1/*-
2 * Copyright (c) 2000-2001 Boris Popov
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 */
26
27#include <sys/cdefs.h>
28__FBSDID("$FreeBSD$");
29
30#include <sys/param.h>
31#include <sys/condvar.h>
32#include <sys/kernel.h>
33#include <sys/lock.h>
34#include <sys/malloc.h>
35#include <sys/mbuf.h>
36#include <sys/poll.h>
37#include <sys/proc.h>
38#include <sys/protosw.h>
39#include <sys/signalvar.h>
40#include <sys/socket.h>
41#include <sys/socketvar.h>
42#include <sys/sx.h>
43#include <sys/sysctl.h>
44#include <sys/systm.h>
45#include <sys/uio.h>
46
47#include <net/if.h>
48#include <net/route.h>
49#include <net/vnet.h>
50
51#include <netinet/in.h>
52#include <netinet/tcp.h>
53
54#include <sys/mchain.h>
55
56#include <netsmb/netbios.h>
57
58#include <netsmb/smb.h>
59#include <netsmb/smb_conn.h>
60#include <netsmb/smb_tran.h>
61#include <netsmb/smb_trantcp.h>
62#include <netsmb/smb_subr.h>
63
64#define M_NBDATA	M_PCB
65
66static int smb_tcpsndbuf = NB_SNDQ - 1;
67static int smb_tcprcvbuf = NB_RCVQ - 1;
68
69SYSCTL_DECL(_net_smb);
70SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
71SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
72
73#define nb_sosend(so,m,flags,td) sosend(so, NULL, 0, m, 0, flags, td)
74
75static int  nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
76	u_int8_t *rpcodep, struct thread *td);
77static int  smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
78
79static int
80nb_setsockopt_int(struct socket *so, int level, int name, int val)
81{
82	struct sockopt sopt;
83	int error;
84
85	bzero(&sopt, sizeof(sopt));
86	sopt.sopt_level = level;
87	sopt.sopt_name = name;
88	sopt.sopt_val = &val;
89	sopt.sopt_valsize = sizeof(val);
90	CURVNET_SET(so->so_vnet);
91	error = sosetopt(so, &sopt);
92	CURVNET_RESTORE();
93	return error;
94}
95
96static int
97nb_intr(struct nbpcb *nbp, struct proc *p)
98{
99	return 0;
100}
101
102static int
103nb_upcall(struct socket *so, void *arg, int waitflag)
104{
105	struct nbpcb *nbp = arg;
106
107	if (arg == NULL || nbp->nbp_selectid == NULL)
108		return (SU_OK);
109	wakeup(nbp->nbp_selectid);
110	return (SU_OK);
111}
112
113static int
114nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
115{
116	u_int32_t *p = mtod(m, u_int32_t *);
117
118	*p = htonl((len & 0x1FFFF) | (type << 24));
119	return 0;
120}
121
122static int
123nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
124{
125	int error;
126	u_char seglen, *cp;
127
128	cp = snb->snb_name;
129	if (*cp == 0)
130		return EINVAL;
131	NBDEBUG("[%s]\n", cp);
132	for (;;) {
133		seglen = (*cp) + 1;
134		error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
135		if (error)
136			return error;
137		if (seglen == 1)
138			break;
139		cp += seglen;
140	}
141	return 0;
142}
143
144static int
145nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
146{
147	struct socket *so;
148	int error, s;
149
150	error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
151	    td->td_ucred, td);
152	if (error)
153		return error;
154	nbp->nbp_tso = so;
155	SOCKBUF_LOCK(&so->so_rcv);
156	soupcall_set(so, SO_RCV, nb_upcall, nbp);
157	SOCKBUF_UNLOCK(&so->so_rcv);
158	so->so_rcv.sb_timeo = (5 * SBT_1S);
159	so->so_snd.sb_timeo = (5 * SBT_1S);
160	error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
161	if (error)
162		goto bad;
163	nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
164	nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
