xref: /dragonfly/sys/net/raw_usrreq.c (revision aef87d48)
1 /*
2  * Copyright (c) 1980, 1986, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. Neither the name of the University nor the names of its contributors
14  *    may be used to endorse or promote products derived from this software
15  *    without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  *	@(#)raw_usrreq.c	8.1 (Berkeley) 6/10/93
30  * $FreeBSD: src/sys/net/raw_usrreq.c,v 1.18 1999/08/28 00:48:28 peter Exp $
31  */
32 
33 #include <sys/param.h>
34 #include <sys/systm.h>
35 #include <sys/mbuf.h>
36 #include <sys/proc.h>
37 #include <sys/priv.h>
38 #include <sys/protosw.h>
39 #include <sys/socket.h>
40 #include <sys/socketvar.h>
41 
42 #include <sys/socketvar2.h>
43 #include <sys/msgport2.h>
44 
45 #include <net/raw_cb.h>
46 #include <net/netisr2.h>
47 
48 /*
49  * Except from the raw_init(), rest of interfaces must be called
50  * from netisr0.
51  */
52 
53 /*
54  * Initialize raw connection block q.
55  */
56 void
57 raw_init(void)
58 {
59 	LIST_INIT(&rawcb_list);
60 }
61 
62 /************************************************************************
63  *			 RAW PROTOCOL INTERFACE				*
64  ************************************************************************/
65 
66 /*
67  * Raw protocol input routine.  Find the socket associated with the packet(s)
68  * and move them over.  If nothing exists for this packet, drop it.  This
69  * routine is indirect called via rts_input() and will be serialized on
70  * cpu 0.
71  *
72  * Most other raw protocol interface functions are also serialized XXX.
73  */
74 void
75 raw_input(struct mbuf *m0, const struct sockproto *proto,
76 	  const struct sockaddr *src, const struct sockaddr *dst,
77 	  const struct rawcb *skip)
78 {
79 	struct rawcb *rp;
80 	struct mbuf *m = m0;
81 	struct socket *last;
82 
83 	ASSERT_NETISR0;
84 
85 	last = NULL;
86 
87 	LIST_FOREACH(rp, &rawcb_list, list) {
88 		if (rp == skip)
89 			continue;
90 		if (rp->rcb_proto.sp_family != proto->sp_family)
91 			continue;
92 		if (rp->rcb_proto.sp_protocol  &&
93 		    rp->rcb_proto.sp_protocol != proto->sp_protocol)
94 			continue;
95 		/*
96 		 * We assume the lower level routines have
97 		 * placed the address in a canonical format
98 		 * suitable for a structure comparison.
99 		 *
100 		 * Note that if the lengths are not the same
101 		 * the comparison will fail at the first byte.
102 		 */
103 		if (rp->rcb_laddr && !sa_equal(rp->rcb_laddr, dst))
104 			continue;
105 		if (rp->rcb_faddr && !sa_equal(rp->rcb_faddr, src))
106 			continue;
107 		if (last) {
108 			struct mbuf *n;
109 
110 			n = m_copypacket(m, M_NOWAIT);
111 			if (n != NULL) {
112 				lwkt_gettoken(&last->so_rcv.ssb_token);
113 				if (ssb_appendaddr(&last->so_rcv, src, n,
114 						 NULL) == 0) {
115 					m_freem(n);
116 					soroverflow(last);
117 				} else {
118 					sorwakeup(last);
119 				}
120 				lwkt_reltoken(&last->so_rcv.ssb_token);
121 			}
122 		}
123 		last = rp->rcb_socket;
124 	}
125 	if (last) {
126 		lwkt_gettoken(&last->so_rcv.ssb_token);
127 		if (ssb_appendaddr(&last->so_rcv, src, m, NULL) == 0) {
128 			m_freem(m);
129 			soroverflow(last);
130 		} else
131 			sorwakeup(last);
132 		lwkt_reltoken(&last->so_rcv.ssb_token);
133 	} else {
134 		m_freem(m);
135 	}
136 }
137 
138 /*
139  * nm_cmd, nm_arg, nm_extra
140  */
141 void
142 raw_ctlinput(netmsg_t msg)
143 {
144 	int error = 0;
145 
146 	ASSERT_NETISR0;
147 
148 	if (msg->ctlinput.nm_cmd < 0 || msg->ctlinput.nm_cmd > PRC_NCMDS) {
149 		; /* no-op */
150 	}
151 	lwkt_replymsg(&msg->lmsg, error);
152 }
153 
154 /*
155  * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort()
156  *	 will sofree() it when we return.
