1 /* 2 * Copyright (c) 1980, 1986, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the University nor the names of its contributors 14 * may be used to endorse or promote products derived from this software 15 * without specific prior written permission. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 * 29 * @(#)raw_usrreq.c 8.1 (Berkeley) 6/10/93 30 * $FreeBSD: src/sys/net/raw_usrreq.c,v 1.18 1999/08/28 00:48:28 peter Exp $ 31 */ 32 33 #include <sys/param.h> 34 #include <sys/systm.h> 35 #include <sys/mbuf.h> 36 #include <sys/proc.h> 37 #include <sys/priv.h> 38 #include <sys/protosw.h> 39 #include <sys/socket.h> 40 #include <sys/socketvar.h> 41 42 #include <sys/socketvar2.h> 43 #include <sys/msgport2.h> 44 45 #include <net/raw_cb.h> 46 #include <net/netisr2.h> 47 48 /* 49 * Except from the raw_init(), rest of interfaces must be called 50 * from netisr0. 51 */ 52 53 /* 54 * Initialize raw connection block q. 55 */ 56 void 57 raw_init(void) 58 { 59 LIST_INIT(&rawcb_list); 60 } 61 62 /************************************************************************ 63 * RAW PROTOCOL INTERFACE * 64 ************************************************************************/ 65 66 /* 67 * Raw protocol input routine. Find the socket associated with the packet(s) 68 * and move them over. If nothing exists for this packet, drop it. This 69 * routine is indirect called via rts_input() and will be serialized on 70 * cpu 0. 71 * 72 * Most other raw protocol interface functions are also serialized XXX. 73 */ 74 void 75 raw_input(struct mbuf *m0, const struct sockproto *proto, 76 const struct sockaddr *src, const struct sockaddr *dst, 77 const struct rawcb *skip) 78 { 79 struct rawcb *rp; 80 struct mbuf *m = m0; 81 struct socket *last; 82 83 ASSERT_NETISR0; 84 85 last = NULL; 86 87 LIST_FOREACH(rp, &rawcb_list, list) { 88 if (rp == skip) 89 continue; 90 if (rp->rcb_proto.sp_family != proto->sp_family) 91 continue; 92 if (rp->rcb_proto.sp_protocol && 93 rp->rcb_proto.sp_protocol != proto->sp_protocol) 94 continue; 95 /* 96 * We assume the lower level routines have 97 * placed the address in a canonical format 98 * suitable for a structure comparison. 99 * 100 * Note that if the lengths are not the same 101 * the comparison will fail at the first byte. 102 */ 103 if (rp->rcb_laddr && !sa_equal(rp->rcb_laddr, dst)) 104 continue; 105 if (rp->rcb_faddr && !sa_equal(rp->rcb_faddr, src)) 106 continue; 107 if (last) { 108 struct mbuf *n; 109 110 n = m_copypacket(m, M_NOWAIT); 111 if (n != NULL) { 112 lwkt_gettoken(&last->so_rcv.ssb_token); 113 if (ssb_appendaddr(&last->so_rcv, src, n, 114 NULL) == 0) { 115 m_freem(n); 116 soroverflow(last); 117 } else { 118 sorwakeup(last); 119 } 120 lwkt_reltoken(&last->so_rcv.ssb_token); 121 } 122 } 123 last = rp->rcb_socket; 124 } 125 if (last) { 126 lwkt_gettoken(&last->so_rcv.ssb_token); 127 if (ssb_appendaddr(&last->so_rcv, src, m, NULL) == 0) { 128 m_freem(m); 129 soroverflow(last); 130 } else 131 sorwakeup(last); 132 lwkt_reltoken(&last->so_rcv.ssb_token); 133 } else { 134 m_freem(m); 135 } 136 } 137 138 /* 139 * nm_cmd, nm_arg, nm_extra 140 */ 141 void 142 raw_ctlinput(netmsg_t msg) 143 { 144 int error = 0; 145 146 ASSERT_NETISR0; 147 148 if (msg->ctlinput.nm_cmd < 0 || msg->ctlinput.nm_cmd > PRC_NCMDS) { 149 ; /* no-op */ 150 } 151 lwkt_replymsg(&msg->lmsg, error); 152 } 153 154 /* 155 * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort() 156 * will sofree() it when we return. 157 */ 158 static void 159 raw_uabort(netmsg_t msg) 160 { 161 struct rawcb *rp = sotorawcb(msg->base.nm_so); 162 int error; 163 164 ASSERT_NETISR0; 165 166 if (rp) { 167 raw_disconnect(rp); 168 soisdisconnected(msg->base.nm_so); 169 error = 0; 170 } else { 171 error = EINVAL; 172 } 173 lwkt_replymsg(&msg->lmsg, error); 174 } 175 176 /* pru_accept is EOPNOTSUPP */ 177 178 static void 179 raw_uattach(netmsg_t msg) 180 { 181 struct socket *so = msg->base.nm_so; 182 int proto = msg->attach.nm_proto; 183 struct pru_attach_info *ai = msg->attach.nm_ai; 184 struct rawcb *rp; 185 int error; 186 187 ASSERT_NETISR0; 188 189 rp = sotorawcb(so); 190 if (rp) { 191 error = priv_check_cred(ai->p_ucred, PRIV_ROOT, NULL_CRED_OKAY); 