2 * Copyright (c) 2000-2001 Boris Popov
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 #include <sys/cdefs.h>
28 __FBSDID("$FreeBSD$");
30 #include <sys/param.h>
31 #include <sys/condvar.h>
32 #include <sys/kernel.h>
34 #include <sys/malloc.h>
38 #include <sys/protosw.h>
39 #include <sys/signalvar.h>
40 #include <sys/socket.h>
41 #include <sys/socketvar.h>
43 #include <sys/sysctl.h>
44 #include <sys/systm.h>
48 #include <net/route.h>
51 #include <netinet/in.h>
52 #include <netinet/tcp.h>
54 #include <sys/mchain.h>
56 #include <netsmb/netbios.h>
58 #include <netsmb/smb.h>
59 #include <netsmb/smb_conn.h>
60 #include <netsmb/smb_tran.h>
61 #include <netsmb/smb_trantcp.h>
62 #include <netsmb/smb_subr.h>
64 #define M_NBDATA M_PCB
66 static int smb_tcpsndbuf = NB_SNDQ - 1;
67 static int smb_tcprcvbuf = NB_RCVQ - 1;
69 SYSCTL_DECL(_net_smb);
70 SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
71 SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
73 #define nb_sosend(so,m,flags,td) sosend(so, NULL, 0, m, 0, flags, td)
75 static int nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
76 u_int8_t *rpcodep, struct thread *td);
77 static int smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
80 nb_setsockopt_int(struct socket *so, int level, int name, int val)
85 bzero(&sopt, sizeof(sopt));
86 sopt.sopt_level = level;
87 sopt.sopt_name = name;
89 sopt.sopt_valsize = sizeof(val);
90 CURVNET_SET(so->so_vnet);
91 error = sosetopt(so, &sopt);
97 nb_intr(struct nbpcb *nbp, struct proc *p)
103 nb_upcall(struct socket *so, void *arg, int waitflag)
105 struct nbpcb *nbp = arg;
107 if (arg == NULL || nbp->nbp_selectid == NULL)
109 wakeup(nbp->nbp_selectid);
114 nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
116 u_int32_t *p = mtod(m, u_int32_t *);
118 *p = htonl((len & 0x1FFFF) | (type << 24));
123 nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
131 NBDEBUG("[%s]\n", cp);
134 error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
145 nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
150 error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
155 SOCKBUF_LOCK(&so->so_rcv);
156 soupcall_set(so, SO_RCV, nb_upcall, nbp);
157 SOCKBUF_UNLOCK(&so->so_rcv);
158 so->so_rcv.sb_timeo = (5 * hz);
159 so->so_snd.sb_timeo = (5 * hz);
160 error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
163 nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
164 nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
165 SOCKBUF_LOCK(&so->so_rcv);
166 so->so_rcv.sb_flags &= ~SB_NOINTR;
167 SOCKBUF_UNLOCK(&so->so_rcv);
168 SOCKBUF_LOCK(&so->so_snd);
169 so->so_snd.sb_flags &= ~SB_NOINTR;
170 SOCKBUF_UNLOCK(&so->so_snd);
171 error = soconnect(so, (struct sockaddr*)to, td);
175 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
176 tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
177 if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
178 (error = nb_intr(nbp, td->td_proc)) != 0) {
179 so->so_state &= ~SS_ISCONNECTING;
185 error = so->so_error;
193 smb_nbst_disconnect(nbp->nbp_vc, td);
198 nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
200 struct mbchain mb, *mbp = &mb;
201 struct mdchain md, *mdp = &md;
204 struct sockaddr_in sin;
209 error = mb_init(mbp);
212 mb_put_uint32le(mbp, 0);
213 nb_put_name(mbp, nbp->nbp_paddr);
214 nb_put_name(mbp, nbp->nbp_laddr);
215 nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
