1 /* 2 * Copyright (c) 1980, 1986, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the University nor the names of its contributors 14 * may be used to endorse or promote products derived from this software 15 * without specific prior written permission. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 * 29 * @(#)raw_usrreq.c 8.1 (Berkeley) 6/10/93 30 * $FreeBSD: src/sys/net/raw_usrreq.c,v 1.18 1999/08/28 00:48:28 peter Exp $ 31 */ 32 33 #include <sys/param.h> 34 #include <sys/systm.h> 35 #include <sys/mbuf.h> 36 #include <sys/proc.h> 37 #include <sys/priv.h> 38 #include <sys/protosw.h> 39 #include <sys/socket.h> 40 #include <sys/socketvar.h> 41 42 #include <sys/socketvar2.h> 43 #include <sys/msgport2.h> 44 45 #include <net/raw_cb.h> 46 47 48 static struct lwkt_token raw_token = LWKT_TOKEN_INITIALIZER(raw_token); 49 50 /* 51 * Initialize raw connection block q. 52 */ 53 void 54 raw_init(void) 55 { 56 LIST_INIT(&rawcb_list); 57 } 58 59 /************************************************************************ 60 * RAW PROTOCOL INTERFACE * 61 ************************************************************************/ 62 63 /* 64 * Raw protocol input routine. Find the socket associated with the packet(s) 65 * and move them over. If nothing exists for this packet, drop it. This 66 * routine is indirect called via rts_input() and will be serialized on 67 * cpu 0. 68 * 69 * Most other raw protocol interface functions are also serialized XXX. 70 */ 71 void 72 raw_input(struct mbuf *m0, const struct sockproto *proto, 73 const struct sockaddr *src, const struct sockaddr *dst, 74 const struct rawcb *skip) 75 { 76 struct rawcb *rp; 77 struct mbuf *m = m0; 78 struct socket *last; 79 80 lwkt_gettoken(&raw_token); 81 82 last = NULL; 83 LIST_FOREACH(rp, &rawcb_list, list) { 84 if (rp == skip) 85 continue; 86 if (rp->rcb_proto.sp_family != proto->sp_family) 87 continue; 88 if (rp->rcb_proto.sp_protocol && 89 rp->rcb_proto.sp_protocol != proto->sp_protocol) 90 continue; 91 /* 92 * We assume the lower level routines have 93 * placed the address in a canonical format 94 * suitable for a structure comparison. 95 * 96 * Note that if the lengths are not the same 97 * the comparison will fail at the first byte. 98 */ 99 if (rp->rcb_laddr && !sa_equal(rp->rcb_laddr, dst)) 100 continue; 101 if (rp->rcb_faddr && !sa_equal(rp->rcb_faddr, src)) 102 continue; 103 if (last) { 104 struct mbuf *n; 105 106 n = m_copypacket(m, M_NOWAIT); 107 if (n != NULL) { 108 lwkt_gettoken(&last->so_rcv.ssb_token); 109 if (ssb_appendaddr(&last->so_rcv, src, n, 110 NULL) == 0) { 111 m_freem(n); 112 soroverflow(last); 113 } else { 114 sorwakeup(last); 115 } 116 lwkt_reltoken(&last->so_rcv.ssb_token); 117 } 118 } 119 last = rp->rcb_socket; 120 } 121 if (last) { 122 lwkt_gettoken(&last->so_rcv.ssb_token); 123 if (ssb_appendaddr(&last->so_rcv, src, m, NULL) == 0) { 124 m_freem(m); 125 soroverflow(last); 126 } else 127 sorwakeup(last); 128 lwkt_reltoken(&last->so_rcv.ssb_token); 129 } else { 130 m_freem(m); 131 } 132 lwkt_reltoken(&raw_token); 133 } 134 135 /* 136 * nm_cmd, nm_arg, nm_extra 137 */ 138 void 139 raw_ctlinput(netmsg_t msg) 140 { 141 int error = 0; 142 143 if (msg->ctlinput.nm_cmd < 0 || msg->ctlinput.nm_cmd > PRC_NCMDS) { 144 ; /* no-op */ 145 } 146 lwkt_replymsg(&msg->lmsg, error); 147 } 148 149 /* 150 * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort() 151 * will sofree() it when we return. 152 */ 153 static void 154 raw_uabort(netmsg_t msg) 155 { 156 struct rawcb *rp = sotorawcb(msg->base.nm_so); 157 int error; 158 159 if (rp) { 160 raw_disconnect(rp); 161 soisdisconnected(msg->base.nm_so); 162 error = 0; 163 } else { 164 error = EINVAL; 165 } 166 lwkt_replymsg(&msg->lmsg, error); 167 } 168 169 /* pru_accept is EOPNOTSUPP */ 170 171 static void 172 raw_uattach(netmsg_t msg) 173 { 174 struct socket *so = msg->base.nm_so; 175 int proto = msg->attach.nm_proto; 176 struct pru_attach_info *ai = msg->attach.nm_ai; 177 struct rawcb *rp; 178 int error; 179 180 rp = sotorawcb(so); 181 if (rp) { 182 error = priv_check_cred(ai->p_ucred, PRIV_ROOT, NULL_CRED_OKAY); 183 if (error == 0) 184 error = raw_attach(so, proto, ai->sb_rlimit); 185 } else { 186 error = EINVAL; 187 } 188 lwkt_replymsg(&msg->lmsg, error); 189 } 190 191 static void 192 raw_ubind(netmsg_t msg) 193 { 194 lwkt_replymsg(&msg->lmsg, EINVAL); 195 } 196 197 static void 198 raw_uconnect(netmsg_t msg) 199 { 200 lwkt_replymsg(&msg->lmsg, EINVAL); 201 } 202 203 /* pru_connect2 is EOPNOTSUPP */ 204 /* pru_control is EOPNOTSUPP */ 205 206 static void 207 raw_udetach(netmsg_t msg) 208 { 209 struct rawcb *rp = sotorawcb(msg->base.nm_so); 210 int error; 211 212 if (rp) { 213 raw_detach(rp); 214 error = 0; 215 } else { 216 error = EINVAL; 217 } 218 lwkt_replymsg(&msg->lmsg, error); 219 } 220 221 static void 222 raw_udisconnect(netmsg_t msg) 223 { 224 struct socket *so = msg->base.nm_so; 225 struct rawcb *rp; 226 int error; 227 228 rp = sotorawcb(so); 229 if (rp == NULL) { 230 error = EINVAL; 231 } else if (rp->rcb_faddr == NULL) { 232 error = ENOTCONN; 233 } else { 234 soreference(so); 235 raw_disconnect(rp); 236 soisdisconnected(so); 237 sofree(so); 238 error = 0; 239 } 240 lwkt_replymsg(&msg->lmsg, error); 241 } 242 243 /* pru_listen is EOPNOTSUPP */ 244 245 static void 246 raw_upeeraddr(netmsg_t msg) 247 { 248 struct rawcb *rp = sotorawcb(msg->base.nm_so); 249 int error; 250 251 if (rp == NULL) { 252 error = EINVAL; 253 } else if (rp->rcb_faddr == NULL) { 254 error = ENOTCONN; 255 } else { 256 *msg->peeraddr.nm_nam = dup_sockaddr(rp->rcb_faddr); 257 error = 0; 258 } 259 lwkt_replymsg(&msg->lmsg, error); 260 } 261 262 /* pru_rcvd is EOPNOTSUPP */ 263 /* pru_rcvoob is EOPNOTSUPP */ 264 265 static void 266 raw_usend(netmsg_t msg) 267 { 268 struct socket *so = msg->base.nm_so; 269 struct mbuf *m = msg->send.nm_m; 270 struct mbuf *control = msg->send.nm_control; 271 struct rawcb *rp = sotorawcb(so); 272 struct pr_output_info oi; 273 int flags = msg->send.nm_flags; 274 int error; 275 276 if (rp == NULL) { 277 error = EINVAL; 278 goto release; 279 } 280 281 if (flags & PRUS_OOB) { 282 error = EOPNOTSUPP; 283 goto release; 284 } 285 286 if (control && control->m_len) { 287 error = EOPNOTSUPP; 288 goto release; 289 } 290 if (msg->send.nm_addr) { 291 if (rp->rcb_faddr) { 292 error = EISCONN; 293 goto release; 294 } 295 rp->rcb_faddr = msg->send.nm_addr; 296 } else if (rp->rcb_faddr == NULL) { 297 error = ENOTCONN; 298 goto release; 299 } 300 oi.p_pid = msg->send.nm_td->td_proc->p_pid; 301 error = (*so->so_proto->pr_output)(m, so, &oi); 302 m = NULL; 303 if (msg->send.nm_addr) 304 rp->rcb_faddr = NULL; 305 release: 306 if (m != NULL) 307 m_freem(m); 308 lwkt_replymsg(&msg->lmsg, error); 309 } 310 311 /* pru_sense is null */ 312 313 static void 314 raw_ushutdown(netmsg_t msg) 315 { 316 struct rawcb *rp = sotorawcb(msg->base.nm_so); 317 int error; 318 319 if (rp) { 320 socantsendmore(msg->base.nm_so); 321 error = 0; 322 } else { 323 error = EINVAL; 324 } 325 lwkt_replymsg(&msg->lmsg, error); 326 } 327 328 static void 329 raw_usockaddr(netmsg_t msg) 330 { 331 struct rawcb *rp = sotorawcb(msg->base.nm_so); 332 int error; 333 334 if (rp == NULL) { 335 error = EINVAL; 336 } else if (rp->rcb_laddr == NULL) { 337 error = EINVAL; 338 } else { 339 *msg->sockaddr.nm_nam = dup_sockaddr(rp->rcb_laddr); 340 error = 0; 341 } 342 lwkt_replymsg(&msg->lmsg, error); 343 } 344 345 struct pr_usrreqs raw_usrreqs = { 346 .pru_abort = raw_uabort, 347 .pru_accept = pr_generic_notsupp, 348 .pru_attach = raw_uattach, 349 .pru_bind = raw_ubind, 350 .pru_connect = raw_uconnect, 351 .pru_connect2 = pr_generic_notsupp, 352 .pru_control = pr_generic_notsupp, 353 .pru_detach = raw_udetach, 354 .pru_disconnect = raw_udisconnect, 355 .pru_listen = pr_generic_notsupp, 356 .pru_peeraddr = raw_upeeraddr, 357 .pru_rcvd = pr_generic_notsupp, 358 .pru_rcvoob = pr_generic_notsupp, 359 .pru_send = raw_usend, 360 .pru_sense = pru_sense_null, 361 .pru_shutdown = raw_ushutdown, 362 .pru_sockaddr = raw_usockaddr, 363 .pru_sosend = sosend, 364 .pru_soreceive = soreceive 365 }; 366