bge: Avoid accessing invalid internal memory region on BCM5906
[dragonfly.git] / sys / net / raw_usrreq.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1980, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * @(#)raw_usrreq.c 8.1 (Berkeley) 6/10/93
34 * $FreeBSD: src/sys/net/raw_usrreq.c,v 1.18 1999/08/28 00:48:28 peter Exp $
47db7f9b 35 * $DragonFly: src/sys/net/raw_usrreq.c,v 1.14 2007/06/24 20:00:00 dillon Exp $
984263bc
MD
36 */
37
38#include <sys/param.h>
39#include <sys/systm.h>
40#include <sys/mbuf.h>
41#include <sys/proc.h>
895c1f85 42#include <sys/priv.h>
984263bc
MD
43#include <sys/protosw.h>
44#include <sys/socket.h>
45#include <sys/socketvar.h>
46
6cef7136 47#include <sys/socketvar2.h>
002c1265 48#include <sys/msgport2.h>
6cef7136 49
984263bc
MD
50#include <net/raw_cb.h>
51
e6318d16 52
a3c18566 53static struct lwkt_token raw_token = LWKT_TOKEN_INITIALIZER(raw_token);
e6318d16 54
984263bc
MD
55/*
56 * Initialize raw connection block q.
57 */
58void
3bf25ce1 59raw_init(void)
984263bc
MD
60{
61 LIST_INIT(&rawcb_list);
62}
63
47db7f9b
MD
64/************************************************************************
65 * RAW PROTOCOL INTERFACE *
66 ************************************************************************/
984263bc
MD
67
68/*
47db7f9b
MD
69 * Raw protocol input routine. Find the socket associated with the packet(s)
70 * and move them over. If nothing exists for this packet, drop it. This
71 * routine is indirect called via rts_input() and will be serialized on
72 * cpu 0.
73 *
74 * Most other raw protocol interface functions are also serialized XXX.
984263bc
MD
75 */
76void
d16fa201
SZ
77raw_input(struct mbuf *m0, const struct sockproto *proto,
78 const struct sockaddr *src, const struct sockaddr *dst,
79 const struct rawcb *skip)
984263bc 80{
dadab5e9
MD
81 struct rawcb *rp;
82 struct mbuf *m = m0;
984263bc
MD
83 struct socket *last;
84
e6318d16
MD
85 lwkt_gettoken(&raw_token);
86
590b8cd4 87 last = NULL;
984263bc 88 LIST_FOREACH(rp, &rawcb_list, list) {
d16fa201
SZ
89 if (rp == skip)
90 continue;
984263bc
MD
91 if (rp->rcb_proto.sp_family != proto->sp_family)
92 continue;
93 if (rp->rcb_proto.sp_protocol &&
94 rp->rcb_proto.sp_protocol != proto->sp_protocol)
95 continue;
96 /*
97 * We assume the lower level routines have
98 * placed the address in a canonical format
99 * suitable for a structure comparison.
100 *
101 * Note that if the lengths are not the same
102 * the comparison will fail at the first byte.
103 */
0c3c561c 104 if (rp->rcb_laddr && !sa_equal(rp->rcb_laddr, dst))
984263bc 105 continue;
0c3c561c 106 if (rp->rcb_faddr && !sa_equal(rp->rcb_faddr, src))
984263bc
MD
107 continue;
108 if (last) {
109 struct mbuf *n;
f23061d4
JH
110
111 n = m_copypacket(m, MB_DONTWAIT);
590b8cd4 112 if (n != NULL) {
a7d0aade 113 lwkt_gettoken(&last->so_rcv.ssb_token);
6d49aa6f 114 if (ssb_appendaddr(&last->so_rcv, src, n,
60233e58 115 NULL) == 0) {
984263bc
MD
116 /* should notify about lost packet */
117 m_freem(n);
590b8cd4 118 } else {
984263bc 119 sorwakeup(last);
984263bc 120 }
a7d0aade 121 lwkt_reltoken(&last->so_rcv.ssb_token);
984263bc
MD
122 }
123 }
124 last = rp->rcb_socket;
125 }
126 if (last) {
a7d0aade 127 lwkt_gettoken(&last->so_rcv.ssb_token);
60233e58 128 if (ssb_appendaddr(&last->so_rcv, src, m, NULL) == 0)
984263bc 129 m_freem(m);
590b8cd4 130 else
984263bc 131 sorwakeup(last);
a7d0aade 132 lwkt_reltoken(&last->so_rcv.ssb_token);
590b8cd4 133 } else {
984263bc 134 m_freem(m);
590b8cd4 135 }
e6318d16 136 lwkt_reltoken(&raw_token);
984263bc
MD
137}
138
002c1265
MD
139/*
140 * nm_cmd, nm_arg, nm_extra
141 */
984263bc 142void
002c1265 143raw_ctlinput(netmsg_t msg)
984263bc 144{
002c1265 145 int error = 0;
984263bc 146
002c1265
MD
147 if (msg->ctlinput.nm_cmd < 0 || msg->ctlinput.nm_cmd > PRC_NCMDS)
148 ;
149 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
150}
151
6cef7136
MD
152/*
153 * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort()
154 * will sofree() it when we return.
