vkernel - Improve memory image file startup
[dragonfly.git] / sys / net / raw_usrreq.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1980, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * @(#)raw_usrreq.c 8.1 (Berkeley) 6/10/93
34 * $FreeBSD: src/sys/net/raw_usrreq.c,v 1.18 1999/08/28 00:48:28 peter Exp $
47db7f9b 35 * $DragonFly: src/sys/net/raw_usrreq.c,v 1.14 2007/06/24 20:00:00 dillon Exp $
984263bc
MD
36 */
37
38#include <sys/param.h>
39#include <sys/systm.h>
40#include <sys/mbuf.h>
41#include <sys/proc.h>
895c1f85 42#include <sys/priv.h>
984263bc
MD
43#include <sys/protosw.h>
44#include <sys/socket.h>
45#include <sys/socketvar.h>
46
6cef7136
MD
47#include <sys/socketvar2.h>
48
984263bc
MD
49#include <net/raw_cb.h>
50
e6318d16
MD
51
52static struct lwkt_token raw_token = LWKT_TOKEN_MP_INITIALIZER(raw_token);
53
984263bc
MD
54/*
55 * Initialize raw connection block q.
56 */
57void
3bf25ce1 58raw_init(void)
984263bc
MD
59{
60 LIST_INIT(&rawcb_list);
61}
62
47db7f9b
MD
63/************************************************************************
64 * RAW PROTOCOL INTERFACE *
65 ************************************************************************/
984263bc
MD
66
67/*
47db7f9b
MD
68 * Raw protocol input routine. Find the socket associated with the packet(s)
69 * and move them over. If nothing exists for this packet, drop it. This
70 * routine is indirect called via rts_input() and will be serialized on
71 * cpu 0.
72 *
73 * Most other raw protocol interface functions are also serialized XXX.
984263bc
MD
74 */
75void
d16fa201
SZ
76raw_input(struct mbuf *m0, const struct sockproto *proto,
77 const struct sockaddr *src, const struct sockaddr *dst,
78 const struct rawcb *skip)
984263bc 79{
dadab5e9
MD
80 struct rawcb *rp;
81 struct mbuf *m = m0;
984263bc
MD
82 struct socket *last;
83
e6318d16
MD
84 lwkt_gettoken(&raw_token);
85
590b8cd4 86 last = NULL;
984263bc 87 LIST_FOREACH(rp, &rawcb_list, list) {
d16fa201
SZ
88 if (rp == skip)
89 continue;
984263bc
MD
90 if (rp->rcb_proto.sp_family != proto->sp_family)
91 continue;
92 if (rp->rcb_proto.sp_protocol &&
93 rp->rcb_proto.sp_protocol != proto->sp_protocol)
94 continue;
95 /*
96 * We assume the lower level routines have
97 * placed the address in a canonical format
98 * suitable for a structure comparison.
99 *
100 * Note that if the lengths are not the same
101 * the comparison will fail at the first byte.
102 */
0c3c561c 103 if (rp->rcb_laddr && !sa_equal(rp->rcb_laddr, dst))
984263bc 104 continue;
0c3c561c 105 if (rp->rcb_faddr && !sa_equal(rp->rcb_faddr, src))
984263bc
MD
106 continue;
107 if (last) {
108 struct mbuf *n;
f23061d4
JH
109
110 n = m_copypacket(m, MB_DONTWAIT);
590b8cd4 111 if (n != NULL) {
a7d0aade 112 lwkt_gettoken(&last->so_rcv.ssb_token);
6d49aa6f 113 if (ssb_appendaddr(&last->so_rcv, src, n,
60233e58 114 NULL) == 0) {
984263bc
MD
115 /* should notify about lost packet */
116 m_freem(n);
590b8cd4 117 } else {
984263bc 118 sorwakeup(last);
984263bc 119 }
a7d0aade 120 lwkt_reltoken(&last->so_rcv.ssb_token);
984263bc
MD
121 }
122 }
123 last = rp->rcb_socket;
124 }
125 if (last) {
a7d0aade 126 lwkt_gettoken(&last->so_rcv.ssb_token);
60233e58 127 if (ssb_appendaddr(&last->so_rcv, src, m, NULL) == 0)
984263bc 128 m_freem(m);
590b8cd4 129 else
984263bc 130 sorwakeup(last);
a7d0aade 131 lwkt_reltoken(&last->so_rcv.ssb_token);
590b8cd4 132 } else {
984263bc 133 m_freem(m);
590b8cd4 134 }
e6318d16 135 lwkt_reltoken(&raw_token);
984263bc
MD
136}
137
138/*ARGSUSED*/
139void
3bf25ce1 140raw_ctlinput(int cmd, struct sockaddr *arg, void *dummy)
984263bc
MD
141{
142
143 if (cmd < 0 || cmd > PRC_NCMDS)
144 return;
145 /* INCOMPLETE */
146}
147
6cef7136
MD
148/*
149 * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort()
150 * will sofree() it when we return.