192 if (error == 0) 193 error = raw_attach(so, proto, ai->sb_rlimit); 194 } else { 195 error = EINVAL; 196 } 197 lwkt_replymsg(&msg->lmsg, error); 198 } 199 200 static void 201 raw_ubind(netmsg_t msg) 202 { 203 ASSERT_NETISR0; 204 lwkt_replymsg(&msg->lmsg, EINVAL); 205 } 206 207 static void 208 raw_uconnect(netmsg_t msg) 209 { 210 ASSERT_NETISR0; 211 lwkt_replymsg(&msg->lmsg, EINVAL); 212 } 213 214 /* pru_connect2 is EOPNOTSUPP */ 215 /* pru_control is EOPNOTSUPP */ 216 217 static void 218 raw_udetach(netmsg_t msg) 219 { 220 struct rawcb *rp = sotorawcb(msg->base.nm_so); 221 int error; 222 223 ASSERT_NETISR0; 224 225 if (rp) { 226 raw_detach(rp); 227 error = 0; 228 } else { 229 error = EINVAL; 230 } 231 lwkt_replymsg(&msg->lmsg, error); 232 } 233 234 static void 235 raw_udisconnect(netmsg_t msg) 236 { 237 struct socket *so = msg->base.nm_so; 238 struct rawcb *rp; 239 int error; 240 241 ASSERT_NETISR0; 242 243 rp = sotorawcb(so); 244 if (rp == NULL) { 245 error = EINVAL; 246 } else if (rp->rcb_faddr == NULL) { 247 error = ENOTCONN; 248 } else { 249 soreference(so); 250 raw_disconnect(rp); 251 soisdisconnected(so); 252 sofree(so); 253 error = 0; 254 } 255 lwkt_replymsg(&msg->lmsg, error); 256 } 257 258 /* pru_listen is EOPNOTSUPP */ 259 260 static void 261 raw_upeeraddr(netmsg_t msg) 262 { 263 struct rawcb *rp = sotorawcb(msg->base.nm_so); 264 int error; 265 266 ASSERT_NETISR0; 267 268 if (rp == NULL) { 269 error = EINVAL; 270 } else if (rp->rcb_faddr == NULL) { 271 error = ENOTCONN; 272 } else { 273 *msg->peeraddr.nm_nam = dup_sockaddr(rp->rcb_faddr); 274 error = 0; 275 } 276 lwkt_replymsg(&msg->lmsg, error); 277 } 278 279 /* pru_rcvd is EOPNOTSUPP */ 280 /* pru_rcvoob is EOPNOTSUPP */ 281 282 static void 283 raw_usend(netmsg_t msg) 284 { 285 struct socket *so = msg->base.nm_so; 286 struct mbuf *m = msg->send.nm_m; 287 struct mbuf *control = msg->send.nm_control; 288 struct rawcb *rp = sotorawcb(so); 289 struct pr_output_info oi; 290 int flags = msg->send.nm_flags; 291 int error; 292 293 ASSERT_NETISR0; 294 295 if (rp == NULL) { 296 error = EINVAL; 297 goto release; 298 } 299 300 if (flags & PRUS_OOB) { 301 error = EOPNOTSUPP; 302 goto release; 303 } 304 305 if (control && control->m_len) { 306 error = EOPNOTSUPP; 307 goto release; 308 } 309 if (msg->send.nm_addr) { 310 if (rp->rcb_faddr) { 311 error = EISCONN; 312 goto release; 313 } 314 rp->rcb_faddr = msg->send.nm_addr; 315 } else if (rp->rcb_faddr == NULL) { 316 error = ENOTCONN; 317 goto release; 318 } 319 oi.p_pid = msg->send.nm_td->td_proc->p_pid; 320 error = (*so->so_proto->pr_output)(m, so, &oi); 321 m = NULL; 322 if (msg->send.nm_addr) 323 rp->rcb_faddr = NULL; 324 release: 325 if (m != NULL) 326 m_freem(m); 327 lwkt_replymsg(&msg->lmsg, error); 328 } 329 330 /* pru_sense is null */ 331 332 static void 333 raw_ushutdown(netmsg_t msg) 334 { 335 struct rawcb *rp = sotorawcb(msg->base.nm_so); 336 int error; 337 338 ASSERT_NETISR0; 339 340 if (rp) { 341 socantsendmore(msg->base.nm_so); 342 error = 0; 343 } else { 344 error = EINVAL; 345 } 346 lwkt_replymsg(&msg->lmsg, error); 347 } 348 349 static void 350 raw_usockaddr(netmsg_t msg) 351 { 352 struct rawcb *rp = sotorawcb(msg->base.nm_so); 353 int error; 354 355 ASSERT_NETISR0; 356 357 if (rp == NULL) { 358 error = EINVAL; 359 } else if (rp->rcb_laddr == NULL) { 360 error = EINVAL; 361 } else { 362 *msg->sockaddr.nm_nam = dup_sockaddr(rp->rcb_laddr); 363 error = 0; 364 } 365 lwkt_replymsg(&msg->lmsg, error); 366 } 367 368 struct pr_usrreqs raw_usrreqs = { 369 .pru_abort = raw_uabort, 370 .pru_accept = pr_generic_notsupp, 371 .pru_attach = raw_uattach, 372 .pru_bind = raw_ubind, 373 .pru_connect = raw_uconnect, 374 .pru_connect2 = pr_generic_notsupp, 375 .pru_control = pr_generic_notsupp, 376 .pru_detach = raw_udetach, 377 .pru_disconnect = raw_udisconnect, 378 .pru_listen = pr_generic_notsupp, 379 .pru_peeraddr = raw_upeeraddr, 380 .pru_rcvd = pr_generic_notsupp, 381 .pru_rcvoob = pr_generic_notsupp, 382 .pru_send = raw_usend, 383 .pru_sense = pru_sense_null, 384 .pru_shutdown = raw_ushutdown, 385 .pru_sockaddr = raw_usockaddr, 386 .pru_sosend = sosend, 387 .pru_soreceive = soreceive 388 }; 389