165	SOCKBUF_LOCK(&so->so_rcv);
166	so->so_rcv.sb_flags &= ~SB_NOINTR;
167	SOCKBUF_UNLOCK(&so->so_rcv);
168	SOCKBUF_LOCK(&so->so_snd);
169	so->so_snd.sb_flags &= ~SB_NOINTR;
170	SOCKBUF_UNLOCK(&so->so_snd);
171	error = soconnect(so, (struct sockaddr*)to, td);
172	if (error)
173		goto bad;
174	s = splnet();
175	while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
176		tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
177		if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
178			(error = nb_intr(nbp, td->td_proc)) != 0) {
179			so->so_state &= ~SS_ISCONNECTING;
180			splx(s);
181			goto bad;
182		}
183	}
184	if (so->so_error) {
185		error = so->so_error;
186		so->so_error = 0;
187		splx(s);
188		goto bad;
189	}
190	splx(s);
191	return 0;
192bad:
193	smb_nbst_disconnect(nbp->nbp_vc, td);
194	return error;
195}
196
197static int
198nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
199{
200	struct mbchain *mbp;
201	struct mdchain *mdp;
202	struct mbuf *m0;
203	struct timeval tv;
204	struct sockaddr_in sin;
205	u_short port;
206	u_int8_t rpcode;
207	int error, rplen;
208
209	mbp = malloc(sizeof(struct mbchain), M_NBDATA, M_WAITOK);
210	mdp = malloc(sizeof(struct mbchain), M_NBDATA, M_WAITOK);
211	error = mb_init(mbp);
212	if (error) {
213		free(mbp, M_NBDATA);
214		free(mdp, M_NBDATA);
215		return error;
216	}
217	mb_put_uint32le(mbp, 0);
218	nb_put_name(mbp, nbp->nbp_paddr);
219	nb_put_name(mbp, nbp->nbp_laddr);
220	nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
221	error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
222	if (!error) {
223		nbp->nbp_state = NBST_RQSENT;
224	}
225	mb_detach(mbp);
226	mb_done(mbp);
227	free(mbp, M_NBDATA);
228	if (error) {
229		free(mdp, M_NBDATA);
230		return error;
231	}
232	TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
233	error = selsocket(nbp->nbp_tso, POLLIN, &tv, td);
234	if (error == EWOULDBLOCK) {	/* Timeout */
235		NBDEBUG("initial request timeout\n");
236		free(mdp, M_NBDATA);
237		return ETIMEDOUT;
238	}
239	if (error) {			/* restart or interrupt */
240		free(mdp, M_NBDATA);
241		return error;
242	}
243	error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
244	if (error) {
245		NBDEBUG("recv() error %d\n", error);
246		free(mdp, M_NBDATA);
247		return error;
248	}
249	/*
250	 * Process NETBIOS reply
251	 */
252	if (m0)
253		md_initm(mdp, m0);
254	error = 0;
255	do {
256		if (rpcode == NB_SSN_POSRESP) {
257			nbp->nbp_state = NBST_SESSION;
258			nbp->nbp_flags |= NBF_CONNECTED;
259			break;
260		}
261		if (rpcode != NB_SSN_RTGRESP) {
262			error = ECONNABORTED;
263			break;
264		}
265		if (rplen != 6) {
266			error = ECONNABORTED;
267			break;
268		}
269		md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
270		md_get_uint16(mdp, &port);
271		sin.sin_port = port;
272		nbp->nbp_state = NBST_RETARGET;
273		smb_nbst_disconnect(nbp->nbp_vc, td);
274		error = nb_connect_in(nbp, &sin, td);
275		if (!error)
276			error = nbssn_rq_request(nbp, td);
277		if (error) {
278			smb_nbst_disconnect(nbp->nbp_vc, td);
279			break;
280		}
281	} while(0);
282	if (m0)
283		md_done(mdp);
284	free(mdp, M_NBDATA);
285	return error;
286}
287
288static int
289nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
290	u_int8_t *rpcodep, int flags, struct thread *td)
291{
292	struct socket *so = nbp->nbp_tso;
293	struct uio auio;
294	struct iovec aio;
295	u_int32_t len;
296	int error;
297
