/* $KAME: sctp_peeloff.c,v 1.12 2004/08/17 04:06:19 itojun Exp $ */ /* $DragonFly: src/sys/netinet/sctp_peeloff.c,v 1.2 2005/07/15 15:02:02 eirikn Exp $ */ /* * Copyright (C) 2002, 2003 Cisco Systems Inc, * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #if !(defined(__OpenBSD__) || defined(__APPLE__)) #include "opt_ipsec.h" #endif #if defined(__FreeBSD__) || defined(__DragonFly__) #include "opt_inet6.h" #include "opt_inet.h" #endif #if defined(__NetBSD__) #include "opt_inet.h" #endif #ifdef __APPLE__ #include #elif !defined(__OpenBSD__) #include "opt_sctp.h" #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef INET6 #include #endif #include #include #include #ifdef INET6 #include #endif #include #include #include #include #include #include #include #include #ifdef IPSEC #ifndef __OpenBSD__ #include #include #else #undef IPSEC #endif #endif /*IPSEC*/ #ifdef SCTP_DEBUG extern u_int32_t sctp_debug_on; #endif /* SCTP_DEBUG */ int sctp_can_peel_off(struct socket *head, caddr_t assoc_id) { struct sctp_inpcb *inp; struct sctp_tcb *stcb; inp = (struct sctp_inpcb *)head->so_pcb; if (inp == NULL) { return (EFAULT); } stcb = sctp_findassociation_ep_asocid(inp, assoc_id); if (stcb == NULL) { return (ENOTCONN); } /* We are clear to peel this one off */ return (0); } int sctp_do_peeloff(struct socket *head, struct socket *so, caddr_t assoc_id) { struct sctp_inpcb *inp, *n_inp; struct sctp_tcb *stcb; inp = (struct sctp_inpcb *)head->so_pcb; if (inp == NULL) return (EFAULT); stcb = sctp_findassociation_ep_asocid(inp, assoc_id); if (stcb == NULL) return (ENOTCONN); n_inp = (struct sctp_inpcb *)so->so_pcb; n_inp->sctp_flags = (SCTP_PCB_FLAGS_UDPTYPE | SCTP_PCB_FLAGS_CONNECTED | SCTP_PCB_FLAGS_IN_TCPPOOL | /* Turn on Blocking IO */ (SCTP_PCB_COPY_FLAGS & inp->sctp_flags)); n_inp->sctp_socket = so; /* * Now we must move it from one hash table to another and get * the stcb in the right place. */ sctp_move_pcb_and_assoc(inp, n_inp, stcb); /* * And now the final hack. We move data in the * pending side i.e. head to the new socket * buffer. Let the GRUBBING begin :-0 */ sctp_grub_through_socket_buffer(inp, head, so, stcb); return (0); } struct socket * sctp_get_peeloff(struct socket *head, caddr_t assoc_id, int *error) { struct socket *newso; struct sctp_inpcb *inp, *n_inp; struct sctp_tcb *stcb; #ifdef SCTP_DEBUG if (sctp_debug_on & SCTP_DEBUG_PEEL1) { printf("SCTP peel-off called\n"); } #endif /* SCTP_DEBUG */ inp = (struct sctp_inpcb *)head->so_pcb; if (inp == NULL) { *error = EFAULT; return (NULL); } stcb = sctp_findassociation_ep_asocid(inp, assoc_id); if (stcb == NULL) { *error = ENOTCONN; return (NULL); } newso = sonewconn(head, SS_ISCONNECTED); if (newso == NULL) { #ifdef SCTP_DEBUG if (sctp_debug_on & SCTP_DEBUG_PEEL1) { printf("sctp_peeloff:sonewconn failed err\n"); } #endif /* SCTP_DEBUG */ *error = ENOMEM; SCTP_TCB_UNLOCK(stcb); return (NULL); } n_inp = (struct sctp_inpcb *)newso->so_pcb; SCTP_INP_WLOCK(n_inp); n_inp->sctp_flags = (SCTP_PCB_FLAGS_UDPTYPE | SCTP_PCB_FLAGS_CONNECTED | SCTP_PCB_FLAGS_IN_TCPPOOL | /* Turn on Blocking IO */ (SCTP_PCB_COPY_FLAGS & inp->sctp_flags)); n_inp->sctp_socket = newso; /* Turn off any non-blocking symantic. */ newso->so_state &= ~SS_NBIO; newso->so_state |= SS_ISCONNECTED; /* We remove it right away */ #if defined(__FreeBSD__) || defined(__APPLE__) || defined(__DragonFly__) SOCK_LOCK(head); TAILQ_REMOVE(&head->so_comp, newso, so_list); head->so_qlen--; SOCK_UNLOCK(head); #else #if defined(__NetBSD__) || defined(__OpenBSD__) newso = TAILQ_FIRST(&head->so_q); #else newso = head->so_q; #endif if (soqremque(newso, 1) == 0) panic("sctp_peeloff"); #endif /* __FreeBSD__ */ /* * Now we must move it from one hash table to another and get * the stcb in the right place. */ SCTP_INP_WUNLOCK(n_inp); sctp_move_pcb_and_assoc(inp, n_inp, stcb); /* * And now the final hack. We move data in the * pending side i.e. head to the new socket * buffer. Let the GRUBBING begin :-0 */ sctp_grub_through_socket_buffer(inp, head, newso, stcb); SCTP_TCB_UNLOCK(stcb); return (newso); }