Deleted Added
full compact
smb_trantcp.c (126425) smb_trantcp.c (130480)
1/*
2 * Copyright (c) 2000-2001 Boris Popov
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by Boris Popov.
16 * 4. Neither the name of the author nor the names of any co-contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33#include <sys/cdefs.h>
1/*
2 * Copyright (c) 2000-2001 Boris Popov
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by Boris Popov.
16 * 4. Neither the name of the author nor the names of any co-contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33#include <sys/cdefs.h>
34__FBSDID("$FreeBSD: head/sys/netsmb/smb_trantcp.c 126425 2004-03-01 03:14:23Z rwatson $");
34__FBSDID("$FreeBSD: head/sys/netsmb/smb_trantcp.c 130480 2004-06-14 18:16:22Z rwatson $");
35
36#include <sys/param.h>
37#include <sys/condvar.h>
38#include <sys/kernel.h>
39#include <sys/lock.h>
40#include <sys/malloc.h>
41#include <sys/mbuf.h>
42#include <sys/poll.h>
43#include <sys/proc.h>
44#include <sys/protosw.h>
45#include <sys/signalvar.h>
46#include <sys/socket.h>
47#include <sys/socketvar.h>
48#include <sys/sx.h>
49#include <sys/sysctl.h>
50#include <sys/systm.h>
51#include <sys/uio.h>
52
53#include <net/if.h>
54#include <net/route.h>
55
56#include <netinet/in.h>
57#include <netinet/tcp.h>
58
59#include <sys/mchain.h>
60
61#include <netsmb/netbios.h>
62
63#include <netsmb/smb.h>
64#include <netsmb/smb_conn.h>
65#include <netsmb/smb_tran.h>
66#include <netsmb/smb_trantcp.h>
67#include <netsmb/smb_subr.h>
68
69#define M_NBDATA M_PCB
70
71static int smb_tcpsndbuf = NB_SNDQ - 1;
72static int smb_tcprcvbuf = NB_RCVQ - 1;
73
74SYSCTL_DECL(_net_smb);
75SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
76SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
77
78#define nb_sosend(so,m,flags,td) (so)->so_proto->pr_usrreqs->pru_sosend( \
79 so, NULL, 0, m, 0, flags, td)
80
81static int nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
82 u_int8_t *rpcodep, struct thread *td);
83static int smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
84
85static int
86nb_setsockopt_int(struct socket *so, int level, int name, int val)
87{
88 struct sockopt sopt;
89
90 bzero(&sopt, sizeof(sopt));
91 sopt.sopt_level = level;
92 sopt.sopt_name = name;
93 sopt.sopt_val = &val;
94 sopt.sopt_valsize = sizeof(val);
95 return sosetopt(so, &sopt);
96}
97
98static __inline int
99nb_poll(struct nbpcb *nbp, int events, struct thread *td)
100{
101 return nbp->nbp_tso->so_proto->pr_usrreqs->pru_sopoll(nbp->nbp_tso,
102 events, NULL, td);
103}
104
105static int
106nbssn_rselect(struct nbpcb *nbp, struct timeval *tv, int events,
107 struct thread *td)
108{
109 struct timeval atv, rtv, ttv;
110 int ncoll, timo, error;
111
112 if (tv) {
113 atv = *tv;
114 if (itimerfix(&atv)) {
115 error = EINVAL;
116 goto done_noproclock;
117 }
118 getmicrouptime(&rtv);
119 timevaladd(&atv, &rtv);
120 }
121 timo = 0;
122 mtx_lock(&sellock);
123retry:
124
125 ncoll = nselcoll;
126 mtx_lock_spin(&sched_lock);
127 td->td_flags |= TDF_SELECT;
128 mtx_unlock_spin(&sched_lock);
129 mtx_unlock(&sellock);
130
131 /* XXX: Should be done when the thread is initialized. */
132 TAILQ_INIT(&td->td_selq);
133 error = nb_poll(nbp, events, td);
134 mtx_lock(&sellock);
135 if (error) {
136 error = 0;
137 goto done;
138 }
139 if (tv) {
140 getmicrouptime(&rtv);
141 if (timevalcmp(&rtv, &atv, >=))
142 goto done;
143 ttv = atv;
144 timevalsub(&ttv, &rtv);
145 timo = tvtohz(&ttv);
146 }
147 /*
148 * An event of our interest may occur during locking a process.
149 * In order to avoid missing the event that occurred during locking
150 * the process, test P_SELECT and rescan file descriptors if
151 * necessary.