155 */
002c1265
MD
156static void
157raw_uabort(netmsg_t msg)
984263bc 158{
002c1265
MD
159 struct rawcb *rp = sotorawcb(msg->base.nm_so);
160 int error;
984263bc 161
002c1265
MD
162 if (rp) {
163 raw_disconnect(rp);
164 soisdisconnected(msg->base.nm_so);
165 error = 0;
166 } else {
167 error = EINVAL;
168 }
169 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
170}
171
172/* pru_accept is EOPNOTSUPP */
173
002c1265
MD
174static void
175raw_uattach(netmsg_t msg)
984263bc 176{
002c1265
MD
177 struct socket *so = msg->base.nm_so;
178 int proto = msg->attach.nm_proto;
179 struct pru_attach_info *ai = msg->attach.nm_ai;
180 struct rawcb *rp;
984263bc
MD
181 int error;
182
002c1265
MD
183 rp = sotorawcb(so);
184 if (rp) {
185 error = priv_check_cred(ai->p_ucred, PRIV_ROOT, NULL_CRED_OKAY);
186 if (error == 0)
187 error = raw_attach(so, proto, ai->sb_rlimit);
188 } else {
189 error = EINVAL;
190 }
191 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
192}
193
002c1265
MD
194static void
195raw_ubind(netmsg_t msg)
984263bc 196{
002c1265 197 lwkt_replymsg(&msg->lmsg, EINVAL);
984263bc
MD
198}
199
002c1265
MD
200static void
201raw_uconnect(netmsg_t msg)
984263bc 202{
002c1265 203 lwkt_replymsg(&msg->lmsg, EINVAL);
984263bc
MD
204}
205
206/* pru_connect2 is EOPNOTSUPP */
207/* pru_control is EOPNOTSUPP */
208
002c1265
MD
209static void
210raw_udetach(netmsg_t msg)
984263bc 211{
002c1265
MD
212 struct rawcb *rp = sotorawcb(msg->base.nm_so);
213 int error;
984263bc 214
002c1265
MD
215 if (rp) {
216 raw_detach(rp);
217 error = 0;
218 } else {
219 error = EINVAL;
220 }
221 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
222}
223
002c1265
MD
224static void
225raw_udisconnect(netmsg_t msg)
984263bc 226{
002c1265
MD
227 struct socket *so = msg->base.nm_so;
228 struct rawcb *rp;
229 int error;
984263bc 230
002c1265
MD
231 rp = sotorawcb(so);
232 if (rp == NULL) {
233 error = EINVAL;
234 } else if (rp->rcb_faddr == NULL) {
235 error = ENOTCONN;
236 } else {
237 soreference(so);
238 raw_disconnect(rp);
239 soisdisconnected(so);
240 sofree(so);
241 error = 0;
984263bc 242 }
002c1265 243 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
244}
245
246/* pru_listen is EOPNOTSUPP */
247
002c1265
MD
248static void
249raw_upeeraddr(netmsg_t msg)
984263bc 250{
002c1265
MD
251 struct rawcb *rp = sotorawcb(msg->base.nm_so);
252 int error;
984263bc 253
002c1265
MD
254 if (rp == NULL) {
255 error = EINVAL;
256 } else if (rp->rcb_faddr == NULL) {
257 error = ENOTCONN;
258 } else {
259 *msg->peeraddr.nm_nam = dup_sockaddr(rp->rcb_faddr);
260 error = 0;
984263bc 261 }
002c1265 262 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
263}
264
265/* pru_rcvd is EOPNOTSUPP */
266/* pru_rcvoob is EOPNOTSUPP */
267
002c1265
MD
268static void
269raw_usend(netmsg_t msg)
