bad;
  184         }
  185         splx(s);
  186         return 0;
  187 bad:
  188         smb_nbst_disconnect(nbp->nbp_vc, td);
  189         return error;
  190 }
  191 
  192 static int
  193 nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
  194 {
  195         struct mbchain mb, *mbp = &mb;
  196         struct mdchain md, *mdp = &md;
  197         struct mbuf *m0;
  198         struct timeval tv;
  199         struct sockaddr_in sin;
  200         u_short port;
  201         u_int8_t rpcode;
  202         int error, rplen;
  203 
  204         error = mb_init(mbp);
  205         if (error)
  206                 return error;
  207         mb_put_uint32le(mbp, 0);
  208         nb_put_name(mbp, nbp->nbp_paddr);
  209         nb_put_name(mbp, nbp->nbp_laddr);
  210         nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
  211         error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
  212         if (!error) {
  213                 nbp->nbp_state = NBST_RQSENT;
  214         }
  215         mb_detach(mbp);
  216         mb_done(mbp);
  217         if (error)
  218                 return error;
  219         TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
  220         error = selsocket(nbp->nbp_tso, POLLIN, &tv, td);
  221         if (error == EWOULDBLOCK) {     /* Timeout */
  222                 NBDEBUG("initial request timeout\n");
  223                 return ETIMEDOUT;
  224         }
  225         if (error)                      /* restart or interrupt */
  226                 return error;
  227         error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
  228         if (error) {
  229                 NBDEBUG("recv() error %d\n", error);
  230                 return error;
  231         }
  232         /*
  233          * Process NETBIOS reply
  234          */
  235         if (m0)
  236                 md_initm(mdp, m0);
  237         error = 0;
  238         do {
  239                 if (rpcode == NB_SSN_POSRESP) {
  240                         nbp->nbp_state = NBST_SESSION;
  241                         nbp->nbp_flags |= NBF_CONNECTED;
  242                         break;
  243                 }
  244                 if (rpcode != NB_SSN_RTGRESP) {
  245                         error = ECONNABORTED;
  246                         break;
  247                 }
  248                 if (rplen != 6) {
  249                         error = ECONNABORTED;
  250                         break;
  251                 }
  252                 md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
  253                 md_get_uint16(mdp, &port);
  254                 sin.sin_port = port;
  255                 nbp->nbp_state = NBST_RETARGET;
  256                 smb_nbst_disconnect(nbp->nbp_vc, td);
  257                 error = nb_connect_in(nbp, &sin, td);
  258                 if (!error)
  259                         error = nbssn_rq_request(nbp, td);
  260                 if (error) {
  261                         smb_nbst_disconnect(nbp->nbp_vc, td);
  262                         break;
  263                 }
  264         } while(0);
  265         if (m0)
  266                 md_done(mdp);
  267         return error;
  268 }
  269 
  270 static int
  271 nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
  272         u_int8_t *rpcodep, int flags, struct thread *td)
  273 {
  274         struct socket *so = nbp->nbp_tso;
  275         struct uio auio;
  276         struct iovec aio;
  277         u_int32_t len;
  278         int error;
  279 
  280         aio.iov_base = (caddr_t)&len;
  281         aio.iov_len = sizeof(len);
  282         auio.uio_iov = &aio;
  283         auio.uio_iovcnt = 1;
  284         auio.uio_segflg = UIO_SYSSPACE;
  285         auio.uio_rw = UIO_READ;
  286         auio.uio_offset = 0;
  287         auio.uio_resid = sizeof(len);
  288         auio.uio_td = td;
  289         error = soreceive(so, (struct sockaddr **)NULL, &auio,
  290             (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
  291         if (error)
  292                 return error;
  293         if (auio.uio_resid > 0) {
  294                 SMBSDEBUG("short reply\n");
  295                 return EPIPE;
  296         }
  297         len = ntohl(len);
  298         *rpcodep = (len >> 24) & 0xFF;
  299         len &= 0x1ffff;
  300         if (len > SMB_MAXPKTLEN) {
  301                 SMBERROR("packet too long (%d)\n", len);
  302                 return EFBIG;
  303         }
  304         *lenp = len;
  305         return 0;
  306 }
  307 
  308 static int
  309 nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
  310         u_int8_t *rpcodep, struct thread *td)
  311 {
  312         struct socket *so = nbp->nbp_tso;
  313         struct uio auio;
  314         struct mbuf *m, *tm, *im;
  315         u_int8_t rpcode;
  316         int len, resid;
  317         int error, rcvflg;
  318 
  319         if (so == NULL)
  320                 return ENOTCONN;
  321 
  322         if (mpp)
  323                 *mpp = NULL;
  324         m = NULL;
  325         for(;;) {
  326                 /*
  327                  * Poll for a response header.