152 */
153 mtx_lock_spin(&sched_lock);
154 if ((td->td_flags & TDF_SELECT) == 0 || nselcoll != ncoll) {
155 mtx_unlock_spin(&sched_lock);
156 goto retry;
157 }
158 mtx_unlock_spin(&sched_lock);
159
160 if (timo > 0)
161 error = cv_timedwait(&selwait, &sellock, timo);
162 else {
163 cv_wait(&selwait, &sellock);
164 error = 0;
165 }
166
167done:
168 clear_selinfo_list(td);
169
170 mtx_lock_spin(&sched_lock);
171 td->td_flags &= ~TDF_SELECT;
172 mtx_unlock_spin(&sched_lock);
173 mtx_unlock(&sellock);
174
175done_noproclock:
176 if (error == ERESTART)
177 return 0;
178 return error;
179}
180
181static int
182nb_intr(struct nbpcb *nbp, struct proc *p)
183{
184 return 0;
185}
186
187static void
188nb_upcall(struct socket *so, void *arg, int waitflag)
189{
190 struct nbpcb *nbp = arg;
191
192 if (arg == NULL || nbp->nbp_selectid == NULL)
193 return;
194 wakeup(nbp->nbp_selectid);
195}
196
197static int
198nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
199{
200 u_int32_t *p = mtod(m, u_int32_t *);
201
202 *p = htonl((len & 0x1FFFF) | (type << 24));
203 return 0;
204}
205
206static int
207nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
208{
209 int error;
210 u_char seglen, *cp;
211
212 cp = snb->snb_name;
213 if (*cp == 0)
214 return EINVAL;
215 NBDEBUG("[%s]\n", cp);
216 for (;;) {
217 seglen = (*cp) + 1;
218 error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
219 if (error)
220 return error;
221 if (seglen == 1)
222 break;
223 cp += seglen;
224 }
225 return 0;
226}
227
228static int
229nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
230{
231 struct socket *so;
232 int error, s;
233
234 error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
235 td->td_ucred, td);
236 if (error)
237 return error;
238 nbp->nbp_tso = so;
239 so->so_upcallarg = (caddr_t)nbp;
240 so->so_upcall = nb_upcall;
241 so->so_rcv.sb_flags |= SB_UPCALL;
242 so->so_rcv.sb_timeo = (5 * hz);
243 so->so_snd.sb_timeo = (5 * hz);
244 error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
245 if (error)
246 goto bad;
247 nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
248 nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
249 so->so_rcv.sb_flags &= ~SB_NOINTR;
250 so->so_snd.sb_flags &= ~SB_NOINTR;
251 error = soconnect(so, (struct sockaddr*)to, td);
252 if (error)
253 goto bad;
254 s = splnet();
255 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
256 tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
257 if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
258 (error = nb_intr(nbp, td->td_proc)) != 0) {
259 so->so_state &= ~SS_ISCONNECTING;
260 splx(s);
261 goto bad;
262 }
263 }
264 if (so->so_error) {
265 error = so->so_error;
266 so->so_error = 0;
267 splx(s);
268 goto bad;
269 }
270 splx(s);
271 return 0;
272bad:
273 smb_nbst_disconnect(nbp->nbp_vc, td);
274 return error;
275}
276
277static int
278nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
279{
280 struct mbchain mb, *mbp = &mb;
281 struct mdchain md, *mdp = &md;
282 struct mbuf *m0;
283 struct timeval tv;
284 struct sockaddr_in sin;
285 u_short port;
286 u_int8_t rpcode;
287 int error, rplen;
288
289 error = mb_init(mbp);
290 if (error)
291 return error;
292 mb_put_uint32le(mbp, 0);
293 nb_put_name(mbp, nbp->nbp_paddr);
294 nb_put_name(mbp, nbp->nbp_laddr);
295 nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
296 error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
297 if (!error) {
298 nbp->nbp_state = NBST_RQSENT;
299 }
300 mb_detach(mbp);
301 mb_done(mbp);
302 if (error)
303 return error;
304 TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
305 error = nbssn_rselect(nbp, &tv, POLLIN, td);
306 if (error == EWOULDBLOCK) { /* Timeout */
307 NBDEBUG("initial request timeout\n");
308 return ETIMEDOUT;
309 }
310 if (error) /* restart or interrupt */
311 return error;
312 error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
313 if (error) {
314 NBDEBUG("recv() error %d\n", error);
315 return error;
316 }
317 /*
318 * Process NETBIOS reply
319 */
320 if (m0)
321 md_initm(mdp, m0);
322 error = 0;
323 do {
324 if (rpcode == NB_SSN_POSRESP) {
325 nbp->nbp_state = NBST_SESSION;
326 nbp->nbp_flags |= NBF_CONNECTED;
327 break;
328 }
329 if (rpcode != NB_SSN_RTGRESP) {
330 error = ECONNABORTED;
331 break;
332 }
333 if (rplen != 6) {
334 error = ECONNABORTED;
335 break;
336 }
337 md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
338 md_get_uint16(mdp, &port);
339 sin.sin_port = port;
340 nbp->nbp_state = NBST_RETARGET;
341 smb_nbst_disconnect(nbp->nbp_vc, td);
342 error = nb_connect_in(nbp, &sin, td);
343 if (!error)
344 error = nbssn_rq_request(nbp, td);
345 if (error) {
346 smb_nbst_disconnect(nbp->nbp_vc, td);
347 break;
348 }
349 } while(0);
350 if (m0)
351 md_done(mdp);
352 return error;
353}
354
355static int
356nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
357 u_int8_t *rpcodep, int flags, struct thread *td)
358{
359 struct socket *so = nbp->nbp_tso;
360 struct uio auio;
361 struct iovec aio;
362 u_int32_t len;
363 int error;
364
365 aio.iov_base = (caddr_t)&len;
366 aio.iov_len = sizeof(len);
367 auio.uio_iov = &aio;
368 auio.uio_iovcnt = 1;
369 auio.uio_segflg = UIO_SYSSPACE;
370 auio.uio_rw = UIO_READ;
371 auio.uio_offset = 0;
372 auio.uio_resid = sizeof(len);
373 auio.uio_td = td;
374 error = so->so_proto->pr_usrreqs->pru_soreceive
375 (so, (struct sockaddr **)NULL, &auio,
376 (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
377 if (error)
378 return error;
379 if (auio.uio_resid > 0) {
380 SMBSDEBUG("short reply\n");
381 return EPIPE;
382 }
383 len = ntohl(len);
384 *rpcodep = (len >> 24) & 0xFF;
385 len &= 0x1ffff;
386 if (len > SMB_MAXPKTLEN) {
387 SMBERROR("packet too long (%d)\n", len);
388 return EFBIG;
389 }
390 *lenp = len;
391 return 0;
392}
393
394static int
395nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
396 u_int8_t *rpcodep, struct thread *td)
397{
398 struct socket *so = nbp->nbp_tso;
399 struct uio auio;
400 struct mbuf *m, *tm, *im;
401 u_int8_t rpcode;
402 int len, resid;
403 int error, rcvflg;
404
405 if (so == NULL)
406 return ENOTCONN;
407
408 if (mpp)
409 *mpp = NULL;
410 m = NULL;
411 for(;;) {
412 /*
413 * Poll for a response header.
