busdma(9): Dup i386 busdma_machdep.c to vkernel
[dragonfly.git] / sys / net / raw_usrreq.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1980, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * @(#)raw_usrreq.c 8.1 (Berkeley) 6/10/93
34 * $FreeBSD: src/sys/net/raw_usrreq.c,v 1.18 1999/08/28 00:48:28 peter Exp $
47db7f9b 35 * $DragonFly: src/sys/net/raw_usrreq.c,v 1.14 2007/06/24 20:00:00 dillon Exp $
984263bc
MD
36 */
37
38#include <sys/param.h>
39#include <sys/systm.h>
40#include <sys/mbuf.h>
41#include <sys/proc.h>
895c1f85 42#include <sys/priv.h>
984263bc
MD
43#include <sys/protosw.h>
44#include <sys/socket.h>
45#include <sys/socketvar.h>
46
47#include <net/raw_cb.h>
48
49/*
50 * Initialize raw connection block q.
51 */
52void
3bf25ce1 53raw_init(void)
984263bc
MD
54{
55 LIST_INIT(&rawcb_list);
56}
57
47db7f9b
MD
58/************************************************************************
59 * RAW PROTOCOL INTERFACE *
60 ************************************************************************/
984263bc
MD
61
62/*
47db7f9b
MD
63 * Raw protocol input routine. Find the socket associated with the packet(s)
64 * and move them over. If nothing exists for this packet, drop it. This
65 * routine is indirect called via rts_input() and will be serialized on
66 * cpu 0.
67 *
68 * Most other raw protocol interface functions are also serialized XXX.
984263bc
MD
69 */
70void
590b8cd4
JH
71raw_input(struct mbuf *m0, struct sockproto *proto, const struct sockaddr *src,
72 const struct sockaddr *dst)
984263bc 73{
dadab5e9
MD
74 struct rawcb *rp;
75 struct mbuf *m = m0;
984263bc
MD
76 struct socket *last;
77
590b8cd4 78 last = NULL;
984263bc
MD
79 LIST_FOREACH(rp, &rawcb_list, list) {
80 if (rp->rcb_proto.sp_family != proto->sp_family)
81 continue;
82 if (rp->rcb_proto.sp_protocol &&
83 rp->rcb_proto.sp_protocol != proto->sp_protocol)
84 continue;
85 /*
86 * We assume the lower level routines have
87 * placed the address in a canonical format
88 * suitable for a structure comparison.
89 *
90 * Note that if the lengths are not the same
91 * the comparison will fail at the first byte.
92 */
0c3c561c 93 if (rp->rcb_laddr && !sa_equal(rp->rcb_laddr, dst))
984263bc 94 continue;
0c3c561c 95 if (rp->rcb_faddr && !sa_equal(rp->rcb_faddr, src))
984263bc
MD
96 continue;
97 if (last) {
98 struct mbuf *n;
f23061d4
JH
99
100 n = m_copypacket(m, MB_DONTWAIT);
590b8cd4 101 if (n != NULL) {
6d49aa6f 102 if (ssb_appendaddr(&last->so_rcv, src, n,
590b8cd4 103 (struct mbuf *)0) == 0) {
984263bc
MD
104 /* should notify about lost packet */
105 m_freem(n);
590b8cd4 106 } else {
984263bc 107 sorwakeup(last);
984263bc
MD
108 }
109 }
110 }
111 last = rp->rcb_socket;
112 }
113 if (last) {
6d49aa6f 114 if (ssb_appendaddr(&last->so_rcv, src, m, (struct mbuf *)0) == 0)
984263bc 115 m_freem(m);
590b8cd4 116 else
984263bc 117 sorwakeup(last);
590b8cd4 118 } else {
984263bc 119 m_freem(m);
590b8cd4 120 }
984263bc
MD
121}
122
123/*ARGSUSED*/
124void
3bf25ce1 125raw_ctlinput(int cmd, struct sockaddr *arg, void *dummy)
984263bc
MD
126{
127
128 if (cmd < 0 || cmd > PRC_NCMDS)
129 return;
130 /* INCOMPLETE */
131}
132
133static int
134raw_uabort(struct socket *so)
135{
136 struct rawcb *rp = sotorawcb(so);
137
590b8cd4 138 if (rp == NULL)
984263bc
MD
139 return EINVAL;
140 raw_disconnect(rp);
141 sofree(so);
142 soisdisconnected(so);
143 return 0;
144}
145
146/* pru_accept is EOPNOTSUPP */
147
148static int
e4700d00 149raw_uattach(struct socket *so, int proto, struct pru_attach_info *ai)
984263bc
MD
150{
151 struct rawcb *rp = sotorawcb(so);
152 int error;
153
590b8cd4 154 if (rp == NULL)
984263bc 155 return EINVAL;
895c1f85 156 if ((error = priv_check_cred(ai->p_ucred, PRIV_ROOT, NULL_CRED_OKAY)) != 0)