298	aio.iov_base = (caddr_t)&len;
299	aio.iov_len = sizeof(len);
300	auio.uio_iov = &aio;
301	auio.uio_iovcnt = 1;
302	auio.uio_segflg = UIO_SYSSPACE;
303	auio.uio_rw = UIO_READ;
304	auio.uio_offset = 0;
305	auio.uio_resid = sizeof(len);
306	auio.uio_td = td;
307	CURVNET_SET(so->so_vnet);
308	error = soreceive(so, (struct sockaddr **)NULL, &auio,
309	    (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
310	CURVNET_RESTORE();
311	if (error)
312		return error;
313	if (auio.uio_resid > 0) {
314		SMBSDEBUG("short reply\n");
315		return EPIPE;
316	}
317	len = ntohl(len);
318	*rpcodep = (len >> 24) & 0xFF;
319	len &= 0x1ffff;
320	if (len > SMB_MAXPKTLEN) {
321		SMBERROR("packet too long (%d)\n", len);
322		return EFBIG;
323	}
324	*lenp = len;
325	return 0;
326}
327
328static int
329nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
330	u_int8_t *rpcodep, struct thread *td)
331{
332	struct socket *so = nbp->nbp_tso;
333	struct uio auio;
334	struct mbuf *m, *tm, *im;
335	u_int8_t rpcode;
336	int len, resid;
337	int error, rcvflg;
338
339	if (so == NULL)
340		return ENOTCONN;
341
342	if (mpp)
343		*mpp = NULL;
344	m = NULL;
345	for(;;) {
346		/*
347		 * Poll for a response header.
348		 * If we don't have one waiting, return.
349		 */
350		len = 0;
351		rpcode = 0;
352		error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
353		if ((so->so_state & (SS_ISDISCONNECTING | SS_ISDISCONNECTED)) ||
354		    (so->so_rcv.sb_state & SBS_CANTRCVMORE)) {
355			nbp->nbp_state = NBST_CLOSED;
356			NBDEBUG("session closed by peer\n");
357			return ECONNRESET;
358		}
359		if (error)
360			return error;
361		if (len == 0 && nbp->nbp_state != NBST_SESSION)
362			break;
363		/* no data, try again */
364		if (rpcode == NB_SSN_KEEPALIVE)
365			continue;
366
367		/*
368		 * Loop, blocking, for data following the response header.
369		 *
370		 * Note that we can't simply block here with MSG_WAITALL for the
371		 * entire response size, as it may be larger than the TCP
372		 * slow-start window that the sender employs.  This will result
373		 * in the sender stalling until the delayed ACK is sent, then
374		 * resuming slow-start, resulting in very poor performance.
375		 *
376		 * Instead, we never request more than NB_SORECEIVE_CHUNK
377		 * bytes at a time, resulting in an ack being pushed by
378		 * the TCP code at the completion of each call.
379		 */
380		resid = len;
381		while (resid > 0) {
382			tm = NULL;
383			rcvflg = MSG_WAITALL;
384			bzero(&auio, sizeof(auio));
385			auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
386			auio.uio_td = td;
387			resid -= auio.uio_resid;
388			/*
389			 * Spin until we have collected everything in
390			 * this chunk.
391			 */
392			do {
393				rcvflg = MSG_WAITALL;
394				CURVNET_SET(so->so_vnet);
395				error = soreceive(so, (struct sockaddr **)NULL,
396				    &auio, &tm, (struct mbuf **)NULL, &rcvflg);
397				CURVNET_RESTORE();
398			} while (error == EWOULDBLOCK || error == EINTR ||
399				 error == ERESTART);
400			if (error)
401				goto out;
402			/* short return guarantees unhappiness */
403			if (auio.uio_resid > 0) {
404				SMBERROR("packet is shorter than expected\n");
405				error = EPIPE;
406				goto out;
407			}
408			/* append received chunk to previous chunk(s) */
409			if (m == NULL) {
410				m = tm;
411			} else {
412				/*
413				 * Just glue the new chain on the end.
414				 * Consumer will pullup as required.