414 * If we don't have one waiting, return.
415 */
416 error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
35
36#include <sys/param.h>
37#include <sys/condvar.h>
38#include <sys/kernel.h>
39#include <sys/lock.h>
40#include <sys/malloc.h>
41#include <sys/mbuf.h>
42#include <sys/poll.h>
43#include <sys/proc.h>
44#include <sys/protosw.h>
45#include <sys/signalvar.h>
46#include <sys/socket.h>
47#include <sys/socketvar.h>
48#include <sys/sx.h>
49#include <sys/sysctl.h>
50#include <sys/systm.h>
51#include <sys/uio.h>
52
53#include <net/if.h>
54#include <net/route.h>
55
56#include <netinet/in.h>
57#include <netinet/tcp.h>
58
59#include <sys/mchain.h>
60
61#include <netsmb/netbios.h>
62
63#include <netsmb/smb.h>
64#include <netsmb/smb_conn.h>
65#include <netsmb/smb_tran.h>
66#include <netsmb/smb_trantcp.h>
67#include <netsmb/smb_subr.h>
68
69#define M_NBDATA M_PCB
70
71static int smb_tcpsndbuf = NB_SNDQ - 1;
72static int smb_tcprcvbuf = NB_RCVQ - 1;
73
74SYSCTL_DECL(_net_smb);
75SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
76SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
77
78#define nb_sosend(so,m,flags,td) (so)->so_proto->pr_usrreqs->pru_sosend( \
79 so, NULL, 0, m, 0, flags, td)
80
81static int nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
82 u_int8_t *rpcodep, struct thread *td);
83static int smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
84
85static int
86nb_setsockopt_int(struct socket *so, int level, int name, int val)
87{
88 struct sockopt sopt;
89
90 bzero(&sopt, sizeof(sopt));
91 sopt.sopt_level = level;
92 sopt.sopt_name = name;
93 sopt.sopt_val = &val;
94 sopt.sopt_valsize = sizeof(val);
95 return sosetopt(so, &sopt);
96}
97
98static __inline int
99nb_poll(struct nbpcb *nbp, int events, struct thread *td)
100{
101 return nbp->nbp_tso->so_proto->pr_usrreqs->pru_sopoll(nbp->nbp_tso,
102 events, NULL, td);
103}
104
105static int
106nbssn_rselect(struct nbpcb *nbp, struct timeval *tv, int events,
107 struct thread *td)
108{
109 struct timeval atv, rtv, ttv;
110 int ncoll, timo, error;
111
112 if (tv) {
113 atv = *tv;
114 if (itimerfix(&atv)) {
115 error = EINVAL;
116 goto done_noproclock;
117 }
118 getmicrouptime(&rtv);
119 timevaladd(&atv, &rtv);
120 }
121 timo = 0;
122 mtx_lock(&sellock);
123retry:
124
125 ncoll = nselcoll;
126 mtx_lock_spin(&sched_lock);
127 td->td_flags |= TDF_SELECT;
128 mtx_unlock_spin(&sched_lock);
129 mtx_unlock(&sellock);
130
131 /* XXX: Should be done when the thread is initialized. */
132 TAILQ_INIT(&td->td_selq);
133 error = nb_poll(nbp, events, td);
134 mtx_lock(&sellock);
135 if (error) {
136 error = 0;
137 goto done;
138 }
139 if (tv) {
140 getmicrouptime(&rtv);
141 if (timevalcmp(&rtv, &atv, >=))
142 goto done;
143 ttv = atv;
144 timevalsub(&ttv, &rtv);
145 timo = tvtohz(&ttv);
146 }
147 /*
148 * An event of our interest may occur during locking a process.
149 * In order to avoid missing the event that occurred during locking
150 * the process, test P_SELECT and rescan file descriptors if
151 * necessary.