151 */
984263bc
MD
152static int
153raw_uabort(struct socket *so)
154{
155 struct rawcb *rp = sotorawcb(so);
156
590b8cd4 157 if (rp == NULL)
984263bc
MD
158 return EINVAL;
159 raw_disconnect(rp);
984263bc
MD
160 soisdisconnected(so);
161 return 0;
162}
163
164/* pru_accept is EOPNOTSUPP */
165
166static int
e4700d00 167raw_uattach(struct socket *so, int proto, struct pru_attach_info *ai)
984263bc
MD
168{
169 struct rawcb *rp = sotorawcb(so);
170 int error;
171
590b8cd4 172 if (rp == NULL)
984263bc 173 return EINVAL;
895c1f85 174 if ((error = priv_check_cred(ai->p_ucred, PRIV_ROOT, NULL_CRED_OKAY)) != 0)
984263bc 175 return error;
e4700d00 176 return raw_attach(so, proto, ai->sb_rlimit);
984263bc
MD
177}
178
179static int
dadab5e9 180raw_ubind(struct socket *so, struct sockaddr *nam, struct thread *td)
984263bc
MD
181{
182 return EINVAL;
183}
184
185static int
dadab5e9 186raw_uconnect(struct socket *so, struct sockaddr *nam, struct thread *td)
984263bc
MD
187{
188 return EINVAL;
189}
190
191/* pru_connect2 is EOPNOTSUPP */
192/* pru_control is EOPNOTSUPP */
193
194static int
195raw_udetach(struct socket *so)
196{
197 struct rawcb *rp = sotorawcb(so);
198
590b8cd4 199 if (rp == NULL)
984263bc
MD
200 return EINVAL;
201
202 raw_detach(rp);
203 return 0;
204}
205
206static int
207raw_udisconnect(struct socket *so)
208{
209 struct rawcb *rp = sotorawcb(so);
210
590b8cd4 211 if (rp == NULL)
984263bc 212 return EINVAL;
590b8cd4 213 if (rp->rcb_faddr == NULL) {
984263bc
MD
214 return ENOTCONN;
215 }
6cef7136 216 soreference(so);
984263bc
MD
217 raw_disconnect(rp);
218 soisdisconnected(so);
6cef7136
MD
219 sofree(so);
220
984263bc
MD
221 return 0;
222}
223
224/* pru_listen is EOPNOTSUPP */
225
226static int
227raw_upeeraddr(struct socket *so, struct sockaddr **nam)
228{
229 struct rawcb *rp = sotorawcb(so);
230
590b8cd4 231 if (rp == NULL)
984263bc 232 return EINVAL;
590b8cd4 233 if (rp->rcb_faddr == NULL) {
984263bc
MD
234 return ENOTCONN;
235 }
cfa2ba21 236 *nam = dup_sockaddr(rp->rcb_faddr);
984263bc
MD
237 return 0;
238}
239
240/* pru_rcvd is EOPNOTSUPP */
241/* pru_rcvoob is EOPNOTSUPP */
242
243static int
244raw_usend(struct socket *so, int flags, struct mbuf *m,
dadab5e9 245 struct sockaddr *nam, struct mbuf *control, struct thread *td)
984263bc
MD
246{
247 int error;
248 struct rawcb *rp = sotorawcb(so);
47e78ae8 249 struct pr_output_info oi;
984263bc 250
590b8cd4 251 if (rp == NULL) {
984263bc
MD
252 error = EINVAL;
253 goto release;
254 }
255
256 if (flags & PRUS_OOB) {
257 error = EOPNOTSUPP;
258 goto release;
259 }
260
261 if (control && control->m_len) {
262 error = EOPNOTSUPP;
263 goto release;
264 }
265 if (nam) {
266 if (rp->rcb_faddr) {
267 error = EISCONN;
268 goto release;
269 }
270 rp->rcb_faddr = nam;
590b8cd4 271 } else if (rp->rcb_faddr == NULL) {
984263bc
MD
272 error = ENOTCONN;
273 goto release;
274 }
47e78ae8
JH
275 oi.p_pid = td->td_proc->p_pid;
276 error = (*so->so_proto->pr_output)(m, so, &oi);
984263bc
MD
277 m = NULL;
278 if (nam)
590b8cd4 279 rp->rcb_faddr = NULL;
984263bc
MD
280release:
281 if (m != NULL)
282 m_freem(m);
283 return (error);
284}
285
286/* pru_sense is null */
287
288static int
289raw_ushutdown(struct socket *so)
290{
291 struct rawcb *rp = sotorawcb(so);
292
590b8cd4 293 if (rp == NULL)
984263bc
MD
294 return EINVAL;
295 socantsendmore(so);
296 return 0;
297}
298
299static int
300raw_usockaddr(struct socket *so, struct sockaddr **nam)
301{
302 struct rawcb *rp = sotorawcb(so);
303
590b8cd4 304 if (rp == NULL)
984263bc 305 return EINVAL;
590b8cd4 306 if (rp->rcb_laddr == NULL)
984263bc 307 return EINVAL;
cfa2ba21 308 *nam = dup_sockaddr(rp->rcb_laddr);
984263bc
MD
309 return 0;
310}
311
312struct pr_usrreqs raw_usrreqs = {
fa5e758c
MD
313 .pru_abort = raw_uabort,
314 .pru_accept = pru_accept_notsupp,
315 .pru_attach = raw_uattach,
316 .pru_bind = raw_ubind,
317 .pru_connect = raw_uconnect,
318 .pru_connect2 = pru_connect2_notsupp,
319 .pru_control = pru_control_notsupp,
320 .pru_detach = raw_udetach,
321 .pru_disconnect = raw_udisconnect,
322 .pru_listen = pru_listen_notsupp,
323 .pru_peeraddr = raw_upeeraddr,
324 .pru_rcvd = pru_rcvd_notsupp,
325 .pru_rcvoob = pru_rcvoob_notsupp,
326 .pru_send = raw_usend,
327 .pru_sense = pru_sense_null,
328 .pru_shutdown = raw_ushutdown,
329 .pru_sockaddr = raw_usockaddr,
330 .pru_sosend = sosend,
8b5c39bb 331 .pru_soreceive = soreceive
984263bc 332};