  328                  * If we don't have one waiting, return.
  329                  */
  330                 len = 0;
  331                 rpcode = 0;
  332                 error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
  333                 if ((so->so_state & (SS_ISDISCONNECTING | SS_ISDISCONNECTED)) ||
  334                     (so->so_rcv.sb_state & SBS_CANTRCVMORE)) {
  335                         nbp->nbp_state = NBST_CLOSED;
  336                         NBDEBUG("session closed by peer\n");
  337                         return ECONNRESET;
  338                 }
  339                 if (error)
  340                         return error;
  341                 if (len == 0 && nbp->nbp_state != NBST_SESSION)
  342                         break;
  343                 /* no data, try again */
  344                 if (rpcode == NB_SSN_KEEPALIVE)
  345                         continue;
  346 
  347                 /*
  348                  * Loop, blocking, for data following the response header.
  349                  *
  350                  * Note that we can't simply block here with MSG_WAITALL for the
  351                  * entire response size, as it may be larger than the TCP
  352                  * slow-start window that the sender employs.  This will result
  353                  * in the sender stalling until the delayed ACK is sent, then
  354                  * resuming slow-start, resulting in very poor performance.
  355                  *
  356                  * Instead, we never request more than NB_SORECEIVE_CHUNK
  357                  * bytes at a time, resulting in an ack being pushed by
  358                  * the TCP code at the completion of each call.
  359                  */
  360                 resid = len;
  361                 while (resid > 0) {
  362                         tm = NULL;
  363                         rcvflg = MSG_WAITALL;
  364                         bzero(&auio, sizeof(auio));
  365                         auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
  366                         auio.uio_td = td;
  367                         resid -= auio.uio_resid;
  368                         /*
  369                          * Spin until we have collected everything in
  370                          * this chunk.
  371                          */
  372                         do {
  373                                 rcvflg = MSG_WAITALL;
  374                                 error = soreceive(so, (struct sockaddr **)NULL,
  375                                     &auio, &tm, (struct mbuf **)NULL, &rcvflg);
  376                         } while (error == EWOULDBLOCK || error == EINTR ||
  377                                  error == ERESTART);
  378                         if (error)
  379                                 goto out;
  380                         /* short return guarantees unhappiness */
  381                         if (auio.uio_resid > 0) {
  382                                 SMBERROR("packet is shorter than expected\n");
  383                                 error = EPIPE;
  384                                 goto out;
  385                         }
  386                         /* append received chunk to previous chunk(s) */
  387                         if (m == NULL) {
  388                                 m = tm;
  389                         } else {
  390                                 /*
  391                                  * Just glue the new chain on the end.
  392                                  * Consumer will pullup as required.