152 */
153 mtx_lock_spin(&sched_lock);
154 if ((td->td_flags & TDF_SELECT) == 0 || nselcoll != ncoll) {
155 mtx_unlock_spin(&sched_lock);
156 goto retry;
157 }
158 mtx_unlock_spin(&sched_lock);
159
160 if (timo > 0)
161 error = cv_timedwait(&selwait, &sellock, timo);
162 else {
163 cv_wait(&selwait, &sellock);
164 error = 0;
165 }
166
167done:
168 clear_selinfo_list(td);
169
170 mtx_lock_spin(&sched_lock);
171 td->td_flags &= ~TDF_SELECT;
172 mtx_unlock_spin(&sched_lock);
173 mtx_unlock(&sellock);
174
175done_noproclock:
176 if (error == ERESTART)
177 return 0;
178 return error;
179}
180
181static int
182nb_intr(struct nbpcb *nbp, struct proc *p)
183{
184 return 0;
185}
186
187static void
188nb_upcall(struct socket *so, void *arg, int waitflag)
189{
190 struct nbpcb *nbp = arg;
191
192 if (arg == NULL || nbp->nbp_selectid == NULL)
193 return;
194 wakeup(nbp->nbp_selectid);
195}
196
197static int
198nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
199{
200 u_int32_t *p = mtod(m, u_int32_t *);
201
202 *p = htonl((len & 0x1FFFF) | (type << 24));
203 return 0;
204}
205
206static int
207nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
208{
209 int error;
210 u_char seglen, *cp;
211
212 cp = snb->snb_name;
213 if (*cp == 0)
214 return EINVAL;
215 NBDEBUG("[%s]\n", cp);
216 for (;;) {
217 seglen = (*cp) + 1;
218 error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
219 if (error)
220 return error;
221 if (seglen == 1)
222 break;
223 cp += seglen;
224 }
225 return 0;
226}
227
228static int
229nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
230{
231 struct socket *so;
232 int error, s;
233
234 error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
235 td->td_ucred, td);
236 if (error)
237 return error;
238 nbp->nbp_tso = so;
239 so->so_upcallarg = (caddr_t)nbp;
240 so->so_upcall = nb_upcall;
241 so->so_rcv.sb_flags |= SB_UPCALL;
242 so->so_rcv.sb_timeo = (5 * hz);
243 so->so_snd.sb_timeo = (5 * hz);
244 error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
245 if (error)
246 goto bad;
247 nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
248 nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
249 so->so_rcv.sb_flags &= ~SB_NOINTR;
250 so->so_snd.sb_flags &= ~SB_NOINTR;
251 error = soconnect(so, (struct sockaddr*)to, td);
252 if (error)
253 goto bad;
254 s = splnet();
255 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
256 tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
257 if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
258 (error = nb_intr(nbp, td->td_proc)) != 0) {
259 so->so_state &= ~SS_ISCONNECTING;
260 splx(s);
261 goto bad;
262 }
263 }
264 if (so->so_error) {
265 error = so->so_error;
266 so->so_error = 0;
267 splx(s);
268 goto bad;
269 }
270 splx(s);
271 return 0;
272bad:
273 smb_nbst_disconnect(nbp->nbp_vc, td);
274 return error;
275}
276
277static int
278nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
279{
280 struct mbchain mb, *mbp = &mb;
281 struct mdchain md, *mdp = &md;
282 struct mbuf *m0;
283 struct timeval tv;
284 struct sockaddr_in sin;
285 u_short port;
286 u_int8_t rpcode;
287 int error, rplen;
288
289 error = mb_init(mbp);
290 if (error)
291 return error;
292 mb_put_uint32le(mbp, 0);
293 nb_put_name(mbp, nbp->nbp_paddr);
294 nb_put_name(mbp, nbp->nbp_laddr);
295 nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
296 error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
297 if (!error) {
298 nbp->nbp_state = NBST_RQSENT;
299 }
300 mb_detach(mbp);
301 mb_done(mbp);
302 if (error)
303 return error;
304 TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
305 error = nbssn_rselect(nbp, &tv, POLLIN, td);
306 if (error == EWOULDBLOCK) { /* Timeout */
307 NBDEBUG("initial request timeout\n");
308 return ETIMEDOUT;
309 }
310 if (error) /* restart or interrupt */
311 return error;
312 error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
313 if (error) {
314 NBDEBUG("recv() error %d\n", error);
315 return error;
316 }
317 /*
318 * Process NETBIOS reply
319 */
320 if (m0)
321 md_initm(mdp, m0);
322 error = 0;
323 do {
324 if (rpcode == NB_SSN_POSRESP) {
325 nbp->nbp_state = NBST_SESSION;
326 nbp->nbp_flags |= NBF_CONNECTED;
327 break;
328 }
329 if (rpcode != NB_SSN_RTGRESP) {
330 error = ECONNABORTED;
331 break;
332 }
333 if (rplen != 6) {
334 error = ECONNABORTED;
335 break;
336 }
337 md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
338 md_get_uint16(mdp, &port);
339 sin.sin_port = port;
340 nbp->nbp_state = NBST_RETARGET;
341 smb_nbst_disconnect(nbp->nbp_vc, td);
342 error = nb_connect_in(nbp, &sin, td);
343 if (!error)
344 error = nbssn_rq_request(nbp, td);
345 if (error) {
346 smb_nbst_disconnect(nbp->nbp_vc, td);
347 break;
348 }
349 } while(0);
350 if (m0)
351 md_done(mdp);
352 return error;
353}
354
355static int
356nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
357 u_int8_t *rpcodep, int flags, struct thread *td)
358{
359 struct socket *so = nbp->nbp_tso;
360 struct uio auio;
361 struct iovec aio;
362 u_int32_t len;
363 int error;
364
365 aio.iov_base = (caddr_t)&len;
366 aio.iov_len = sizeof(len);
367 auio.uio_iov = &aio;
368 auio.uio_iovcnt = 1;
369 auio.uio_segflg = UIO_SYSSPACE;
370 auio.uio_rw = UIO_READ;
371 auio.uio_offset = 0;
372 auio.uio_resid = sizeof(len);
373 auio.uio_td = td;
374 error = so->so_proto->pr_usrreqs->pru_soreceive
375 (so, (struct sockaddr **)NULL, &auio,
376 (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
377 if (error)
378 return error;
379 if (auio.uio_resid > 0) {
380 SMBSDEBUG("short reply\n");
381 return EPIPE;
382 }
383 len = ntohl(len);
384 *rpcodep = (len >> 24) & 0xFF;
385 len &= 0x1ffff;
386 if (len > SMB_MAXPKTLEN) {
387 SMBERROR("packet too long (%d)\n", len);
388 return EFBIG;
389 }
390 *lenp = len;
391 return 0;
392}
393
394static int
395nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
396 u_int8_t *rpcodep, struct thread *td)
397{
398 struct socket *so = nbp->nbp_tso;
399 struct uio auio;
400 struct mbuf *m, *tm, *im;
401 u_int8_t rpcode;
402 int len, resid;
403 int error, rcvflg;
404
405 if (so == NULL)
406 return ENOTCONN;
407
408 if (mpp)
409 *mpp = NULL;
410 m = NULL;
411 for(;;) {
412 /*
413 * Poll for a response header.