415				 */
416				for (im = m; im->m_next != NULL; im = im->m_next)
417					;
418				im->m_next = tm;
419			}
420		}
421		/* got a session/message packet? */
422		if (nbp->nbp_state == NBST_SESSION &&
423		    rpcode == NB_SSN_MESSAGE)
424			break;
425		/* drop packet and try for another */
426		NBDEBUG("non-session packet %x\n", rpcode);
427		if (m) {
428			m_freem(m);
429			m = NULL;
430		}
431	}
432
433out:
434	if (error) {
435		if (m)
436			m_freem(m);
437		return error;
438	}
439	if (mpp)
440		*mpp = m;
441	else
442		m_freem(m);
443	*lenp = len;
444	*rpcodep = rpcode;
445	return 0;
446}
447
448/*
449 * SMB transport interface
450 */
451static int
452smb_nbst_create(struct smb_vc *vcp, struct thread *td)
453{
454	struct nbpcb *nbp;
455
456	nbp = malloc(sizeof *nbp, M_NBDATA, M_WAITOK);
457	bzero(nbp, sizeof *nbp);
458	nbp->nbp_timo.tv_sec = 15;	/* XXX: sysctl ? */
459	nbp->nbp_state = NBST_CLOSED;
460	nbp->nbp_vc = vcp;
461	nbp->nbp_sndbuf = smb_tcpsndbuf;
462	nbp->nbp_rcvbuf = smb_tcprcvbuf;
463	vcp->vc_tdata = nbp;
464	return 0;
465}
466
467static int
468smb_nbst_done(struct smb_vc *vcp, struct thread *td)
469{
470	struct nbpcb *nbp = vcp->vc_tdata;
471
472	if (nbp == NULL)
473		return ENOTCONN;
474	smb_nbst_disconnect(vcp, td);
475	if (nbp->nbp_laddr)
476		free(nbp->nbp_laddr, M_SONAME);
477	if (nbp->nbp_paddr)
478		free(nbp->nbp_paddr, M_SONAME);
479	free(nbp, M_NBDATA);
480	return 0;
481}
482
483static int
484smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
485{
486	struct nbpcb *nbp = vcp->vc_tdata;
487	struct sockaddr_nb *snb;
488	int error, slen;
489
490	NBDEBUG("\n");
491	error = EINVAL;
492	do {
493		if (nbp->nbp_flags & NBF_LOCADDR)
494			break;
495		/*
496		 * It is possible to create NETBIOS name in the kernel,
497		 * but nothing prevents us to do it in the user space.
498		 */
499		if (sap == NULL)
500			break;
501		slen = sap->sa_len;
502		if (slen < NB_MINSALEN)
503			break;
504		snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
505		if (snb == NULL) {
506			error = ENOMEM;
507			break;
508		}
509		nbp->nbp_laddr = snb;
510		nbp->nbp_flags |= NBF_LOCADDR;
511		error = 0;
512	} while(0);
513	return error;
514}
515
516static int
517smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
518{
519	struct nbpcb *nbp = vcp->vc_tdata;
520	struct sockaddr_in sin;
521	struct sockaddr_nb *snb;
522	struct timespec ts1, ts2;
523	int error, slen;
524
525	NBDEBUG("\n");
526	if (nbp->nbp_tso != NULL)
527		return EISCONN;
528	if (nbp->nbp_laddr == NULL)
529		return EINVAL;
530	slen = sap->sa_len;
531	if (slen < NB_MINSALEN)
532		return EINVAL;
533	if (nbp->nbp_paddr) {
534		free(nbp->nbp_paddr, M_SONAME);
535		nbp->nbp_paddr = NULL;
536	}
537	snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
538	if (snb == NULL)
539		return ENOMEM;
540	nbp->nbp_paddr = snb;
541	sin = snb->snb_addrin;
542	getnanotime(&ts1);
543	error = nb_connect_in(nbp, &sin, td);
544	if (error)
545		return error;
546	getnanotime(&ts2);
547	timespecsub(&ts2, &ts1);
548	if (ts2.tv_sec == 0) {
549		ts2.tv_sec = 1;
550		ts2.tv_nsec = 0;
551	}
552	nbp->nbp_timo = ts2;