157  */
158 static void
159 raw_uabort(netmsg_t msg)
160 {
161 	struct rawcb *rp = sotorawcb(msg->base.nm_so);
162 	int error;
163 
164 	ASSERT_NETISR0;
165 
166 	if (rp) {
167 		raw_disconnect(rp);
168 		soisdisconnected(msg->base.nm_so);
169 		error = 0;
170 	} else {
171 		error = EINVAL;
172 	}
173 	lwkt_replymsg(&msg->lmsg, error);
174 }
175 
176 /* pru_accept is EOPNOTSUPP */
177 
178 static void
179 raw_uattach(netmsg_t msg)
180 {
181 	struct socket *so = msg->base.nm_so;
182 	int proto = msg->attach.nm_proto;
183 	struct pru_attach_info *ai = msg->attach.nm_ai;
184 	struct rawcb *rp;
185 	int error;
186 
187 	ASSERT_NETISR0;
188 
189 	rp = sotorawcb(so);
190 	if (rp) {
191 		error = priv_check_cred(ai->p_ucred, PRIV_ROOT, NULL_CRED_OKAY);
192 		if (error == 0)
193 			error = raw_attach(so, proto, ai->sb_rlimit);
194 	} else {
195 		error = EINVAL;
196 	}
197 	lwkt_replymsg(&msg->lmsg, error);
198 }
199 
200 static void
201 raw_ubind(netmsg_t msg)
202 {
203 	ASSERT_NETISR0;
204 	lwkt_replymsg(&msg->lmsg, EINVAL);
205 }
206 
207 static void
208 raw_uconnect(netmsg_t msg)
209 {
210 	ASSERT_NETISR0;
211 	lwkt_replymsg(&msg->lmsg, EINVAL);
212 }
213 
214 /* pru_connect2 is EOPNOTSUPP */
215 /* pru_control is EOPNOTSUPP */
216 
217 static void
218 raw_udetach(netmsg_t msg)
219 {
220 	struct rawcb *rp = sotorawcb(msg->base.nm_so);
221 	int error;
222 
223 	ASSERT_NETISR0;
224 
225 	if (rp) {
226 		raw_detach(rp);
227 		error = 0;
228 	} else {
229 		error = EINVAL;
230 	}
231 	lwkt_replymsg(&msg->lmsg, error);
232 }
233 
234 static void
235 raw_udisconnect(netmsg_t msg)
236 {
237 	struct socket *so = msg->base.nm_so;
238 	struct rawcb *rp;
239 	int error;
240 
241 	ASSERT_NETISR0;
242 
243 	rp = sotorawcb(so);
244 	if (rp == NULL) {
245 		error = EINVAL;
246 	} else if (rp->rcb_faddr == NULL) {
247 		error = ENOTCONN;
248 	} else {
249 		soreference(so);
250 		raw_disconnect(rp);
251 		soisdisconnected(so);
252 		sofree(so);
253 		error = 0;
254 	}
255 	lwkt_replymsg(&msg->lmsg, error);
256 }
257 
258 /* pru_listen is EOPNOTSUPP */
259 
260 static void
261 raw_upeeraddr(netmsg_t msg)
262 {
263 	struct rawcb *rp = sotorawcb(msg->base.nm_so);
264 	int error;
265 
266 	ASSERT_NETISR0;
267 
268 	if (rp == NULL) {
269 		error = EINVAL;
270 	} else if (rp->rcb_faddr == NULL) {
271 		error = ENOTCONN;
272 	} else {
273 		*msg->peeraddr.nm_nam = dup_sockaddr(rp->rcb_faddr);
274 		error = 0;
275 	}
276 	lwkt_replymsg(&msg->lmsg, error);
277 }
278 
279 /* pru_rcvd is EOPNOTSUPP */
280 /* pru_rcvoob is EOPNOTSUPP */
281 