414 * If we don't have one waiting, return.
415 */
416 error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
417 if (so->so_state &
418 (SS_ISDISCONNECTING | SS_ISDISCONNECTED | SS_CANTRCVMORE)) {
417 if ((so->so_state & (SS_ISDISCONNECTING | SS_ISDISCONNECTED)) ||
418 (so->so_rcv.sb_state & SBS_CANTRCVMORE)) {
419 nbp->nbp_state = NBST_CLOSED;
420 NBDEBUG("session closed by peer\n");
421 return ECONNRESET;
422 }
423 if (error)
424 return error;
425 if (len == 0 && nbp->nbp_state != NBST_SESSION)
426 break;
427 /* no data, try again */
428 if (rpcode == NB_SSN_KEEPALIVE)
429 continue;
430
431 /*
432 * Loop, blocking, for data following the response header.
433 *
434 * Note that we can't simply block here with MSG_WAITALL for the
435 * entire response size, as it may be larger than the TCP
436 * slow-start window that the sender employs. This will result
437 * in the sender stalling until the delayed ACK is sent, then
438 * resuming slow-start, resulting in very poor performance.
439 *
440 * Instead, we never request more than NB_SORECEIVE_CHUNK
441 * bytes at a time, resulting in an ack being pushed by
442 * the TCP code at the completion of each call.
443 */
444 resid = len;
445 while (resid > 0) {
446 tm = NULL;
447 rcvflg = MSG_WAITALL;
448 bzero(&auio, sizeof(auio));
449 auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
450 auio.uio_td = td;
451 resid -= auio.uio_resid;
452 /*
453 * Spin until we have collected everything in
454 * this chunk.
455 */
456 do {
457 rcvflg = MSG_WAITALL;
458 error = so->so_proto->pr_usrreqs->pru_soreceive
459 (so, (struct sockaddr **)NULL,
460 &auio, &tm, (struct mbuf **)NULL, &rcvflg);
461 } while (error == EWOULDBLOCK || error == EINTR ||
462 error == ERESTART);
463 if (error)
464 goto out;
465 /* short return guarantees unhappiness */
466 if (auio.uio_resid > 0) {
467 SMBERROR("packet is shorter than expected\n");
468 error = EPIPE;
469 goto out;
470 }
471 /* append received chunk to previous chunk(s) */
472 if (m == NULL) {
473 m = tm;
474 } else {
475 /*
476 * Just glue the new chain on the end.
477 * Consumer will pullup as required.
478 */
479 for (im = m; im->m_next != NULL; im = im->m_next)
480 ;
481 im->m_next = tm;
482 }
483 }
484 /* got a session/message packet? */
485 if (nbp->nbp_state == NBST_SESSION &&
486 rpcode == NB_SSN_MESSAGE)
487 break;
488 /* drop packet and try for another */
489 NBDEBUG("non-session packet %x\n", rpcode);
490 if (m) {
491 m_freem(m);
492 m = NULL;
493 }
494 }
495
496out:
497 if (error) {
498 if (m)
499 m_freem(m);
500 return error;
501 }
502 if (mpp)
503 *mpp = m;
504 else
505 m_freem(m);
506 *lenp = len;
507 *rpcodep = rpcode;
508 return 0;
509}
510
511/*
512 * SMB transport interface
513 */
514static int
515smb_nbst_create(struct smb_vc *vcp, struct thread *td)
516{
517 struct nbpcb *nbp;
518
519 MALLOC(nbp, struct nbpcb *, sizeof *nbp, M_NBDATA, M_WAITOK);
520 bzero(nbp, sizeof *nbp);
521 nbp->nbp_timo.tv_sec = 15; /* XXX: sysctl ? */
522 nbp->nbp_state = NBST_CLOSED;
523 nbp->nbp_vc = vcp;
524 nbp->nbp_sndbuf = smb_tcpsndbuf;
525 nbp->nbp_rcvbuf = smb_tcprcvbuf;
526 vcp->vc_tdata = nbp;
527 return 0;
528}
529
530static int
531smb_nbst_done(struct smb_vc *vcp, struct thread *td)
532{
533 struct nbpcb *nbp = vcp->vc_tdata;
534
535 if (nbp == NULL)
536 return ENOTCONN;
537 smb_nbst_disconnect(vcp, td);
538 if (nbp->nbp_laddr)
539 free(nbp->nbp_laddr, M_SONAME);
540 if (nbp->nbp_paddr)
541 free(nbp->nbp_paddr, M_SONAME);
542 free(nbp, M_NBDATA);
543 return 0;
544}
545
546static int
547smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
548{
549 struct nbpcb *nbp = vcp->vc_tdata;
550 struct sockaddr_nb *snb;
551 int error, slen;
552
553 NBDEBUG("\n");
554 error = EINVAL;
555 do {
556 if (nbp->nbp_flags & NBF_LOCADDR)
557 break;
558 /*
559 * It is possible to create NETBIOS name in the kernel,
560 * but nothing prevents us to do it in the user space.