  393                                  */
  394                                 for (im = m; im->m_next != NULL; im = im->m_next)
  395                                         ;
  396                                 im->m_next = tm;
  397                         }
  398                 }
  399                 /* got a session/message packet? */
  400                 if (nbp->nbp_state == NBST_SESSION &&
  401                     rpcode == NB_SSN_MESSAGE)
  402                         break;
  403                 /* drop packet and try for another */
  404                 NBDEBUG("non-session packet %x\n", rpcode);
  405                 if (m) {
  406                         m_freem(m);
  407                         m = NULL;
  408                 }
  409         }
  410 
  411 out:
  412         if (error) {
  413                 if (m)
  414                         m_freem(m);
  415                 return error;
  416         }
  417         if (mpp)
  418                 *mpp = m;
  419         else
  420                 m_freem(m);
  421         *lenp = len;
  422         *rpcodep = rpcode;
  423         return 0;
  424 }
  425 
  426 /*
  427  * SMB transport interface
  428  */
  429 static int
  430 smb_nbst_create(struct smb_vc *vcp, struct thread *td)
  431 {
  432         struct nbpcb *nbp;
  433 
  434         nbp = malloc(sizeof *nbp, M_NBDATA, M_WAITOK);
  435         bzero(nbp, sizeof *nbp);
  436         nbp->nbp_timo.tv_sec = 15;      /* XXX: sysctl ? */
  437         nbp->nbp_state = NBST_CLOSED;
  438         nbp->nbp_vc = vcp;
  439         nbp->nbp_sndbuf = smb_tcpsndbuf;
  440         nbp->nbp_rcvbuf = smb_tcprcvbuf;
  441         vcp->vc_tdata = nbp;
  442         return 0;
  443 }
  444 
  445 static int
  446 smb_nbst_done(struct smb_vc *vcp, struct thread *td)
  447 {
  448         struct nbpcb *nbp = vcp->vc_tdata;
  449 
  450         if (nbp == NULL)
  451                 return ENOTCONN;
  452         smb_nbst_disconnect(vcp, td);
  453         if (nbp->nbp_laddr)
  454                 free(nbp->nbp_laddr, M_SONAME);
  455         if (nbp->nbp_paddr)
  456                 free(nbp->nbp_paddr, M_SONAME);
  457         free(nbp, M_NBDATA);
  458         return 0;
  459 }
  460 
  461 static int
  462 smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
  463 {
  464         struct nbpcb *nbp = vcp->vc_tdata;
  465         struct sockaddr_nb *snb;
  466         int error, slen;
  467 
  468         NBDEBUG("\n");
  469         error = EINVAL;
  470         do {
  471                 if (nbp->nbp_flags & NBF_LOCADDR)
  472                         break;
  473                 /*
  474                  * It is possible to create NETBIOS name in the kernel,
  475                  * but nothing prevents us to do it in the user space.
  476                  */
  477                 if (sap == NULL)
  478                         break;
  479                 slen = sap->sa_len;
  480                 if (slen < NB_MINSALEN)
  481                         break;
  482                 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
  483                 if (snb == NULL) {
  484                         error = ENOMEM;
  485                         break;
  486                 }
  487                 nbp->nbp_laddr = snb;
  488                 nbp->nbp_flags |= NBF_LOCADDR;
  489                 error = 0;
  490         } while(0);
  491         return error;
  492 }
  493 
  494 static int
  495 smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
  496 {
  497         struct nbpcb *nbp = vcp->vc_tdata;
  498         struct sockaddr_in sin;
  499         struct sockaddr_nb *snb;
  500         struct timespec ts1, ts2;
  501         int error, slen;
  502 
  503         NBDEBUG("\n");
  504         if (nbp->nbp_tso != NULL)
  505                 return EISCONN;
  506         if (nbp->nbp_laddr == NULL)
  507                 return EINVAL;
  508         slen = sap->sa_len;
  509         if (slen < NB_MINSALEN)
  510                 return EINVAL;
  511         if (nbp->nbp_paddr) {
  512                 free(nbp->nbp_paddr, M_SONAME);
  513                 nbp->nbp_paddr = NULL;
  514         }
  515         snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
  516         if (snb == NULL)
  517                 return ENOMEM;
  518         nbp->nbp_paddr = snb;
  519         sin = snb->snb_addrin;
  520         getnanotime(&ts1);
  521         error = nb_connect_in(nbp, &sin, td);
  522         if (error)
  523                 return error;