216 error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
218 nbp->nbp_state = NBST_RQSENT;
224 TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
225 error = selsocket(nbp->nbp_tso, POLLIN, &tv, td);
226 if (error == EWOULDBLOCK) { /* Timeout */
227 NBDEBUG("initial request timeout\n");
230 if (error) /* restart or interrupt */
232 error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
234 NBDEBUG("recv() error %d\n", error);
238 * Process NETBIOS reply
244 if (rpcode == NB_SSN_POSRESP) {
245 nbp->nbp_state = NBST_SESSION;
246 nbp->nbp_flags |= NBF_CONNECTED;
249 if (rpcode != NB_SSN_RTGRESP) {
250 error = ECONNABORTED;
254 error = ECONNABORTED;
257 md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
258 md_get_uint16(mdp, &port);
260 nbp->nbp_state = NBST_RETARGET;
261 smb_nbst_disconnect(nbp->nbp_vc, td);
262 error = nb_connect_in(nbp, &sin, td);
264 error = nbssn_rq_request(nbp, td);
266 smb_nbst_disconnect(nbp->nbp_vc, td);
276 nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
277 u_int8_t *rpcodep, int flags, struct thread *td)
279 struct socket *so = nbp->nbp_tso;
285 aio.iov_base = (caddr_t)&len;
286 aio.iov_len = sizeof(len);
289 auio.uio_segflg = UIO_SYSSPACE;
290 auio.uio_rw = UIO_READ;
292 auio.uio_resid = sizeof(len);
294 CURVNET_SET(so->so_vnet);
295 error = soreceive(so, (struct sockaddr **)NULL, &auio,
296 (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
300 if (auio.uio_resid > 0) {
301 SMBSDEBUG("short reply\n");
305 *rpcodep = (len >> 24) & 0xFF;
307 if (len > SMB_MAXPKTLEN) {
308 SMBERROR("packet too long (%d)\n", len);
316 nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
317 u_int8_t *rpcodep, struct thread *td)
319 struct socket *so = nbp->nbp_tso;
321 struct mbuf *m, *tm, *im;
334 * Poll for a response header.
335 * If we don't have one waiting, return.
339 error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
340 if ((so->so_state & (SS_ISDISCONNECTING | SS_ISDISCONNECTED)) ||
341 (so->so_rcv.sb_state & SBS_CANTRCVMORE)) {
342 nbp->nbp_state = NBST_CLOSED;
343 NBDEBUG("session closed by peer\n");
348 if (len == 0 && nbp->nbp_state != NBST_SESSION)
350 /* no data, try again */
351 if (rpcode == NB_SSN_KEEPALIVE)
355 * Loop, blocking, for data following the response header.
357 * Note that we can't simply block here with MSG_WAITALL for the
358 * entire response size, as it may be larger than the TCP
359 * slow-start window that the sender employs. This will result
360 * in the sender stalling until the delayed ACK is sent, then
361 * resuming slow-start, resulting in very poor performance.
363 * Instead, we never request more than NB_SORECEIVE_CHUNK
364 * bytes at a time, resulting in an ack being pushed by
365 * the TCP code at the completion of each call.
370 rcvflg = MSG_WAITALL;
371 bzero(&auio, sizeof(auio));
372 auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
374 resid -= auio.uio_resid;
376 * Spin until we have collected everything in
380 rcvflg = MSG_WAITALL;
381 CURVNET_SET(so->so_vnet);
382 error = soreceive(so, (struct sockaddr **)NULL,
383 &auio, &tm, (struct mbuf **)NULL, &rcvflg);
385 } while (error == EWOULDBLOCK || error == EINTR ||
389 /* short return guarantees unhappiness */
390 if (auio.uio_resid > 0) {
391 SMBERROR("packet is shorter than expected\n");
395 /* append received chunk to previous chunk(s) */
400 * Just glue the new chain on the end.
401 * Consumer will pullup as required.