561 */
562 if (sap == NULL)
563 break;
564 slen = sap->sa_len;
565 if (slen < NB_MINSALEN)
566 break;
567 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
568 if (snb == NULL) {
569 error = ENOMEM;
570 break;
571 }
572 nbp->nbp_laddr = snb;
573 nbp->nbp_flags |= NBF_LOCADDR;
574 error = 0;
575 } while(0);
576 return error;
577}
578
579static int
580smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
581{
582 struct nbpcb *nbp = vcp->vc_tdata;
583 struct sockaddr_in sin;
584 struct sockaddr_nb *snb;
585 struct timespec ts1, ts2;
586 int error, slen;
587
588 NBDEBUG("\n");
589 if (nbp->nbp_tso != NULL)
590 return EISCONN;
591 if (nbp->nbp_laddr == NULL)
592 return EINVAL;
593 slen = sap->sa_len;
594 if (slen < NB_MINSALEN)
595 return EINVAL;
596 if (nbp->nbp_paddr) {
597 free(nbp->nbp_paddr, M_SONAME);
598 nbp->nbp_paddr = NULL;
599 }
600 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
601 if (snb == NULL)
602 return ENOMEM;
603 nbp->nbp_paddr = snb;
604 sin = snb->snb_addrin;
605 getnanotime(&ts1);
606 error = nb_connect_in(nbp, &sin, td);
607 if (error)
608 return error;
609 getnanotime(&ts2);
610 timespecsub(&ts2, &ts1);
611 if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
612 ts2.tv_sec = 1;
613 nbp->nbp_timo = ts2;
614 timespecadd(&nbp->nbp_timo, &ts2);
615 timespecadd(&nbp->nbp_timo, &ts2);
616 timespecadd(&nbp->nbp_timo, &ts2); /* * 4 */
617 error = nbssn_rq_request(nbp, td);
618 if (error)
619 smb_nbst_disconnect(vcp, td);
620 return error;
621}
622
623static int
624smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
625{
626 struct nbpcb *nbp = vcp->vc_tdata;
627 struct socket *so;
628
629 if (nbp == NULL || nbp->nbp_tso == NULL)
630 return ENOTCONN;
631 if ((so = nbp->nbp_tso) != NULL) {
632 nbp->nbp_flags &= ~NBF_CONNECTED;
633 nbp->nbp_tso = (struct socket *)NULL;
634 soshutdown(so, 2);
635 soclose(so);
636 }
637 if (nbp->nbp_state != NBST_RETARGET) {
638 nbp->nbp_state = NBST_CLOSED;
639 }
640 return 0;
641}
642
643static int
644smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
645{
646 struct nbpcb *nbp = vcp->vc_tdata;
647 int error;
648
649 if (nbp->nbp_state != NBST_SESSION) {
650 error = ENOTCONN;
651 goto abort;
652 }
653 M_PREPEND(m0, 4, M_TRYWAIT);
654 if (m0 == NULL)
655 return ENOBUFS;
656 nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
657 error = nb_sosend(nbp->nbp_tso, m0, 0, td);
658 return error;
659abort:
660 if (m0)
661 m_freem(m0);
662 return error;
663}
664
665
666static int
667smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
668{
669 struct nbpcb *nbp = vcp->vc_tdata;
670 u_int8_t rpcode;
671 int error, rplen;
672
673 nbp->nbp_flags |= NBF_RECVLOCK;
674 error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
675 nbp->nbp_flags &= ~NBF_RECVLOCK;
676 return error;
677}
678
679static void
680smb_nbst_timo(struct smb_vc *vcp)
681{
682 return;
683}
684
685static void
686smb_nbst_intr(struct smb_vc *vcp)
687{
688 struct nbpcb *nbp = vcp->vc_tdata;
689
690 if (nbp == NULL || nbp->nbp_tso == NULL)
691 return;
692 sorwakeup(nbp->nbp_tso);
693 sowwakeup(nbp->nbp_tso);
694}
695
696static int
697smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
698{
699 struct nbpcb *nbp = vcp->vc_tdata;
700
701 switch (param) {
702 case SMBTP_SNDSZ:
703 *(int*)data = nbp->nbp_sndbuf;
704 break;
705 case SMBTP_RCVSZ:
706 *(int*)data = nbp->nbp_rcvbuf;
707 break;
708 case SMBTP_TIMEOUT:
709 *(struct timespec*)data = nbp->nbp_timo;
710 break;
711 default:
712 return EINVAL;
713 }
714 return 0;
715}
716
717static int
718smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
719{
720 struct nbpcb *nbp = vcp->vc_tdata;
721
722 switch (param) {
723 case SMBTP_SELECTID:
724 nbp->nbp_selectid = data;
725 break;
726 default:
727 return EINVAL;
728 }
729 return 0;
730}
731
732/*
733 * Check for fatal errors
734 */
735static int
736smb_nbst_fatal(struct smb_vc *vcp, int error)
737{
738 switch (error) {
739 case ENOTCONN:
740 case ENETRESET:
741 case ECONNABORTED:
742 return 1;
743 }
744 return 0;
745}
746
747
748struct smb_tran_desc smb_tran_nbtcp_desc = {
749 SMBT_NBTCP,
750 smb_nbst_create, smb_nbst_done,
751 smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
752 smb_nbst_send, smb_nbst_recv,
753 smb_nbst_timo, smb_nbst_intr,
754 smb_nbst_getparam, smb_nbst_setparam,
755 smb_nbst_fatal
756};
757
419 nbp->nbp_state = NBST_CLOSED;
420 NBDEBUG("session closed by peer\n");
421 return ECONNRESET;
422 }
423 if (error)
424 return error;
425 if (len == 0 && nbp->nbp_state != NBST_SESSION)
426 break;
427 /* no data, try again */
428 if (rpcode == NB_SSN_KEEPALIVE)
429 continue;
430
431 /*
432 * Loop, blocking, for data following the response header.