  524         getnanotime(&ts2);
  525         timespecsub(&ts2, &ts1);
  526         if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
  527                 ts2.tv_sec = 1;
  528         nbp->nbp_timo = ts2;
  529         timespecadd(&nbp->nbp_timo, &ts2);
  530         timespecadd(&nbp->nbp_timo, &ts2);
  531         timespecadd(&nbp->nbp_timo, &ts2);      /*  * 4 */
  532         error = nbssn_rq_request(nbp, td);
  533         if (error)
  534                 smb_nbst_disconnect(vcp, td);
  535         return error;
  536 }
  537 
  538 static int
  539 smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
  540 {
  541         struct nbpcb *nbp = vcp->vc_tdata;
  542         struct socket *so;
  543 
  544         if (nbp == NULL || nbp->nbp_tso == NULL)
  545                 return ENOTCONN;
  546         if ((so = nbp->nbp_tso) != NULL) {
  547                 nbp->nbp_flags &= ~NBF_CONNECTED;
  548                 nbp->nbp_tso = (struct socket *)NULL;
  549                 soshutdown(so, 2);
  550                 soclose(so);
  551         }
  552         if (nbp->nbp_state != NBST_RETARGET) {
  553                 nbp->nbp_state = NBST_CLOSED;
  554         }
  555         return 0;
  556 }
  557 
  558 static int
  559 smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
  560 {
  561         struct nbpcb *nbp = vcp->vc_tdata;
  562         int error;
  563 
  564         if (nbp->nbp_state != NBST_SESSION) {
  565                 error = ENOTCONN;
  566                 goto abort;
  567         }
  568         M_PREPEND(m0, 4, M_WAIT);
  569         nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
  570         error = nb_sosend(nbp->nbp_tso, m0, 0, td);
  571         return error;
  572 abort:
  573         if (m0)
  574                 m_freem(m0);
  575         return error;
  576 }
  577 
  578 
  579 static int
  580 smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
  581 {
  582         struct nbpcb *nbp = vcp->vc_tdata;
  583         u_int8_t rpcode;
  584         int error, rplen;
  585 
  586         nbp->nbp_flags |= NBF_RECVLOCK;
  587         error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
  588         nbp->nbp_flags &= ~NBF_RECVLOCK;
  589         return error;
  590 }
  591 
  592 static void
  593 smb_nbst_timo(struct smb_vc *vcp)
  594 {
  595         return;
  596 }
  597 
  598 static void
  599 smb_nbst_intr(struct smb_vc *vcp)
  600 {
  601         struct nbpcb *nbp = vcp->vc_tdata;
  602 
  603         if (nbp == NULL || nbp->nbp_tso == NULL)
  604                 return;
  605         sorwakeup(nbp->nbp_tso);
  606         sowwakeup(nbp->nbp_tso);
  607 }
  608 
  609 static int
  610 smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
  611 {
  612         struct nbpcb *nbp = vcp->vc_tdata;
  613 
  614         switch (param) {
  615             case SMBTP_SNDSZ:
  616                 *(int*)data = nbp->nbp_sndbuf;
  617                 break;
  618             case SMBTP_RCVSZ:
  619                 *(int*)data = nbp->nbp_rcvbuf;
  620                 break;
  621             case SMBTP_TIMEOUT:
  622                 *(struct timespec*)data = nbp->nbp_timo;
  623                 break;
  624             default:
  625                 return EINVAL;
  626         }
  627         return 0;
  628 }
  629 
  630 static int
  631 smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
  632 {
  633         struct nbpcb *nbp = vcp->vc_tdata;
  634 
  635         switch (param) {
  636             case SMBTP_SELECTID:
  637                 nbp->nbp_selectid = data;
  638                 break;
  639             default:
  640                 return EINVAL;
  641         }
  642         return 0;
  643 }
  644 
  645 /*
  646  * Check for fatal errors
  647  */
  648 static int
  649 smb_nbst_fatal(struct smb_vc *vcp, int error)
  650 {
  651         switch (error) {
  652             case ENOTCONN:
  653             case ENETRESET:
  654             case ECONNABORTED:
  655                 return 1;
  656         }
  657         return 0;
  658 }
  659 
  660 
  661 struct smb_tran_desc smb_tran_nbtcp_desc = {
  662         SMBT_NBTCP,
  663         smb_nbst_create, smb_nbst_done,
  664         smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
  665         smb_nbst_send, smb_nbst_recv,
  666         smb_nbst_timo, smb_nbst_intr,
  667         smb_nbst_getparam, smb_nbst_setparam,
  668         smb_nbst_fatal
  669 };
  670 

Cache object: c4cfd1f6d883d1190ab8e3096bbb9562


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.