984263bc 157 return error;
e4700d00 158 return raw_attach(so, proto, ai->sb_rlimit);
984263bc
MD
159}
160
161static int
dadab5e9 162raw_ubind(struct socket *so, struct sockaddr *nam, struct thread *td)
984263bc
MD
163{
164 return EINVAL;
165}
166
167static int
dadab5e9 168raw_uconnect(struct socket *so, struct sockaddr *nam, struct thread *td)
984263bc
MD
169{
170 return EINVAL;
171}
172
173/* pru_connect2 is EOPNOTSUPP */
174/* pru_control is EOPNOTSUPP */
175
176static int
177raw_udetach(struct socket *so)
178{
179 struct rawcb *rp = sotorawcb(so);
180
590b8cd4 181 if (rp == NULL)
984263bc
MD
182 return EINVAL;
183
184 raw_detach(rp);
185 return 0;
186}
187
188static int
189raw_udisconnect(struct socket *so)
190{
191 struct rawcb *rp = sotorawcb(so);
192
590b8cd4 193 if (rp == NULL)
984263bc 194 return EINVAL;
590b8cd4 195 if (rp->rcb_faddr == NULL) {
984263bc
MD
196 return ENOTCONN;
197 }
198 raw_disconnect(rp);
199 soisdisconnected(so);
200 return 0;
201}
202
203/* pru_listen is EOPNOTSUPP */
204
205static int
206raw_upeeraddr(struct socket *so, struct sockaddr **nam)
207{
208 struct rawcb *rp = sotorawcb(so);
209
590b8cd4 210 if (rp == NULL)
984263bc 211 return EINVAL;
590b8cd4 212 if (rp->rcb_faddr == NULL) {
984263bc
MD
213 return ENOTCONN;
214 }
cfa2ba21 215 *nam = dup_sockaddr(rp->rcb_faddr);
984263bc
MD
216 return 0;
217}
218
219/* pru_rcvd is EOPNOTSUPP */
220/* pru_rcvoob is EOPNOTSUPP */
221
222static int
223raw_usend(struct socket *so, int flags, struct mbuf *m,
dadab5e9 224 struct sockaddr *nam, struct mbuf *control, struct thread *td)
984263bc
MD
225{
226 int error;
227 struct rawcb *rp = sotorawcb(so);
47e78ae8 228 struct pr_output_info oi;
984263bc 229
590b8cd4 230 if (rp == NULL) {
984263bc
MD
231 error = EINVAL;
232 goto release;
233 }
234
235 if (flags & PRUS_OOB) {
236 error = EOPNOTSUPP;
237 goto release;
238 }
239
240 if (control && control->m_len) {
241 error = EOPNOTSUPP;
242 goto release;
243 }
244 if (nam) {
245 if (rp->rcb_faddr) {
246 error = EISCONN;
247 goto release;
248 }
249 rp->rcb_faddr = nam;
590b8cd4 250 } else if (rp->rcb_faddr == NULL) {
984263bc
MD
251 error = ENOTCONN;
252 goto release;
253 }
47e78ae8
JH
254 oi.p_pid = td->td_proc->p_pid;
255 error = (*so->so_proto->pr_output)(m, so, &oi);
984263bc
MD
256 m = NULL;
257 if (nam)
590b8cd4 258 rp->rcb_faddr = NULL;
984263bc
MD
259release:
260 if (m != NULL)
261 m_freem(m);
262 return (error);
263}
264
265/* pru_sense is null */
266
267static int
268raw_ushutdown(struct socket *so)
269{
270 struct rawcb *rp = sotorawcb(so);
271
590b8cd4 272 if (rp == NULL)
984263bc
MD
273 return EINVAL;
274 socantsendmore(so);
275 return 0;
276}
277
278static int
279raw_usockaddr(struct socket *so, struct sockaddr **nam)
280{
281 struct rawcb *rp = sotorawcb(so);
282
590b8cd4 283 if (rp == NULL)
984263bc 284 return EINVAL;
590b8cd4 285 if (rp->rcb_laddr == NULL)
984263bc 286 return EINVAL;
cfa2ba21 287 *nam = dup_sockaddr(rp->rcb_laddr);
984263bc
MD
288 return 0;
289}
290
291struct pr_usrreqs raw_usrreqs = {
fa5e758c
MD
292 .pru_abort = raw_uabort,
293 .pru_accept = pru_accept_notsupp,
294 .pru_attach = raw_uattach,
295 .pru_bind = raw_ubind,
296 .pru_connect = raw_uconnect,
297 .pru_connect2 = pru_connect2_notsupp,
298 .pru_control = pru_control_notsupp,
299 .pru_detach = raw_udetach,
300 .pru_disconnect = raw_udisconnect,
301 .pru_listen = pru_listen_notsupp,
302 .pru_peeraddr = raw_upeeraddr,
303 .pru_rcvd = pru_rcvd_notsupp,
304 .pru_rcvoob = pru_rcvoob_notsupp,
305 .pru_send = raw_usend,
306 .pru_sense = pru_sense_null,
307 .pru_shutdown = raw_ushutdown,
308 .pru_sockaddr = raw_usockaddr,
309 .pru_sosend = sosend,
310 .pru_soreceive = soreceive,
311 .pru_sopoll = sopoll
984263bc 312};
fa5e758c 313