403 for (im = m; im->m_next != NULL; im = im->m_next)
408 /* got a session/message packet? */
409 if (nbp->nbp_state == NBST_SESSION &&
410 rpcode == NB_SSN_MESSAGE)
412 /* drop packet and try for another */
413 NBDEBUG("non-session packet %x\n", rpcode);
436 * SMB transport interface
439 smb_nbst_create(struct smb_vc *vcp, struct thread *td)
443 nbp = malloc(sizeof *nbp, M_NBDATA, M_WAITOK);
444 bzero(nbp, sizeof *nbp);
445 nbp->nbp_timo.tv_sec = 15; /* XXX: sysctl ? */
446 nbp->nbp_state = NBST_CLOSED;
448 nbp->nbp_sndbuf = smb_tcpsndbuf;
449 nbp->nbp_rcvbuf = smb_tcprcvbuf;
455 smb_nbst_done(struct smb_vc *vcp, struct thread *td)
457 struct nbpcb *nbp = vcp->vc_tdata;
461 smb_nbst_disconnect(vcp, td);
463 free(nbp->nbp_laddr, M_SONAME);
465 free(nbp->nbp_paddr, M_SONAME);
471 smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
473 struct nbpcb *nbp = vcp->vc_tdata;
474 struct sockaddr_nb *snb;
480 if (nbp->nbp_flags & NBF_LOCADDR)
483 * It is possible to create NETBIOS name in the kernel,
484 * but nothing prevents us to do it in the user space.
489 if (slen < NB_MINSALEN)
491 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
496 nbp->nbp_laddr = snb;
497 nbp->nbp_flags |= NBF_LOCADDR;
504 smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
506 struct nbpcb *nbp = vcp->vc_tdata;
507 struct sockaddr_in sin;
508 struct sockaddr_nb *snb;
509 struct timespec ts1, ts2;
513 if (nbp->nbp_tso != NULL)
515 if (nbp->nbp_laddr == NULL)
518 if (slen < NB_MINSALEN)
520 if (nbp->nbp_paddr) {
521 free(nbp->nbp_paddr, M_SONAME);
522 nbp->nbp_paddr = NULL;
524 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
527 nbp->nbp_paddr = snb;
528 sin = snb->snb_addrin;
530 error = nb_connect_in(nbp, &sin, td);
534 timespecsub(&ts2, &ts1);
535 if (ts2.tv_sec == 0 && ts2.tv_sec == 0)
538 timespecadd(&nbp->nbp_timo, &ts2);
539 timespecadd(&nbp->nbp_timo, &ts2);
540 timespecadd(&nbp->nbp_timo, &ts2); /* * 4 */
541 error = nbssn_rq_request(nbp, td);
543 smb_nbst_disconnect(vcp, td);
548 smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
550 struct nbpcb *nbp = vcp->vc_tdata;
553 if (nbp == NULL || nbp->nbp_tso == NULL)
555 if ((so = nbp->nbp_tso) != NULL) {
556 nbp->nbp_flags &= ~NBF_CONNECTED;
557 nbp->nbp_tso = (struct socket *)NULL;
561 if (nbp->nbp_state != NBST_RETARGET) {
562 nbp->nbp_state = NBST_CLOSED;
568 smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
570 struct nbpcb *nbp = vcp->vc_tdata;
573 if (nbp->nbp_state != NBST_SESSION) {
577 M_PREPEND(m0, 4, M_WAIT);
578 nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
579 error = nb_sosend(nbp->nbp_tso, m0, 0, td);
589 smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
591 struct nbpcb *nbp = vcp->vc_tdata;
595 nbp->nbp_flags |= NBF_RECVLOCK;
596 error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
597 nbp->nbp_flags &= ~NBF_RECVLOCK;
602 smb_nbst_timo(struct smb_vc *vcp)
608 smb_nbst_intr(struct smb_vc *vcp)
610 struct nbpcb *nbp = vcp->vc_tdata;
612 if (nbp == NULL || nbp->nbp_tso == NULL)
614 sorwakeup(nbp->nbp_tso);
615 sowwakeup(nbp->nbp_tso);
619 smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
621 struct nbpcb *nbp = vcp->vc_tdata;
625 *(int*)data = nbp->nbp_sndbuf;
628 *(int*)data = nbp->nbp_rcvbuf;
631 *(struct timespec*)data = nbp->nbp_timo;
640 smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
642 struct nbpcb *nbp = vcp->vc_tdata;
646 nbp->nbp_selectid = data;
655 * Check for fatal errors
658 smb_nbst_fatal(struct smb_vc *vcp, int error)
670 struct smb_tran_desc smb_tran_nbtcp_desc = {
672 smb_nbst_create, smb_nbst_done,
673 smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
674 smb_nbst_send, smb_nbst_recv,
675 smb_nbst_timo, smb_nbst_intr,
676 smb_nbst_getparam, smb_nbst_setparam,