984263bc 270{
002c1265
MD
271 struct socket *so = msg->base.nm_so;
272 struct mbuf *m = msg->send.nm_m;
273 struct mbuf *control = msg->send.nm_control;
984263bc 274 struct rawcb *rp = sotorawcb(so);
47e78ae8 275 struct pr_output_info oi;
002c1265
MD
276 int flags = msg->send.nm_flags;
277 int error;
984263bc 278
590b8cd4 279 if (rp == NULL) {
984263bc
MD
280 error = EINVAL;
281 goto release;
282 }
283
284 if (flags & PRUS_OOB) {
285 error = EOPNOTSUPP;
286 goto release;
287 }
288
289 if (control && control->m_len) {
290 error = EOPNOTSUPP;
291 goto release;
292 }
002c1265 293 if (msg->send.nm_addr) {
984263bc
MD
294 if (rp->rcb_faddr) {
295 error = EISCONN;
296 goto release;
297 }
002c1265 298 rp->rcb_faddr = msg->send.nm_addr;
590b8cd4 299 } else if (rp->rcb_faddr == NULL) {
984263bc
MD
300 error = ENOTCONN;
301 goto release;
302 }
002c1265 303 oi.p_pid = msg->send.nm_td->td_proc->p_pid;
47e78ae8 304 error = (*so->so_proto->pr_output)(m, so, &oi);
984263bc 305 m = NULL;
002c1265 306 if (msg->send.nm_addr)
590b8cd4 307 rp->rcb_faddr = NULL;
984263bc
MD
308release:
309 if (m != NULL)
310 m_freem(m);
002c1265 311 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
312}
313
314/* pru_sense is null */
315
002c1265
MD
316static void
317raw_ushutdown(netmsg_t msg)
984263bc 318{
002c1265
MD
319 struct rawcb *rp = sotorawcb(msg->base.nm_so);
320 int error;
984263bc 321
002c1265
MD
322 if (rp) {
323 socantsendmore(msg->base.nm_so);
324 error = 0;
325 } else {
326 error = EINVAL;
327 }
328 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
329}
330
002c1265
MD
331static void
332raw_usockaddr(netmsg_t msg)
984263bc 333{
002c1265
MD
334 struct rawcb *rp = sotorawcb(msg->base.nm_so);
335 int error;
984263bc 336
002c1265
MD
337 if (rp == NULL) {
338 error = EINVAL;
339 } else if (rp->rcb_laddr == NULL) {
340 error = EINVAL;
341 } else {
342 *msg->sockaddr.nm_nam = dup_sockaddr(rp->rcb_laddr);
343 error = 0;
344 }
345 lwkt_replymsg(&msg->lmsg, error);
984263bc
MD
346}
347
348struct pr_usrreqs raw_usrreqs = {
fa5e758c 349 .pru_abort = raw_uabort,
002c1265 350 .pru_accept = pr_generic_notsupp,
fa5e758c
MD
351 .pru_attach = raw_uattach,
352 .pru_bind = raw_ubind,
353 .pru_connect = raw_uconnect,
002c1265
MD
354 .pru_connect2 = pr_generic_notsupp,
355 .pru_control = pr_generic_notsupp,
fa5e758c
MD
356 .pru_detach = raw_udetach,
357 .pru_disconnect = raw_udisconnect,
002c1265 358 .pru_listen = pr_generic_notsupp,
fa5e758c 359 .pru_peeraddr = raw_upeeraddr,
002c1265
MD
360 .pru_rcvd = pr_generic_notsupp,
361 .pru_rcvoob = pr_generic_notsupp,
fa5e758c
MD
362 .pru_send = raw_usend,
363 .pru_sense = pru_sense_null,
364 .pru_shutdown = raw_ushutdown,
365 .pru_sockaddr = raw_usockaddr,
366 .pru_sosend = sosend,
8b5c39bb 367 .pru_soreceive = soreceive
984263bc 368};