282 static void
283 raw_usend(netmsg_t msg)
284 {
285 	struct socket *so = msg->base.nm_so;
286 	struct mbuf *m = msg->send.nm_m;
287 	struct mbuf *control = msg->send.nm_control;
288 	struct rawcb *rp = sotorawcb(so);
289 	struct pr_output_info oi;
290 	int flags = msg->send.nm_flags;
291 	int error;
292 
293 	ASSERT_NETISR0;
294 
295 	if (rp == NULL) {
296 		error = EINVAL;
297 		goto release;
298 	}
299 
300 	if (flags & PRUS_OOB) {
301 		error = EOPNOTSUPP;
302 		goto release;
303 	}
304 
305 	if (control && control->m_len) {
306 		error = EOPNOTSUPP;
307 		goto release;
308 	}
309 	if (msg->send.nm_addr) {
310 		if (rp->rcb_faddr) {
311 			error = EISCONN;
312 			goto release;
313 		}
314 		rp->rcb_faddr = msg->send.nm_addr;
315 	} else if (rp->rcb_faddr == NULL) {
316 		error = ENOTCONN;
317 		goto release;
318 	}
319 	oi.p_pid = msg->send.nm_td->td_proc->p_pid;
320 	error = (*so->so_proto->pr_output)(m, so, &oi);
321 	m = NULL;
322 	if (msg->send.nm_addr)
323 		rp->rcb_faddr = NULL;
324 release:
325 	if (m != NULL)
326 		m_freem(m);
327 	lwkt_replymsg(&msg->lmsg, error);
328 }
329 
330 /* pru_sense is null */
331 
332 static void
333 raw_ushutdown(netmsg_t msg)
334 {
335 	struct rawcb *rp = sotorawcb(msg->base.nm_so);
336 	int error;
337 
338 	ASSERT_NETISR0;
339 
340 	if (rp) {
341 		socantsendmore(msg->base.nm_so);
342 		error = 0;
343 	} else {
344 		error = EINVAL;
345 	}
346 	lwkt_replymsg(&msg->lmsg, error);
347 }
348 
349 static void
350 raw_usockaddr(netmsg_t msg)
351 {
352 	struct rawcb *rp = sotorawcb(msg->base.nm_so);
353 	int error;
354 
355 	ASSERT_NETISR0;
356 
357 	if (rp == NULL) {
358 		error = EINVAL;
359 	} else if (rp->rcb_laddr == NULL) {
360 		error = EINVAL;
361 	} else {
362 		*msg->sockaddr.nm_nam = dup_sockaddr(rp->rcb_laddr);
363 		error = 0;
364 	}
365 	lwkt_replymsg(&msg->lmsg, error);
366 }
367 
368 struct pr_usrreqs raw_usrreqs = {
369 	.pru_abort = raw_uabort,
370 	.pru_accept = pr_generic_notsupp,
371 	.pru_attach = raw_uattach,
372 	.pru_bind = raw_ubind,
373 	.pru_connect = raw_uconnect,
374 	.pru_connect2 = pr_generic_notsupp,
375 	.pru_control = pr_generic_notsupp,
376 	.pru_detach = raw_udetach,
377 	.pru_disconnect = raw_udisconnect,
378 	.pru_listen = pr_generic_notsupp,
379 	.pru_peeraddr = raw_upeeraddr,
380 	.pru_rcvd = pr_generic_notsupp,
381 	.pru_rcvoob = pr_generic_notsupp,
382 	.pru_send = raw_usend,
383 	.pru_sense = pru_sense_null,
384 	.pru_shutdown = raw_ushutdown,
385 	.pru_sockaddr = raw_usockaddr,
386 	.pru_sosend = sosend,
387 	.pru_soreceive = soreceive
388 };
389