553	timespecadd(&nbp->nbp_timo, &ts2);
554	timespecadd(&nbp->nbp_timo, &ts2);
555	timespecadd(&nbp->nbp_timo, &ts2);	/*  * 4 */
556	error = nbssn_rq_request(nbp, td);
557	if (error)
558		smb_nbst_disconnect(vcp, td);
559	return error;
560}
561
562static int
563smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
564{
565	struct nbpcb *nbp = vcp->vc_tdata;
566	struct socket *so;
567
568	if (nbp == NULL || nbp->nbp_tso == NULL)
569		return ENOTCONN;
570	if ((so = nbp->nbp_tso) != NULL) {
571		nbp->nbp_flags &= ~NBF_CONNECTED;
572		nbp->nbp_tso = (struct socket *)NULL;
573		soshutdown(so, 2);
574		soclose(so);
575	}
576	if (nbp->nbp_state != NBST_RETARGET) {
577		nbp->nbp_state = NBST_CLOSED;
578	}
579	return 0;
580}
581
582static int
583smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
584{
585	struct nbpcb *nbp = vcp->vc_tdata;
586	int error;
587
588	if (nbp->nbp_state != NBST_SESSION) {
589		error = ENOTCONN;
590		goto abort;
591	}
592	M_PREPEND(m0, 4, M_WAITOK);
593	nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
594	error = nb_sosend(nbp->nbp_tso, m0, 0, td);
595	return error;
596abort:
597	if (m0)
598		m_freem(m0);
599	return error;
600}
601
602
603static int
604smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
605{
606	struct nbpcb *nbp = vcp->vc_tdata;
607	u_int8_t rpcode;
608	int error, rplen;
609
610	nbp->nbp_flags |= NBF_RECVLOCK;
611	error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
612	nbp->nbp_flags &= ~NBF_RECVLOCK;
613	return error;
614}
615
616static void
617smb_nbst_timo(struct smb_vc *vcp)
618{
619	return;
620}
621
622static void
623smb_nbst_intr(struct smb_vc *vcp)
624{
625	struct nbpcb *nbp = vcp->vc_tdata;
626
627	if (nbp == NULL || nbp->nbp_tso == NULL)
628		return;
629	sorwakeup(nbp->nbp_tso);
630	sowwakeup(nbp->nbp_tso);
631}
632
633static int
634smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
635{
636	struct nbpcb *nbp = vcp->vc_tdata;
637
638	switch (param) {
639	    case SMBTP_SNDSZ:
640		*(int*)data = nbp->nbp_sndbuf;
641		break;
642	    case SMBTP_RCVSZ:
643		*(int*)data = nbp->nbp_rcvbuf;
644		break;
645	    case SMBTP_TIMEOUT:
646		*(struct timespec*)data = nbp->nbp_timo;
647		break;
648	    default:
649		return EINVAL;
650	}
651	return 0;
652}
653
654static int
655smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
656{
657	struct nbpcb *nbp = vcp->vc_tdata;
658
659	switch (param) {
660	    case SMBTP_SELECTID:
661		nbp->nbp_selectid = data;
662		break;
663	    default:
664		return EINVAL;
665	}
666	return 0;
667}
668
669/*
670 * Check for fatal errors
671 */
672static int
673smb_nbst_fatal(struct smb_vc *vcp, int error)
674{
675	switch (error) {
676	    case ENOTCONN:
677	    case ENETRESET:
678	    case ECONNABORTED:
679		return 1;
680	}
681	return 0;
682}
683
684
685struct smb_tran_desc smb_tran_nbtcp_desc = {
686	SMBT_NBTCP,
687	smb_nbst_create, smb_nbst_done,
688	smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
689	smb_nbst_send, smb_nbst_recv,
690	smb_nbst_timo, smb_nbst_intr,
691	smb_nbst_getparam, smb_nbst_setparam,
692	smb_nbst_fatal
693};
694
695