433 *
434 * Note that we can't simply block here with MSG_WAITALL for the
435 * entire response size, as it may be larger than the TCP
436 * slow-start window that the sender employs. This will result
437 * in the sender stalling until the delayed ACK is sent, then
438 * resuming slow-start, resulting in very poor performance.
439 *
440 * Instead, we never request more than NB_SORECEIVE_CHUNK
441 * bytes at a time, resulting in an ack being pushed by
442 * the TCP code at the completion of each call.
443 */
444 resid = len;
445 while (resid > 0) {
446 tm = NULL;
447 rcvflg = MSG_WAITALL;
448 bzero(&auio, sizeof(auio));
449 auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
450 auio.uio_td = td;
451 resid -= auio.uio_resid;
452 /*
453 * Spin until we have collected everything in
454 * this chunk.
455 */
456 do {
457 rcvflg = MSG_WAITALL;
458 error = so->so_proto->pr_usrreqs->pru_soreceive
459 (so, (struct sockaddr **)NULL,
460 &auio, &tm, (struct mbuf **)NULL, &rcvflg);
461 } while (error == EWOULDBLOCK || error == EINTR ||
462 error == ERESTART);
463 if (error)
464 goto out;
465 /* short return guarantees unhappiness */
466 if (auio.uio_resid > 0) {
467 SMBERROR("packet is shorter than expected\n");
468 error = EPIPE;
469 goto out;
470 }
471 /* append received chunk to previous chunk(s) */
472 if (m == NULL) {
473 m = tm;
474 } else {
475 /*
476 * Just glue the new chain on the end.
477 * Consumer will pullup as required.
478 */
479 for (im = m; im->m_next != NULL; im = im->m_next)
480 ;
481 im->m_next = tm;
482 }
483 }
484 /* got a session/message packet? */
485 if (nbp->nbp_state == NBST_SESSION &&
486 rpcode == NB_SSN_MESSAGE)
487 break;
488 /* drop packet and try for another */
489 NBDEBUG("non-session packet %x\n", rpcode);
490 if (m) {
491 m_freem(m);
492 m = NULL;
493 }
494 }
495
496out:
497 if (error) {
498 if (m)
499 m_freem(m);
500 return error;
501 }
502 if (mpp)
503 *mpp = m;
504 else
505 m_freem(m);
506 *lenp = len;
507 *rpcodep = rpcode;
508 return 0;
509}
510
511/*
512 * SMB transport interface
513 */
514static int
515smb_nbst_create(struct smb_vc *vcp, struct thread *td)
516{
517 struct nbpcb *nbp;
518
519 MALLOC(nbp, struct nbpcb *, sizeof *nbp, M_NBDATA, M_WAITOK);
520 bzero(nbp, sizeof *nbp);
521 nbp->nbp_timo.tv_sec = 15; /* XXX: sysctl ? */
522 nbp->nbp_state = NBST_CLOSED;
523 nbp->nbp_vc = vcp;
524 nbp->nbp_sndbuf = smb_tcpsndbuf;
525 nbp->nbp_rcvbuf = smb_tcprcvbuf;
526 vcp->vc_tdata = nbp;
527 return 0;
528}
529
530static int
531smb_nbst_done(struct smb_vc *vcp, struct thread *td)
532{
533 struct nbpcb *nbp = vcp->vc_tdata;
534
535 if (nbp == NULL)
536 return ENOTCONN;
537 smb_nbst_disconnect(vcp, td);
538 if (nbp->nbp_laddr)
539 free(nbp->nbp_laddr, M_SONAME);
540 if (nbp->nbp_paddr)
541 free(nbp->nbp_paddr, M_SONAME);
542 free(nbp, M_NBDATA);
543 return 0;
544}
545
546static int
547smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
548{
549 struct nbpcb *nbp = vcp->vc_tdata;
550 struct sockaddr_nb *snb;
551 int error, slen;
552
553 NBDEBUG("\n");
554 error = EINVAL;
555 do {
556 if (nbp->nbp_flags & NBF_LOCADDR)
557 break;
558 /*
559 * It is possible to create NETBIOS name in the kernel,
560 * but nothing prevents us to do it in the user space.
561 */
562 if (sap == NULL)
563 break;
564 slen = sap->sa_len;
565 if (slen < NB_MINSALEN)
566 break;
567 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
568 if (snb == NULL) {
569 error = ENOMEM;
570 break;
571 }
572 nbp->nbp_laddr = snb;
573 nbp->nbp_flags |= NBF_LOCADDR;
574 error = 0;
575 } while(0);
576 return error;
577}
578
579static int
580smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
581{
582 struct nbpcb *nbp = vcp->vc_tdata;
583 struct sockaddr_in sin;
584 struct sockaddr_nb *snb;
585 struct timespec ts1, ts2;
586 int error, slen;
587
588 NBDEBUG("\n");
589 if (nbp->nbp_tso != NULL)
590 return EISCONN;
591 if (nbp->nbp_laddr == NULL)
592 return EINVAL;
593 slen = sap->sa_len;
594 if (slen < NB_MINSALEN)
595 return EINVAL;
596 if (nbp->nbp_paddr) {
597 free(nbp->nbp_paddr, M_SONAME);
598 nbp->nbp_paddr = NULL;
599 }
600 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
601 if (snb == NULL)
602 return ENOMEM;
603 nbp->nbp_paddr = snb;
604 sin = snb->snb_addrin;
605 getnanotime(&ts1);
606 error = nb_connect_in(nbp, &sin, td);
607 if (error)
608 return error;
609 getnanotime(&ts2);
610 timespecsub(&ts2, &ts1);
611 if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
612 ts2.tv_sec = 1;
613 nbp->nbp_timo = ts2;
614 timespecadd(&nbp->nbp_timo, &ts2);
615 timespecadd(&nbp->nbp_timo, &ts2);
616 timespecadd(&nbp->nbp_timo, &ts2); /* * 4 */
617 error = nbssn_rq_request(nbp, td);
618 if (error)
619 smb_nbst_disconnect(vcp, td);
620 return error;
621}
622
623static int
624smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
625{
626 struct nbpcb *nbp = vcp->vc_tdata;
627 struct socket *so;
628
629 if (nbp == NULL || nbp->nbp_tso == NULL)
630 return ENOTCONN;
631 if ((so = nbp->nbp_tso) != NULL) {
632 nbp->nbp_flags &= ~NBF_CONNECTED;
633 nbp->nbp_tso = (struct socket *)NULL;
634 soshutdown(so, 2);
635 soclose(so);
636 }
637 if (nbp->nbp_state != NBST_RETARGET) {
638 nbp->nbp_state = NBST_CLOSED;
639 }
640 return 0;
641}
642
643static int
644smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
645{
646 struct nbpcb *nbp = vcp->vc_tdata;
647 int error;
648
649 if (nbp->nbp_state != NBST_SESSION) {
650 error = ENOTCONN;
651 goto abort;
652 }
653 M_PREPEND(m0, 4, M_TRYWAIT);
654 if (m0 == NULL)
655 return ENOBUFS;
656 nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
657 error = nb_sosend(nbp->nbp_tso, m0, 0, td);
658 return error;
659abort:
660 if (m0)
661 m_freem(m0);
662 return error;
663}
664
665
666static int
667smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
668{
669 struct nbpcb *nbp = vcp->vc_tdata;
670 u_int8_t rpcode;
671 int error, rplen;
672
673 nbp->nbp_flags |= NBF_RECVLOCK;
674 error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
675 nbp->nbp_flags &= ~NBF_RECVLOCK;
676 return error;
677}
678
679static void
680smb_nbst_timo(struct smb_vc *vcp)
681{
682 return;
683}
684
685static void
686smb_nbst_intr(struct smb_vc *vcp)
687{
688 struct nbpcb *nbp = vcp->vc_tdata;
689
690 if (nbp == NULL || nbp->nbp_tso == NULL)
691 return;
692 sorwakeup(nbp->nbp_tso);
693 sowwakeup(nbp->nbp_tso);
694}
695
696static int
697smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
698{
699 struct nbpcb *nbp = vcp->vc_tdata;
700
701 switch (param) {
702 case SMBTP_SNDSZ:
703 *(int*)data = nbp->nbp_sndbuf;
704 break;
705 case SMBTP_RCVSZ:
706 *(int*)data = nbp->nbp_rcvbuf;
707 break;
708 case SMBTP_TIMEOUT:
709 *(struct timespec*)data = nbp->nbp_timo;
710 break;
711 default:
712 return EINVAL;
713 }
714 return 0;
715}
716
717static int
718smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
719{
720 struct nbpcb *nbp = vcp->vc_tdata;
721
722 switch (param) {
723 case SMBTP_SELECTID:
724 nbp->nbp_selectid = data;
725 break;
726 default:
727 return EINVAL;
728 }
729 return 0;
730}
731
732/*
733 * Check for fatal errors
734 */
735static int
736smb_nbst_fatal(struct smb_vc *vcp, int error)
737{
738 switch (error) {
739 case ENOTCONN:
740 case ENETRESET:
741 case ECONNABORTED:
742 return 1;
743 }
744 return 0;
745}
746
747
748struct smb_tran_desc smb_tran_nbtcp_desc = {
749 SMBT_NBTCP,
750 smb_nbst_create, smb_nbst_done,
751 smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
752 smb_nbst_send, smb_nbst_recv,
753 smb_nbst_timo, smb_nbst_intr,
754 smb_nbst_getparam, smb_nbst_setparam,
755 smb_nbst_fatal
756};
757